Learning from “Shadow Security”: Why understanding non-compliant behaviors provides the basis for effective security I Kirlappos, S Parkin, MA Sasse USEC’14 Workshop on Usable Security, 2014 | 144* | 2014 |
Load balancing for massively multiplayer online games F Lu, S Parkin, G Morgan Proceedings of 5th ACM SIGCOMM workshop on Network and system support for …, 2006 | 103 | 2006 |
‘Internet of Things’: How abuse is getting smarter I Lopez-Neira, T Patel, S Parkin, G Danezis, L Tanczer Safe – The Domestic Abuse Quarterly 64, 24-26, 2019 | 94 | 2019 |
An information security ontology incorporating human-behavioural implications SE Parkin, A Van Moorsel, R Coles Proceedings of the 2nd International Conference on Security of Information …, 2009 | 86 | 2009 |
Shadow security as a tool for the learning organization I Kirlappos, S Parkin, MA Sasse ACM SIGCAS Computers and Society 45 (1), 29-37, 2015 | 84 | 2015 |
Productive Security: A scalable methodology for analysing employee security behaviours A Beautement, I Becker, S Parkin, K Krol, A Sasse Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016 | 73 | 2016 |
A stealth approach to usable security: helping IT security managers to identify workable security solutions S Parkin, A van Moorsel, P Inglesant, MA Sasse Proceedings of the 2010 workshop on New security paradigms, 33-50, 2010 | 70 | 2010 |
Towards robust experimental design for user studies in security and privacy K Krol, JM Spring, S Parkin, MA Sasse Learning from Authoritative Security Experiment Results (LASER) Workshop, 2016 | 68 | 2016 |
Of Two Minds about Two-Factor: Understanding Everyday FIDO U2F Usability through Device Comparison and Experience Sampling S Ciolino, S Parkin, P Dunphy Fifteenth Symposium on Usable Privacy and Security (SOUPS '19), 2019 | 60 | 2019 |
Usability Analysis of Shared Device Ecosystem Security: Informing Support for Survivors of IoT-Facilitated Tech-Abuse S Parkin, T Patel, I Lopez-Neira, L Tanczer New Security Paradigms Workshop (NSPW) 2019, 2019 | 57 | 2019 |
[poster] The Security Blanket of the Chat World: An Analytic Evaluation and A User Study of Telegram R Abu-Salma, K Krol, S Parkin, V Koh, K Kwan, J Mahboob, Z Traboulsi, ... Thirteenth Symposium on Usable Privacy and Security (SOUPS '17), 2017 | 54* | 2017 |
The Security Blanket of the Chat World: An Analytic Evaluation and A User Study of Telegram R Abu-Salma, K Krol, S Parkin, V Koh, K Kwan, J Mahboob, Z Traboulsi, ... 2nd European Workshop on Usable Security (EuroUSEC 2017), 2017 | 54 | 2017 |
Awareness is only the first step: A framework for progressive engagement of staff in cyber security M Beyer, S Ahmed, K Doerlemann, S Arnell, S Parkin, MA Sasse, ... Business white paper, Hewlett Packard Enterprise, 2015 | 51 | 2015 |
Finding Security Champions in Blends of Organisational Culture I Becker, S Parkin, MA Sasse 2nd European Workshop on Usable Security (EuroUSEC 2017), 2017 | 50 | 2017 |
‘I feel like we’re really behind the game’: perspectives of the United Kingdom’s intimate partner violence support sector on the rise of technology-facilitated abuse L Tanczer, I López-Neira, S Parkin Journal of Gender-Based Violence, 2021 | 37 | 2021 |
Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption A Demjaha, J Spring, I Becker, S Parkin, MA Sasse Proceedings of the 12th NDSS Workshop on Usable Security (USEC 2018), 2018 | 34 | 2018 |
Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity Theory for Usable Security Z Benenson, G Lenzini, D Oliveira, S Parkin, S Uebelacker Proceedings of the 2015 New Security Paradigms Workshop (NSPW), 85-99, 2015 | 32 | 2015 |
Gender and IoT research report: The rise of the Internet of Things and implications for technology-facilitated abuse L Tanczer, IL Neria, S Parkin, T Patel, G Danezis UCL. https://www. ucl. ac. uk/steapp/sites/steapp/files/giot-report. pdf …, 2018 | 31 | 2018 |
Pragmatic Security: Modelling IT Security Management Responsibilities for SME Archetypes S Parkin, A Fielder, A Ashby 8th ACM CCS International Workshop on Managing Insider Security Threats (MIST), 2016 | 30 | 2016 |
Better the Devil You Know: A User Study of Two CAPTCHAs and a Possible Replacement K Krol, S Parkin, MA Sasse Proceedings of the 10th NDSS Workshop on Usable Security (USEC 2016), 2016 | 28 | 2016 |