![]() | 2009 | |
---|---|---|
73 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15-17, 2009 ACM 2009 |
72 | ![]() ![]() ![]() ![]() ![]() ![]() | Janice Y. Tsai, Patrick Gage Kelley, Paul Hankes Drielsma, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh: Who's viewed you?: the impact of feedback in a mobile location-sharing application. CHI 2009: 2003-2012 |
71 | ![]() ![]() ![]() ![]() ![]() ![]() | Serge Egelman, Janice Y. Tsai, Lorrie Faith Cranor, Alessandro Acquisti: Timing is everything?: the effects of timing and placement of online privacy indicators. CHI 2009: 319-328 |
70 | ![]() ![]() ![]() ![]() ![]() ![]() | Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea: Real life challenges in access-control management. CHI 2009: 899-908 |
69 | ![]() ![]() ![]() ![]() ![]() ![]() | Brandon Salmon, Steven W. Schlosser, Lorrie Faith Cranor, Gregory R. Ganger: Perspective: Semantic Data Management for the Home. FAST 2009: 167-182 |
68 | ![]() ![]() ![]() ![]() ![]() ![]() | Aleecia M. McDonald, Robert W. Reeder, Patrick Gage Kelley, Lorrie Faith Cranor: A Comparative Study of Online Privacy Policies and Formats. Privacy Enhancing Technologies 2009: 37-55 |
67 | ![]() ![]() ![]() ![]() ![]() ![]() | Patrick Gage Kelley, Joanna Bresee, Lorrie Faith Cranor, Robert W. Reeder: A "nutrition label" for privacy. SOUPS 2009 |
66 | ![]() ![]() ![]() ![]() ![]() ![]() | Aleecia M. McDonald, Robert W. Reeder, Patrick Gage Kelley, Lorrie Faith Cranor: A comparative study of online privacy policies and formats. SOUPS 2009 |
65 | ![]() ![]() ![]() ![]() ![]() ![]() | Robert W. Reeder, Patrick Gage Kelley, Aleecia M. McDonald, Lorrie Faith Cranor: A user study of the expandable grid applied to P3P privacy policy visualization. SOUPS 2009 |
64 | ![]() ![]() ![]() ![]() ![]() ![]() | Eran Toch, Ramprasad Ravichandran, Lorrie Faith Cranor, Paul Hankes Drielsma, Jason I. Hong, Patrick Gage Kelley, Norman M. Sadeh, Janice Y. Tsai: Analyzing use of privacy policy attributes in a location sharing application. SOUPS 2009 |
63 | ![]() ![]() ![]() ![]() ![]() ![]() | Ponnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Mary Ann Blair, Theodore Pham: School of phish: a real-word evaluation of anti-phishing training. SOUPS 2009 |
62 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Benisch, Patrick Gage Kelley, Norman M. Sadeh, Tuomas Sandholm, Janice Y. Tsai, Lorrie Faith Cranor, Paul Hankes Drielsma: The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing. SOUPS 2009 |
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Janice Y. Tsai, Serge Egelman, Lorrie Faith Cranor, Alessandro Acquisti: The impact of privacy indicators on search engine browsing patterns. SOUPS 2009 |
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Janice Y. Tsai, Patrick Gage Kelley, Paul Hankes Drielsma, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh: Who's viewed you?: the impact of feedback in a mobile location-sharing application. SOUPS 2009 |
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Sarah Spiekermann, Lorrie Faith Cranor: Engineering Privacy. IEEE Trans. Software Eng. 35(1): 67-82 (2009) |
58 | ![]() ![]() ![]() ![]() ![]() ![]() | Norman M. Sadeh, Jason I. Hong, Lorrie Faith Cranor, Ian Fette, Patrick Gage Kelley, Madhu K. Prabaker, Jinghai Rao: Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing 13(6): 401-412 (2009) |
2008 | ||
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor: Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS 2008, Pittsburgh, Pennsylvania, USA, July 23-25, 2008 ACM 2008 |
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Ahren Studer, Christina Johns, Jaanus Kase, Kyle O'Meara, Lorrie Faith Cranor: A Survey to Guide Group Key Protocol Development. ACSAC 2008: 475-484 |
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Patrick Gage Kelley, Paul Hankes Drielsma, Norman M. Sadeh, Lorrie Faith Cranor: User-controllable learning of security and privacy policies. AISec 2008: 11-18 |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Serge Egelman, Lorrie Faith Cranor, Jason I. Hong: You've been warned: an empirical study of the effectiveness of web browser phishing warnings. CHI 2008: 1065-1074 |
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kelli Bacon, Keisha How, Heather Strong: Expandable grids for visualizing and authoring computer security policies. CHI 2008: 1473-1482 |
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea: A user study of policy creation in a flexible access-control system. CHI 2008: 543-552 |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor: A Framework for Reasoning About the Human in the Loop. UPSEC 2008 |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Robert W. Reeder, Patrick Gage Kelley, Aleecia M. McDonald, Lorrie Faith Cranor: A user study of the expandable grid applied to P3P privacy policy visualization. WPES 2008: 45-54 |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor, Serge Egelman, Steve Sheng, Aleecia M. McDonald, Abdur Chowdhury: P3P deployment on websites. Electronic Commerce Research and Applications 7(3): 274-293 (2008) |
2007 | ||
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007 ACM 2007 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007 ACM 2007 |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge: Protecting people from phishing: the design and evaluation of an embedded training email system. CHI 2007: 905-914 |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor, Serge Egelman, Jason I. Hong, Yue Zhang: Phinding Phish: An Evaluation of Anti-Phishing Toolbars. NDSS 2007 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kami Vaniea: Lessons learned from the deployment of a smartphone-based access-control system. SOUPS 2007: 64-75 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge: Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. SOUPS 2007: 88-99 |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Yue Zhang, Jason I. Hong, Lorrie Faith Cranor: Cantina: a content-based approach to detecting phishing web sites. WWW 2007: 639-648 |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cranor: Behavioral response to phishing risk. eCrime Researchers Summit 2007: 37-44 |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sharique Hasan, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong: Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. eCrime Researchers Summit 2007: 70-81 |
2006 | ||
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor: Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006 ACM 2006 |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Janice Y. Tsai, Lorrie Faith Cranor, Scott Craver: Vicarious infringement creates a privacy ceiling. Digital Rights Management Workshop 2006: 9-18 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Serge Egelman, Lorrie Faith Cranor, Abdur Chowdhury: An analysis of P3P-enabled web sites among top-20 search results. ICEC 2006: 197-207 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor: Trust modelling for online transactions: a phishing scenario. PST 2006: 11 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Julia Gideon, Lorrie Faith Cranor, Serge Egelman, Alessandro Acquisti: Power strips, prophylactics, and privacy, oh my! SOUPS 2006: 133-144 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Cynthia Kuo, Sasha Romanosky, Lorrie Faith Cranor: Human selection of mnemonic phrase-based passwords. SOUPS 2006: 67-78 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cranor: Decision strategies and susceptibility to phishing. SOUPS 2006: 79-90 |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor, Praveen Guduru, Manjula Arjula: User interfaces for privacy agents. ACM Trans. Comput.-Hum. Interact. 13(2): 135-178 (2006) |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Matthew Geiger, Lorrie Faith Cranor: Scrubbing Stubborn Data: An Evaluation of Counter-Forensic Privacy Tools. IEEE Security & Privacy 4(5): 16-25 (2006) |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor: What do they "indicate?": evaluating security and privacy indicators. Interactions 13(3): 45-47 (2006) |
2005 | ||
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor: Proceedings of the 1st Symposium on Usable Privacy and Security, SOUPS 2005, Pittsburgh, Pennsylvania, USA, July 6-8, 2005 ACM 2005 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Ponnurangam Kumaraguru, Lorrie Faith Cranor: Privacy in India: Attitudes and Awareness. Privacy Enhancing Technologies 2005: 243-258 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor: Hey, That's Personal! User Modeling 2005: 4 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Braden Kowitz, Lorrie Faith Cranor: Peripheral privacy notifications for wireless networks. WPES 2005: 90-96 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor: Towards usable Web privacy and security. WWW 2005: 352 |
2004 | ||
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Simon Byers, Lorrie Faith Cranor, David P. Kormann, Patrick Drew McDaniel: Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine. Privacy Enhancing Technologies 2004: 314-328 |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor, Simson L. Garfinkel: Guest Editors' Introduction: Secure or Usable? IEEE Security & Privacy 2(5): 16-18 (2004) |
2003 | ||
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Norman M. Sadeh, Mary Jo Dively, Robert J. Kauffman, Yannis Labrou, Onn Shehory, Rahul Telang, Lorrie Faith Cranor: Proceedings of the 5th International Conference on Electronic Commerce, ICEC 2003, Pittsburgh, Pennsylvania, USA, September 30 - October 03, 2003 ACM 2003 |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Simon Byers, Lorrie Faith Cranor, David P. Kormann, Patrick Drew McDaniel, Eric Cronin: Analysis of security vulnerabilities in the movie production and distribution process. Digital Rights Management Workshop 2003: 1-12 |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Simon Byers, Lorrie Faith Cranor, David P. Kormann: Automated analysis of P3P-enabled Web sites. ICEC 2003: 326-338 |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor: 'I didn't buy it for myself' privacy and ecommerce personalization. WPES 2003: 111-117 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor: P3P: Making Privacy Policies More Useful. IEEE Security & Privacy 1(6): 50-55 (2003) |
2002 | ||
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor, Manjula Arjula, Praveen Guduru: Use of a P3P user agent by early adopters. WPES 2002: 1-10 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor: Letter from the Special Section Editors, Ten Years of Computers, Freedom and Privacy. Inf. Soc. 18(3): (2002) |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor: SPECIAL SECTION: Computers, Freedom and Privacy. Inf. Soc. 18(3): (2002) |
2001 | ||
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Marc Waldman, Aviel D. Rubin, Lorrie Faith Cranor: The architecture of robust publishing systems. ACM Trans. Internet Techn. 1(2): 199-230 (2001) |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Lance J. Hoffman, Lorrie Faith Cranor: Internet voting for public officials: introduction. Commun. ACM 44(1): 69-71 (2001) |
2000 | ||
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor: Agents of Choice: Tools that Facilitate Notice and Choice about Web Site Data Practices CoRR cs.CY/0001011: (2000) |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor: Platform for Privacy Preferences - P3P. Datenschutz und Datensicherheit 24(8): (2000) |
1999 | ||
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Mark S. Ackerman, Lorrie Faith Cranor, Joseph Reagle: Privacy in e-commerce: examining user scenarios and privacy preferences. ACM Conference on Electronic Commerce 1999: 1-8 |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor: Minding Your Own Business: The Platform for Privacy Preferences Project and Privacy Minder. USENIX Annual Technical Conference, FREENIX Track 1999: 103-108 |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor, Joseph Reagle, Mark S. Ackerman: Beyond Concern: Understanding Net Users' Attitudes About Online Privacy CoRR cs.CY/9904010: (1999) |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor: Internet Privacy - Introduction. Commun. ACM 42(2): 28-31 (1999) |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Joseph Reagle, Lorrie Faith Cranor: The Platform for Privacy Preferences. Commun. ACM 42(2): 48-55 (1999) |
1998 | ||
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor: Requirements for a P3P Query Language. QL 1998 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor, Rebecca N. Wright: Influencing Software Usage CoRR cs.CY/9809018: (1998) |
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor, Brian A. LaMacchia: Spam! Commun. ACM 41(8): 74-83 (1998) |
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor: Laws, Self-Regulation, and P3P: Will W3C's Privacy Platform Help Make the Web Safe for Privacy? Computer Networks 30(1-7): 751-753 (1998) |
1997 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor, Ron Cytron: Sensus: A Security-Conscious Electronic Polling System for the Internet. HICSS (3) 1997: 561-570 |