2009 | ||
---|---|---|
73 | Lorrie Faith Cranor: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15-17, 2009 ACM 2009 | |
72 | Janice Y. Tsai, Patrick Gage Kelley, Paul Hankes Drielsma, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh: Who's viewed you?: the impact of feedback in a mobile location-sharing application. CHI 2009: 2003-2012 | |
71 | Serge Egelman, Janice Y. Tsai, Lorrie Faith Cranor, Alessandro Acquisti: Timing is everything?: the effects of timing and placement of online privacy indicators. CHI 2009: 319-328 | |
70 | Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea: Real life challenges in access-control management. CHI 2009: 899-908 | |
69 | Brandon Salmon, Steven W. Schlosser, Lorrie Faith Cranor, Gregory R. Ganger: Perspective: Semantic Data Management for the Home. FAST 2009: 167-182 | |
68 | Aleecia M. McDonald, Robert W. Reeder, Patrick Gage Kelley, Lorrie Faith Cranor: A Comparative Study of Online Privacy Policies and Formats. Privacy Enhancing Technologies 2009: 37-55 | |
67 | Patrick Gage Kelley, Joanna Bresee, Lorrie Faith Cranor, Robert W. Reeder: A "nutrition label" for privacy. SOUPS 2009 | |
66 | Aleecia M. McDonald, Robert W. Reeder, Patrick Gage Kelley, Lorrie Faith Cranor: A comparative study of online privacy policies and formats. SOUPS 2009 | |
65 | Robert W. Reeder, Patrick Gage Kelley, Aleecia M. McDonald, Lorrie Faith Cranor: A user study of the expandable grid applied to P3P privacy policy visualization. SOUPS 2009 | |
64 | Eran Toch, Ramprasad Ravichandran, Lorrie Faith Cranor, Paul Hankes Drielsma, Jason I. Hong, Patrick Gage Kelley, Norman M. Sadeh, Janice Y. Tsai: Analyzing use of privacy policy attributes in a location sharing application. SOUPS 2009 | |
63 | Ponnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Mary Ann Blair, Theodore Pham: School of phish: a real-word evaluation of anti-phishing training. SOUPS 2009 | |
62 | Michael Benisch, Patrick Gage Kelley, Norman M. Sadeh, Tuomas Sandholm, Janice Y. Tsai, Lorrie Faith Cranor, Paul Hankes Drielsma: The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing. SOUPS 2009 | |
61 | Janice Y. Tsai, Serge Egelman, Lorrie Faith Cranor, Alessandro Acquisti: The impact of privacy indicators on search engine browsing patterns. SOUPS 2009 | |
60 | Janice Y. Tsai, Patrick Gage Kelley, Paul Hankes Drielsma, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh: Who's viewed you?: the impact of feedback in a mobile location-sharing application. SOUPS 2009 | |
59 | Sarah Spiekermann, Lorrie Faith Cranor: Engineering Privacy. IEEE Trans. Software Eng. 35(1): 67-82 (2009) | |
58 | Norman M. Sadeh, Jason I. Hong, Lorrie Faith Cranor, Ian Fette, Patrick Gage Kelley, Madhu K. Prabaker, Jinghai Rao: Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing 13(6): 401-412 (2009) | |
2008 | ||
57 | Lorrie Faith Cranor: Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS 2008, Pittsburgh, Pennsylvania, USA, July 23-25, 2008 ACM 2008 | |
56 | Ahren Studer, Christina Johns, Jaanus Kase, Kyle O'Meara, Lorrie Faith Cranor: A Survey to Guide Group Key Protocol Development. ACSAC 2008: 475-484 | |
55 | Patrick Gage Kelley, Paul Hankes Drielsma, Norman M. Sadeh, Lorrie Faith Cranor: User-controllable learning of security and privacy policies. AISec 2008: 11-18 | |
54 | Serge Egelman, Lorrie Faith Cranor, Jason I. Hong: You've been warned: an empirical study of the effectiveness of web browser phishing warnings. CHI 2008: 1065-1074 | |
53 | Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kelli Bacon, Keisha How, Heather Strong: Expandable grids for visualizing and authoring computer security policies. CHI 2008: 1473-1482 | |
52 | Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea: A user study of policy creation in a flexible access-control system. CHI 2008: 543-552 | |
51 | Lorrie Faith Cranor: A Framework for Reasoning About the Human in the Loop. UPSEC 2008 | |
50 | Robert W. Reeder, Patrick Gage Kelley, Aleecia M. McDonald, Lorrie Faith Cranor: A user study of the expandable grid applied to P3P privacy policy visualization. WPES 2008: 45-54 | |
49 | Lorrie Faith Cranor, Serge Egelman, Steve Sheng, Aleecia M. McDonald, Abdur Chowdhury: P3P deployment on websites. Electronic Commerce Research and Applications 7(3): 274-293 (2008) | |
2007 | ||
48 | Lorrie Faith Cranor: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007 ACM 2007 | |
47 | Lorrie Faith Cranor: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007 ACM 2007 | |
46 | Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge: Protecting people from phishing: the design and evaluation of an embedded training email system. CHI 2007: 905-914 | |
45 | Lorrie Faith Cranor, Serge Egelman, Jason I. Hong, Yue Zhang: Phinding Phish: An Evaluation of Anti-Phishing Toolbars. NDSS 2007 | |
44 | Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kami Vaniea: Lessons learned from the deployment of a smartphone-based access-control system. SOUPS 2007: 64-75 | |
43 | Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge: Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. SOUPS 2007: 88-99 | |
42 | Yue Zhang, Jason I. Hong, Lorrie Faith Cranor: Cantina: a content-based approach to detecting phishing web sites. WWW 2007: 639-648 | |
41 | Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cranor: Behavioral response to phishing risk. eCrime Researchers Summit 2007: 37-44 | |
40 | Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sharique Hasan, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong: Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. eCrime Researchers Summit 2007: 70-81 | |
2006 | ||
39 | Lorrie Faith Cranor: Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006 ACM 2006 | |
38 | Janice Y. Tsai, Lorrie Faith Cranor, Scott Craver: Vicarious infringement creates a privacy ceiling. Digital Rights Management Workshop 2006: 9-18 | |
37 | Serge Egelman, Lorrie Faith Cranor, Abdur Chowdhury: An analysis of P3P-enabled web sites among top-20 search results. ICEC 2006: 197-207 | |
36 | Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor: Trust modelling for online transactions: a phishing scenario. PST 2006: 11 | |
35 | Julia Gideon, Lorrie Faith Cranor, Serge Egelman, Alessandro Acquisti: Power strips, prophylactics, and privacy, oh my! SOUPS 2006: 133-144 | |
34 | Cynthia Kuo, Sasha Romanosky, Lorrie Faith Cranor: Human selection of mnemonic phrase-based passwords. SOUPS 2006: 67-78 | |
33 | Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cranor: Decision strategies and susceptibility to phishing. SOUPS 2006: 79-90 | |
32 | Lorrie Faith Cranor, Praveen Guduru, Manjula Arjula: User interfaces for privacy agents. ACM Trans. Comput.-Hum. Interact. 13(2): 135-178 (2006) | |
31 | Matthew Geiger, Lorrie Faith Cranor: Scrubbing Stubborn Data: An Evaluation of Counter-Forensic Privacy Tools. IEEE Security & Privacy 4(5): 16-25 (2006) | |
30 | Lorrie Faith Cranor: What do they "indicate?": evaluating security and privacy indicators. Interactions 13(3): 45-47 (2006) | |
2005 | ||
29 | Lorrie Faith Cranor: Proceedings of the 1st Symposium on Usable Privacy and Security, SOUPS 2005, Pittsburgh, Pennsylvania, USA, July 6-8, 2005 ACM 2005 | |
28 | Ponnurangam Kumaraguru, Lorrie Faith Cranor: Privacy in India: Attitudes and Awareness. Privacy Enhancing Technologies 2005: 243-258 | |
27 | Lorrie Faith Cranor: Hey, That's Personal! User Modeling 2005: 4 | |
26 | Braden Kowitz, Lorrie Faith Cranor: Peripheral privacy notifications for wireless networks. WPES 2005: 90-96 | |
25 | Lorrie Faith Cranor: Towards usable Web privacy and security. WWW 2005: 352 | |
2004 | ||
24 | Simon Byers, Lorrie Faith Cranor, David P. Kormann, Patrick Drew McDaniel: Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine. Privacy Enhancing Technologies 2004: 314-328 | |
23 | Lorrie Faith Cranor, Simson L. Garfinkel: Guest Editors' Introduction: Secure or Usable? IEEE Security & Privacy 2(5): 16-18 (2004) | |
2003 | ||
22 | Norman M. Sadeh, Mary Jo Dively, Robert J. Kauffman, Yannis Labrou, Onn Shehory, Rahul Telang, Lorrie Faith Cranor: Proceedings of the 5th International Conference on Electronic Commerce, ICEC 2003, Pittsburgh, Pennsylvania, USA, September 30 - October 03, 2003 ACM 2003 | |
21 | Simon Byers, Lorrie Faith Cranor, David P. Kormann, Patrick Drew McDaniel, Eric Cronin: Analysis of security vulnerabilities in the movie production and distribution process. Digital Rights Management Workshop 2003: 1-12 | |
20 | Simon Byers, Lorrie Faith Cranor, David P. Kormann: Automated analysis of P3P-enabled Web sites. ICEC 2003: 326-338 | |
19 | Lorrie Faith Cranor: 'I didn't buy it for myself' privacy and ecommerce personalization. WPES 2003: 111-117 | |
18 | Lorrie Faith Cranor: P3P: Making Privacy Policies More Useful. IEEE Security & Privacy 1(6): 50-55 (2003) | |
2002 | ||
17 | Lorrie Faith Cranor, Manjula Arjula, Praveen Guduru: Use of a P3P user agent by early adopters. WPES 2002: 1-10 | |
16 | Lorrie Faith Cranor: Letter from the Special Section Editors, Ten Years of Computers, Freedom and Privacy. Inf. Soc. 18(3): (2002) | |
15 | Lorrie Faith Cranor: SPECIAL SECTION: Computers, Freedom and Privacy. Inf. Soc. 18(3): (2002) | |
2001 | ||
14 | Marc Waldman, Aviel D. Rubin, Lorrie Faith Cranor: The architecture of robust publishing systems. ACM Trans. Internet Techn. 1(2): 199-230 (2001) | |
13 | Lance J. Hoffman, Lorrie Faith Cranor: Internet voting for public officials: introduction. Commun. ACM 44(1): 69-71 (2001) | |
2000 | ||
12 | Lorrie Faith Cranor: Agents of Choice: Tools that Facilitate Notice and Choice about Web Site Data Practices CoRR cs.CY/0001011: (2000) | |
11 | Lorrie Faith Cranor: Platform for Privacy Preferences - P3P. Datenschutz und Datensicherheit 24(8): (2000) | |
1999 | ||
10 | Mark S. Ackerman, Lorrie Faith Cranor, Joseph Reagle: Privacy in e-commerce: examining user scenarios and privacy preferences. ACM Conference on Electronic Commerce 1999: 1-8 | |
9 | Lorrie Faith Cranor: Minding Your Own Business: The Platform for Privacy Preferences Project and Privacy Minder. USENIX Annual Technical Conference, FREENIX Track 1999: 103-108 | |
8 | Lorrie Faith Cranor, Joseph Reagle, Mark S. Ackerman: Beyond Concern: Understanding Net Users' Attitudes About Online Privacy CoRR cs.CY/9904010: (1999) | |
7 | Lorrie Faith Cranor: Internet Privacy - Introduction. Commun. ACM 42(2): 28-31 (1999) | |
6 | Joseph Reagle, Lorrie Faith Cranor: The Platform for Privacy Preferences. Commun. ACM 42(2): 48-55 (1999) | |
1998 | ||
5 | Lorrie Faith Cranor: Requirements for a P3P Query Language. QL 1998 | |
4 | Lorrie Faith Cranor, Rebecca N. Wright: Influencing Software Usage CoRR cs.CY/9809018: (1998) | |
3 | Lorrie Faith Cranor, Brian A. LaMacchia: Spam! Commun. ACM 41(8): 74-83 (1998) | |
2 | Lorrie Faith Cranor: Laws, Self-Regulation, and P3P: Will W3C's Privacy Platform Help Make the Web Safe for Privacy? Computer Networks 30(1-7): 751-753 (1998) | |
1997 | ||
1 | Lorrie Faith Cranor, Ron Cytron: Sensus: A Security-Conscious Electronic Polling System for the Internet. HICSS (3) 1997: 561-570 |