2009 |
60 | EE | Janice Y. Tsai,
Patrick Gage Kelley,
Paul Hankes Drielsma,
Lorrie Faith Cranor,
Jason I. Hong,
Norman M. Sadeh:
Who's viewed you?: the impact of feedback in a mobile location-sharing application.
CHI 2009: 2003-2012 |
59 | EE | Serge Egelman,
Janice Y. Tsai,
Lorrie Faith Cranor,
Alessandro Acquisti:
Timing is everything?: the effects of timing and placement of online privacy indicators.
CHI 2009: 319-328 |
58 | EE | Lujo Bauer,
Lorrie Faith Cranor,
Robert W. Reeder,
Michael K. Reiter,
Kami Vaniea:
Real life challenges in access-control management.
CHI 2009: 899-908 |
57 | EE | Brandon Salmon,
Steven W. Schlosser,
Lorrie Faith Cranor,
Gregory R. Ganger:
Perspective: Semantic Data Management for the Home.
FAST 2009: 167-182 |
56 | EE | Sarah Spiekermann,
Lorrie Faith Cranor:
Engineering Privacy.
IEEE Trans. Software Eng. 35(1): 67-82 (2009) |
2008 |
55 | | Lorrie Faith Cranor:
Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS 2008, Pittsburgh, Pennsylvania, USA, July 23-25, 2008
ACM 2008 |
54 | EE | Patrick Gage Kelley,
Paul Hankes Drielsma,
Norman M. Sadeh,
Lorrie Faith Cranor:
User-controllable learning of security and privacy policies.
AISec 2008: 11-18 |
53 | EE | Serge Egelman,
Lorrie Faith Cranor,
Jason I. Hong:
You've been warned: an empirical study of the effectiveness of web browser phishing warnings.
CHI 2008: 1065-1074 |
52 | EE | Robert W. Reeder,
Lujo Bauer,
Lorrie Faith Cranor,
Michael K. Reiter,
Kelli Bacon,
Keisha How,
Heather Strong:
Expandable grids for visualizing and authoring computer security policies.
CHI 2008: 1473-1482 |
51 | EE | Lujo Bauer,
Lorrie Faith Cranor,
Robert W. Reeder,
Michael K. Reiter,
Kami Vaniea:
A user study of policy creation in a flexible access-control system.
CHI 2008: 543-552 |
50 | EE | Lorrie Faith Cranor:
A Framework for Reasoning About the Human in the Loop.
UPSEC 2008 |
49 | EE | Robert W. Reeder,
Patrick Gage Kelley,
Aleecia M. McDonald,
Lorrie Faith Cranor:
A user study of the expandable grid applied to P3P privacy policy visualization.
WPES 2008: 45-54 |
48 | EE | Lorrie Faith Cranor,
Serge Egelman,
Steve Sheng,
Aleecia M. McDonald,
Abdur Chowdhury:
P3P deployment on websites.
Electronic Commerce Research and Applications 7(3): 274-293 (2008) |
2007 |
47 | | Lorrie Faith Cranor:
Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007
ACM 2007 |
46 | | Lorrie Faith Cranor:
Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007
ACM 2007 |
45 | EE | Ponnurangam Kumaraguru,
Yong Rhee,
Alessandro Acquisti,
Lorrie Faith Cranor,
Jason I. Hong,
Elizabeth Nunge:
Protecting people from phishing: the design and evaluation of an embedded training email system.
CHI 2007: 905-914 |
44 | EE | Lorrie Faith Cranor,
Serge Egelman,
Jason I. Hong,
Yue Zhang:
Phinding Phish: An Evaluation of Anti-Phishing Toolbars.
NDSS 2007 |
43 | EE | Lujo Bauer,
Lorrie Faith Cranor,
Michael K. Reiter,
Kami Vaniea:
Lessons learned from the deployment of a smartphone-based access-control system.
SOUPS 2007: 64-75 |
42 | EE | Steve Sheng,
Bryant Magnien,
Ponnurangam Kumaraguru,
Alessandro Acquisti,
Lorrie Faith Cranor,
Jason I. Hong,
Elizabeth Nunge:
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish.
SOUPS 2007: 88-99 |
41 | EE | Yue Zhang,
Jason I. Hong,
Lorrie Faith Cranor:
Cantina: a content-based approach to detecting phishing web sites.
WWW 2007: 639-648 |
40 | EE | Julie S. Downs,
Mandy B. Holbrook,
Lorrie Faith Cranor:
Behavioral response to phishing risk.
eCrime Researchers Summit 2007: 37-44 |
39 | EE | Ponnurangam Kumaraguru,
Yong Rhee,
Steve Sheng,
Sharique Hasan,
Alessandro Acquisti,
Lorrie Faith Cranor,
Jason I. Hong:
Getting users to pay attention to anti-phishing education: evaluation of retention and transfer.
eCrime Researchers Summit 2007: 70-81 |
2006 |
38 | | Lorrie Faith Cranor:
Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006
ACM 2006 |
37 | EE | Janice Y. Tsai,
Lorrie Faith Cranor,
Scott Craver:
Vicarious infringement creates a privacy ceiling.
Digital Rights Management Workshop 2006: 9-18 |
36 | EE | Serge Egelman,
Lorrie Faith Cranor,
Abdur Chowdhury:
An analysis of P3P-enabled web sites among top-20 search results.
ICEC 2006: 197-207 |
35 | EE | Ponnurangam Kumaraguru,
Alessandro Acquisti,
Lorrie Faith Cranor:
Trust modelling for online transactions: a phishing scenario.
PST 2006: 11 |
34 | EE | Julia Gideon,
Lorrie Faith Cranor,
Serge Egelman,
Alessandro Acquisti:
Power strips, prophylactics, and privacy, oh my!
SOUPS 2006: 133-144 |
33 | EE | Cynthia Kuo,
Sasha Romanosky,
Lorrie Faith Cranor:
Human selection of mnemonic phrase-based passwords.
SOUPS 2006: 67-78 |
32 | EE | Julie S. Downs,
Mandy B. Holbrook,
Lorrie Faith Cranor:
Decision strategies and susceptibility to phishing.
SOUPS 2006: 79-90 |
31 | EE | Lorrie Faith Cranor,
Praveen Guduru,
Manjula Arjula:
User interfaces for privacy agents.
ACM Trans. Comput.-Hum. Interact. 13(2): 135-178 (2006) |
30 | EE | Lorrie Faith Cranor:
What do they "indicate?": evaluating security and privacy indicators.
Interactions 13(3): 45-47 (2006) |
2005 |
29 | | Lorrie Faith Cranor:
Proceedings of the 1st Symposium on Usable Privacy and Security, SOUPS 2005, Pittsburgh, Pennsylvania, USA, July 6-8, 2005
ACM 2005 |
28 | EE | Ponnurangam Kumaraguru,
Lorrie Faith Cranor:
Privacy in India: Attitudes and Awareness.
Privacy Enhancing Technologies 2005: 243-258 |
27 | EE | Lorrie Faith Cranor:
Hey, That's Personal!
User Modeling 2005: 4 |
26 | EE | Braden Kowitz,
Lorrie Faith Cranor:
Peripheral privacy notifications for wireless networks.
WPES 2005: 90-96 |
25 | EE | Lorrie Faith Cranor:
Towards usable Web privacy and security.
WWW 2005: 352 |
2004 |
24 | EE | Simon Byers,
Lorrie Faith Cranor,
David P. Kormann,
Patrick Drew McDaniel:
Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine.
Privacy Enhancing Technologies 2004: 314-328 |
23 | EE | Lorrie Faith Cranor,
Simson L. Garfinkel:
Guest Editors' Introduction: Secure or Usable?
IEEE Security & Privacy 2(5): 16-18 (2004) |
2003 |
22 | | Norman M. Sadeh,
Mary Jo Dively,
Robert J. Kauffman,
Yannis Labrou,
Onn Shehory,
Rahul Telang,
Lorrie Faith Cranor:
Proceedings of the 5th International Conference on Electronic Commerce, ICEC 2003, Pittsburgh, Pennsylvania, USA, September 30 - October 03, 2003
ACM 2003 |
21 | EE | Simon Byers,
Lorrie Faith Cranor,
David P. Kormann,
Patrick Drew McDaniel,
Eric Cronin:
Analysis of security vulnerabilities in the movie production and distribution process.
Digital Rights Management Workshop 2003: 1-12 |
20 | EE | Simon Byers,
Lorrie Faith Cranor,
David P. Kormann:
Automated analysis of P3P-enabled Web sites.
ICEC 2003: 326-338 |
19 | EE | Lorrie Faith Cranor:
'I didn't buy it for myself' privacy and ecommerce personalization.
WPES 2003: 111-117 |
18 | EE | Lorrie Faith Cranor:
P3P: Making Privacy Policies More Useful.
IEEE Security & Privacy 1(6): 50-55 (2003) |
2002 |
17 | EE | Lorrie Faith Cranor,
Manjula Arjula,
Praveen Guduru:
Use of a P3P user agent by early adopters.
WPES 2002: 1-10 |
16 | EE | Lorrie Faith Cranor:
Letter from the Special Section Editors, Ten Years of Computers, Freedom and Privacy.
Inf. Soc. 18(3): (2002) |
15 | | Lorrie Faith Cranor:
SPECIAL SECTION: Computers, Freedom and Privacy.
Inf. Soc. 18(3): (2002) |
2001 |
14 | EE | Marc Waldman,
Aviel D. Rubin,
Lorrie Faith Cranor:
The architecture of robust publishing systems.
ACM Trans. Internet Techn. 1(2): 199-230 (2001) |
13 | EE | Lance J. Hoffman,
Lorrie Faith Cranor:
Internet voting for public officials: introduction.
Commun. ACM 44(1): 69-71 (2001) |
2000 |
12 | EE | Lorrie Faith Cranor:
Agents of Choice: Tools that Facilitate Notice and Choice about Web Site Data Practices
CoRR cs.CY/0001011: (2000) |
11 | | Lorrie Faith Cranor:
Platform for Privacy Preferences - P3P.
Datenschutz und Datensicherheit 24(8): (2000) |
1999 |
10 | EE | Mark S. Ackerman,
Lorrie Faith Cranor,
Joseph Reagle:
Privacy in e-commerce: examining user scenarios and privacy preferences.
ACM Conference on Electronic Commerce 1999: 1-8 |
9 | | Lorrie Faith Cranor:
Minding Your Own Business: The Platform for Privacy Preferences Project and Privacy Minder.
USENIX Annual Technical Conference, FREENIX Track 1999: 103-108 |
8 | EE | Lorrie Faith Cranor,
Joseph Reagle,
Mark S. Ackerman:
Beyond Concern: Understanding Net Users' Attitudes About Online Privacy
CoRR cs.CY/9904010: (1999) |
7 | EE | Lorrie Faith Cranor:
Internet Privacy - Introduction.
Commun. ACM 42(2): 28-31 (1999) |
6 | EE | Joseph Reagle,
Lorrie Faith Cranor:
The Platform for Privacy Preferences.
Commun. ACM 42(2): 48-55 (1999) |
1998 |
5 | EE | Lorrie Faith Cranor:
Requirements for a P3P Query Language.
QL 1998 |
4 | EE | Lorrie Faith Cranor,
Rebecca N. Wright:
Influencing Software Usage
CoRR cs.CY/9809018: (1998) |
3 | | Lorrie Faith Cranor,
Brian A. LaMacchia:
Spam!
Commun. ACM 41(8): 74-83 (1998) |
2 | EE | Lorrie Faith Cranor:
Laws, Self-Regulation, and P3P: Will W3C's Privacy Platform Help Make the Web Safe for Privacy?
Computer Networks 30(1-7): 751-753 (1998) |
1997 |
1 | EE | Lorrie Faith Cranor,
Ron Cytron:
Sensus: A Security-Conscious Electronic Polling System for the Internet.
HICSS (3) 1997: 561-570 |