dblp.uni-trier.dewww.uni-trier.de

Lorrie Faith Cranor

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
60EEJanice Y. Tsai, Patrick Gage Kelley, Paul Hankes Drielsma, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh: Who's viewed you?: the impact of feedback in a mobile location-sharing application. CHI 2009: 2003-2012
59EESerge Egelman, Janice Y. Tsai, Lorrie Faith Cranor, Alessandro Acquisti: Timing is everything?: the effects of timing and placement of online privacy indicators. CHI 2009: 319-328
58EELujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea: Real life challenges in access-control management. CHI 2009: 899-908
57EEBrandon Salmon, Steven W. Schlosser, Lorrie Faith Cranor, Gregory R. Ganger: Perspective: Semantic Data Management for the Home. FAST 2009: 167-182
56EESarah Spiekermann, Lorrie Faith Cranor: Engineering Privacy. IEEE Trans. Software Eng. 35(1): 67-82 (2009)
2008
55 Lorrie Faith Cranor: Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS 2008, Pittsburgh, Pennsylvania, USA, July 23-25, 2008 ACM 2008
54EEPatrick Gage Kelley, Paul Hankes Drielsma, Norman M. Sadeh, Lorrie Faith Cranor: User-controllable learning of security and privacy policies. AISec 2008: 11-18
53EESerge Egelman, Lorrie Faith Cranor, Jason I. Hong: You've been warned: an empirical study of the effectiveness of web browser phishing warnings. CHI 2008: 1065-1074
52EERobert W. Reeder, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kelli Bacon, Keisha How, Heather Strong: Expandable grids for visualizing and authoring computer security policies. CHI 2008: 1473-1482
51EELujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea: A user study of policy creation in a flexible access-control system. CHI 2008: 543-552
50EELorrie Faith Cranor: A Framework for Reasoning About the Human in the Loop. UPSEC 2008
49EERobert W. Reeder, Patrick Gage Kelley, Aleecia M. McDonald, Lorrie Faith Cranor: A user study of the expandable grid applied to P3P privacy policy visualization. WPES 2008: 45-54
48EELorrie Faith Cranor, Serge Egelman, Steve Sheng, Aleecia M. McDonald, Abdur Chowdhury: P3P deployment on websites. Electronic Commerce Research and Applications 7(3): 274-293 (2008)
2007
47 Lorrie Faith Cranor: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007 ACM 2007
46 Lorrie Faith Cranor: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007 ACM 2007
45EEPonnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge: Protecting people from phishing: the design and evaluation of an embedded training email system. CHI 2007: 905-914
44EELorrie Faith Cranor, Serge Egelman, Jason I. Hong, Yue Zhang: Phinding Phish: An Evaluation of Anti-Phishing Toolbars. NDSS 2007
43EELujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kami Vaniea: Lessons learned from the deployment of a smartphone-based access-control system. SOUPS 2007: 64-75
42EESteve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge: Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. SOUPS 2007: 88-99
41EEYue Zhang, Jason I. Hong, Lorrie Faith Cranor: Cantina: a content-based approach to detecting phishing web sites. WWW 2007: 639-648
40EEJulie S. Downs, Mandy B. Holbrook, Lorrie Faith Cranor: Behavioral response to phishing risk. eCrime Researchers Summit 2007: 37-44
39EEPonnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sharique Hasan, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong: Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. eCrime Researchers Summit 2007: 70-81
2006
38 Lorrie Faith Cranor: Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006 ACM 2006
37EEJanice Y. Tsai, Lorrie Faith Cranor, Scott Craver: Vicarious infringement creates a privacy ceiling. Digital Rights Management Workshop 2006: 9-18
36EESerge Egelman, Lorrie Faith Cranor, Abdur Chowdhury: An analysis of P3P-enabled web sites among top-20 search results. ICEC 2006: 197-207
35EEPonnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor: Trust modelling for online transactions: a phishing scenario. PST 2006: 11
34EEJulia Gideon, Lorrie Faith Cranor, Serge Egelman, Alessandro Acquisti: Power strips, prophylactics, and privacy, oh my! SOUPS 2006: 133-144
33EECynthia Kuo, Sasha Romanosky, Lorrie Faith Cranor: Human selection of mnemonic phrase-based passwords. SOUPS 2006: 67-78
32EEJulie S. Downs, Mandy B. Holbrook, Lorrie Faith Cranor: Decision strategies and susceptibility to phishing. SOUPS 2006: 79-90
31EELorrie Faith Cranor, Praveen Guduru, Manjula Arjula: User interfaces for privacy agents. ACM Trans. Comput.-Hum. Interact. 13(2): 135-178 (2006)
30EELorrie Faith Cranor: What do they "indicate?": evaluating security and privacy indicators. Interactions 13(3): 45-47 (2006)
2005
29 Lorrie Faith Cranor: Proceedings of the 1st Symposium on Usable Privacy and Security, SOUPS 2005, Pittsburgh, Pennsylvania, USA, July 6-8, 2005 ACM 2005
28EEPonnurangam Kumaraguru, Lorrie Faith Cranor: Privacy in India: Attitudes and Awareness. Privacy Enhancing Technologies 2005: 243-258
27EELorrie Faith Cranor: Hey, That's Personal! User Modeling 2005: 4
26EEBraden Kowitz, Lorrie Faith Cranor: Peripheral privacy notifications for wireless networks. WPES 2005: 90-96
25EELorrie Faith Cranor: Towards usable Web privacy and security. WWW 2005: 352
2004
24EESimon Byers, Lorrie Faith Cranor, David P. Kormann, Patrick Drew McDaniel: Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine. Privacy Enhancing Technologies 2004: 314-328
23EELorrie Faith Cranor, Simson L. Garfinkel: Guest Editors' Introduction: Secure or Usable? IEEE Security & Privacy 2(5): 16-18 (2004)
2003
22 Norman M. Sadeh, Mary Jo Dively, Robert J. Kauffman, Yannis Labrou, Onn Shehory, Rahul Telang, Lorrie Faith Cranor: Proceedings of the 5th International Conference on Electronic Commerce, ICEC 2003, Pittsburgh, Pennsylvania, USA, September 30 - October 03, 2003 ACM 2003
21EESimon Byers, Lorrie Faith Cranor, David P. Kormann, Patrick Drew McDaniel, Eric Cronin: Analysis of security vulnerabilities in the movie production and distribution process. Digital Rights Management Workshop 2003: 1-12
20EESimon Byers, Lorrie Faith Cranor, David P. Kormann: Automated analysis of P3P-enabled Web sites. ICEC 2003: 326-338
19EELorrie Faith Cranor: 'I didn't buy it for myself' privacy and ecommerce personalization. WPES 2003: 111-117
18EELorrie Faith Cranor: P3P: Making Privacy Policies More Useful. IEEE Security & Privacy 1(6): 50-55 (2003)
2002
17EELorrie Faith Cranor, Manjula Arjula, Praveen Guduru: Use of a P3P user agent by early adopters. WPES 2002: 1-10
16EELorrie Faith Cranor: Letter from the Special Section Editors, Ten Years of Computers, Freedom and Privacy. Inf. Soc. 18(3): (2002)
15 Lorrie Faith Cranor: SPECIAL SECTION: Computers, Freedom and Privacy. Inf. Soc. 18(3): (2002)
2001
14EEMarc Waldman, Aviel D. Rubin, Lorrie Faith Cranor: The architecture of robust publishing systems. ACM Trans. Internet Techn. 1(2): 199-230 (2001)
13EELance J. Hoffman, Lorrie Faith Cranor: Internet voting for public officials: introduction. Commun. ACM 44(1): 69-71 (2001)
2000
12EELorrie Faith Cranor: Agents of Choice: Tools that Facilitate Notice and Choice about Web Site Data Practices CoRR cs.CY/0001011: (2000)
11 Lorrie Faith Cranor: Platform for Privacy Preferences - P3P. Datenschutz und Datensicherheit 24(8): (2000)
1999
10EEMark S. Ackerman, Lorrie Faith Cranor, Joseph Reagle: Privacy in e-commerce: examining user scenarios and privacy preferences. ACM Conference on Electronic Commerce 1999: 1-8
9 Lorrie Faith Cranor: Minding Your Own Business: The Platform for Privacy Preferences Project and Privacy Minder. USENIX Annual Technical Conference, FREENIX Track 1999: 103-108
8EELorrie Faith Cranor, Joseph Reagle, Mark S. Ackerman: Beyond Concern: Understanding Net Users' Attitudes About Online Privacy CoRR cs.CY/9904010: (1999)
7EELorrie Faith Cranor: Internet Privacy - Introduction. Commun. ACM 42(2): 28-31 (1999)
6EEJoseph Reagle, Lorrie Faith Cranor: The Platform for Privacy Preferences. Commun. ACM 42(2): 48-55 (1999)
1998
5EELorrie Faith Cranor: Requirements for a P3P Query Language. QL 1998
4EELorrie Faith Cranor, Rebecca N. Wright: Influencing Software Usage CoRR cs.CY/9809018: (1998)
3 Lorrie Faith Cranor, Brian A. LaMacchia: Spam! Commun. ACM 41(8): 74-83 (1998)
2EELorrie Faith Cranor: Laws, Self-Regulation, and P3P: Will W3C's Privacy Platform Help Make the Web Safe for Privacy? Computer Networks 30(1-7): 751-753 (1998)
1997
1EELorrie Faith Cranor, Ron Cytron: Sensus: A Security-Conscious Electronic Polling System for the Internet. HICSS (3) 1997: 561-570

Coauthor Index

1Mark S. Ackerman [8] [10]
2Alessandro Acquisti [34] [35] [39] [42] [45] [59]
3Manjula Arjula [17] [31]
4Kelli Bacon [52]
5Lujo Bauer [43] [51] [52] [58]
6Simon Byers [20] [21] [24]
7Abdur Chowdhury [36] [48]
8Scott Craver [37]
9Eric Cronin [21]
10Ron Cytron (Ron K. Cytron) [1]
11Mary Jo Dively [22]
12Julie S. Downs [32] [40]
13Paul Hankes Drielsma [54] [60]
14Serge Egelman [34] [36] [44] [48] [53] [59]
15Gregory R. Ganger [57]
16Simson L. Garfinkel [23]
17Julia Gideon [34]
18Praveen Guduru [17] [31]
19Sharique Hasan [39]
20Lance J. Hoffman [13]
21Mandy B. Holbrook [32] [40]
22Jason I. Hong [39] [41] [42] [44] [45] [53] [60]
23Keisha How [52]
24Robert J. Kauffman [22]
25Patrick Gage Kelley [49] [54] [60]
26David P. Kormann [20] [21] [24]
27Braden Kowitz [26]
28Ponnurangam Kumaraguru [28] [35] [39] [42] [45]
29Cynthia Kuo [33]
30Brian A. LaMacchia [3]
31Yannis Labrou [22]
32Bryant Magnien [42]
33Patrick Drew McDaniel (Patrick McDaniel) [21] [24]
34Aleecia M. McDonald [48] [49]
35Elizabeth Nunge [42] [45]
36Joseph Reagle [6] [8] [10]
37Robert W. Reeder [49] [51] [52] [58]
38Michael K. Reiter [43] [51] [52] [58]
39Yong Rhee [39] [45]
40Sasha Romanosky [33]
41Aviel D. Rubin [14]
42Norman M. Sadeh [22] [54] [60]
43Brandon Salmon [57]
44Steven W. Schlosser [57]
45Onn Shehory [22]
46Steve Sheng [39] [42] [48]
47Sarah Spiekermann [56]
48Heather Strong [52]
49Rahul Telang [22]
50Janice Y. Tsai [37] [59] [60]
51Kami Vaniea [43] [51] [58]
52Marc Waldman [14]
53Rebecca N. Wright [4]
54Yue Zhang [41] [44]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)