Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Lorrie Faith Cranor
@article{DBLP:journals/cacm/CranorAN24, author = {Lorrie Faith Cranor and Yuvraj Agarwal and Pardis Emami Naeini}, title = {Internet of Things Security and Privacy Labels Should Empower Consumers}, journal = {Commun. {ACM}}, volume = {67}, number = {3}, pages = {29--31}, year = {2024}, url = {https://doi.org/10.1145/3637630}, doi = {10.1145/3637630}, timestamp = {Sat, 23 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/CranorAN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imwut/LiCAH24, author = {Tianshi Li and Lorrie Faith Cranor and Yuvraj Agarwal and Jason I. Hong}, title = {Matcha: An {IDE} Plugin for Creating Accurate Privacy Nutrition Labels}, journal = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.}, volume = {8}, number = {1}, pages = {33:1--33:38}, year = {2024}, url = {https://doi.org/10.1145/3643544}, doi = {10.1145/3643544}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imwut/LiCAH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-03582, author = {Tianshi Li and Lorrie Faith Cranor and Yuvraj Agarwal and Jason I. Hong}, title = {Matcha: An {IDE} Plugin for Creating Accurate Privacy Nutrition Labels}, journal = {CoRR}, volume = {abs/2402.03582}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.03582}, doi = {10.48550/ARXIV.2402.03582}, eprinttype = {arXiv}, eprint = {2402.03582}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-03582.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/CranorH23, author = {Lorrie Faith Cranor and Hana Habib}, title = {Metrics for Success: Why and How to Evaluate Privacy Choice Usability}, journal = {Commun. {ACM}}, volume = {66}, number = {3}, pages = {35--37}, year = {2023}, url = {https://doi.org/10.1145/3581764}, doi = {10.1145/3581764}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/CranorH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BlakleyC23, author = {Bob Blakley and Lorrie Cranor}, title = {Katie Moussouris: Vulnerability Disclosure and Security Workforce Development}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {1}, pages = {11--18}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2022.3222043}, doi = {10.1109/MSEC.2022.3222043}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BlakleyC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BlakleyC23a, author = {Bob Blakley and Lorrie Cranor}, title = {A 20th Anniversary Episode Chat With S{\&}P Editors George Cybenko, Carl Landwehr, Shari Lawrence Pfleeger, and Sean Peisert}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {2}, pages = {9--16}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2023.3239179}, doi = {10.1109/MSEC.2023.3239179}, timestamp = {Tue, 25 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BlakleyC23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/ColnagoCA23, author = {Jessica Colnago and Lorrie Faith Cranor and Alessandro Acquisti}, title = {Is There a Reverse Privacy Paradox? An Exploratory Analysis of Gaps Between Privacy Perspectives and Privacy-Seeking Behaviors}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {1}, pages = {455--476}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0027}, doi = {10.56553/POPETS-2023-0027}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/ColnagoCA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/GallardoCJBCBC23, author = {Andrea Gallardo and Chris Choy and Jaideep Juneja and Efe Bozkir and Camille Cobb and Lujo Bauer and Lorrie Cranor}, title = {Speculative Privacy Concerns about {AR} Glasses Data Collection}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {4}, pages = {416--435}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0117}, doi = {10.56553/POPETS-2023-0117}, timestamp = {Thu, 17 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/GallardoCJBCBC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/Bouma-SimsLLSNY23, author = {Elijah Robert Bouma{-}Sims and Megan Li and Yanzi Lin and Adia Sakura{-}Lemessy and Alexandra Nisenoff and Ellie Young and Eleanor Birrell and Lorrie Faith Cranor and Hana Habib}, editor = {Albrecht Schmidt and Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and Tesh Goyal and Per Ola Kristensson and Anicia Peters and Stefanie Mueller and Julie R. Williamson and Max L. Wilson}, title = {A {US-UK} Usability Evaluation of Consent Management Platform Cookie Consent Interface Design on Desktop and Mobile}, booktitle = {Proceedings of the 2023 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2023, Hamburg, Germany, April 23-28, 2023}, pages = {163:1--163:36}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3544548.3580725}, doi = {10.1145/3544548.3580725}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/Bouma-SimsLLSNY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/ImWLCHC0S23, author = {Jane Im and Ruiyi Wang and Weikun Lyu and Nick Cook and Hana Habib and Lorrie Faith Cranor and Nikola Banovic and Florian Schaub}, editor = {Albrecht Schmidt and Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and Tesh Goyal and Per Ola Kristensson and Anicia Peters and Stefanie Mueller and Julie R. Williamson and Max L. Wilson}, title = {Less is Not More: Improving Findability and Actionability of Privacy Controls for Online Behavioral Advertising}, booktitle = {Proceedings of the 2023 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2023, Hamburg, Germany, April 23-28, 2023}, pages = {661:1--661:33}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3544548.3580773}, doi = {10.1145/3544548.3580773}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/ImWLCHC0S23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/NaeiniDAC23, author = {Pardis Emami Naeini and Janarth Dheenadhayalan and Yuvraj Agarwal and Lorrie Faith Cranor}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Are Consumers Willing to Pay for Security and Privacy of IoT Devices?}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {1505--1522}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/emami-naeini}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/NaeiniDAC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-10148, author = {Eman Alashwali and Lorrie Faith Cranor}, title = {Privacy Perceptions and Behaviors of Google Personal Account Holders in Saudi Arabia}, journal = {CoRR}, volume = {abs/2308.10148}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.10148}, doi = {10.48550/ARXIV.2308.10148}, eprinttype = {arXiv}, eprint = {2308.10148}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-10148.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-00226, author = {Karen Sowon and Edith Luhanga and Lorrie Faith Cranor and Giulia Fanti and Conrad Tucker and Assane Gueye}, title = {The Role of User-Agent Interactions on Mobile Money Practices in Kenya and Tanzania}, journal = {CoRR}, volume = {abs/2309.00226}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.00226}, doi = {10.48550/ARXIV.2309.00226}, eprinttype = {arXiv}, eprint = {2309.00226}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-00226.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-00830, author = {Edith Luhanga and Karen Sowon and Lorrie Faith Cranor and Giulia Fanti and Conrad Tucker and Assane Gueye}, title = {User Experiences with Third-Party {SIM} Cards and {ID} Registration in Kenya and Tanzania}, journal = {CoRR}, volume = {abs/2311.00830}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.00830}, doi = {10.48550/ARXIV.2311.00830}, eprinttype = {arXiv}, eprint = {2311.00830}, timestamp = {Tue, 07 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-00830.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-03918, author = {Yanzi Lin and Jaideep Juneja and Eleanor Birrell and Lorrie Faith Cranor}, title = {Data Safety vs. App Privacy: Comparing the Usability of Android and iOS Privacy Labels}, journal = {CoRR}, volume = {abs/2312.03918}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.03918}, doi = {10.48550/ARXIV.2312.03918}, eprinttype = {arXiv}, eprint = {2312.03918}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-03918.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/SkirpanOBCC22, author = {Michael Skirpan and Maggie Oates and Daragh Byrne and Robert K. Cunningham and Lorrie Faith Cranor}, title = {Is a privacy crisis experienced, a privacy crisis avoided?}, journal = {Commun. {ACM}}, volume = {65}, number = {3}, pages = {26--29}, year = {2022}, url = {https://doi.org/10.1145/3512325}, doi = {10.1145/3512325}, timestamp = {Fri, 25 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/SkirpanOBCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Cranor22, author = {Lorrie Faith Cranor}, title = {Cookie monster}, journal = {Commun. {ACM}}, volume = {65}, number = {7}, pages = {30--32}, year = {2022}, url = {https://doi.org/10.1145/3538639}, doi = {10.1145/3538639}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/Cranor22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Cranor22a, author = {Lorrie Faith Cranor}, title = {Mobile-app privacy nutrition labels missing key ingredients for success}, journal = {Commun. {ACM}}, volume = {65}, number = {11}, pages = {26--28}, year = {2022}, url = {https://doi.org/10.1145/3563967}, doi = {10.1145/3563967}, timestamp = {Mon, 07 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Cranor22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/NaeiniDAC22, author = {Pardis Emami Naeini and Janarth Dheenadhayalan and Yuvraj Agarwal and Lorrie Faith Cranor}, title = {An Informative Security and Privacy "Nutrition" Label for Internet of Things Devices}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {2}, pages = {31--39}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2021.3132398}, doi = {10.1109/MSEC.2021.3132398}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/NaeiniDAC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BlakleyC22, author = {Bob Blakley and Lorrie Faith Cranor}, title = {High Assurance in the Twenty-First Century With Roger Schell}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {3}, pages = {12--21}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2022.3159044}, doi = {10.1109/MSEC.2022.3159044}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BlakleyC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmhci/HabibPYSZC22, author = {Hana Habib and Sarah Pearman and Ellie Young and Ishika Saxena and Robert Zhang and Lorrie Faith Cranor}, title = {Identifying User Needs for Advertising Controls on Facebook}, journal = {Proc. {ACM} Hum. Comput. Interact.}, volume = {6}, number = {{CSCW1}}, pages = {59:1--59:42}, year = {2022}, url = {https://doi.org/10.1145/3512906}, doi = {10.1145/3512906}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pacmhci/HabibPYSZC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/StorySCYACSS22, author = {Peter Story and Daniel Smullen and Rex Chen and Yaxing Yao and Alessandro Acquisti and Lorrie Faith Cranor and Norman M. Sadeh and Florian Schaub}, title = {Increasing Adoption of Tor Browser Using Informational and Planning Nudges}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {2}, pages = {152--183}, year = {2022}, url = {https://doi.org/10.2478/popets-2022-0040}, doi = {10.2478/POPETS-2022-0040}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/StorySCYACSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/PearmanYC22, author = {Sarah Pearman and Ellie Young and Lorrie Faith Cranor}, title = {User-friendly yet rarely read: {A} case study on the redesign of an online {HIPAA} authorization}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {3}, pages = {558--581}, year = {2022}, url = {https://doi.org/10.56553/popets-2022-0086}, doi = {10.56553/POPETS-2022-0086}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/PearmanYC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/ZhangFYCS22, author = {Shikun Zhang and Yuanyuan Feng and Yaxing Yao and Lorrie Faith Cranor and Norman Sadeh}, title = {How Usable Are iOS App Privacy Labels?}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {4}, pages = {204--228}, year = {2022}, url = {https://doi.org/10.56553/popets-2022-0106}, doi = {10.56553/POPETS-2022-0106}, timestamp = {Fri, 30 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/ZhangFYCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tweb/CrichtonCC22, author = {Kyle Crichton and Nicolas Christin and Lorrie Faith Cranor}, title = {How Do Home Computer Users Browse the Web?}, journal = {{ACM} Trans. Web}, volume = {16}, number = {1}, pages = {3:1--3:27}, year = {2022}, url = {https://doi.org/10.1145/3473343}, doi = {10.1145/3473343}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tweb/CrichtonCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/LiCLACH22, author = {Yucheng Li and Deyuan Chen and Tianshi Li and Yuvraj Agarwal and Lorrie Faith Cranor and Jason I. Hong}, editor = {Simone D. J. Barbosa and Cliff Lampe and Caroline Appert and David A. Shamma}, title = {Understanding iOS Privacy Nutrition Labels: An Exploratory Large-Scale Analysis of App Store Data}, booktitle = {{CHI} '22: {CHI} Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022 - 5 May 2022, Extended Abstracts}, pages = {356:1--356:7}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3491101.3519739}, doi = {10.1145/3491101.3519739}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/LiCLACH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/LiRACH22, author = {Tianshi Li and Kayla Reiman and Yuvraj Agarwal and Lorrie Faith Cranor and Jason I. Hong}, editor = {Simone D. J. Barbosa and Cliff Lampe and Caroline Appert and David A. Shamma and Steven Mark Drucker and Julie R. Williamson and Koji Yatani}, title = {Understanding Challenges for Developers to Create Accurate Privacy Nutrition Labels}, booktitle = {{CHI} '22: {CHI} Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022 - 5 May 2022}, pages = {588:1--588:24}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3491102.3502012}, doi = {10.1145/3491102.3502012}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/LiRACH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/HabibLYC22, author = {Hana Habib and Megan Li and Ellie Young and Lorrie Faith Cranor}, editor = {Simone D. J. Barbosa and Cliff Lampe and Caroline Appert and David A. Shamma and Steven Mark Drucker and Julie R. Williamson and Koji Yatani}, title = {"Okay, whatever": An Evaluation of Cookie Consent Interfaces}, booktitle = {{CHI} '22: {CHI} Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022 - 5 May 2022}, pages = {621:1--621:27}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3491102.3501985}, doi = {10.1145/3491102.3501985}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/HabibLYC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/HabibC22, author = {Hana Habib and Lorrie Faith Cranor}, editor = {Sonia Chiasson and Apu Kapadia}, title = {Evaluating the Usability of Privacy Choice Mechanisms}, booktitle = {Eighteenth Symposium on Usable Privacy and Security, {SOUPS} 2022, Boston, MA, USA, August 7-9, 2022}, pages = {273--289}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/soups2022/presentation/habib}, timestamp = {Wed, 26 Oct 2022 12:44:43 +0200}, biburl = {https://dblp.org/rec/conf/soups/HabibC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/GallardoKLBC22, author = {Andrea Gallardo and Hanseul Kim and Tianying Li and Lujo Bauer and Lorrie Faith Cranor}, editor = {Sonia Chiasson and Apu Kapadia}, title = {Detecting iPhone Security Compromise in Simulated Stalking Scenarios: Strategies and Obstacles}, booktitle = {Eighteenth Symposium on Usable Privacy and Security, {SOUPS} 2022, Boston, MA, USA, August 7-9, 2022}, pages = {291--312}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/soups2022/presentation/gallardo}, timestamp = {Wed, 26 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/GallardoKLBC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/ColnagoCAS22, author = {Jessica Colnago and Lorrie Faith Cranor and Alessandro Acquisti and Kate Hazel Stanton}, editor = {Sonia Chiasson and Apu Kapadia}, title = {Is it a concern or a preference? An investigation into the ability of privacy scales to capture and distinguish granular privacy constructs}, booktitle = {Eighteenth Symposium on Usable Privacy and Security, {SOUPS} 2022, Boston, MA, USA, August 7-9, 2022}, pages = {331--346}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/soups2022/presentation/colnago}, timestamp = {Wed, 26 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/ColnagoCAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Cranor21, author = {Lorrie Faith Cranor}, title = {Informing California privacy regulations with evidence from research}, journal = {Commun. {ACM}}, volume = {64}, number = {3}, pages = {29--32}, year = {2021}, url = {https://doi.org/10.1145/3447253}, doi = {10.1145/3447253}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/Cranor21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Cranor21a, author = {Lorrie Faith Cranor}, title = {Lessons from the loo}, journal = {Commun. {ACM}}, volume = {64}, number = {7}, pages = {27--29}, year = {2021}, url = {https://doi.org/10.1145/3466609}, doi = {10.1145/3466609}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/Cranor21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/KissnerC21, author = {Lea Kissner and Lorrie Faith Cranor}, title = {Privacy engineering superheroes}, journal = {Commun. {ACM}}, volume = {64}, number = {11}, pages = {23--25}, year = {2021}, url = {https://doi.org/10.1145/3486631}, doi = {10.1145/3486631}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/KissnerC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/0001C21, author = {Bob Blakley and Lorrie Faith Cranor}, title = {A Discussion of Public Health, Trust, and Privacy With Susan Landau}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {5}, pages = {9--15}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3092956}, doi = {10.1109/MSEC.2021.3092956}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/0001C21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BlakleyC21, author = {Bob Blakley and Lorrie Faith Cranor}, title = {A Discussion of Election Security, Cryptography, and Exceptional Access With Michael Alan Specter}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {15--22}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3107769}, doi = {10.1109/MSEC.2021.3107769}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BlakleyC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/ZhangFBCDS21, author = {Shikun Zhang and Yuanyuan Feng and Lujo Bauer and Lorrie Faith Cranor and Anupam Das and Norman M. Sadeh}, title = {"Did you know this camera tracks your mood?": Understanding Privacy Expectations and Preferences in the Age of Video Analytics}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {2}, pages = {282--304}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0028}, doi = {10.2478/POPETS-2021-0028}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/ZhangFBCDS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/StorySYACSS21, author = {Peter Story and Daniel Smullen and Yaxing Yao and Alessandro Acquisti and Lorrie Faith Cranor and Norman M. Sadeh and Florian Schaub}, title = {Awareness, Adoption, and Misconceptions of Web Privacy Tools}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {3}, pages = {308--333}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0049}, doi = {10.2478/POPETS-2021-0049}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/StorySYACSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tochi/DistlerFHKLLCK21, author = {Verena Distler and Matthias Fassl and Hana Habib and Katharina Krombholz and Gabriele Lenzini and Carine Lallemand and Lorrie Faith Cranor and Vincent Koenig}, title = {A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research}, journal = {{ACM} Trans. Comput. Hum. Interact.}, volume = {28}, number = {6}, pages = {43:1--43:50}, year = {2021}, url = {https://doi.org/10.1145/3469845}, doi = {10.1145/3469845}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tochi/DistlerFHKLLCK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/OwensCC21, author = {Kentrell Owens and Camille Cobb and Lorrie Faith Cranor}, editor = {Yoshifumi Kitamura and Aaron Quigley and Katherine Isbister and Takeo Igarashi and Pernille Bj{\o}rn and Steven Mark Drucker}, title = {"You Gotta Watch What You Say": Surveillance of Communication with Incarcerated People}, booktitle = {{CHI} '21: {CHI} Conference on Human Factors in Computing Systems, Virtual Event / Yokohama, Japan, May 8-13, 2021}, pages = {62:1--62:18}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3411764.3445055}, doi = {10.1145/3411764.3445055}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/OwensCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/HabibZYACRSS21, author = {Hana Habib and Yixin Zou and Yaxing Yao and Alessandro Acquisti and Lorrie Faith Cranor and Joel R. Reidenberg and Norman M. Sadeh and Florian Schaub}, editor = {Yoshifumi Kitamura and Aaron Quigley and Katherine Isbister and Takeo Igarashi and Pernille Bj{\o}rn and Steven Mark Drucker}, title = {Toggles, Dollar Signs, and Triangles: How to (In)Effectively Convey Privacy Choices with Icons and Link Texts}, booktitle = {{CHI} '21: {CHI} Conference on Human Factors in Computing Systems, Virtual Event / Yokohama, Japan, May 8-13, 2021}, pages = {63:1--63:25}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3411764.3445387}, doi = {10.1145/3411764.3445387}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/HabibZYACRSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/NaeiniDAC21, author = {Pardis Emami Naeini and Janarth Dheenadhayalan and Yuvraj Agarwal and Lorrie Faith Cranor}, title = {Which Privacy and Security Attributes Most Impact Consumers' Risk Perception and Willingness to Purchase IoT Devices?}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {519--536}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00112}, doi = {10.1109/SP40001.2021.00112}, timestamp = {Thu, 21 Sep 2023 15:57:26 +0200}, biburl = {https://dblp.org/rec/conf/sp/NaeiniDAC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Cranor20, author = {Lorrie Faith Cranor}, title = {Digital contact tracing may protect privacy, but it is unlikely to stop the pandemic}, journal = {Commun. {ACM}}, volume = {63}, number = {11}, pages = {22--24}, year = {2020}, url = {https://doi.org/10.1145/3423993}, doi = {10.1145/3423993}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/Cranor20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TanBCC20, author = {Joshua Tan and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1407--1426}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417882}, doi = {10.1145/3372297.3417882}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TanBCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/ColnagoFPPUACS20, author = {Jessica Colnago and Yuanyuan Feng and Tharangini Palanivel and Sarah Pearman and Megan Ung and Alessandro Acquisti and Lorrie Faith Cranor and Norman M. Sadeh}, editor = {Regina Bernhaupt and Florian 'Floyd' Mueller and David Verweij and Josh Andres and Joanna McGrenere and Andy Cockburn and Ignacio Avellino and Alix Goguey and Pernille Bj{\o}n and Shengdong Zhao and Briane Paul Samson and Rafal Kocielnik}, title = {Informing the Design of a Personalized Privacy Assistant for the Internet of Things}, booktitle = {{CHI} '20: {CHI} Conference on Human Factors in Computing Systems, Honolulu, HI, USA, April 25-30, 2020}, pages = {1--13}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3313831.3376389}, doi = {10.1145/3313831.3376389}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/ColnagoFPPUACS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/HabibPWZACSS20, author = {Hana Habib and Sarah Pearman and Jiamin Wang and Yixin Zou and Alessandro Acquisti and Lorrie Faith Cranor and Norman M. Sadeh and Florian Schaub}, editor = {Regina Bernhaupt and Florian 'Floyd' Mueller and David Verweij and Josh Andres and Joanna McGrenere and Andy Cockburn and Ignacio Avellino and Alix Goguey and Pernille Bj{\o}n and Shengdong Zhao and Briane Paul Samson and Rafal Kocielnik}, title = {"It's a scavenger hunt": Usability of Websites' Opt-Out and Data Deletion Choices}, booktitle = {{CHI} '20: {CHI} Conference on Human Factors in Computing Systems, Honolulu, HI, USA, April 25-30, 2020}, pages = {1--12}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3313831.3376511}, doi = {10.1145/3313831.3376511}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/HabibPWZACSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/KisselburghBCLH20, author = {Lorraine G. Kisselburgh and Michel Beaudouin{-}Lafon and Lorrie Faith Cranor and Jonathan Lazar and Vicki L. Hanson}, editor = {Regina Bernhaupt and Florian 'Floyd' Mueller and David Verweij and Josh Andres and Joanna McGrenere and Andy Cockburn and Ignacio Avellino and Alix Goguey and Pernille Bj{\o}n and Shengdong Zhao and Briane Paul Samson and Rafal Kocielnik}, title = {{HCI} Ethics, Privacy, Accessibility, and the Environment: {A} Town Hall Forum on Global Policy Issues}, booktitle = {Extended Abstracts of the 2020 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2020, Honolulu, HI, USA, April 25-30, 2020}, pages = {1--6}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3334480.3381067}, doi = {10.1145/3334480.3381067}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/KisselburghBCLH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/StorySACSS20, author = {Peter Story and Daniel Smullen and Alessandro Acquisti and Lorrie Faith Cranor and Norman M. Sadeh and Florian Schaub}, editor = {Heather Richter Lipford and Sonia Chiasson}, title = {From Intent to Action: Nudging Users Towards Secure Mobile Payments}, booktitle = {Sixteenth Symposium on Usable Privacy and Security, {SOUPS} 2020, August 7-11, 2020}, pages = {379--415}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/soups2020/presentation/story}, timestamp = {Mon, 01 Feb 2021 08:41:55 +0100}, biburl = {https://dblp.org/rec/conf/soups/StorySACSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/NaeiniACH20, author = {Pardis Emami Naeini and Yuvraj Agarwal and Lorrie Faith Cranor and Hanan Hibshi}, title = {Ask the Experts: What Should Be on an IoT Privacy and Security Label?}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {447--464}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00043}, doi = {10.1109/SP40000.2020.00043}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/NaeiniACH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/KumarINFHSCHCWS20, author = {Vinayshekhar Bannihatti Kumar and Roger Iyengar and Namita Nisal and Yuanyuan Feng and Hana Habib and Peter Story and Sushain Cherivirala and Margaret Hagan and Lorrie Faith Cranor and Shomir Wilson and Florian Schaub and Norman M. Sadeh}, editor = {Yennun Huang and Irwin King and Tie{-}Yan Liu and Maarten van Steen}, title = {Finding a Choice in a Haystack: Automatic Extraction of Opt-Out Statements from Privacy Policy Text}, booktitle = {{WWW} '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020}, pages = {1943--1954}, publisher = {{ACM} / {IW3C2}}, year = {2020}, url = {https://doi.org/10.1145/3366423.3380262}, doi = {10.1145/3366423.3380262}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/KumarINFHSCHCWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-04631, author = {Pardis Emami Naeini and Yuvraj Agarwal and Lorrie Faith Cranor and Hanan Hibshi}, title = {Ask the Experts: What Should Be on an IoT Privacy and Security Label?}, journal = {CoRR}, volume = {abs/2002.04631}, year = {2020}, url = {https://arxiv.org/abs/2002.04631}, eprinttype = {arXiv}, eprint = {2002.04631}, timestamp = {Fri, 14 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-04631.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jamia/SchairerCRCCB19, author = {Cynthia E. Schairer and Cynthia Cheung and Caryn Kseniya Rubanovich and Mildred K. Cho and Lorrie Faith Cranor and Cinnamon S. Bloss}, title = {Disposition toward privacy and information disclosure in the context of emerging health technologies}, journal = {J. Am. Medical Informatics Assoc.}, volume = {26}, number = {7}, pages = {610--619}, year = {2019}, url = {https://doi.org/10.1093/jamia/ocz010}, doi = {10.1093/JAMIA/OCZ010}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jamia/SchairerCRCCB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/NaeiniDAC19, author = {Pardis Emami Naeini and Henry Dixon and Yuvraj Agarwal and Lorrie Faith Cranor}, editor = {Stephen A. Brewster and Geraldine Fitzpatrick and Anna L. Cox and Vassilis Kostakos}, title = {Exploring How Privacy and Security Factor into IoT Device Purchase Behavior}, booktitle = {Proceedings of the 2019 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019}, pages = {534}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3290605.3300764}, doi = {10.1145/3290605.3300764}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/NaeiniDAC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/HabibZJSSACSS19, author = {Hana Habib and Yixin Zou and Aditi Jannu and Neha Sridhar and Chelse Swoopes and Alessandro Acquisti and Lorrie Faith Cranor and Norman M. Sadeh and Florian Schaub}, editor = {Heather Richter Lipford}, title = {An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites}, booktitle = {Fifteenth Symposium on Usable Privacy and Security, {SOUPS} 2019, Santa Clara, CA, USA, August 11-13, 2019}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/soups2019/presentation/habib}, timestamp = {Mon, 01 Feb 2021 08:41:56 +0100}, biburl = {https://dblp.org/rec/conf/soups/HabibZJSSACSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmhci/NaeiniDBCCHP18, author = {Pardis Emami Naeini and Martin Degeling and Lujo Bauer and Richard Chow and Lorrie Faith Cranor and Mohammad R. Haghighat and Heather M. Patterson}, title = {The Influence of Friends and Experts on Privacy Decision Making in IoT Scenarios}, journal = {Proc. {ACM} Hum. Comput. Interact.}, volume = {2}, number = {{CSCW}}, pages = {48:1--48:26}, year = {2018}, url = {https://doi.org/10.1145/3274317}, doi = {10.1145/3274317}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pacmhci/NaeiniDBCCHP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/OatesAMSZBC18, author = {Maggie Oates and Yama Ahmadullah and Abigail Marsh and Chelse Swoopes and Shikun Zhang and Rebecca Balebako and Lorrie Faith Cranor}, title = {Turtles, Locks, and Bathrooms: Understanding Mental Models of Privacy Through Illustration}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2018}, number = {4}, pages = {5--32}, year = {2018}, url = {https://doi.org/10.1515/popets-2018-0029}, doi = {10.1515/POPETS-2018-0029}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/OatesAMSZBC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/ColnagoDOSBCC18, author = {Jessica Colnago and Summer Devlin and Maggie Oates and Chelse Swoopes and Lujo Bauer and Lorrie Faith Cranor and Nicolas Christin}, editor = {Regan L. Mandryk and Mark Hancock and Mark Perry and Anna L. Cox}, title = {"It's not actually that horrible": Exploring Adoption of Two-Factor Authentication at a University}, booktitle = {Proceedings of the 2018 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2018, Montreal, QC, Canada, April 21-26, 2018}, pages = {456}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3173574.3174030}, doi = {10.1145/3173574.3174030}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/ColnagoDOSBCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/Cranor18, author = {Lorrie Faith Cranor}, editor = {Regan L. Mandryk and Mark Hancock and Mark Perry and Anna L. Cox}, title = {{SIGCHI} Social Impact Award Talk - Making Privacy and Security More Usable}, booktitle = {Extended Abstracts of the 2018 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2018, Montreal, QC, Canada, April 21-26, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3170427.3185061}, doi = {10.1145/3170427.3185061}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/Cranor18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/HabibNDOSBCC18, author = {Hana Habib and Pardis Emami Naeini and Summer Devlin and Maggie Oates and Chelse Swoopes and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Mary Ellen Zurko and Heather Richter Lipford}, title = {User Behaviors and Attitudes Under Password Expiration Policies}, booktitle = {Fourteenth Symposium on Usable Privacy and Security, {SOUPS} 2018, Baltimore, MD, USA, August 12-14, 2018}, pages = {13--30}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/soups2018/presentation/habib-password}, timestamp = {Mon, 01 Feb 2021 08:41:57 +0100}, biburl = {https://dblp.org/rec/conf/soups/HabibNDOSBCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/HabibCGPTACC18, author = {Hana Habib and Jessica Colnago and Vidya Gopalakrishnan and Sarah Pearman and Jeremy Thomas and Alessandro Acquisti and Nicolas Christin and Lorrie Faith Cranor}, editor = {Mary Ellen Zurko and Heather Richter Lipford}, title = {Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing}, booktitle = {Fourteenth Symposium on Usable Privacy and Security, {SOUPS} 2018, Baltimore, MD, USA, August 12-14, 2018}, pages = {159--175}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/soups2018/presentation/habib-prying}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/HabibCGPTACC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/AcquistiABBCKLS17, author = {Alessandro Acquisti and Idris Adjerid and Rebecca Balebako and Laura Brandimarte and Lorrie Faith Cranor and Saranga Komanduri and Pedro Giovanni Leon and Norman M. Sadeh and Florian Schaub and Manya Sleeper and Yang Wang and Shomir Wilson}, title = {Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online}, journal = {{ACM} Comput. Surv.}, volume = {50}, number = {3}, pages = {44:1--44:41}, year = {2017}, url = {https://doi.org/10.1145/3054926}, doi = {10.1145/3054926}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/AcquistiABBCKLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/SchaubBC17, author = {Florian Schaub and Rebecca Balebako and Lorrie Faith Cranor}, title = {Designing Effective Privacy Notices and Controls}, journal = {{IEEE} Internet Comput.}, volume = {21}, number = {3}, pages = {70--77}, year = {2017}, url = {https://doi.org/10.1109/MIC.2017.75}, doi = {10.1109/MIC.2017.75}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/internet/SchaubBC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/MelicherUSBCC17, author = {William Melicher and Blase Ur and Sean M. Segreti and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, title = {Better Passwords through Science (and Neural Networks)}, journal = {login Usenix Mag.}, volume = {42}, number = {4}, year = {2017}, url = {https://www.usenix.org/publications/login/winter2017/melicher}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/MelicherUSBCC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PearmanTNHBCCEF17, author = {Sarah Pearman and Jeremy Thomas and Pardis Emami Naeini and Hana Habib and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor and Serge Egelman and Alain Forget}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Let's Go in for a Closer Look: Observing Passwords in Their Natural Habitat}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {295--310}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133973}, doi = {10.1145/3133956.3133973}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PearmanTNHBCCEF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/UrAABCCCDNHJM17, author = {Blase Ur and Felicia Alfieri and Maung Aung and Lujo Bauer and Nicolas Christin and Jessica Colnago and Lorrie Faith Cranor and Henry Dixon and Pardis Emami Naeini and Hana Habib and Noah Johnson and William Melicher}, editor = {Gloria Mark and Susan R. Fussell and Cliff Lampe and m. c. schraefel and Juan Pablo Hourcade and Caroline Appert and Daniel Wigdor}, title = {Design and Evaluation of a Data-Driven Password Meter}, booktitle = {Proceedings of the 2017 {CHI} Conference on Human Factors in Computing Systems, Denver, CO, USA, May 06-11, 2017}, pages = {3775--3786}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3025453.3026050}, doi = {10.1145/3025453.3026050}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/UrAABCCCDNHJM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/TanBBCTU17, author = {Joshua Tan and Lujo Bauer and Joseph Bonneau and Lorrie Faith Cranor and Jeremy Thomas and Blase Ur}, editor = {Gloria Mark and Susan R. Fussell and Cliff Lampe and m. c. schraefel and Juan Pablo Hourcade and Caroline Appert and Daniel Wigdor}, title = {Can Unicorns Help Users Compare Crypto Key Fingerprints?}, booktitle = {Proceedings of the 2017 {CHI} Conference on Human Factors in Computing Systems, Denver, CO, USA, May 06-11, 2017}, pages = {3787--3798}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3025453.3025733}, doi = {10.1145/3025453.3025733}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/TanBBCTU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/SleeperCP17, author = {Manya Sleeper and Lorrie Faith Cranor and Sarah K. Pearman}, editor = {Gloria Mark and Susan R. Fussell and Cliff Lampe and m. c. schraefel and Juan Pablo Hourcade and Caroline Appert and Daniel Wigdor}, title = {Exploring Topic-Based Sharing Mechanisms}, booktitle = {Proceedings of the 2017 {CHI} Conference on Human Factors in Computing Systems, Denver, CO, USA, May 06-11, 2017}, pages = {6973--6985}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3025453.3025840}, doi = {10.1145/3025453.3025840}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/SleeperCP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/SegretiMKMSUBCC17, author = {Sean M. Segreti and William Melicher and Saranga Komanduri and Darya Melicher and Richard Shay and Blase Ur and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor and Michelle L. Mazurek}, title = {Diversify to Survive: Making Passwords Stronger with Adaptive Policies}, booktitle = {Thirteenth Symposium on Usable Privacy and Security, {SOUPS} 2017, Santa Clara, CA, USA, July 12-14, 2017}, pages = {1--12}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/soups2017/technical-sessions/presentation/segreti}, timestamp = {Wed, 19 Jul 2017 17:13:43 +0200}, biburl = {https://dblp.org/rec/conf/soups/SegretiMKMSUBCC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/NaeiniBHDBCS17, author = {Pardis Emami Naeini and Sruti Bhagavatula and Hana Habib and Martin Degeling and Lujo Bauer and Lorrie Faith Cranor and Norman M. Sadeh}, title = {Privacy Expectations and Preferences in an IoT World}, booktitle = {Thirteenth Symposium on Usable Privacy and Security, {SOUPS} 2017, Santa Clara, CA, USA, July 12-14, 2017}, pages = {399--412}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/soups2017/technical-sessions/presentation/naeini}, timestamp = {Wed, 19 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/NaeiniBHDBCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/MelicherUKBCC17, author = {William Melicher and Blase Ur and Saranga Komanduri and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Dilma Da Silva and Bryan Ford}, title = {Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks}, booktitle = {2017 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2017, Santa Clara, CA, USA, July 12-14, 2017}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/atc17/technical-sessions/presentation/melicher}, timestamp = {Mon, 01 Feb 2021 08:43:34 +0100}, biburl = {https://dblp.org/rec/conf/usenix/MelicherUKBCC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/Sigurbjarnarson17, author = {Helgi Sigurbjarnarson and James Bornholt and Nicolas Christin and Lorrie Faith Cranor}, editor = {Dilma Da Silva and Bryan Ford}, title = {Push-Button Verification of File Systems via Crash Refinement}, booktitle = {2017 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2017, Santa Clara, CA, USA, July 12-14, 2017}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/atc17/technical-sessions/presentation/sigurbjarnarson}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/usenix/Sigurbjarnarson17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fthci/LazarABBFGGJMNM16, author = {Jonathan Lazar and Julio Abascal and Simone D. J. Barbosa and Jeremy T. Barksdale and Batya Friedman and Jens Grossklags and Jan Gulliksen and Jeff A. Johnson and Tom McEwan and Lo{\"{\i}}c Mart{\'{\i}}nez Normand and Wibke Michalk and Janice Y. Tsai and Gerrit C. van der Veer and Hans von Axelson and {\AA}ke Walldius and Gill Whitney and Marco Winckler and Volker Wulf and Elizabeth F. Churchill and Lorrie Faith Cranor and Janet Davis and Alan Hedge and Harry Hochheiser and Juan Pablo Hourcade and Clayton Lewis and Lisa P. Nathan and Fabio Patern{\`{o}} and Blake Reid and Whitney Quesenbery and Ted Selker and Brian Wentz}, title = {Human-Computer Interaction and International Public Policymaking: {A} Framework for Understanding and Taking Future Actions}, journal = {Found. Trends Hum. Comput. Interact.}, volume = {9}, number = {2}, pages = {69--149}, year = {2016}, url = {https://doi.org/10.1561/1100000062}, doi = {10.1561/1100000062}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fthci/LazarABBFGGJMNM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ShayKDHMSUBCC16, author = {Richard Shay and Saranga Komanduri and Adam L. Durity and Phillip (Seyoung) Huh and Michelle L. Mazurek and Sean M. Segreti and Blase Ur and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, title = {Designing Password Policies for Strength and Usability}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {4}, pages = {13:1--13:34}, year = {2016}, url = {https://doi.org/10.1145/2891411}, doi = {10.1145/2891411}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ShayKDHMSUBCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/SleeperMHBCM16, author = {Manya Sleeper and William Melicher and Hana Habib and Lujo Bauer and Lorrie Faith Cranor and Michelle L. Mazurek}, editor = {Jofish Kaye and Allison Druin and Cliff Lampe and Dan Morris and Juan Pablo Hourcade}, title = {Sharing Personal Content Online: Exploring Channel Choice and Multi-Channel Behaviors}, booktitle = {Proceedings of the 2016 {CHI} Conference on Human Factors in Computing Systems, San Jose, CA, USA, May 7-12, 2016}, pages = {101--112}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2858036.2858170}, doi = {10.1145/2858036.2858170}, timestamp = {Wed, 01 Jun 2022 08:38:38 +0200}, biburl = {https://dblp.org/rec/conf/chi/SleeperMHBCM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/MelicherKSKSUBC16, author = {William Melicher and Darya Kurilova and Sean M. Segreti and Pranshu Kalvani and Richard Shay and Blase Ur and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor and Michelle L. Mazurek}, editor = {Jofish Kaye and Allison Druin and Cliff Lampe and Dan Morris and Juan Pablo Hourcade}, title = {Usability and Security of Text Passwords on Mobile Devices}, booktitle = {Proceedings of the 2016 {CHI} Conference on Human Factors in Computing Systems, San Jose, CA, USA, May 7-12, 2016}, pages = {527--539}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2858036.2858384}, doi = {10.1145/2858036.2858384}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/MelicherKSKSUBC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/DrayKCCJLLSV16, author = {Susan M. Dray and Clare{-}Marie Karat and John M. Carroll and Lorrie Faith Cranor and Robin Jeffries and Zhengjie Liu and Arnold (Arnie) Lund and Ben Shneiderman and Gerrit C. van der Veer}, editor = {Jofish Kaye and Allison Druin and Cliff Lampe and Dan Morris and Juan Pablo Hourcade}, title = {Science and Service, Innovation and Inspiration: Celebrating the Life of John Karat}, booktitle = {Proceedings of the 2016 {CHI} Conference on Human Factors in Computing Systems, San Jose, CA, USA, May 7-12, 2016, Extended Abstracts}, pages = {1047--1050}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2851581.2886420}, doi = {10.1145/2851581.2886420}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/DrayKCCJLLSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/UrBSBCC16, author = {Blase Ur and Jonathan Bees and Sean M. Segreti and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Jofish Kaye and Allison Druin and Cliff Lampe and Dan Morris and Juan Pablo Hourcade}, title = {Do Users' Perceptions of Password Security Match Reality?}, booktitle = {Proceedings of the 2016 {CHI} Conference on Human Factors in Computing Systems, San Jose, CA, USA, May 7-12, 2016}, pages = {3748--3760}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2858036.2858546}, doi = {10.1145/2858036.2858546}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/UrBSBCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/ForgetPTACCEHT16, author = {Alain Forget and Sarah Pearman and Jeremy Thomas and Alessandro Acquisti and Nicolas Christin and Lorrie Faith Cranor and Serge Egelman and Marian Harbach and Rahul Telang}, title = {Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes}, booktitle = {Twelfth Symposium on Usable Privacy and Security, {SOUPS} 2016, Denver, CO, USA, June 22-24, 2016}, pages = {97--111}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/soups2016/technical-sessions/presentation/forget}, timestamp = {Thu, 04 Aug 2016 15:59:03 +0200}, biburl = {https://dblp.org/rec/conf/soups/ForgetPTACCEHT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/GluckSFHSCA16, author = {Joshua Gluck and Florian Schaub and Amy Friedman and Hana Habib and Norman M. Sadeh and Lorrie Faith Cranor and Yuvraj Agarwal}, title = {How Short Is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices}, booktitle = {Twelfth Symposium on Usable Privacy and Security, {SOUPS} 2016, Denver, CO, USA, June 22-24, 2016}, pages = {321--340}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/soups2016/technical-sessions/presentation/gluck}, timestamp = {Thu, 04 Aug 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/GluckSFHSCA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MelicherUSKBCC16, author = {William Melicher and Blase Ur and Sean M. Segreti and Saranga Komanduri and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Thorsten Holz and Stefan Savage}, title = {Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {175--191}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/melicher}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/MelicherUSKBCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CranorRSVW16, author = {Lorrie Faith Cranor and Tal Rabin and Vitaly Shmatikov and Salil P. Vadhan and Daniel J. Weitzner}, title = {Towards a Privacy Research Roadmap for the Computing Community}, journal = {CoRR}, volume = {abs/1604.03160}, year = {2016}, url = {http://arxiv.org/abs/1604.03160}, eprinttype = {arXiv}, eprint = {1604.03160}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CranorRSVW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TianLDUTC15, author = {Yuan Tian and Bin Liu and Weisi Dai and Blase Ur and Patrick Tague and Lorrie Faith Cranor}, editor = {David Lie and Glenn Wurster}, title = {Supporting Privacy-Conscious App Update Decisions with User Reviews}, booktitle = {Proceedings of the 5th Annual {ACM} {CCS} Workshop on Security and Privacy in Smartphones and Mobile Devices, {SPSM} 2015, Denver, Colorado, USA, October 12, 2015}, pages = {51--61}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808117.2808124}, doi = {10.1145/2808117.2808124}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TianLDUTC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BalebakoSAAC15, author = {Rebecca Balebako and Florian Schaub and Idris Adjerid and Alessandro Acquisti and Lorrie Faith Cranor}, editor = {David Lie and Glenn Wurster}, title = {The Impact of Timing on the Salience of Smartphone App Privacy Notices}, booktitle = {Proceedings of the 5th Annual {ACM} {CCS} Workshop on Security and Privacy in Smartphones and Mobile Devices, {SPSM} 2015, Denver, Colorado, USA, October 12, 2015}, pages = {63--74}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808117.2808119}, doi = {10.1145/2808117.2808119}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BalebakoSAAC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/AlmuhimediSSAAG15, author = {Hazim Almuhimedi and Florian Schaub and Norman M. Sadeh and Idris Adjerid and Alessandro Acquisti and Joshua Gluck and Lorrie Faith Cranor and Yuvraj Agarwal}, editor = {Bo Begole and Jinwoo Kim and Kori Inkpen and Woontack Woo}, title = {Your Location has been Shared 5, 398 Times!: {A} Field Study on Mobile App Privacy Nudging}, booktitle = {Proceedings of the 33rd Annual {ACM} Conference on Human Factors in Computing Systems, {CHI} 2015, Seoul, Republic of Korea, April 18-23, 2015}, pages = {787--796}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2702123.2702210}, doi = {10.1145/2702123.2702210}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/AlmuhimediSSAAG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/ShayBCCFKMMSU15, author = {Richard Shay and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor and Alain Forget and Saranga Komanduri and Michelle L. Mazurek and William Melicher and Sean M. Segreti and Blase Ur}, editor = {Bo Begole and Jinwoo Kim and Kori Inkpen and Woontack Woo}, title = {A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior}, booktitle = {Proceedings of the 33rd Annual {ACM} Conference on Human Factors in Computing Systems, {CHI} 2015, Seoul, Republic of Korea, April 18-23, 2015}, pages = {2903--2912}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2702123.2702586}, doi = {10.1145/2702123.2702586}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/ShayBCCFKMMSU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscw/SleeperACKMS15, author = {Manya Sleeper and Alessandro Acquisti and Lorrie Faith Cranor and Patrick Gage Kelley and Sean A. Munson and Norman M. Sadeh}, editor = {Dan Cosley and Andrea Forte and Luigina Ciolfi and David McDonald}, title = {I Would Like To..., {I} Shouldn't..., {I} Wish {I...:} Exploring Behavior-Change Goals for Social Networking Sites}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer Supported Cooperative Work {\&} Social Computing, {CSCW} 2015, Vancouver, BC, Canada, March 14 - 18, 2015}, pages = {1058--1069}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2675133.2675193}, doi = {10.1145/2675133.2675193}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscw/SleeperACKMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/OltramariCWM15, author = {Alessandro Oltramari and Lorrie Faith Cranor and Robert J. Walls and Patrick D. McDaniel}, editor = {Qinqing Zhang and Jerry Brand and Thomas G. MacDonald and Bharat T. Doshi and Bonnie L. Gorsic}, title = {Computational ontology of network operations}, booktitle = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa, FL, USA, October 26-28, 2015}, pages = {318--323}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/MILCOM.2015.7357462}, doi = {10.1109/MILCOM.2015.7357462}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcom/OltramariCWM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BlockiKCD15, author = {Jeremiah Blocki and Saranga Komanduri and Lorrie Faith Cranor and Anupam Datta}, title = {Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/spaced-repetition-and-mnemonics-enable-recall-multiple-strong-passwords}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BlockiKCD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/SchaubBDC15, author = {Florian Schaub and Rebecca Balebako and Adam L. Durity and Lorrie Faith Cranor}, editor = {Lorrie Faith Cranor and Robert Biddle and Sunny Consolvo}, title = {A Design Space for Effective Privacy Notices}, booktitle = {Eleventh Symposium On Usable Privacy and Security, {SOUPS} 2015, Ottawa, Canada, July 22-24, 2015}, pages = {1--17}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/soups2015/proceedings/presentation/schaub}, timestamp = {Wed, 05 Apr 2017 12:53:50 +0200}, biburl = {https://dblp.org/rec/conf/soups/SchaubBDC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/UrNBSSBCC15, author = {Blase Ur and Fumiko Noma and Jonathan Bees and Sean M. Segreti and Richard Shay and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Lorrie Faith Cranor and Robert Biddle and Sunny Consolvo}, title = {"I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab}, booktitle = {Eleventh Symposium On Usable Privacy and Security, {SOUPS} 2015, Ottawa, Canada, July 22-24, 2015}, pages = {123--140}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/soups2015/proceedings/presentation/ur}, timestamp = {Thu, 15 Sep 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/UrNBSSBCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/UrSBCCKKMMS15, author = {Blase Ur and Sean M. Segreti and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor and Saranga Komanduri and Darya Kurilova and Michelle L. Mazurek and William Melicher and Richard Shay}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {Measuring Real-World Accuracies and Biases in Modeling Password Guessability}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {463--481}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/ur}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/UrSBCCKKMMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/soups/2015, editor = {Lorrie Faith Cranor and Robert Biddle and Sunny Consolvo}, title = {Eleventh Symposium On Usable Privacy and Security, {SOUPS} 2015, Ottawa, Canada, July 22-24, 2015}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/soups2015}, isbn = {978-1-931971-249}, timestamp = {Wed, 05 Apr 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BalebakoC14, author = {Rebecca Balebako and Lorrie Faith Cranor}, title = {Improving App Privacy: Nudging App Developers to Protect User Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {4}, pages = {55--58}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.70}, doi = {10.1109/MSP.2014.70}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BalebakoC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CranorB14, author = {Lorrie Faith Cranor and Norbou Buchler}, title = {Better Together: Usability and Security Go Hand in Hand}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {6}, pages = {89--93}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.109}, doi = {10.1109/MSP.2014.109}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/CranorB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/HourcadeCDCG14, author = {Juan Pablo Hourcade and Ann Cavoukian and Ronald J. Deibert and Lorrie Faith Cranor and Ian Goldberg}, editor = {Matt Jones and Philippe A. Palanque and Albrecht Schmidt and Tovi Grossman}, title = {Electronic privacy and surveillance}, booktitle = {{CHI} Conference on Human Factors in Computing Systems, CHI'14, Toronto, ON, Canada - April 26 - May 01, 2014, Extended Abstracts}, pages = {1075--1080}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2559206.2579403}, doi = {10.1145/2559206.2579403}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/HourcadeCDCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/0005LACFS14, author = {Yang Wang and Pedro Giovanni Leon and Alessandro Acquisti and Lorrie Faith Cranor and Alain Forget and Norman M. Sadeh}, editor = {Matt Jones and Philippe A. Palanque and Albrecht Schmidt and Tovi Grossman}, title = {A field trial of privacy nudges for facebook}, booktitle = {{CHI} Conference on Human Factors in Computing Systems, CHI'14, Toronto, ON, Canada - April 26 - May 01, 2014}, pages = {2367--2376}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2556288.2557413}, doi = {10.1145/2556288.2557413}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/0005LACFS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/ShayKDHMSUBCC14, author = {Richard Shay and Saranga Komanduri and Adam L. Durity and Phillip (Seyoung) Huh and Michelle L. Mazurek and Sean M. Segreti and Blase Ur and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Matt Jones and Philippe A. Palanque and Albrecht Schmidt and Tovi Grossman}, title = {Can long passwords be secure and usable?}, booktitle = {{CHI} Conference on Human Factors in Computing Systems, CHI'14, Toronto, ON, Canada - April 26 - May 01, 2014}, pages = {2927--2936}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2556288.2557377}, doi = {10.1145/2556288.2557377}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/ShayKDHMSUBCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/ForgetKACCT14, author = {Alain Forget and Saranga Komanduri and Alessandro Acquisti and Nicolas Christin and Lorrie Faith Cranor and Rahul Telang}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Building the security behavior observatory: an infrastructure for long-term monitoring of client machines}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {24}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600200}, doi = {10.1145/2600176.2600200}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/ForgetKACCT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/OltramariBCBC14, author = {Alessandro Oltramari and Noam Ben{-}Asher and Lorrie Faith Cranor and Lujo Bauer and Nicolas Christin}, title = {General Requirements of a Hybrid-Modeling Framework for Cyber Security}, booktitle = {2014 {IEEE} Military Communications Conference, {MILCOM} 2014, Baltimore, MD, USA, October 6-8, 2014}, pages = {129--135}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/MILCOM.2014.28}, doi = {10.1109/MILCOM.2014.28}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcom/OltramariBCBC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/CranorDMU14, author = {Lorrie Faith Cranor and Adam L. Durity and Abigail Marsh and Blase Ur}, editor = {Lorrie Faith Cranor and Lujo Bauer and Robert Biddle}, title = {Parents' and Teens' Perspectives on Privacy In a Technology-Filled World}, booktitle = {Tenth Symposium on Usable Privacy and Security, {SOUPS} 2014, Menlo Park, CA, USA, July 9-11, 2014}, pages = {19--35}, publisher = {{USENIX} Association}, year = {2014}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/soups/CranorDMU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/Bravo-LilloCKSS14, author = {Cristian Bravo{-}Lillo and Lorrie Faith Cranor and Saranga Komanduri and Stuart E. Schechter and Manya Sleeper}, editor = {Lorrie Faith Cranor and Lujo Bauer and Robert Biddle}, title = {Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It}, booktitle = {Tenth Symposium on Usable Privacy and Security, {SOUPS} 2014, Menlo Park, CA, USA, July 9-11, 2014}, pages = {105--111}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/soups2014/proceedings/presentation/bravo-lillo}, timestamp = {Tue, 06 Jan 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/Bravo-LilloCKSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stids/OltramariCWM14, author = {Alessandro Oltramari and Lorrie Faith Cranor and Robert J. Walls and Patrick D. McDaniel}, editor = {Kathryn Blackmond Laskey and Ian Emmons and Paulo C. G. Costa}, title = {Building an Ontology of Cyber Security}, booktitle = {Proceedings of the Ninth Conference on Semantic Technology for Intelligence, Defense, and Security, Fairfax VA, USA, November 18-21, 2014}, series = {{CEUR} Workshop Proceedings}, volume = {1304}, pages = {54--61}, publisher = {CEUR-WS.org}, year = {2014}, url = {https://ceur-ws.org/Vol-1304/STIDS2014\_T08\_OltramariEtAl.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:26 +0100}, biburl = {https://dblp.org/rec/conf/stids/OltramariCWM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KomanduriSCHS14, author = {Saranga Komanduri and Richard Shay and Lorrie Faith Cranor and Cormac Herley and Stuart E. Schechter}, editor = {Kevin Fu and Jaeyeon Jung}, title = {Telepathwords: Preventing Weak Passwords by Reading Users' Minds}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {591--606}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/komanduri}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/KomanduriSCHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/soups/2014, editor = {Lorrie Faith Cranor and Lujo Bauer and Robert Biddle}, title = {Tenth Symposium on Usable Privacy and Security, {SOUPS} 2014, Menlo Park, CA, USA, July 9-11, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/soups2014}, isbn = {978-1-931971-13-3}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BlockiKCD14, author = {Jeremiah Blocki and Saranga Komanduri and Lorrie Faith Cranor and Anupam Datta}, title = {Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords}, journal = {CoRR}, volume = {abs/1410.1490}, year = {2014}, url = {http://arxiv.org/abs/1410.1490}, eprinttype = {arXiv}, eprint = {1410.1490}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BlockiKCD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CranorS13, author = {Lorrie Faith Cranor and Norman M. Sadeh}, title = {A Shortage of Privacy Engineers}, journal = {{IEEE} Secur. Priv.}, volume = {11}, number = {2}, pages = {77--79}, year = {2013}, url = {https://doi.org/10.1109/MSP.2013.25}, doi = {10.1109/MSP.2013.25}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/CranorS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MazurekKVBCCKSU13, author = {Michelle L. Mazurek and Saranga Komanduri and Timothy Vidas and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor and Patrick Gage Kelley and Richard Shay and Blase Ur}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Measuring password guessability for an entire university}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {173--186}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516726}, doi = {10.1145/2508859.2516726}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MazurekKVBCCKSU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/SleeperCKUACS13, author = {Manya Sleeper and Justin Cranshaw and Patrick Gage Kelley and Blase Ur and Alessandro Acquisti and Lorrie Faith Cranor and Norman M. Sadeh}, editor = {Wendy E. Mackay and Stephen A. Brewster and Susanne B{\o}dker}, title = {"i read my Twitter the next morning and was astonished": a conversational perspective on Twitter regrets}, booktitle = {2013 {ACM} {SIGCHI} Conference on Human Factors in Computing Systems, {CHI} '13, Paris, France, April 27 - May 2, 2013}, pages = {3277--3286}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2470654.2466448}, doi = {10.1145/2470654.2466448}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/SleeperCKUACS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/KelleyCS13, author = {Patrick Gage Kelley and Lorrie Faith Cranor and Norman M. Sadeh}, editor = {Wendy E. Mackay and Stephen A. Brewster and Susanne B{\o}dker}, title = {Privacy as part of the app decision-making process}, booktitle = {2013 {ACM} {SIGCHI} Conference on Human Factors in Computing Systems, {CHI} '13, Paris, France, April 27 - May 2, 2013}, pages = {3393--3402}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2470654.2466466}, doi = {10.1145/2470654.2466466}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/KelleyCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscw/SleeperBDMWC13, author = {Manya Sleeper and Rebecca Balebako and Sauvik Das and Amber Lynn McConahy and Jason Wiese and Lorrie Faith Cranor}, editor = {Amy S. Bruckman and Scott Counts and Cliff Lampe and Loren G. Terveen}, title = {The post that wasn't: exploring self-censorship on facebook}, booktitle = {Computer Supported Cooperative Work, {CSCW} 2013, San Antonio, TX, USA, February 23-27, 2013}, pages = {793--802}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2441776.2441865}, doi = {10.1145/2441776.2441865}, timestamp = {Tue, 15 Sep 2020 08:36:55 +0200}, biburl = {https://dblp.org/rec/conf/cscw/SleeperBDMWC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KelleyKMSVBCC13, author = {Patrick Gage Kelley and Saranga Komanduri and Michelle L. Mazurek and Richard Shay and Timothy Vidas and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {34--51}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_3}, doi = {10.1007/978-3-642-41320-9\_3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/KelleyKMSVBCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/VidasOWZCC13, author = {Timothy Vidas and Emmanuel Owusu and Shuai Wang and Cheng Zeng and Lorrie Faith Cranor and Nicolas Christin}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {QRishing: The Susceptibility of Smartphone Users to {QR} Code Phishing Attacks}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {52--69}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_4}, doi = {10.1007/978-3-642-41320-9\_4}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/VidasOWZCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/WilsonCSACSJB13, author = {Shomir Wilson and Justin Cranshaw and Norman M. Sadeh and Alessandro Acquisti and Lorrie Faith Cranor and Jay Springfield and Sae Young Jeong and Arun Balasubramanian}, editor = {Friedemann Mattern and Silvia Santini and John F. Canny and Marc Langheinrich and Jun Rekimoto}, title = {Privacy manipulation and acclimation in a location sharing application}, booktitle = {The 2013 {ACM} International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '13, Zurich, Switzerland, September 8-12, 2013}, pages = {549--558}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2493432.2493436}, doi = {10.1145/2493432.2493436}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/huc/WilsonCSACSJB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/laseres/BalebakoPBCA13, author = {Rebecca Balebako and Eyal P{\'{e}}er and Laura Brandimarte and Lorrie Faith Cranor and Alessandro Acquisti}, title = {Is it the Typeset or the Type of Statistics? Disfluent Font does not Reduce Self-disclosure}, booktitle = {2013 Workshop on Learning from Authoritative Security Experiment Results, {LASER} 2013, Arlington, VA, USA, October 16-17, 2013}, pages = {1--11}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/laser2013/program/balebako}, timestamp = {Wed, 04 Jul 2018 13:06:35 +0200}, biburl = {https://dblp.org/rec/conf/laseres/BalebakoPBCA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/Bravo-LilloKCRSDS13, author = {Cristian Bravo{-}Lillo and Saranga Komanduri and Lorrie Faith Cranor and Robert W. Reeder and Manya Sleeper and Julie S. Downs and Stuart E. Schechter}, editor = {Lujo Bauer and Konstantin Beznosov and Lorrie Faith Cranor}, title = {Your attention please: designing security-decision UIs to make genuine risks harder to ignore}, booktitle = {Symposium On Usable Privacy and Security, {SOUPS} '13, Newcastle, United Kingdom, July 24-26, 2013}, pages = {6:1--6:12}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2501604.2501610}, doi = {10.1145/2501604.2501610}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/Bravo-LilloKCRSDS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/LeonU0SBSBCC13, author = {Pedro Giovanni Leon and Blase Ur and Yang Wang and Manya Sleeper and Rebecca Balebako and Richard Shay and Lujo Bauer and Mihai Christodorescu and Lorrie Faith Cranor}, editor = {Lujo Bauer and Konstantin Beznosov and Lorrie Faith Cranor}, title = {What matters to users?: factors that affect users' willingness to share information with online advertisers}, booktitle = {Symposium On Usable Privacy and Security, {SOUPS} '13, Newcastle, United Kingdom, July 24-26, 2013}, pages = {7:1--7:12}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2501604.2501611}, doi = {10.1145/2501604.2501611}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/LeonU0SBSBCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/BalebakoJLCN13, author = {Rebecca Balebako and Jaeyeon Jung and Wei Lu and Lorrie Faith Cranor and Carolyn Nguyen}, editor = {Lujo Bauer and Konstantin Beznosov and Lorrie Faith Cranor}, title = {"Little brothers watching you": raising awareness of data leaks on smartphones}, booktitle = {Symposium On Usable Privacy and Security, {SOUPS} '13, Newcastle, United Kingdom, July 24-26, 2013}, pages = {12:1--12:11}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2501604.2501616}, doi = {10.1145/2501604.2501616}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/BalebakoJLCN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/BauerCKMRSU13, author = {Lujo Bauer and Lorrie Faith Cranor and Saranga Komanduri and Michelle L. Mazurek and Michael K. Reiter and Manya Sleeper and Blase Ur}, editor = {Ahmad{-}Reza Sadeghi and Sara Foresti}, title = {The post anachronism: the temporal dimension of facebook privacy}, booktitle = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2013, Berlin, Germany, November 4, 2013}, pages = {1--12}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517840.2517859}, doi = {10.1145/2517840.2517859}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/BauerCKMRSU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/WangLSCAC13, author = {Yang Wang and Pedro Giovanni Leon and Kevin Scott and Xiaoxuan Chen and Alessandro Acquisti and Lorrie Faith Cranor}, editor = {Leslie Carr and Alberto H. F. Laender and Bernadette Farias L{\'{o}}scio and Irwin King and Marcus Fontoura and Denny Vrandecic and Lora Aroyo and Jos{\'{e}} Palazzo M. de Oliveira and Fernanda Lima and Erik Wilde}, title = {Privacy nudges for social media: an exploratory Facebook study}, booktitle = {22nd International World Wide Web Conference, {WWW} '13, Rio de Janeiro, Brazil, May 13-17, 2013, Companion Volume}, pages = {763--770}, publisher = {International World Wide Web Conferences Steering Committee / {ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487788.2488038}, doi = {10.1145/2487788.2488038}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/WangLSCAC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/soups/2013, editor = {Lujo Bauer and Konstantin Beznosov and Lorrie Faith Cranor}, title = {Symposium On Usable Privacy and Security, {SOUPS} '13, Newcastle, United Kingdom, July 24-26, 2013}, publisher = {{ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2501604}, isbn = {978-1-4503-2319-2}, timestamp = {Fri, 16 Aug 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Cranor12, author = {Lorrie Faith Cranor}, title = {Can Users Control Online Behavioral Advertising Effectively?}, journal = {{IEEE} Secur. Priv.}, volume = {10}, number = {2}, pages = {93--96}, year = {2012}, url = {https://doi.org/10.1109/MSP.2012.32}, doi = {10.1109/MSP.2012.32}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Cranor12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jthtl/Cranor12, author = {Lorrie Faith Cranor}, title = {Necessary But Not Sufficient: Standardized Mechanisms for Privacy Notice and Choice}, journal = {J. Telecommun. High Technol. Law}, volume = {10}, number = {2}, pages = {273--308}, year = {2012}, url = {http://www.jthtl.org/content/articles/V10I2/JTHTLv10i2\_Cranor.PDF}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jthtl/Cranor12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/umuai/TochWC12, author = {Eran Toch and Yang Wang and Lorrie Faith Cranor}, title = {Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems}, journal = {User Model. User Adapt. Interact.}, volume = {22}, number = {1-2}, pages = {203--220}, year = {2012}, url = {https://doi.org/10.1007/s11257-011-9110-z}, doi = {10.1007/S11257-011-9110-Z}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/umuai/TochWC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/UrKKLMMPSVBCCEL12, author = {Blase Ur and Patrick Gage Kelley and Saranga Komanduri and Joel Lee and Michael Maass and Michelle L. Mazurek and Timothy Passaro and Richard Shay and Timothy Vidas and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor and Serge Egelman and Julio L{\'{o}}pez}, title = {Helping Users Create Better Passwords}, journal = {login Usenix Mag.}, volume = {37}, number = {6}, year = {2012}, url = {https://www.usenix.org/publications/login/december-2012-volume-37-number-6/helping-users-create-better-passwords}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/UrKKLMMPSVBCCEL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Bravo-LilloCDKSS12, author = {Cristian Bravo{-}Lillo and Lorrie Faith Cranor and Julie S. Downs and Saranga Komanduri and Stuart E. Schechter and Manya Sleeper}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Operating system framed in case of mistaken identity: measuring the success of web-based spoofing attacks on {OS} password-entry dialogs}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {365--377}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382237}, doi = {10.1145/2382196.2382237}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Bravo-LilloCDKSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/KlempererLMSUBCGR12, author = {Peter F. Klemperer and Yuan Liang and Michelle L. Mazurek and Manya Sleeper and Blase Ur and Lujo Bauer and Lorrie Faith Cranor and Nitin Gupta and Michael K. Reiter}, editor = {Joseph A. Konstan and Ed H. Chi and Kristina H{\"{o}}{\"{o}}k}, title = {Tag, you can see it!: using tags for access control in photo sharing}, booktitle = {{CHI} Conference on Human Factors in Computing Systems, {CHI} '12, Austin, TX, {USA} - May 05 - 10, 2012}, pages = {377--386}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2207676.2207728}, doi = {10.1145/2207676.2207728}, timestamp = {Tue, 01 Jun 2021 15:21:43 +0200}, biburl = {https://dblp.org/rec/conf/chi/KlempererLMSUBCGR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/LeonUSWBC12, author = {Pedro Giovanni Leon and Blase Ur and Richard Shay and Yang Wang and Rebecca Balebako and Lorrie Faith Cranor}, editor = {Joseph A. Konstan and Ed H. Chi and Kristina H{\"{o}}{\"{o}}k}, title = {Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising}, booktitle = {{CHI} Conference on Human Factors in Computing Systems, {CHI} '12, Austin, TX, {USA} - May 05 - 10, 2012}, pages = {589--598}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2207676.2207759}, doi = {10.1145/2207676.2207759}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/LeonUSWBC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KelleyCCJSW12, author = {Patrick Gage Kelley and Sunny Consolvo and Lorrie Faith Cranor and Jaeyeon Jung and Norman M. Sadeh and David Wetherall}, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {A Conundrum of Permissions: Installing Applications on an Android Smartphone}, booktitle = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC} and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7398}, pages = {68--79}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34638-5\_6}, doi = {10.1007/978-3-642-34638-5\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KelleyCCJSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/VanieaBCR12, author = {Kami Vaniea and Lujo Bauer and Lorrie Faith Cranor and Michael K. Reiter}, editor = {Nora Cuppens{-}Boulahia and Philip Fong and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Stephen Marsh and Jan{-}Philipp Stegh{\"{o}}fer}, title = {Out of sight, out of mind: Effects of displaying access-control information near the item it controls}, booktitle = {Tenth Annual International Conference on Privacy, Security and Trust, {PST} 2012, Paris, France, July 16-18, 2012}, pages = {128--136}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/PST.2012.6297929}, doi = {10.1109/PST.2012.6297929}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/VanieaBCR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/UrLCS012, author = {Blase Ur and Pedro Giovanni Leon and Lorrie Faith Cranor and Richard Shay and Yang Wang}, editor = {Lorrie Faith Cranor}, title = {Smart, useful, scary, creepy: perceptions of online behavioral advertising}, booktitle = {Symposium On Usable Privacy and Security, {SOUPS} '12, Washington, DC, {USA} - July 11 - 13, 2012}, pages = {4}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2335356.2335362}, doi = {10.1145/2335356.2335362}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/UrLCS012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/ShayKKMUVBCC12, author = {Richard Shay and Patrick Gage Kelley and Saranga Komanduri and Michelle L. Mazurek and Blase Ur and Timothy Vidas and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Lorrie Faith Cranor}, title = {Correct horse battery staple: exploring the usability of system-assigned passphrases}, booktitle = {Symposium On Usable Privacy and Security, {SOUPS} '12, Washington, DC, {USA} - July 11 - 13, 2012}, pages = {7}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2335356.2335366}, doi = {10.1145/2335356.2335366}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/ShayKKMUVBCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KelleyKMSVBCCL12, author = {Patrick Gage Kelley and Saranga Komanduri and Michelle L. Mazurek and Richard Shay and Timothy Vidas and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor and Julio L{\'{o}}pez}, title = {Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {523--537}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.38}, doi = {10.1109/SP.2012.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/KelleyKMSVBCCL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/UrKKLMMPSVBCC12, author = {Blase Ur and Patrick Gage Kelley and Saranga Komanduri and Joel Lee and Michael Maass and Michelle L. Mazurek and Timothy Passaro and Richard Shay and Timothy Vidas and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Tadayoshi Kohno}, title = {How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation}, booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA, USA, August 8-10, 2012}, pages = {65--80}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/ur}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/UrKKLMMPSVBCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/LeonCCGHUX12, author = {Pedro Giovanni Leon and Justin Cranshaw and Lorrie Faith Cranor and Jim Graves and Manoj Hastak and Blase Ur and Guzi Xu}, editor = {Ting Yu and Nikita Borisov}, title = {What do online behavioral advertising privacy disclosures communicate to users?}, booktitle = {Proceedings of the 11th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2012, Raleigh, NC, USA, October 15, 2012}, pages = {19--30}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381966.2381970}, doi = {10.1145/2381966.2381970}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/wpes/LeonCCGHUX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/soups/2012, editor = {Lorrie Faith Cranor}, title = {Symposium On Usable Privacy and Security, {SOUPS} '12, Washington, DC, {USA} - July 11 - 13, 2012}, publisher = {{ACM}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2335356}, isbn = {978-1-4503-1532-6}, timestamp = {Mon, 24 Sep 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Bravo-LilloCDK11, author = {Cristian Bravo{-}Lillo and Lorrie Faith Cranor and Julie S. Downs and Saranga Komanduri}, title = {Bridging the Gap in Computer Security Warnings: {A} Mental Model Approach}, journal = {{IEEE} Secur. Priv.}, volume = {9}, number = {2}, pages = {18--26}, year = {2011}, url = {https://doi.org/10.1109/MSP.2010.198}, doi = {10.1109/MSP.2010.198}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Bravo-LilloCDK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isr/TsaiECA11, author = {Janice Y. Tsai and Serge Egelman and Lorrie Faith Cranor and Alessandro Acquisti}, title = {The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study}, journal = {Inf. Syst. Res.}, volume = {22}, number = {2}, pages = {254--268}, year = {2011}, url = {https://doi.org/10.1287/isre.1090.0260}, doi = {10.1287/ISRE.1090.0260}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isr/TsaiECA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/BenischKSC11, author = {Michael Benisch and Patrick Gage Kelley and Norman M. Sadeh and Lorrie Faith Cranor}, title = {Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs}, journal = {Pers. Ubiquitous Comput.}, volume = {15}, number = {7}, pages = {679--694}, year = {2011}, url = {https://doi.org/10.1007/s00779-010-0346-0}, doi = {10.1007/S00779-010-0346-0}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/BenischKSC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/XiangHRC11, author = {Guang Xiang and Jason I. Hong and Carolyn P. Ros{\'{e}} and Lorrie Faith Cranor}, title = {{CANTINA+:} {A} Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {2}, pages = {21:1--21:28}, year = {2011}, url = {https://doi.org/10.1145/2019599.2019606}, doi = {10.1145/2019599.2019606}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/XiangHRC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/ReederBCRV11, author = {Robert W. Reeder and Lujo Bauer and Lorrie Faith Cranor and Michael K. Reiter and Kami Vaniea}, editor = {Desney S. Tan and Saleema Amershi and Bo Begole and Wendy A. Kellogg and Manas Tungare}, title = {More than skin deep: measuring effects of the underlying model on access-control system usability}, booktitle = {Proceedings of the International Conference on Human Factors in Computing Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011}, pages = {2065--2074}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1978942.1979243}, doi = {10.1145/1978942.1979243}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/ReederBCRV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/MazurekKSTBC11, author = {Michelle L. Mazurek and Peter F. Klemperer and Richard Shay and Hassan Takabi and Lujo Bauer and Lorrie Faith Cranor}, editor = {Desney S. Tan and Saleema Amershi and Bo Begole and Wendy A. Kellogg and Manas Tungare}, title = {Exploring reactive access control}, booktitle = {Proceedings of the International Conference on Human Factors in Computing Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011}, pages = {2085--2094}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1978942.1979245}, doi = {10.1145/1978942.1979245}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/MazurekKSTBC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/KelleyBCS11, author = {Patrick Gage Kelley and Michael Benisch and Lorrie Faith Cranor and Norman M. Sadeh}, editor = {Desney S. Tan and Saleema Amershi and Bo Begole and Wendy A. Kellogg and Manas Tungare}, title = {When are users comfortable sharing locations with advertisers?}, booktitle = {Proceedings of the International Conference on Human Factors in Computing Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011}, pages = {2449--2452}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1978942.1979299}, doi = {10.1145/1978942.1979299}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/KelleyBCS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/KomanduriSKMBCCE11, author = {Saranga Komanduri and Richard Shay and Patrick Gage Kelley and Michelle L. Mazurek and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor and Serge Egelman}, editor = {Desney S. Tan and Saleema Amershi and Bo Begole and Wendy A. Kellogg and Manas Tungare}, title = {Of passwords and people: measuring the effect of password-composition policies}, booktitle = {Proceedings of the International Conference on Human Factors in Computing Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011}, pages = {2595--2604}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1978942.1979321}, doi = {10.1145/1978942.1979321}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/KomanduriSKMBCCE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dppi/OzencCM11, author = {Fatih Kursat Ozenc and Lorrie Faith Cranor and James H. Morris}, editor = {Alessandro Deserti and Francesco Zurlo and Francesca Rizzo}, title = {Adapt-a-ride: understanding the dynamics of commuting preferences through an experience design framework}, booktitle = {Designing Pleasurable Products and Interfaces, {DPPI} '11, Milano, Italy, June 22-25, 2011}, pages = {61:1--61:8}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2347504.2347571}, doi = {10.1145/2347504.2347571}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dppi/OzencCM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/WieseKCDHZ11, author = {Jason Wiese and Patrick Gage Kelley and Lorrie Faith Cranor and Laura Dabbish and Jason I. Hong and John Zimmerman}, editor = {James A. Landay and Yuanchun Shi and Donald J. Patterson and Yvonne Rogers and Xing Xie}, title = {Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share}, booktitle = {UbiComp 2011: Ubiquitous Computing, 13th International Conference, UbiComp 2011, Beijing, China, September 17-21, 2011, Proceedings}, pages = {197--206}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2030112.2030140}, doi = {10.1145/2030112.2030140}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/huc/WieseKCDHZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imf/HibshiVC11, author = {Hanan Hibshi and Timothy Vidas and Lorrie Faith Cranor}, editor = {Holger Morgenstern and Ralf Ehlert and Sandra Frings and Oliver G{\"{o}}bel and Detlef G{\"{u}}nther and Stefan Kiltz and Jens Nedon and Dirk Schadt}, title = {Usability of Forensics Tools: {A} User Study}, booktitle = {Sixth International Conference on {IT} Security Incident Management and {IT} Forensics, {IMF} 2011, Stuttgart, Germany, May 10-12, 2011}, pages = {81--91}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IMF.2011.19}, doi = {10.1109/IMF.2011.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imf/HibshiVC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/interact/Bravo-LilloCDKS11, author = {Cristian Bravo{-}Lillo and Lorrie Faith Cranor and Julie S. Downs and Saranga Komanduri and Manya Sleeper}, editor = {Pedro F. Campos and T. C. Nicholas Graham and Joaquim A. Jorge and Nuno Jardim Nunes and Philippe A. Palanque and Marco Winckler}, title = {Improving Computer Security Dialogs}, booktitle = {Human-Computer Interaction - {INTERACT} 2011 - 13th {IFIP} {TC} 13 International Conference, Lisbon, Portugal, September 5-9, 2011, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {6949}, pages = {18--35}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23768-3\_2}, doi = {10.1007/978-3-642-23768-3\_2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/interact/Bravo-LilloCDKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/interact/KelleyBMCS11, author = {Patrick Gage Kelley and Robin Brewer and Yael Mayer and Lorrie Faith Cranor and Norman M. Sadeh}, editor = {Pedro F. Campos and T. C. Nicholas Graham and Joaquim A. Jorge and Nuno Jardim Nunes and Philippe A. Palanque and Marco Winckler}, title = {An Investigation into Facebook Friend Grouping}, booktitle = {Human-Computer Interaction - {INTERACT} 2011 - 13th {IFIP} {TC} 13 International Conference, Lisbon, Portugal, September 5-9, 2011, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {6948}, pages = {216--233}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23765-2\_15}, doi = {10.1007/978-3-642-23765-2\_15}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/interact/KelleyBMCS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/0016NKALC11, author = {Yang Wang and Gregory Norcie and Saranga Komanduri and Alessandro Acquisti and Pedro Giovanni Leon and Lorrie Faith Cranor}, editor = {Lorrie Faith Cranor}, title = {"I regretted the minute {I} pressed share": a qualitative study of regrets on Facebook}, booktitle = {Symposium On Usable Privacy and Security, {SOUPS} '11, Pittsburgh, PA, {USA} - July 20 - 22, 2011}, pages = {10}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2078827.2078841}, doi = {10.1145/2078827.2078841}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/0016NKALC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trust/WangNC11, author = {Yang Wang and Gregory Norcie and Lorrie Faith Cranor}, editor = {Jonathan M. McCune and Boris Balacheff and Adrian Perrig and Ahmad{-}Reza Sadeghi and M. Angela Sasse and Yolanta Beres}, title = {Who Is Concerned about What? {A} Study of American, Chinese and Indian Users' Privacy Concerns on Social Network Sites - (Short Paper)}, booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST} 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6740}, pages = {146--153}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21599-5\_11}, doi = {10.1007/978-3-642-21599-5\_11}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/trust/WangNC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/SleeperSC11, author = {Manya Sleeper and Divya Sharma and Lorrie Faith Cranor}, editor = {Yan Chen and Jaideep Vaidya}, title = {I know where you live: analyzing privacy protection in public databases}, booktitle = {Proceedings of the 10th annual {ACM} workshop on Privacy in the electronic society, {WPES} 2011, Chicago, IL, USA, October 17, 2011}, pages = {165--170}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046556.2046579}, doi = {10.1145/2046556.2046579}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/SleeperSC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/soups/2011, editor = {Lorrie Faith Cranor}, title = {Symposium On Usable Privacy and Security, {SOUPS} '11, Pittsburgh, PA, {USA} - July 20 - 22, 2011}, publisher = {{ACM}}, year = {2011}, url = {http://dl.acm.org/citation.cfm?id=2078827}, isbn = {978-1-4503-0911-0}, timestamp = {Mon, 24 Sep 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Cranor11, author = {Lorrie Faith Cranor}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Platform for Privacy Preferences {(P3P)}}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {940--941}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_759}, doi = {10.1007/978-1-4419-5906-5\_759}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Cranor11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/GarfinkelC10, author = {Simson L. Garfinkel and Lorrie Faith Cranor}, title = {Institutional review boards and your research}, journal = {Commun. {ACM}}, volume = {53}, number = {6}, pages = {38--40}, year = {2010}, url = {https://doi.org/10.1145/1743546.1743563}, doi = {10.1145/1743546.1743563}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/GarfinkelC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/KumaraguruSACH10, author = {Ponnurangam Kumaraguru and Steve Sheng and Alessandro Acquisti and Lorrie Faith Cranor and Jason I. Hong}, title = {Teaching Johnny not to fall for phish}, journal = {{ACM} Trans. Internet Techn.}, volume = {10}, number = {2}, pages = {7:1--7:31}, year = {2010}, url = {https://doi.org/10.1145/1754393.1754396}, doi = {10.1145/1754393.1754396}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/KumaraguruSACH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/ShengHKCD10, author = {Steve Sheng and Mandy B. Holbrook and Ponnurangam Kumaraguru and Lorrie Faith Cranor and Julie S. Downs}, editor = {Elizabeth D. Mynatt and Don Schoner and Geraldine Fitzpatrick and Scott E. Hudson and W. Keith Edwards and Tom Rodden}, title = {Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions}, booktitle = {Proceedings of the 28th International Conference on Human Factors in Computing Systems, {CHI} 2010, Atlanta, Georgia, USA, April 10-15, 2010}, pages = {373--382}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1753326.1753383}, doi = {10.1145/1753326.1753383}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/ShengHKCD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/MazurekABGIJLLOSSVBCGR10, author = {Michelle L. Mazurek and J. P. Arsenault and Joanna Bresee and Nitin Gupta and Iulia Ion and Christina Johns and Daniel Lee and Yuan Liang and Jenny Olsen and Brandon Salmon and Richard Shay and Kami Vaniea and Lujo Bauer and Lorrie Faith Cranor and Gregory R. Ganger and Michael K. Reiter}, editor = {Elizabeth D. Mynatt and Don Schoner and Geraldine Fitzpatrick and Scott E. Hudson and W. Keith Edwards and Tom Rodden}, title = {Access control for home data sharing: evaluating social acceptability}, booktitle = {Proceedings of the 28th International Conference on Human Factors in Computing Systems, {CHI} 2010, Atlanta, Georgia, USA, April 10-15, 2010}, pages = {645--654}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1753326.1753421}, doi = {10.1145/1753326.1753421}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/MazurekABGIJLLOSSVBCGR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/KelleyCBC10, author = {Patrick Gage Kelley and Lucian Cesca and Joanna Bresee and Lorrie Faith Cranor}, editor = {Elizabeth D. Mynatt and Don Schoner and Geraldine Fitzpatrick and Scott E. Hudson and W. Keith Edwards and Tom Rodden}, title = {Standardizing privacy notices: an online study of the nutrition label approach}, booktitle = {Proceedings of the 28th International Conference on Human Factors in Computing Systems, {CHI} 2010, Atlanta, Georgia, USA, April 10-15, 2010}, pages = {1573--1582}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1753326.1753561}, doi = {10.1145/1753326.1753561}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/KelleyCBC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/DownsHSC10, author = {Julie S. Downs and Mandy B. Holbrook and Steve Sheng and Lorrie Faith Cranor}, editor = {Elizabeth D. Mynatt and Don Schoner and Geraldine Fitzpatrick and Scott E. Hudson and W. Keith Edwards and Tom Rodden}, title = {Are your participants gaming the system?: screening mechanical turk workers}, booktitle = {Proceedings of the 28th International Conference on Human Factors in Computing Systems, {CHI} 2010, Atlanta, Georgia, USA, April 10-15, 2010}, pages = {2399--2402}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1753326.1753688}, doi = {10.1145/1753326.1753688}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/DownsHSC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Cranor10, author = {Lorrie Faith Cranor}, editor = {Radu Sion}, title = {Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {3}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_3}, doi = {10.1007/978-3-642-14577-3\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Cranor10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Cranor10a, author = {Lorrie Faith Cranor}, editor = {Radu Sion and Reza Curtmola and Sven Dietrich and Aggelos Kiayias and Josep M. Miret and Kazue Sako and Francesc Seb{\'{e}}}, title = {Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects}, booktitle = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS, WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6054}, pages = {247--249}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14992-4\_23}, doi = {10.1007/978-3-642-14992-4\_23}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Cranor10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/TochCDTKSCHS10, author = {Eran Toch and Justin Cranshaw and Paul Hankes Drielsma and Janice Y. Tsai and Patrick Gage Kelley and James Springfield and Lorrie Faith Cranor and Jason I. Hong and Norman M. Sadeh}, editor = {Jakob E. Bardram and Marc Langheinrich and Khai N. Truong and Paddy Nixon}, title = {Empirical models of privacy in location sharing}, booktitle = {UbiComp 2010: Ubiquitous Computing, 12th International Conference, UbiComp 2010, Copenhagen, Denmark, September 26-29, 2010, Proceedings}, series = {{ACM} International Conference Proceeding Series}, pages = {129--138}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1864349.1864364}, doi = {10.1145/1864349.1864364}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/huc/TochCDTKSCHS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/TochCDSKCHS10, author = {Eran Toch and Justin Cranshaw and Paul Hankes Drielsma and Jay Springfield and Patrick Gage Kelley and Lorrie Faith Cranor and Jason I. Hong and Norman M. Sadeh}, editor = {Jakob E. Bardram and Marc Langheinrich and Khai N. Truong and Paddy Nixon}, title = {Locaccino: a privacy-centric location sharing application}, booktitle = {UbiComp 2010: Ubiquitous Computing, 12th International Conference, UbiComp 2010, Copenhagen, Denmark, September 26-29, 2010, Adjunct Papers Proceedings}, series = {{ACM} International Conference Proceeding Series}, pages = {381--382}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1864431.1864446}, doi = {10.1145/1864431.1864446}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/huc/TochCDSKCHS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/ShayKKLMBCC10, author = {Richard Shay and Saranga Komanduri and Patrick Gage Kelley and Pedro Giovanni Leon and Michelle L. Mazurek and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Lorrie Faith Cranor}, title = {Encountering stronger password requirements: user attitudes and behaviors}, booktitle = {Proceedings of the Sixth Symposium on Usable Privacy and Security, {SOUPS} 2010, Redmond, Washington, USA, July 14-16, 2010}, series = {{ACM} International Conference Proceeding Series}, volume = {485}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1837110.1837113}, doi = {10.1145/1837110.1837113}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/ShayKKLMBCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/McDonaldC10, author = {Aleecia M. McDonald and Lorrie Faith Cranor}, editor = {Ehab Al{-}Shaer and Keith B. Frikken}, title = {Americans' attitudes about internet behavioral advertising practices}, booktitle = {Proceedings of the 2010 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2010, Chicago, Illinois, USA, October 4, 2010}, pages = {63--72}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866919.1866929}, doi = {10.1145/1866919.1866929}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/McDonaldC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/LeonCMM10, author = {Pedro Giovanni Leon and Lorrie Faith Cranor and Aleecia M. McDonald and Robert McGuire}, editor = {Ehab Al{-}Shaer and Keith B. Frikken}, title = {Token attempt: the misrepresentation of website privacy policies through the misuse of p3p compact policy tokens}, booktitle = {Proceedings of the 2010 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2010, Chicago, Illinois, USA, October 4, 2010}, pages = {93--104}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866919.1866932}, doi = {10.1145/1866919.1866932}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/LeonCMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/soups/2010, editor = {Lorrie Faith Cranor}, title = {Proceedings of the Sixth Symposium on Usable Privacy and Security, {SOUPS} 2010, Redmond, Washington, USA, July 14-16, 2010}, series = {{ACM} International Conference Proceeding Series}, volume = {485}, publisher = {{ACM}}, year = {2010}, isbn = {978-1-4503-0264-7}, timestamp = {Mon, 23 Aug 2010 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ibmrd/BertinoBCCKKLLLNRW09, author = {Elisa Bertino and Carolyn Brodie and Seraphin B. Calo and Lorrie Faith Cranor and Clare{-}Marie Karat and John Karat and Ninghui Li and Dan Lin and Jorge Lobo and Qun Ni and Prathima Rao and Xiping Wang}, title = {Analysis of privacy and security policies}, journal = {{IBM} J. Res. Dev.}, volume = {53}, number = {2}, pages = {3}, year = {2009}, url = {https://doi.org/10.1147/JRD.2009.5429045}, doi = {10.1147/JRD.2009.5429045}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ibmrd/BertinoBCCKKLLLNRW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ibmrd/KaratKBLNBLCCKR09, author = {John Karat and Clare{-}Marie Karat and Elisa Bertino and Ninghui Li and Qun Ni and Carolyn Brodie and Jorge Lobo and Seraphin B. Calo and Lorrie Faith Cranor and Ponnurangam Kumaraguru and Robert W. Reeder}, title = {Policy framework for security and privacy management}, journal = {{IBM} J. Res. Dev.}, volume = {53}, number = {2}, pages = {4}, year = {2009}, url = {https://doi.org/10.1147/JRD.2009.5429046}, doi = {10.1147/JRD.2009.5429046}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ibmrd/KaratKBLNBLCCKR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/SadehHCFKPR09, author = {Norman M. Sadeh and Jason I. Hong and Lorrie Faith Cranor and Ian Fette and Patrick Gage Kelley and Madhu K. Prabaker and Jinghai Rao}, title = {Understanding and capturing people's privacy policies in a mobile social networking application}, journal = {Pers. Ubiquitous Comput.}, volume = {13}, number = {6}, pages = {401--412}, year = {2009}, url = {https://doi.org/10.1007/s00779-008-0214-3}, doi = {10.1007/S00779-008-0214-3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/SadehHCFKPR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/SpiekermannC09, author = {Sarah Spiekermann and Lorrie Faith Cranor}, title = {Engineering Privacy}, journal = {{IEEE} Trans. Software Eng.}, volume = {35}, number = {1}, pages = {67--82}, year = {2009}, url = {https://doi.org/10.1109/TSE.2008.88}, doi = {10.1109/TSE.2008.88}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tse/SpiekermannC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/SalmonSCG09, author = {Brandon Salmon and Steven W. Schlosser and Lorrie Faith Cranor and Gregory R. Ganger}, title = {Perspective: Semantic Data Management for the Home}, journal = {login Usenix Mag.}, volume = {34}, number = {5}, year = {2009}, url = {https://www.usenix.org/publications/login/october-2009-volume-34-number-5/perspective-semantic-data-management-home}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/SalmonSCG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/EgelmanTCA09, author = {Serge Egelman and Janice Y. Tsai and Lorrie Faith Cranor and Alessandro Acquisti}, editor = {Dan R. Olsen Jr. and Richard B. Arthur and Ken Hinckley and Meredith Ringel Morris and Scott E. Hudson and Saul Greenberg}, title = {Timing is everything?: the effects of timing and placement of online privacy indicators}, booktitle = {Proceedings of the 27th International Conference on Human Factors in Computing Systems, {CHI} 2009, Boston, MA, USA, April 4-9, 2009}, pages = {319--328}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1518701.1518752}, doi = {10.1145/1518701.1518752}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/EgelmanTCA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/BauerCRRV09, author = {Lujo Bauer and Lorrie Faith Cranor and Robert W. Reeder and Michael K. Reiter and Kami Vaniea}, editor = {Dan R. Olsen Jr. and Richard B. Arthur and Ken Hinckley and Meredith Ringel Morris and Scott E. Hudson and Saul Greenberg}, title = {Real life challenges in access-control management}, booktitle = {Proceedings of the 27th International Conference on Human Factors in Computing Systems, {CHI} 2009, Boston, MA, USA, April 4-9, 2009}, pages = {899--908}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1518701.1518838}, doi = {10.1145/1518701.1518838}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/BauerCRRV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/TsaiKDCHS09, author = {Janice Y. Tsai and Patrick Gage Kelley and Paul Hankes Drielsma and Lorrie Faith Cranor and Jason I. Hong and Norman M. Sadeh}, editor = {Dan R. Olsen Jr. and Richard B. Arthur and Ken Hinckley and Meredith Ringel Morris and Scott E. Hudson and Saul Greenberg}, title = {Who's viewed you?: the impact of feedback in a mobile location-sharing application}, booktitle = {Proceedings of the 27th International Conference on Human Factors in Computing Systems, {CHI} 2009, Boston, MA, USA, April 4-9, 2009}, pages = {2003--2012}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1518701.1519005}, doi = {10.1145/1518701.1519005}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/TsaiKDCHS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/ShengKACH09, author = {Steve Sheng and Ponnurangam Kumaraguru and Alessandro Acquisti and Lorrie Faith Cranor and Jason I. Hong}, title = {Improving phishing countermeasures: An analysis of expert interviews}, booktitle = {2009 eCrime Researchers Summit, eCrime 2009, Tacoma, WA, USA, October 20-21, 2009}, pages = {1--15}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ECRIME.2009.5342608}, doi = {10.1109/ECRIME.2009.5342608}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/ShengKACH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fast/SalmonSCG09, author = {Brandon Salmon and Steven W. Schlosser and Lorrie Faith Cranor and Gregory R. Ganger}, editor = {Margo I. Seltzer and Richard Wheeler}, title = {Perspective: Semantic Data Management for the Home}, booktitle = {7th {USENIX} Conference on File and Storage Technologies, February 24-27, 2009, San Francisco, CA, {USA.} Proceedings}, pages = {167--182}, publisher = {{USENIX}}, year = {2009}, url = {http://www.usenix.org/events/fast09/tech/full\_papers/salmon/salmon.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fast/SalmonSCG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/McDonaldRKC09, author = {Aleecia M. McDonald and Robert W. Reeder and Patrick Gage Kelley and Lorrie Faith Cranor}, editor = {Ian Goldberg and Mikhail J. Atallah}, title = {A Comparative Study of Online Privacy Policies and Formats}, booktitle = {Privacy Enhancing Technologies, 9th International Symposium, {PETS} 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5672}, pages = {37--55}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03168-7\_3}, doi = {10.1007/978-3-642-03168-7\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/McDonaldRKC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/BenischKSSTCD09, author = {Michael Benisch and Patrick Gage Kelley and Norman M. Sadeh and Tuomas Sandholm and Janice Y. Tsai and Lorrie Faith Cranor and Paul Hankes Drielsma}, editor = {Lorrie Faith Cranor}, title = {The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing}, booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS} 2009, Mountain View, California, USA, July 15-17, 2009}, series = {{ACM} International Conference Proceeding Series}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1572532.1572561}, doi = {10.1145/1572532.1572561}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/BenischKSSTCD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/KelleyBCR09, author = {Patrick Gage Kelley and Joanna Bresee and Lorrie Faith Cranor and Robert W. Reeder}, editor = {Lorrie Faith Cranor}, title = {A "nutrition label" for privacy}, booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS} 2009, Mountain View, California, USA, July 15-17, 2009}, series = {{ACM} International Conference Proceeding Series}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1572532.1572538}, doi = {10.1145/1572532.1572538}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/KelleyBCR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/KumaraguruCACHBP09, author = {Ponnurangam Kumaraguru and Justin Cranshaw and Alessandro Acquisti and Lorrie Faith Cranor and Jason I. Hong and Mary Ann Blair and Theodore Pham}, editor = {Lorrie Faith Cranor}, title = {School of phish: a real-word evaluation of anti-phishing training}, booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS} 2009, Mountain View, California, USA, July 15-17, 2009}, series = {{ACM} International Conference Proceeding Series}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1572532.1572536}, doi = {10.1145/1572532.1572536}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/KumaraguruCACHBP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/McDonaldRKC09, author = {Aleecia M. McDonald and Robert W. Reeder and Patrick Gage Kelley and Lorrie Faith Cranor}, editor = {Lorrie Faith Cranor}, title = {A comparative study of online privacy policies and formats}, booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS} 2009, Mountain View, California, USA, July 15-17, 2009}, series = {{ACM} International Conference Proceeding Series}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1572532.1572586}, doi = {10.1145/1572532.1572586}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/McDonaldRKC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/ReederKMC09, author = {Robert W. Reeder and Patrick Gage Kelley and Aleecia M. McDonald and Lorrie Faith Cranor}, editor = {Lorrie Faith Cranor}, title = {A user study of the expandable grid applied to {P3P} privacy policy visualization}, booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS} 2009, Mountain View, California, USA, July 15-17, 2009}, series = {{ACM} International Conference Proceeding Series}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1572532.1572582}, doi = {10.1145/1572532.1572582}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/ReederKMC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/TochRCDHKST09, author = {Eran Toch and Ramprasad Ravichandran and Lorrie Faith Cranor and Paul Hankes Drielsma and Jason I. Hong and Patrick Gage Kelley and Norman M. Sadeh and Janice Y. Tsai}, editor = {Lorrie Faith Cranor}, title = {Analyzing use of privacy policy attributes in a location sharing application}, booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS} 2009, Mountain View, California, USA, July 15-17, 2009}, series = {{ACM} International Conference Proceeding Series}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1572532.1572571}, doi = {10.1145/1572532.1572571}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/TochRCDHKST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/TsaiECA09, author = {Janice Y. Tsai and Serge Egelman and Lorrie Faith Cranor and Alessandro Acquisti}, editor = {Lorrie Faith Cranor}, title = {The impact of privacy indicators on search engine browsing patterns}, booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS} 2009, Mountain View, California, USA, July 15-17, 2009}, series = {{ACM} International Conference Proceeding Series}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1572532.1572568}, doi = {10.1145/1572532.1572568}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/TsaiECA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/TsaiKDCHS09, author = {Janice Y. Tsai and Patrick Gage Kelley and Paul Hankes Drielsma and Lorrie Faith Cranor and Jason I. Hong and Norman M. Sadeh}, editor = {Lorrie Faith Cranor}, title = {Who's viewed you?: the impact of feedback in a mobile location-sharing application}, booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS} 2009, Mountain View, California, USA, July 15-17, 2009}, series = {{ACM} International Conference Proceeding Series}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1572532.1572583}, doi = {10.1145/1572532.1572583}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/TsaiKDCHS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SunshineEAAC09, author = {Joshua Sunshine and Serge Egelman and Hazim Almuhimedi and Neha Atri and Lorrie Faith Cranor}, editor = {Fabian Monrose}, title = {Crying Wolf: An Empirical Study of {SSL} Warning Effectiveness}, booktitle = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14, 2009, Proceedings}, pages = {399--416}, publisher = {{USENIX} Association}, year = {2009}, url = {http://www.usenix.org/events/sec09/tech/full\_papers/sunshine.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/SunshineEAAC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/soups/2009, editor = {Lorrie Faith Cranor}, title = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS} 2009, Mountain View, California, USA, July 15-17, 2009}, series = {{ACM} International Conference Proceeding Series}, publisher = {{ACM}}, year = {2009}, isbn = {978-1-60558-736-3}, timestamp = {Tue, 28 Jul 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ecra/CranorESMC08, author = {Lorrie Faith Cranor and Serge Egelman and Steve Sheng and Aleecia M. McDonald and Abdur Chowdhury}, title = {{P3P} deployment on websites}, journal = {Electron. Commer. Res. Appl.}, volume = {7}, number = {3}, pages = {274--293}, year = {2008}, url = {https://doi.org/10.1016/j.elerap.2008.04.003}, doi = {10.1016/J.ELERAP.2008.04.003}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ecra/CranorESMC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/StuderJKOC08, author = {Ahren Studer and Christina Johns and Jaanus Kase and Kyle O'Meara and Lorrie Faith Cranor}, title = {A Survey to Guide Group Key Protocol Development}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {475--484}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.28}, doi = {10.1109/ACSAC.2008.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/StuderJKOC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KelleyDSC08, author = {Patrick Gage Kelley and Paul Hankes Drielsma and Norman M. Sadeh and Lorrie Faith Cranor}, editor = {Dirk Balfanz and Jessica Staddon}, title = {User-controllable learning of security and privacy policies}, booktitle = {Proceedings of the 1st {ACM} Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {11--18}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456377.1456380}, doi = {10.1145/1456377.1456380}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KelleyDSC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/BauerCRRV08, author = {Lujo Bauer and Lorrie Faith Cranor and Robert W. Reeder and Michael K. Reiter and Kami Vaniea}, editor = {Mary Czerwinski and Arnold M. Lund and Desney S. Tan}, title = {A user study of policy creation in a flexible access-control system}, booktitle = {Proceedings of the 2008 Conference on Human Factors in Computing Systems, {CHI} 2008, 2008, Florence, Italy, April 5-10, 2008}, pages = {543--552}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1357054.1357143}, doi = {10.1145/1357054.1357143}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/BauerCRRV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/EgelmanCH08, author = {Serge Egelman and Lorrie Faith Cranor and Jason I. Hong}, editor = {Mary Czerwinski and Arnold M. Lund and Desney S. Tan}, title = {You've been warned: an empirical study of the effectiveness of web browser phishing warnings}, booktitle = {Proceedings of the 2008 Conference on Human Factors in Computing Systems, {CHI} 2008, 2008, Florence, Italy, April 5-10, 2008}, pages = {1065--1074}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1357054.1357219}, doi = {10.1145/1357054.1357219}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/EgelmanCH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/ReederBCRBHS08, author = {Robert W. Reeder and Lujo Bauer and Lorrie Faith Cranor and Michael K. Reiter and Kelli Bacon and Keisha How and Heather Strong}, editor = {Mary Czerwinski and Arnold M. Lund and Desney S. Tan}, title = {Expandable grids for visualizing and authoring computer security policies}, booktitle = {Proceedings of the 2008 Conference on Human Factors in Computing Systems, {CHI} 2008, 2008, Florence, Italy, April 5-10, 2008}, pages = {1473--1482}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1357054.1357285}, doi = {10.1145/1357054.1357285}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/ReederBCRBHS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/KumaraguruSACH08, author = {Ponnurangam Kumaraguru and Steve Sheng and Alessandro Acquisti and Lorrie Faith Cranor and Jason I. Hong}, title = {Lessons from a real world evaluation of anti-phishing training}, booktitle = {2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October 15-16, 2008}, pages = {1--12}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ECRIME.2008.4696970}, doi = {10.1109/ECRIME.2008.4696970}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/KumaraguruSACH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/Cranor08, author = {Lorrie Faith Cranor}, editor = {Elizabeth F. Churchill and Rachna Dhamija}, title = {A Framework for Reasoning About the Human in the Loop}, booktitle = {Usability, Psychology, and Security, UPSEC'08, San Francisco, CA, USA, April 14, 2008, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/upsec08/tech/full\_papers/cranor/cranor.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/Cranor08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/ReederKMC08, author = {Robert W. Reeder and Patrick Gage Kelley and Aleecia M. McDonald and Lorrie Faith Cranor}, editor = {Vijay Atluri and Marianne Winslett}, title = {A user study of the expandable grid applied to {P3P} privacy policy visualization}, booktitle = {Proceedings of the 2008 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2008, Alexandria, VA, USA, October 27, 2008}, pages = {45--54}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456403.1456413}, doi = {10.1145/1456403.1456413}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/ReederKMC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/soups/2008, editor = {Lorrie Faith Cranor}, title = {Proceedings of the 4th Symposium on Usable Privacy and Security, {SOUPS} 2008, Pittsburgh, Pennsylvania, USA, July 23-25, 2008}, series = {{ACM} International Conference Proceeding Series}, publisher = {{ACM}}, year = {2008}, isbn = {978-1-60558-276-4}, timestamp = {Mon, 16 Mar 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/KumaraguruRACHN07, author = {Ponnurangam Kumaraguru and Yong Rhee and Alessandro Acquisti and Lorrie Faith Cranor and Jason I. Hong and Elizabeth Nunge}, editor = {Mary Beth Rosson and David J. Gilmore}, title = {Protecting people from phishing: the design and evaluation of an embedded training email system}, booktitle = {Proceedings of the 2007 Conference on Human Factors in Computing Systems, {CHI} 2007, San Jose, California, USA, April 28 - May 3, 2007}, pages = {905--914}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1240624.1240760}, doi = {10.1145/1240624.1240760}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/KumaraguruRACHN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/DownsHC07, author = {Julie S. Downs and Mandy B. Holbrook and Lorrie Faith Cranor}, editor = {Lorrie Faith Cranor}, title = {Behavioral response to phishing risk}, booktitle = {Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007}, series = {{ACM} International Conference Proceeding Series}, volume = {269}, pages = {37--44}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1299015.1299019}, doi = {10.1145/1299015.1299019}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/DownsHC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/KumaraguruRSHACH07, author = {Ponnurangam Kumaraguru and Yong Rhee and Steve Sheng and Sharique Hasan and Alessandro Acquisti and Lorrie Faith Cranor and Jason I. Hong}, editor = {Lorrie Faith Cranor}, title = {Getting users to pay attention to anti-phishing education: evaluation of retention and transfer}, booktitle = {Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007}, series = {{ACM} International Conference Proceeding Series}, volume = {269}, pages = {70--81}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1299015.1299022}, doi = {10.1145/1299015.1299022}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/KumaraguruRSHACH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/CranorETA07, author = {Lorrie Faith Cranor and Serge Egelman and Janice Y. Tsai and Alessandro Acquisti}, title = {The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study}, booktitle = {Proceedings of the International Conference on Information Systems, {ICIS} 2007, Montreal, Quebec, Canada, December 9-12, 2007}, pages = {20}, publisher = {Association for Information Systems}, year = {2007}, url = {http://aisel.aisnet.org/icis2007/20}, timestamp = {Wed, 28 Dec 2011 14:49:00 +0100}, biburl = {https://dblp.org/rec/conf/icis/CranorETA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/CranorEHZ07, author = {Lorrie Faith Cranor and Serge Egelman and Jason I. Hong and Yue Zhang}, title = {Phinding Phish: An Evaluation of Anti-Phishing Toolbars}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2007, San Diego, California, USA, 28th February - 2nd March 2007}, publisher = {The Internet Society}, year = {2007}, url = {https://www.ndss-symposium.org/ndss2007/phinding-phish-evaluation-anti-phishing-toolbars/}, timestamp = {Mon, 01 Feb 2021 08:42:16 +0100}, biburl = {https://dblp.org/rec/conf/ndss/CranorEHZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/BauerCRV07, author = {Lujo Bauer and Lorrie Faith Cranor and Michael K. Reiter and Kami Vaniea}, editor = {Lorrie Faith Cranor}, title = {Lessons learned from the deployment of a smartphone-based access-control system}, booktitle = {Proceedings of the 3rd Symposium on Usable Privacy and Security, {SOUPS} 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007}, series = {{ACM} International Conference Proceeding Series}, volume = {229}, pages = {64--75}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1280680.1280689}, doi = {10.1145/1280680.1280689}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/BauerCRV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/ShengMKACHN07, author = {Steve Sheng and Bryant Magnien and Ponnurangam Kumaraguru and Alessandro Acquisti and Lorrie Faith Cranor and Jason I. Hong and Elizabeth Nunge}, editor = {Lorrie Faith Cranor}, title = {Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish}, booktitle = {Proceedings of the 3rd Symposium on Usable Privacy and Security, {SOUPS} 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007}, series = {{ACM} International Conference Proceeding Series}, volume = {229}, pages = {88--99}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1280680.1280692}, doi = {10.1145/1280680.1280692}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/ShengMKACHN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weis/TsaiECA07, author = {Janice Y. Tsai and Serge Egelman and Lorrie Faith Cranor and Alessandro Acquisti}, title = {The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study}, booktitle = {6th Annual Workshop on the Economics of Information Security, {WEIS} 2007, The Heinz School and CyLab at Carnegie Mellon University, Pittsburgh, PA, USA, June 7-8, 2007}, year = {2007}, url = {http://weis2007.econinfosec.org/papers/57.pdf}, timestamp = {Thu, 22 Jul 2021 16:15:45 +0200}, biburl = {https://dblp.org/rec/conf/weis/TsaiECA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmcsa/CornwellFHPRTVBCHMRS07, author = {Jason Cornwell and Ian Fette and Gary Hsieh and Madhu K. Prabaker and Jinghai Rao and Karen P. Tang and Kami Vaniea and Lujo Bauer and Lorrie Faith Cranor and Jason I. Hong and Bruce M. McLaren and Mike Reiter and Norman M. Sadeh}, editor = {Eyal de Lara and Nina Bhatti}, title = {User-Controllable Security and Privacy for Pervasive Computing}, booktitle = {Eighth {IEEE} Workshop on Mobile Computing Systems and Applications, HotMobile 2007, Tucson, Arizona, USA, March 8-9, 2007}, pages = {14--19}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/HotMobile.2007.9}, doi = {10.1109/HOTMOBILE.2007.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wmcsa/CornwellFHPRTVBCHMRS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/ZhangHC07, author = {Yue Zhang and Jason I. Hong and Lorrie Faith Cranor}, editor = {Carey L. Williamson and Mary Ellen Zurko and Peter F. Patel{-}Schneider and Prashant J. Shenoy}, title = {Cantina: a content-based approach to detecting phishing web sites}, booktitle = {Proceedings of the 16th International Conference on World Wide Web, {WWW} 2007, Banff, Alberta, Canada, May 8-12, 2007}, pages = {639--648}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1242572.1242659}, doi = {10.1145/1242572.1242659}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/ZhangHC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecrime/2007, editor = {Lorrie Faith Cranor}, title = {Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007}, series = {{ACM} International Conference Proceeding Series}, volume = {269}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1299015}, doi = {10.1145/1299015}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/soups/2007, editor = {Lorrie Faith Cranor}, title = {Proceedings of the 3rd Symposium on Usable Privacy and Security, {SOUPS} 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007}, series = {{ACM} International Conference Proceeding Series}, volume = {229}, publisher = {{ACM}}, year = {2007}, isbn = {978-1-59593-801-5}, timestamp = {Tue, 10 Jun 2008 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeigerC06, author = {Matthew Geiger and Lorrie Faith Cranor}, title = {Scrubbing Stubborn Data: An Evaluation of Counter-Forensic Privacy Tools}, journal = {{IEEE} Secur. Priv.}, volume = {4}, number = {5}, pages = {16--25}, year = {2006}, url = {https://doi.org/10.1109/MSP.2006.132}, doi = {10.1109/MSP.2006.132}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/GeigerC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/interactions/Cranor06, author = {Lorrie Faith Cranor}, title = {What do they "indicate?": evaluating security and privacy indicators}, journal = {Interactions}, volume = {13}, number = {3}, pages = {45--47}, year = {2006}, url = {https://doi.org/10.1145/1125864.1125890}, doi = {10.1145/1125864.1125890}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/interactions/Cranor06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tochi/CranorGA06, author = {Lorrie Faith Cranor and Praveen Guduru and Manjula Arjula}, title = {User interfaces for privacy agents}, journal = {{ACM} Trans. Comput. Hum. Interact.}, volume = {13}, number = {2}, pages = {135--178}, year = {2006}, url = {https://doi.org/10.1145/1165734.1165735}, doi = {10.1145/1165734.1165735}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tochi/CranorGA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMicec/EgelmanCC06, author = {Serge Egelman and Lorrie Faith Cranor and Abdur Chowdhury}, editor = {Mark S. Fox and Bruce Spencer}, title = {An analysis of P3P-enabled web sites among top-20 search results}, booktitle = {Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce - Innovations for Conquering Current Barriers, Obstacles and Limitations to Conducting Successful Business on the Internet, 2006, Fredericton, New Brunswick, Canada, August 13-16, 2006}, series = {{ACM} International Conference Proceeding Series}, volume = {156}, pages = {197--207}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1151454.1151492}, doi = {10.1145/1151454.1151492}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ACMicec/EgelmanCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/TsaiCC06, author = {Janice Y. Tsai and Lorrie Faith Cranor and Scott Craver}, editor = {Moti Yung and Kaoru Kurosawa and Reihaneh Safavi{-}Naini}, title = {Vicarious infringement creates a privacy ceiling}, booktitle = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006}, pages = {9--18}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179509.1179512}, doi = {10.1145/1179509.1179512}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/TsaiCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/KumaraguruAC06, author = {Ponnurangam Kumaraguru and Alessandro Acquisti and Lorrie Faith Cranor}, title = {Trust modelling for online transactions: a phishing scenario}, booktitle = {Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between {PST} Technologies and Business Services, {PST} 2006, Markham, Ontario, Canada, October 30 - November 1, 2006}, series = {{ACM} International Conference Proceeding Series}, volume = {380}, pages = {11}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1501434.1501448}, doi = {10.1145/1501434.1501448}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/KumaraguruAC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/KuoRC06, author = {Cynthia Kuo and Sasha Romanosky and Lorrie Faith Cranor}, editor = {Lorrie Faith Cranor}, title = {Human selection of mnemonic phrase-based passwords}, booktitle = {Proceedings of the 2nd Symposium on Usable Privacy and Security, {SOUPS} 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006}, series = {{ACM} International Conference Proceeding Series}, volume = {149}, pages = {67--78}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1143120.1143129}, doi = {10.1145/1143120.1143129}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soups/KuoRC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/DownsHC06, author = {Julie S. Downs and Mandy B. Holbrook and Lorrie Faith Cranor}, editor = {Lorrie Faith Cranor}, title = {Decision strategies and susceptibility to phishing}, booktitle = {Proceedings of the 2nd Symposium on Usable Privacy and Security, {SOUPS} 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006}, series = {{ACM} International Conference Proceeding Series}, volume = {149}, pages = {79--90}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1143120.1143131}, doi = {10.1145/1143120.1143131}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/DownsHC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/GideonCEA06, author = {Julia Gideon and Lorrie Faith Cranor and Serge Egelman and Alessandro Acquisti}, editor = {Lorrie Faith Cranor}, title = {Power strips, prophylactics, and privacy, oh my!}, booktitle = {Proceedings of the 2nd Symposium on Usable Privacy and Security, {SOUPS} 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006}, series = {{ACM} International Conference Proceeding Series}, volume = {149}, pages = {133--144}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1143120.1143137}, doi = {10.1145/1143120.1143137}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/GideonCEA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/soups/2006, editor = {Lorrie Faith Cranor}, title = {Proceedings of the 2nd Symposium on Usable Privacy and Security, {SOUPS} 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006}, series = {{ACM} International Conference Proceeding Series}, volume = {149}, publisher = {{ACM}}, year = {2006}, isbn = {1-59593-448-0}, timestamp = {Tue, 10 Jun 2008 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/Cranor05, author = {Lorrie Faith Cranor}, title = {Giving notice: why privacy policies and security breach notifications aren't enough}, journal = {{IEEE} Commun. Mag.}, volume = {43}, number = {8}, pages = {18--19}, year = {2005}, url = {https://doi.org/10.1109/MCOM.2005.1497545}, doi = {10.1109/MCOM.2005.1497545}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/Cranor05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/KumaraguruC05, author = {Ponnurangam Kumaraguru and Lorrie Faith Cranor}, editor = {George Danezis and David M. Martin Jr.}, title = {Privacy in India: Attitudes and Awareness}, booktitle = {Privacy Enhancing Technologies, 5th International Workshop, {PET} 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3856}, pages = {243--258}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11767831\_16}, doi = {10.1007/11767831\_16}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/KumaraguruC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/um/Cranor05, author = {Lorrie Faith Cranor}, editor = {Liliana Ardissono and Paul Brna and Antonija Mitrovic}, title = {Hey, That's Personal!}, booktitle = {User Modeling 2005, 10th International Conference, {UM} 2005, Edinburgh, Scotland, UK, July 24-29, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3538}, pages = {4}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11527886\_2}, doi = {10.1007/11527886\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/um/Cranor05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/KowitzC05, author = {Braden Kowitz and Lorrie Faith Cranor}, editor = {Vijay Atluri and Sabrina De Capitani di Vimercati and Roger Dingledine}, title = {Peripheral privacy notifications for wireless networks}, booktitle = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005}, pages = {90--96}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102199.1102217}, doi = {10.1145/1102199.1102217}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/KowitzC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/Cranor05, author = {Lorrie Faith Cranor}, editor = {Allan Ellis and Tatsuya Hagino}, title = {Towards usable Web privacy and security}, booktitle = {Proceedings of the 14th international conference on World Wide Web, {WWW} 2005, Chiba, Japan, May 10-14, 2005}, pages = {352}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1060745.1060749}, doi = {10.1145/1060745.1060749}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/Cranor05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/soups/2005, editor = {Lorrie Faith Cranor}, title = {Proceedings of the 1st Symposium on Usable Privacy and Security, {SOUPS} 2005, Pittsburgh, Pennsylvania, USA, July 6-8, 2005}, series = {{ACM} International Conference Proceeding Series}, volume = {93}, publisher = {{ACM}}, year = {2005}, isbn = {1-59593-178-3}, timestamp = {Tue, 10 Jun 2008 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/CranorG04, author = {Lorrie Faith Cranor and Simson L. Garfinkel}, title = {Guest Editors' Introduction: Secure or Usable?}, journal = {{IEEE} Secur. Priv.}, volume = {2}, number = {5}, pages = {16--18}, year = {2004}, url = {https://doi.org/10.1109/MSP.2004.69}, doi = {10.1109/MSP.2004.69}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/CranorG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/ByersCKM04, author = {Simon D. Byers and Lorrie Faith Cranor and David P. Kormann and Patrick D. McDaniel}, editor = {David M. Martin Jr. and Andrei Serjantov}, title = {Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine}, booktitle = {Privacy Enhancing Technologies, 4th International Workshop, {PET} 2004, Toronto, Canada, May 26-28, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3424}, pages = {314--328}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11423409\_20}, doi = {10.1007/11423409\_20}, timestamp = {Thu, 05 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/ByersCKM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/04/Cranor04, author = {Lorrie Faith Cranor}, editor = {Clare{-}Marie Karat and Jan O. Blom and John Karat}, title = {I Didn't buy It for Myself}, booktitle = {Designing Personalized User Experiences in eCommerce}, series = {Human-Computer Interaction Series}, volume = {5}, pages = {57--73}, publisher = {Kluwer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-2148-8\_5}, doi = {10.1007/1-4020-2148-8\_5}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/04/Cranor04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Cranor03, author = {Lorrie Faith Cranor}, title = {{P3P:} Making Privacy Policies More Useful}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {6}, pages = {50--55}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1253568}, doi = {10.1109/MSECP.2003.1253568}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Cranor03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ubiquity/CranorG03, author = {Lorrie Faith Cranor and Shane Greenstein}, title = {Communications policy and information technology}, journal = {Ubiquity}, volume = {2003}, number = {January}, pages = {1}, year = {2003}, url = {http://doi.acm.org/10.1145/763961.763962}, doi = {10.1145/763961.763962}, timestamp = {Thu, 12 Jan 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ubiquity/CranorG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMicec/ByersCK03, author = {Simon D. Byers and Lorrie Faith Cranor and David P. Kormann}, editor = {Norman M. Sadeh and Mary Jo Dively and Robert J. Kauffman and Yannis Labrou and Onn Shehory and Rahul Telang and Lorrie Faith Cranor}, title = {Automated analysis of P3P-enabled Web sites}, booktitle = {Proceedings of the 5th International Conference on Electronic Commerce, {ICEC} 2003, Pittsburgh, Pennsylvania, USA, September 30 - October 03, 2003}, series = {{ACM} International Conference Proceeding Series}, volume = {50}, pages = {326--338}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948005.948048}, doi = {10.1145/948005.948048}, timestamp = {Tue, 06 Apr 2021 12:12:56 +0200}, biburl = {https://dblp.org/rec/conf/ACMicec/ByersCK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/ByersCKMC03, author = {Simon D. Byers and Lorrie Faith Cranor and David P. Kormann and Patrick D. McDaniel and Eric Cronin}, editor = {Moti Yung}, title = {Analysis of security vulnerabilities in the movie production and distribution process}, booktitle = {Proceedings of the 2003 {ACM} workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003}, pages = {1--12}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/947380.947383}, doi = {10.1145/947380.947383}, timestamp = {Thu, 05 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/ByersCKMC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/Cranor03, author = {Lorrie Faith Cranor}, editor = {Sushil Jajodia and Pierangela Samarati and Paul F. Syverson}, title = {'I didn't buy it for myself' privacy and ecommerce personalization}, booktitle = {Proceedings of the 2003 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2003, Washington, DC, USA, October 30, 2003}, pages = {111--117}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/1005140.1005158}, doi = {10.1145/1005140.1005158}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/Cranor03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Cranor03, author = {Lorrie Faith Cranor}, editor = {Dimitris Gritzalis}, title = {In Search of the Perfect Voting Technology: No Easy Answers}, booktitle = {Secure Electronic Voting}, series = {Advances in Information Security}, volume = {7}, pages = {17--30}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0239-5\_2}, doi = {10.1007/978-1-4615-0239-5\_2}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/Cranor03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ACMicec/2003, editor = {Norman M. Sadeh and Mary Jo Dively and Robert J. Kauffman and Yannis Labrou and Onn Shehory and Rahul Telang and Lorrie Faith Cranor}, title = {Proceedings of the 5th International Conference on Electronic Commerce, {ICEC} 2003, Pittsburgh, Pennsylvania, USA, September 30 - October 03, 2003}, series = {{ACM} International Conference Proceeding Series}, volume = {50}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948005}, doi = {10.1145/948005}, isbn = {1-58113-788-5}, timestamp = {Tue, 06 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ACMicec/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0007179, author = {Lorrie Faith Cranor}, title = {Web privacy with {P3P} - the platform for privacy preferences}, publisher = {O'Reilly}, year = {2002}, url = {http://www.oreilly.de/catalog/webprivp3p/index.html}, isbn = {978-0-596-00371-5}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/daglib/0007179.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tis/Cranor02, author = {Lorrie Faith Cranor}, title = {Letter from the Special Section Editors, Ten Years of Computers, Freedom and Privacy}, journal = {Inf. Soc.}, volume = {18}, number = {3}, year = {2002}, url = {http://www.indiana.edu/\%7Etisj/readers/full-text/18-3\%20Cranor.pdf}, timestamp = {Fri, 17 Sep 2004 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tis/Cranor02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tis/Cranor02a, author = {Lorrie Faith Cranor}, title = {{SPECIAL} {SECTION:} Computers, Freedom and Privacy}, journal = {Inf. Soc.}, volume = {18}, number = {3}, year = {2002}, timestamp = {Fri, 17 Sep 2004 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tis/Cranor02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cfp/Cranor02, author = {Lorrie Faith Cranor}, title = {The role of privacy advocates and data protection authorities in the design and deployment of the platform for privacy preferences}, booktitle = {Proceedings of the 12th Annual Conference on Computers, Freedom and Privacy, {CFP} 2002, San Francisco, California, USA, April 16-19, 2002}, pages = {1:1--1:8}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/543482.543506}, doi = {10.1145/543482.543506}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cfp/Cranor02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/CranorAG02, author = {Lorrie Faith Cranor and Manjula Arjula and Praveen Guduru}, editor = {Sushil Jajodia and Pierangela Samarati}, title = {Use of a {P3P} user agent by early adopters}, booktitle = {Proceedings of the 2002 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2002, Washington, DC, USA, November 21, 2002}, pages = {1--10}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/644527.644528}, doi = {10.1145/644527.644528}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/CranorAG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/HoffmanC01, author = {Lance J. Hoffman and Lorrie Faith Cranor}, title = {Internet voting for public officials: introduction}, journal = {Commun. {ACM}}, volume = {44}, number = {1}, pages = {69--71}, year = {2001}, url = {https://doi.org/10.1145/357489.357510}, doi = {10.1145/357489.357510}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/HoffmanC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/WaldmanRC01, author = {Marc Waldman and Aviel D. Rubin and Lorrie Faith Cranor}, title = {The architecture of robust publishing systems}, journal = {{ACM} Trans. Internet Techn.}, volume = {1}, number = {2}, pages = {199--230}, year = {2001}, url = {https://doi.org/10.1145/502152.502154}, doi = {10.1145/502152.502154}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/WaldmanRC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ubiquity/Cranor01, author = {Lorrie Faith Cranor}, title = {Voting after Florida: no easy answers}, journal = {Ubiquity}, volume = {2001}, number = {February}, pages = {3}, year = {2001}, url = {https://doi.org/10.1145/363984.364044}, doi = {10.1145/363984.364044}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ubiquity/Cranor01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dud/Cranor00, author = {Lorrie Faith Cranor}, title = {Platform for Privacy Preferences - {P3P}}, journal = {Datenschutz und Datensicherheit}, volume = {24}, number = {8}, year = {2000}, timestamp = {Fri, 12 Dec 2003 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dud/Cranor00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cfp/Cranor00, author = {Lorrie Faith Cranor}, editor = {Lorrie Faith Cranor}, title = {Ten years of computers, freedom and privacy: a personal retrospective}, booktitle = {Proceedings of the Tenth Conference on Computers, Freedom and Privacy: Challenging the Assumptions, {CFP} 2000, Toronto, Ontario, Canada, April 4-7, 2000}, pages = {11--15}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/332186.332193}, doi = {10.1145/332186.332193}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cfp/Cranor00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cfp/CranorW00, author = {Lorrie Faith Cranor and Rebecca N. Wright}, editor = {Lorrie Faith Cranor}, title = {Influencing software usage}, booktitle = {Proceedings of the Tenth Conference on Computers, Freedom and Privacy: Challenging the Assumptions, {CFP} 2000, Toronto, Ontario, Canada, April 4-7, 2000}, pages = {45--55}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/332186.332210}, doi = {10.1145/332186.332210}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cfp/CranorW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WaldmanRC00, author = {Marc Waldman and Aviel D. Rubin and Lorrie Faith Cranor}, editor = {Steven M. Bellovin and Greg Rose}, title = {Publius: {A} Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System}, booktitle = {9th {USENIX} Security Symposium, Denver, Colorado, USA, August 14-17, 2000}, publisher = {{USENIX} Association}, year = {2000}, url = {https://www.usenix.org/conference/9th-usenix-security-symposium/publius-robust-tamper-evident-censorship-resistant-and}, timestamp = {Mon, 01 Feb 2021 08:43:02 +0100}, biburl = {https://dblp.org/rec/conf/uss/WaldmanRC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cfp/2000, editor = {Lorrie Faith Cranor}, title = {Proceedings of the Tenth Conference on Computers, Freedom and Privacy: Challenging the Assumptions, {CFP} 2000, Toronto, Ontario, Canada, April 4-7, 2000}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/332186}, doi = {10.1145/332186}, isbn = {978-1-58113-256-4}, timestamp = {Mon, 23 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cfp/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CY-0001011, author = {Lorrie Faith Cranor}, title = {Agents of Choice: Tools that Facilitate Notice and Choice about Web Site Data Practices}, journal = {CoRR}, volume = {cs.CY/0001011}, year = {2000}, url = {https://arxiv.org/abs/cs/0001011}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CY-0001011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Cranor99, author = {Lorrie Faith Cranor}, title = {Internet Privacy - Introduction}, journal = {Commun. {ACM}}, volume = {42}, number = {2}, pages = {28--31}, year = {1999}, url = {https://doi.org/10.1145/293411.293440}, doi = {10.1145/293411.293440}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Cranor99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/ReagleC99, author = {Joseph Reagle and Lorrie Faith Cranor}, title = {The Platform for Privacy Preferences}, journal = {Commun. {ACM}}, volume = {42}, number = {2}, pages = {48--55}, year = {1999}, url = {https://doi.org/10.1145/293411.293455}, doi = {10.1145/293411.293455}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/ReagleC99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/AckermanC99, author = {Mark S. Ackerman and Lorrie Faith Cranor}, editor = {Michael E. Atwood}, title = {Privacy critics: {UI} components to safeguard users' privacy}, booktitle = {{CHI} '99 Extended Abstracts on Human Factors in Computing Systems, {CHI} Extended Abstracts '99, Pittsburgh, Pennsylvania, USA, May 15-20, 1999}, pages = {258--259}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/632716.632875}, doi = {10.1145/632716.632875}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/AckermanC99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigecom/AckermanCR99, author = {Mark S. Ackerman and Lorrie Faith Cranor and Joseph Reagle}, editor = {Stuart I. Feldman and Michael P. Wellman}, title = {Privacy in e-commerce: examining user scenarios and privacy preferences}, booktitle = {Proceedings of the First {ACM} Conference on Electronic Commerce (EC-99), Denver, CO, USA, November 3-5, 1999}, pages = {1--8}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/336992.336995}, doi = {10.1145/336992.336995}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigecom/AckermanCR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/Cranor99, author = {Lorrie Faith Cranor}, title = {Minding Your Own Business: The Platform for Privacy Preferences Project and Privacy Minder}, booktitle = {Proceedings of the {FREENIX} Track: 1999 {USENIX} Annual Technical Conference, June 6-11, 1999, Monterey, California, {USA}}, pages = {103--108}, publisher = {{USENIX}}, year = {1999}, timestamp = {Thu, 04 Sep 2003 08:25:47 +0200}, biburl = {https://dblp.org/rec/conf/usenix/Cranor99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CY-9904010, author = {Lorrie Faith Cranor and Joseph Reagle and Mark S. Ackerman}, title = {Beyond Concern: Understanding Net Users' Attitudes About Online Privacy}, journal = {CoRR}, volume = {cs.CY/9904010}, year = {1999}, url = {https://arxiv.org/abs/cs/9904010}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CY-9904010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/CranorL98, author = {Lorrie Faith Cranor and Brian A. LaMacchia}, title = {Spam!}, journal = {Commun. {ACM}}, volume = {41}, number = {8}, pages = {74--83}, year = {1998}, url = {https://doi.org/10.1145/280324.280336}, doi = {10.1145/280324.280336}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/CranorL98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Cranor98, author = {Lorrie Faith Cranor}, title = {Laws, Self-Regulation, and {P3P:} Will W3C's Privacy Platform Help Make the Web Safe for Privacy?}, journal = {Comput. Networks}, volume = {30}, number = {1-7}, pages = {751--753}, year = {1998}, url = {https://doi.org/10.1016/S0169-7552(98)00135-4}, doi = {10.1016/S0169-7552(98)00135-4}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/Cranor98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigcas/Cranor98, author = {Lorrie Faith Cranor}, title = {Bias and responsibility in 'neutral' social protocols}, journal = {{SIGCAS} Comput. Soc.}, volume = {28}, number = {3}, pages = {17--19}, year = {1998}, url = {https://doi.org/10.1145/298972.298980}, doi = {10.1145/298972.298980}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigcas/Cranor98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/w3c/Cranor98, author = {Lorrie Faith Cranor}, title = {Requirements for a {P3P} Query Language}, booktitle = {The Query Languages Workshop, Boston, {QL} 1998, Massachussets, USA, December 3-4, 1998}, publisher = {{W3C}}, year = {1998}, url = {http://www.w3.org/TandS/QL/QL98/pp/APPEL-QLW.html}, timestamp = {Fri, 05 Feb 2021 11:06:48 +0100}, biburl = {https://dblp.org/rec/conf/w3c/Cranor98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CY-9809018, author = {Lorrie Faith Cranor and Rebecca N. Wright}, title = {Influencing Software Usage}, journal = {CoRR}, volume = {cs.CY/9809018}, year = {1998}, url = {https://arxiv.org/abs/cs/9809018}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CY-9809018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/CranorC97, author = {Lorrie Faith Cranor and Ron Cytron}, title = {Sensus: {A} Security-Conscious Electronic Polling System for the Internet}, booktitle = {30th Annual Hawaii International Conference on System Sciences (HICSS-30), 7-10 January 1997, Maui, Hawaii, {USA}}, pages = {561--570}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/HICSS.1997.661700}, doi = {10.1109/HICSS.1997.661700}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/CranorC97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/Cranor96, author = {Lorrie Faith Cranor}, title = {The road less traveled: Internet collaboration: good, bad, and downright ugly}, journal = {{XRDS}}, volume = {2}, number = {3}, pages = {16--18}, year = {1996}, url = {https://doi.org/10.1145/332168.332175}, doi = {10.1145/332168.332175}, timestamp = {Thu, 05 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/Cranor96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/Cranor96a, author = {Lorrie Faith Cranor}, title = {Road crew: students at work}, journal = {{XRDS}}, volume = {2}, number = {3}, pages = {24}, year = {1996}, url = {https://doi.org/10.1145/332168.332179}, doi = {10.1145/332168.332179}, timestamp = {Thu, 05 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/Cranor96a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/Cranor96b, author = {Lorrie Faith Cranor}, title = {Electronic voting: computerized polls may save money, protect privacy}, journal = {{XRDS}}, volume = {2}, number = {4}, pages = {12--16}, year = {1996}, url = {https://doi.org/10.1145/332159.332163}, doi = {10.1145/332159.332163}, timestamp = {Thu, 05 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/Cranor96b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/Cranor96c, author = {Lorrie Faith Cranor}, title = {Road crew: students at work}, journal = {{XRDS}}, volume = {2}, number = {4}, pages = {28}, year = {1996}, url = {https://doi.org/10.1145/332159.332167}, doi = {10.1145/332159.332167}, timestamp = {Thu, 05 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/Cranor96c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/Cranor96d, author = {Lorrie Faith Cranor}, title = {Road crew: students at work}, journal = {{XRDS}}, volume = {3}, number = {1}, pages = {28}, year = {1996}, url = {https://doi.org/10.1145/332148.332158}, doi = {10.1145/332148.332158}, timestamp = {Thu, 05 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/Cranor96d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/Cranor96e, author = {Lorrie Faith Cranor}, title = {Research posters 101}, journal = {{XRDS}}, volume = {3}, number = {2}, pages = {13--16}, year = {1996}, url = {https://doi.org/10.1145/332132.332138}, doi = {10.1145/332132.332138}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/crossroads/Cranor96e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/Cranor95e, author = {Lorrie Faith Cranor}, title = {The Road Less Traveled: an alternative review of Doom {II}}, journal = {{XRDS}}, volume = {1}, number = {3}, pages = {20}, year = {1995}, url = {https://doi.org/10.1145/197892.332229}, doi = {10.1145/197892.332229}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/Cranor95e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/Cranor95f, author = {Lorrie Faith Cranor}, title = {Road crew: students at work}, journal = {{XRDS}}, volume = {1}, number = {3}, pages = {25}, year = {1995}, url = {https://doi.org/10.1145/197892.332232}, doi = {10.1145/197892.332232}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/Cranor95f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/Cranor95g, author = {Lorrie Faith Cranor}, title = {Digital liberties: free speech and privacy under attack in cyberspace}, journal = {{XRDS}}, volume = {1}, number = {4}, pages = {7--9}, year = {1995}, url = {https://doi.org/10.1145/332218.332220}, doi = {10.1145/332218.332220}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/Cranor95g.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/CranorL95, author = {Lorrie Faith Cranor and Adam T. Lake}, title = {Conference report: conferences offer insifhts into how computers may affect our future}, journal = {{XRDS}}, volume = {2}, number = {1}, pages = {23--26}, year = {1995}, url = {https://doi.org/10.1145/332198.332214}, doi = {10.1145/332198.332214}, timestamp = {Mon, 30 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/CranorL95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/Cranor95, author = {Lorrie Faith Cranor}, title = {Road crew: students at work}, journal = {{XRDS}}, volume = {2}, number = {1}, pages = {28}, year = {1995}, url = {https://doi.org/10.1145/332198.332217}, doi = {10.1145/332198.332217}, timestamp = {Thu, 05 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/Cranor95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/Cranor95a, author = {Lorrie Faith Cranor}, title = {The Road Less Traveled: it shouldn't be allowed!}, journal = {{XRDS}}, volume = {2}, number = {2}, pages = {2--3}, year = {1995}, url = {https://doi.org/10.1145/332180.332185}, doi = {10.1145/332180.332185}, timestamp = {Thu, 05 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/Cranor95a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/Cranor95b, author = {Lorrie Faith Cranor}, title = {email}, journal = {{XRDS}}, volume = {2}, number = {2}, pages = {27}, year = {1995}, url = {https://doi.org/10.1145/332180.332194}, doi = {10.1145/332180.332194}, timestamp = {Thu, 05 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/Cranor95b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/Cranor95c, author = {Lorrie Faith Cranor}, title = {Road crew: students at work}, journal = {{XRDS}}, volume = {2}, number = {2}, pages = {28}, year = {1995}, url = {https://doi.org/10.1145/332180.332196}, doi = {10.1145/332180.332196}, timestamp = {Thu, 05 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/Cranor95c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/Cranor94, author = {Lorrie Faith Cranor}, title = {The Road Less Traveled: stop and smell the policy}, journal = {{XRDS}}, volume = {1}, number = {1}, pages = {3--4}, year = {1994}, url = {https://doi.org/10.1145/197177.197179}, doi = {10.1145/197177.197179}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/Cranor94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/Cranor94a, author = {Lorrie Faith Cranor}, title = {Programming Perl: an interview with Larry Wall}, journal = {{XRDS}}, volume = {1}, number = {2}, pages = {10--11}, year = {1994}, url = {https://doi.org/10.1145/197149.197157}, doi = {10.1145/197149.197157}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/Cranor94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/CranorA94, author = {Lorrie Faith Cranor and Ajay Apte}, title = {Programs worth one thousand words: visual languages bring programming to the masses}, journal = {{XRDS}}, volume = {1}, number = {2}, pages = {16--18}, year = {1994}, url = {https://doi.org/10.1145/197149.197163}, doi = {10.1145/197149.197163}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/CranorA94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/Cranor94b, author = {Lorrie Faith Cranor}, title = {Book review: email style book jumps on the Internet bandwagon}, journal = {{XRDS}}, volume = {1}, number = {2}, pages = {42--43}, year = {1994}, url = {https://doi.org/10.1145/197149.332233}, doi = {10.1145/197149.332233}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/Cranor94b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.