dblp.uni-trier.dewww.uni-trier.de

Lorrie Faith Cranor Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
72 Lorrie Faith Cranor: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15-17, 2009 ACM 2009
71EEJanice Y. Tsai, Patrick Gage Kelley, Paul Hankes Drielsma, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh: Who's viewed you?: the impact of feedback in a mobile location-sharing application. CHI 2009: 2003-2012
70EESerge Egelman, Janice Y. Tsai, Lorrie Faith Cranor, Alessandro Acquisti: Timing is everything?: the effects of timing and placement of online privacy indicators. CHI 2009: 319-328
69EELujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea: Real life challenges in access-control management. CHI 2009: 899-908
68EEBrandon Salmon, Steven W. Schlosser, Lorrie Faith Cranor, Gregory R. Ganger: Perspective: Semantic Data Management for the Home. FAST 2009: 167-182
67EEAleecia M. McDonald, Robert W. Reeder, Patrick Gage Kelley, Lorrie Faith Cranor: A Comparative Study of Online Privacy Policies and Formats. Privacy Enhancing Technologies 2009: 37-55
66EEPatrick Gage Kelley, Joanna Bresee, Lorrie Faith Cranor, Robert W. Reeder: A "nutrition label" for privacy. SOUPS 2009
65EEAleecia M. McDonald, Robert W. Reeder, Patrick Gage Kelley, Lorrie Faith Cranor: A comparative study of online privacy policies and formats. SOUPS 2009
64EERobert W. Reeder, Patrick Gage Kelley, Aleecia M. McDonald, Lorrie Faith Cranor: A user study of the expandable grid applied to P3P privacy policy visualization. SOUPS 2009
63EEEran Toch, Ramprasad Ravichandran, Lorrie Faith Cranor, Paul Hankes Drielsma, Jason I. Hong, Patrick Gage Kelley, Norman M. Sadeh, Janice Y. Tsai: Analyzing use of privacy policy attributes in a location sharing application. SOUPS 2009
62EEPonnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Mary Ann Blair, Theodore Pham: School of phish: a real-word evaluation of anti-phishing training. SOUPS 2009
61EEMichael Benisch, Patrick Gage Kelley, Norman M. Sadeh, Tuomas Sandholm, Janice Y. Tsai, Lorrie Faith Cranor, Paul Hankes Drielsma: The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing. SOUPS 2009
60EEJanice Y. Tsai, Serge Egelman, Lorrie Faith Cranor, Alessandro Acquisti: The impact of privacy indicators on search engine browsing patterns. SOUPS 2009
59EEJanice Y. Tsai, Patrick Gage Kelley, Paul Hankes Drielsma, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh: Who's viewed you?: the impact of feedback in a mobile location-sharing application. SOUPS 2009
58EESarah Spiekermann, Lorrie Faith Cranor: Engineering Privacy. IEEE Trans. Software Eng. 35(1): 67-82 (2009)
2008
57 Lorrie Faith Cranor: Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS 2008, Pittsburgh, Pennsylvania, USA, July 23-25, 2008 ACM 2008
56EEAhren Studer, Christina Johns, Jaanus Kase, Kyle O'Meara, Lorrie Faith Cranor: A Survey to Guide Group Key Protocol Development. ACSAC 2008: 475-484
55EEPatrick Gage Kelley, Paul Hankes Drielsma, Norman M. Sadeh, Lorrie Faith Cranor: User-controllable learning of security and privacy policies. AISec 2008: 11-18
54EESerge Egelman, Lorrie Faith Cranor, Jason I. Hong: You've been warned: an empirical study of the effectiveness of web browser phishing warnings. CHI 2008: 1065-1074
53EERobert W. Reeder, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kelli Bacon, Keisha How, Heather Strong: Expandable grids for visualizing and authoring computer security policies. CHI 2008: 1473-1482
52EELujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea: A user study of policy creation in a flexible access-control system. CHI 2008: 543-552
51EELorrie Faith Cranor: A Framework for Reasoning About the Human in the Loop. UPSEC 2008
50EERobert W. Reeder, Patrick Gage Kelley, Aleecia M. McDonald, Lorrie Faith Cranor: A user study of the expandable grid applied to P3P privacy policy visualization. WPES 2008: 45-54
49EELorrie Faith Cranor, Serge Egelman, Steve Sheng, Aleecia M. McDonald, Abdur Chowdhury: P3P deployment on websites. Electronic Commerce Research and Applications 7(3): 274-293 (2008)
2007
48 Lorrie Faith Cranor: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007 ACM 2007
47 Lorrie Faith Cranor: Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007 ACM 2007
46EEPonnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge: Protecting people from phishing: the design and evaluation of an embedded training email system. CHI 2007: 905-914
45EELorrie Faith Cranor, Serge Egelman, Jason I. Hong, Yue Zhang: Phinding Phish: An Evaluation of Anti-Phishing Toolbars. NDSS 2007
44EELujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kami Vaniea: Lessons learned from the deployment of a smartphone-based access-control system. SOUPS 2007: 64-75
43EESteve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge: Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. SOUPS 2007: 88-99
42EEYue Zhang, Jason I. Hong, Lorrie Faith Cranor: Cantina: a content-based approach to detecting phishing web sites. WWW 2007: 639-648
41EEJulie S. Downs, Mandy B. Holbrook, Lorrie Faith Cranor: Behavioral response to phishing risk. eCrime Researchers Summit 2007: 37-44
40EEPonnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sharique Hasan, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong: Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. eCrime Researchers Summit 2007: 70-81
2006
39 Lorrie Faith Cranor: Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006 ACM 2006
38EEJanice Y. Tsai, Lorrie Faith Cranor, Scott Craver: Vicarious infringement creates a privacy ceiling. Digital Rights Management Workshop 2006: 9-18
37EESerge Egelman, Lorrie Faith Cranor, Abdur Chowdhury: An analysis of P3P-enabled web sites among top-20 search results. ICEC 2006: 197-207
36EEPonnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor: Trust modelling for online transactions: a phishing scenario. PST 2006: 11
35EEJulia Gideon, Lorrie Faith Cranor, Serge Egelman, Alessandro Acquisti: Power strips, prophylactics, and privacy, oh my! SOUPS 2006: 133-144
34EECynthia Kuo, Sasha Romanosky, Lorrie Faith Cranor: Human selection of mnemonic phrase-based passwords. SOUPS 2006: 67-78
33EEJulie S. Downs, Mandy B. Holbrook, Lorrie Faith Cranor: Decision strategies and susceptibility to phishing. SOUPS 2006: 79-90
32EELorrie Faith Cranor, Praveen Guduru, Manjula Arjula: User interfaces for privacy agents. ACM Trans. Comput.-Hum. Interact. 13(2): 135-178 (2006)
31EEMatthew Geiger, Lorrie Faith Cranor: Scrubbing Stubborn Data: An Evaluation of Counter-Forensic Privacy Tools. IEEE Security & Privacy 4(5): 16-25 (2006)
30EELorrie Faith Cranor: What do they "indicate?": evaluating security and privacy indicators. Interactions 13(3): 45-47 (2006)
2005
29 Lorrie Faith Cranor: Proceedings of the 1st Symposium on Usable Privacy and Security, SOUPS 2005, Pittsburgh, Pennsylvania, USA, July 6-8, 2005 ACM 2005
28EEPonnurangam Kumaraguru, Lorrie Faith Cranor: Privacy in India: Attitudes and Awareness. Privacy Enhancing Technologies 2005: 243-258
27EELorrie Faith Cranor: Hey, That's Personal! User Modeling 2005: 4
26EEBraden Kowitz, Lorrie Faith Cranor: Peripheral privacy notifications for wireless networks. WPES 2005: 90-96
25EELorrie Faith Cranor: Towards usable Web privacy and security. WWW 2005: 352
2004
24EESimon Byers, Lorrie Faith Cranor, David P. Kormann, Patrick Drew McDaniel: Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine. Privacy Enhancing Technologies 2004: 314-328
23EELorrie Faith Cranor, Simson L. Garfinkel: Guest Editors' Introduction: Secure or Usable? IEEE Security & Privacy 2(5): 16-18 (2004)
2003
22 Norman M. Sadeh, Mary Jo Dively, Robert J. Kauffman, Yannis Labrou, Onn Shehory, Rahul Telang, Lorrie Faith Cranor: Proceedings of the 5th International Conference on Electronic Commerce, ICEC 2003, Pittsburgh, Pennsylvania, USA, September 30 - October 03, 2003 ACM 2003
21EESimon Byers, Lorrie Faith Cranor, David P. Kormann, Patrick Drew McDaniel, Eric Cronin: Analysis of security vulnerabilities in the movie production and distribution process. Digital Rights Management Workshop 2003: 1-12
20EESimon Byers, Lorrie Faith Cranor, David P. Kormann: Automated analysis of P3P-enabled Web sites. ICEC 2003: 326-338
19EELorrie Faith Cranor: 'I didn't buy it for myself' privacy and ecommerce personalization. WPES 2003: 111-117
18EELorrie Faith Cranor: P3P: Making Privacy Policies More Useful. IEEE Security & Privacy 1(6): 50-55 (2003)
2002
17EELorrie Faith Cranor, Manjula Arjula, Praveen Guduru: Use of a P3P user agent by early adopters. WPES 2002: 1-10
16EELorrie Faith Cranor: Letter from the Special Section Editors, Ten Years of Computers, Freedom and Privacy. Inf. Soc. 18(3): (2002)
15 Lorrie Faith Cranor: SPECIAL SECTION: Computers, Freedom and Privacy. Inf. Soc. 18(3): (2002)
2001
14EEMarc Waldman, Aviel D. Rubin, Lorrie Faith Cranor: The architecture of robust publishing systems. ACM Trans. Internet Techn. 1(2): 199-230 (2001)
13EELance J. Hoffman, Lorrie Faith Cranor: Internet voting for public officials: introduction. Commun. ACM 44(1): 69-71 (2001)
2000
12EELorrie Faith Cranor: Agents of Choice: Tools that Facilitate Notice and Choice about Web Site Data Practices CoRR cs.CY/0001011: (2000)
11 Lorrie Faith Cranor: Platform for Privacy Preferences - P3P. Datenschutz und Datensicherheit 24(8): (2000)
1999
10EEMark S. Ackerman, Lorrie Faith Cranor, Joseph Reagle: Privacy in e-commerce: examining user scenarios and privacy preferences. ACM Conference on Electronic Commerce 1999: 1-8
9 Lorrie Faith Cranor: Minding Your Own Business: The Platform for Privacy Preferences Project and Privacy Minder. USENIX Annual Technical Conference, FREENIX Track 1999: 103-108
8EELorrie Faith Cranor, Joseph Reagle, Mark S. Ackerman: Beyond Concern: Understanding Net Users' Attitudes About Online Privacy CoRR cs.CY/9904010: (1999)
7EELorrie Faith Cranor: Internet Privacy - Introduction. Commun. ACM 42(2): 28-31 (1999)
6EEJoseph Reagle, Lorrie Faith Cranor: The Platform for Privacy Preferences. Commun. ACM 42(2): 48-55 (1999)
1998
5EELorrie Faith Cranor: Requirements for a P3P Query Language. QL 1998
4EELorrie Faith Cranor, Rebecca N. Wright: Influencing Software Usage CoRR cs.CY/9809018: (1998)
3 Lorrie Faith Cranor, Brian A. LaMacchia: Spam! Commun. ACM 41(8): 74-83 (1998)
2EELorrie Faith Cranor: Laws, Self-Regulation, and P3P: Will W3C's Privacy Platform Help Make the Web Safe for Privacy? Computer Networks 30(1-7): 751-753 (1998)
1997
1EELorrie Faith Cranor, Ron Cytron: Sensus: A Security-Conscious Electronic Polling System for the Internet. HICSS (3) 1997: 561-570

Coauthor Index

1Mark S. Ackerman [8] [10]
2Alessandro Acquisti [35] [36] [40] [43] [46] [60] [62] [70]
3Manjula Arjula [17] [32]
4Kelli Bacon [53]
5Lujo Bauer [44] [52] [53] [69]
6Michael Benisch [61]
7Mary Ann Blair [62]
8Joanna Bresee [66]
9Simon Byers [20] [21] [24]
10Abdur Chowdhury [37] [49]
11Justin Cranshaw [62]
12Scott Craver [38]
13Eric Cronin [21]
14Ron Cytron (Ron K. Cytron) [1]
15Mary Jo Dively [22]
16Julie S. Downs [33] [41]
17Paul Hankes Drielsma [55] [59] [61] [63] [71]
18Serge Egelman [35] [37] [45] [49] [54] [60] [70]
19Gregory R. Ganger [68]
20Simson L. Garfinkel [23]
21Matthew Geiger [31]
22Julia Gideon [35]
23Praveen Guduru [17] [32]
24Sharique Hasan [40]
25Lance J. Hoffman [13]
26Mandy B. Holbrook [33] [41]
27Jason I. Hong [40] [42] [43] [45] [46] [54] [59] [62] [63] [71]
28Keisha How [53]
29Christina Johns [56]
30Jaanus Kase [56]
31Robert J. Kauffman [22]
32Patrick Gage Kelley [50] [55] [59] [61] [63] [64] [65] [66] [67] [71]
33David P. Kormann [20] [21] [24]
34Braden Kowitz [26]
35Ponnurangam Kumaraguru [28] [36] [40] [43] [46] [62]
36Cynthia Kuo [34]
37Brian A. LaMacchia [3]
38Yannis Labrou [22]
39Bryant Magnien [43]
40Patrick Drew McDaniel (Patrick McDaniel) [21] [24]
41Aleecia M. McDonald [49] [50] [64] [65] [67]
42Elizabeth Nunge [43] [46]
43Kyle O'Meara [56]
44Theodore Pham [62]
45Ramprasad Ravichandran [63]
46Joseph Reagle [6] [8] [10]
47Robert W. Reeder [50] [52] [53] [64] [65] [66] [67] [69]
48Michael K. Reiter [44] [52] [53] [69]
49Yong Rhee [40] [46]
50Sasha Romanosky [34]
51Aviel D. Rubin [14]
52Norman M. Sadeh [22] [55] [59] [61] [63] [71]
53Brandon Salmon [68]
54Tuomas Sandholm [61]
55Steven W. Schlosser [68]
56Onn Shehory [22]
57Steve Sheng [40] [43] [49]
58Sarah Spiekermann [58]
59Heather Strong [53]
60Ahren Studer [56]
61Rahul Telang [22]
62Eran Toch [63]
63Janice Y. Tsai [38] [59] [60] [61] [63] [70] [71]
64Kami Vaniea [44] [52] [69]
65Marc Waldman [14]
66Rebecca N. Wright [4]
67Yue Zhang [42] [45]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)