Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Lorrie Faith Cranor
2010 – today
- 2013
[j28]Lorrie Faith Cranor, Norman M. Sadeh: A Shortage of Privacy Engineers. IEEE Security & Privacy 11(2): 77-79 (2013)
[c88]Manya Sleeper, Justin Cranshaw, Patrick Gage Kelley, Blase Ur, Alessandro Acquisti, Lorrie Faith Cranor, Norman M. Sadeh: "i read my Twitter the next morning and was astonished": a conversational perspective on Twitter regrets. CHI 2013: 3277-3286
[c87]Patrick Gage Kelley, Lorrie Faith Cranor, Norman M. Sadeh: Privacy as part of the app decision-making process. CHI 2013: 3393-3402
[c86]Manya Sleeper, Rebecca Balebako, Sauvik Das, Amber Lynn McConahy, Jason Wiese, Lorrie Faith Cranor: The post that wasn't: exploring self-censorship on facebook. CSCW 2013: 793-802
[c85]Shomir Wilson, Justin Cranshaw, Norman M. Sadeh, Alessandro Acquisti, Lorrie Faith Cranor, Jay Springfield, Sae Young Jeong, Arun Balasubramanian: Privacy manipulation and acclimation in a location sharing application. UbiComp 2013: 549-558
[c84]Cristian Bravo-Lillo, Saranga Komanduri, Lorrie Faith Cranor, Robert W. Reeder, Manya Sleeper, Julie S. Downs, Stuart E. Schechter: Your attention please: designing security-decision UIs to make genuine risks harder to ignore. SOUPS 2013: 6
[c83]Pedro Giovanni Leon, Blase Ur, Yang Wang, Manya Sleeper, Rebecca Balebako, Richard Shay, Lujo Bauer, Mihai Christodorescu, Lorrie Faith Cranor: What matters to users?: factors that affect users' willingness to share information with online advertisers. SOUPS 2013: 7
[c82]Rebecca Balebako, Jaeyeon Jung, Wei Lu, Lorrie Faith Cranor, Carolyn Nguyen: "Little brothers watching you": raising awareness of data leaks on smartphones. SOUPS 2013: 12
[c81]Yang Wang, Pedro Giovanni Leon, Kevin Scott, Xiaoxuan Chen, Alessandro Acquisti, Lorrie Faith Cranor: Privacy nudges for social media: an exploratory Facebook study. WWW (Companion Volume) 2013: 763-770
[e11]Lujo Bauer, Konstantin Beznosov, Lorrie Faith Cranor (Eds.): Symposium On Usable Privacy and Security, SOUPS '13, Newcastle, United Kingdom, July 24-26, 2013. ACM 2013, ISBN 978-1-4503-2319-2- 2012
[j27]Lorrie Faith Cranor: Can Users Control Online Behavioral Advertising Effectively? IEEE Security & Privacy 10(2): 93-96 (2012)
[j26]Eran Toch, Yang Wang, Lorrie Faith Cranor: Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems. User Model. User-Adapt. Interact. 22(1-2): 203-220 (2012)
[c80]Cristian Bravo-Lillo, Lorrie Faith Cranor, Julie S. Downs, Saranga Komanduri, Stuart E. Schechter, Manya Sleeper: Operating system framed in case of mistaken identity: measuring the success of web-based spoofing attacks on OS password-entry dialogs. ACM Conference on Computer and Communications Security 2012: 365-377
[c79]Peter F. Klemperer, Yuan Liang, Michelle L. Mazurek, Manya Sleeper, Blase Ur, Lujo Bauer, Lorrie Faith Cranor, Nitin Gupta, Michael K. Reiter: Tag, you can see it!: using tags for access control in photo sharing. CHI 2012: 377-386
[c78]Pedro Giovanni Leon, Blase Ur, Richard Shay, Yang Wang, Rebecca Balebako, Lorrie Faith Cranor: Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising. CHI 2012: 589-598
[c77]Patrick Gage Kelley, Sunny Consolvo, Lorrie Faith Cranor, Jaeyeon Jung, Norman M. Sadeh, David Wetherall: A Conundrum of Permissions: Installing Applications on an Android Smartphone. Financial Cryptography Workshops 2012: 68-79
[c76]Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter: Out of sight, out of mind: Effects of displaying access-control information near the item it controls. PST 2012: 128-136
[c75]Blase Ur, Pedro Giovanni Leon, Lorrie Faith Cranor, Richard Shay, Yang Wang: Smart, useful, scary, creepy: perceptions of online behavioral advertising. SOUPS 2012: 4
[c74]Richard Shay, Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Blase Ur, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor: Correct horse battery staple: exploring the usability of system-assigned passphrases. SOUPS 2012: 7
[c73]Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Julio Lopez: Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms. IEEE Symposium on Security and Privacy 2012: 523-537
[c72]Pedro Giovanni Leon, Justin Cranshaw, Lorrie Faith Cranor, Jim Graves, Manoj Hastak, Blase Ur, Guzi Xu: What do online behavioral advertising privacy disclosures communicate to users? WPES 2012: 19-30
[e10]Lorrie Faith Cranor (Ed.): Symposium On Usable Privacy and Security, SOUPS '12, Washington, DC, USA - July 11 - 13, 2012. ACM 2012, ISBN 978-1-4503-1532-6- 2011
[j25]Cristian Bravo-Lillo, Lorrie Faith Cranor, Julie S. Downs, Saranga Komanduri: Bridging the Gap in Computer Security Warnings: A Mental Model Approach. IEEE Security & Privacy 9(2): 18-26 (2011)
[j24]Janice Y. Tsai, Serge Egelman, Lorrie Faith Cranor, Alessandro Acquisti: The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. Information Systems Research 22(2): 254-268 (2011)
[j23]Michael Benisch, Patrick Gage Kelley, Norman M. Sadeh, Lorrie Faith Cranor: Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs. Personal and Ubiquitous Computing 15(7): 679-694 (2011)
[j22]Guang Xiang, Jason I. Hong, Carolyn Penstein Rosé, Lorrie Faith Cranor: CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites. ACM Trans. Inf. Syst. Secur. 14(2): 21 (2011)
[c71]Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kami Vaniea: More than skin deep: measuring effects of the underlying model on access-control system usability. CHI 2011: 2065-2074
[c70]Michelle L. Mazurek, Peter F. Klemperer, Richard Shay, Hassan Takabi, Lujo Bauer, Lorrie Faith Cranor: Exploring reactive access control. CHI 2011: 2085-2094
[c69]Patrick Gage Kelley, Michael Benisch, Lorrie Faith Cranor, Norman M. Sadeh: When are users comfortable sharing locations with advertisers? CHI 2011: 2449-2452
[c68]Saranga Komanduri, Richard Shay, Patrick Gage Kelley, Michelle L. Mazurek, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman: Of passwords and people: measuring the effect of password-composition policies. CHI 2011: 2595-2604
[c67]Jason Wiese, Patrick Gage Kelley, Lorrie Faith Cranor, Laura Dabbish, Jason I. Hong, John Zimmerman: Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share. Ubicomp 2011: 197-206
[c66]Hanan Hibshi, Timothy Vidas, Lorrie Faith Cranor: Usability of Forensics Tools: A User Study. IMF 2011: 81-91
[c65]Cristian Bravo-Lillo, Lorrie Faith Cranor, Julie S. Downs, Saranga Komanduri, Manya Sleeper: Improving Computer Security Dialogs. INTERACT (4) 2011: 18-35
[c64]Patrick Gage Kelley, Robin Brewer, Yael Mayer, Lorrie Faith Cranor, Norman M. Sadeh: An Investigation into Facebook Friend Grouping. INTERACT (3) 2011: 216-233
[c63]Yang Wang, Gregory Norcie, Saranga Komanduri, Alessandro Acquisti, Pedro Giovanni Leon, Lorrie Faith Cranor: "I regretted the minute I pressed share": a qualitative study of regrets on Facebook. SOUPS 2011: 10
[c62]Yang Wang, Gregory Norcie, Lorrie Faith Cranor: Who Is Concerned about What? A Study of American, Chinese and Indian Users' Privacy Concerns on Social Network Sites - (Short Paper). TRUST 2011: 146-153
[c61]Manya Sleeper, Divya Sharma, Lorrie Faith Cranor: I know where you live: analyzing privacy protection in public databases. WPES 2011: 165-170
[e9]Lorrie Faith Cranor (Ed.): Symposium On Usable Privacy and Security, SOUPS '11, Pittsburgh, PA, USA - July 20 - 22, 2011. ACM 2011, ISBN 978-1-4503-0911-0
[r1]Lorrie Faith Cranor: Platform for Privacy Preferences (P3P). Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 940-941- 2010
[j21]Simson L. Garfinkel, Lorrie Faith Cranor: Institutional review boards and your research. Commun. ACM 53(6): 38-40 (2010)
[j20]Ponnurangam Kumaraguru, Steve Sheng, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong: Teaching Johnny not to fall for phish. ACM Trans. Internet Techn. 10(2) (2010)
[c60]Steve Sheng, Mandy B. Holbrook, Ponnurangam Kumaraguru, Lorrie Faith Cranor, Julie S. Downs: Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions. CHI 2010: 373-382
[c59]Michelle L. Mazurek, J. P. Arsenault, Joanna Bresee, Nitin Gupta, Iulia Ion, Christina Johns, Daniel Lee, Yuan Liang, Jenny Olsen, Brandon Salmon, Richard Shay, Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor, Gregory R. Ganger, Michael K. Reiter: Access control for home data sharing: evaluating social acceptability. CHI 2010: 645-654
[c58]Patrick Gage Kelley, Lucian Cesca, Joanna Bresee, Lorrie Faith Cranor: Standardizing privacy notices: an online study of the nutrition label approach. CHI 2010: 1573-1582
[c57]Julie S. Downs, Mandy B. Holbrook, Steve Sheng, Lorrie Faith Cranor: Are your participants gaming the system?: screening mechanical turk workers. CHI 2010: 2399-2402
[c56]Lorrie Faith Cranor: Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory. Financial Cryptography 2010: 3
[c55]Lorrie Faith Cranor: Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects. Financial Cryptography Workshops 2010: 247-249
[c54]Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, Janice Y. Tsai, Patrick Gage Kelley, James Springfield, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh: Empirical models of privacy in location sharing. UbiComp 2010: 129-138
[c53]Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, Jay Springfield, Patrick Gage Kelley, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh: Locaccino: a privacy-centric location sharing application. UbiComp (Adjunct Papers) 2010: 381-382
[c52]Richard Shay, Saranga Komanduri, Patrick Gage Kelley, Pedro Giovanni Leon, Michelle L. Mazurek, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor: Encountering stronger password requirements: user attitudes and behaviors. SOUPS 2010
[c51]Aleecia M. McDonald, Lorrie Faith Cranor: Americans' attitudes about internet behavioral advertising practices. WPES 2010: 63-72
[c50]Pedro Giovanni Leon, Lorrie Faith Cranor, Aleecia M. McDonald, Robert McGuire: Token attempt: the misrepresentation of website privacy policies through the misuse of p3p compact policy tokens. WPES 2010: 93-104
[e8]Lorrie Faith Cranor (Ed.): Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, Redmond, Washington, USA, July 14-16, 2010. ACM International Conference Proceeding Series 485, ACM 2010, ISBN 978-1-4503-0264-7
2000 – 2009
- 2009
[j19]Elisa Bertino, Carolyn Brodie, Seraphin B. Calo, Lorrie Faith Cranor, Clare-Marie Karat, John Karat, Ninghui Li, Dan Lin, Jorge Lobo, Qun Ni, Prathima Rao, Xiping Wang: Analysis of privacy and security policies. IBM Journal of Research and Development 53(2): 3 (2009)
[j18]John Karat, Clare-Marie Karat, Elisa Bertino, Ninghui Li, Qun Ni, Carolyn Brodie, Jorge Lobo, Seraphin B. Calo, Lorrie Faith Cranor, Ponnurangam Kumaraguru, Robert W. Reeder: Policy framework for security and privacy management. IBM Journal of Research and Development 53(2): 4 (2009)
[j17]Norman M. Sadeh, Jason I. Hong, Lorrie Faith Cranor, Ian Fette, Patrick Gage Kelley, Madhu K. Prabaker, Jinghai Rao: Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing 13(6): 401-412 (2009)
[j16]Sarah Spiekermann, Lorrie Faith Cranor: Engineering Privacy. IEEE Trans. Software Eng. 35(1): 67-82 (2009)
[c49]Serge Egelman, Janice Y. Tsai, Lorrie Faith Cranor, Alessandro Acquisti: Timing is everything?: the effects of timing and placement of online privacy indicators. CHI 2009: 319-328
[c48]Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea: Real life challenges in access-control management. CHI 2009: 899-908
[c47]Janice Y. Tsai, Patrick Gage Kelley, Paul Hankes Drielsma, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh: Who's viewed you?: the impact of feedback in a mobile location-sharing application. CHI 2009: 2003-2012
[c46]Brandon Salmon, Steven W. Schlosser, Lorrie Faith Cranor, Gregory R. Ganger: Perspective: Semantic Data Management for the Home. FAST 2009: 167-182
[c45]Aleecia M. McDonald, Robert W. Reeder, Patrick Gage Kelley, Lorrie Faith Cranor: A Comparative Study of Online Privacy Policies and Formats. Privacy Enhancing Technologies 2009: 37-55
[c44]Michael Benisch, Patrick Gage Kelley, Norman M. Sadeh, Tuomas Sandholm, Janice Y. Tsai, Lorrie Faith Cranor, Paul Hankes Drielsma: The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing. SOUPS 2009
[c43]Patrick Gage Kelley, Joanna Bresee, Lorrie Faith Cranor, Robert W. Reeder: A "nutrition label" for privacy. SOUPS 2009
[c42]Ponnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Mary Ann Blair, Theodore Pham: School of phish: a real-word evaluation of anti-phishing training. SOUPS 2009
[c41]Aleecia M. McDonald, Robert W. Reeder, Patrick Gage Kelley, Lorrie Faith Cranor: A comparative study of online privacy policies and formats. SOUPS 2009
[c40]Robert W. Reeder, Patrick Gage Kelley, Aleecia M. McDonald, Lorrie Faith Cranor: A user study of the expandable grid applied to P3P privacy policy visualization. SOUPS 2009
[c39]Eran Toch, Ramprasad Ravichandran, Lorrie Faith Cranor, Paul Hankes Drielsma, Jason I. Hong, Patrick Gage Kelley, Norman M. Sadeh, Janice Y. Tsai: Analyzing use of privacy policy attributes in a location sharing application. SOUPS 2009
[c38]Janice Y. Tsai, Serge Egelman, Lorrie Faith Cranor, Alessandro Acquisti: The impact of privacy indicators on search engine browsing patterns. SOUPS 2009
[c37]Janice Y. Tsai, Patrick Gage Kelley, Paul Hankes Drielsma, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh: Who's viewed you?: the impact of feedback in a mobile location-sharing application. SOUPS 2009
[c36]Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, Lorrie Faith Cranor: Crying Wolf: An Empirical Study of SSL Warning Effectiveness. USENIX Security Symposium 2009: 399-416
[e7]Lorrie Faith Cranor (Ed.): Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15-17, 2009. ACM International Conference Proceeding Series, ACM 2009, ISBN 978-1-60558-736-3- 2008
[j15]Lorrie Faith Cranor, Serge Egelman, Steve Sheng, Aleecia M. McDonald, Abdur Chowdhury: P3P deployment on websites. Electronic Commerce Research and Applications 7(3): 274-293 (2008)
[c35]Ahren Studer, Christina Johns, Jaanus Kase, Kyle O'Meara, Lorrie Faith Cranor: A Survey to Guide Group Key Protocol Development. ACSAC 2008: 475-484
[c34]Patrick Gage Kelley, Paul Hankes Drielsma, Norman M. Sadeh, Lorrie Faith Cranor: User-controllable learning of security and privacy policies. AISec 2008: 11-18
[c33]Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea: A user study of policy creation in a flexible access-control system. CHI 2008: 543-552
[c32]Serge Egelman, Lorrie Faith Cranor, Jason I. Hong: You've been warned: an empirical study of the effectiveness of web browser phishing warnings. CHI 2008: 1065-1074
[c31]Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kelli Bacon, Keisha How, Heather Strong: Expandable grids for visualizing and authoring computer security policies. CHI 2008: 1473-1482
[c30]
[c29]Robert W. Reeder, Patrick Gage Kelley, Aleecia M. McDonald, Lorrie Faith Cranor: A user study of the expandable grid applied to P3P privacy policy visualization. WPES 2008: 45-54
[e6]Lorrie Faith Cranor (Ed.): Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS 2008, Pittsburgh, Pennsylvania, USA, July 23-25, 2008. ACM International Conference Proceeding Series, ACM 2008, ISBN 978-1-60558-276-4- 2007
[c28]Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge: Protecting people from phishing: the design and evaluation of an embedded training email system. CHI 2007: 905-914
[c27]Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cranor: Behavioral response to phishing risk. eCrime Researchers Summit 2007: 37-44
[c26]Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sharique Hasan, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong: Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. eCrime Researchers Summit 2007: 70-81
[c25]Lorrie Faith Cranor, Serge Egelman, Janice Y. Tsai, Alessandro Acquisti: The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. ICIS 2007: 20
[c24]Lorrie Faith Cranor, Serge Egelman, Jason I. Hong, Yue Zhang: Phinding Phish: An Evaluation of Anti-Phishing Toolbars. NDSS 2007
[c23]Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kami Vaniea: Lessons learned from the deployment of a smartphone-based access-control system. SOUPS 2007: 64-75
[c22]Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge: Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. SOUPS 2007: 88-99
[c21]Janice Y. Tsai, Serge Egelman, Lorrie Faith Cranor, Alessandro Acquisti: The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. WEIS 2007
[c20]Yue Zhang, Jason I. Hong, Lorrie Faith Cranor: Cantina: a content-based approach to detecting phishing web sites. WWW 2007: 639-648
[e5]Lorrie Faith Cranor (Ed.): Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007. ACM International Conference Proceeding Series 269, ACM 2007
[e4]Lorrie Faith Cranor (Ed.): Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007. ACM International Conference Proceeding Series 229, ACM 2007, ISBN 978-1-59593-801-5- 2006
[j14]Matthew Geiger, Lorrie Faith Cranor: Scrubbing Stubborn Data: An Evaluation of Counter-Forensic Privacy Tools. IEEE Security & Privacy 4(5): 16-25 (2006)
[j13]Lorrie Faith Cranor: What do they "indicate?": evaluating security and privacy indicators. Interactions 13(3): 45-47 (2006)
[j12]Lorrie Faith Cranor, Praveen Guduru, Manjula Arjula: User interfaces for privacy agents. ACM Trans. Comput.-Hum. Interact. 13(2): 135-178 (2006)
[c19]Serge Egelman, Lorrie Faith Cranor, Abdur Chowdhury: An analysis of P3P-enabled web sites among top-20 search results. ICEC 2006: 197-207
[c18]Janice Y. Tsai, Lorrie Faith Cranor, Scott Craver: Vicarious infringement creates a privacy ceiling. Digital Rights Management Workshop 2006: 9-18
[c17]Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor: Trust modelling for online transactions: a phishing scenario. PST 2006: 11
[c16]Cynthia Kuo, Sasha Romanosky, Lorrie Faith Cranor: Human selection of mnemonic phrase-based passwords. SOUPS 2006: 67-78
[c15]Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cranor: Decision strategies and susceptibility to phishing. SOUPS 2006: 79-90
[c14]Julia Gideon, Lorrie Faith Cranor, Serge Egelman, Alessandro Acquisti: Power strips, prophylactics, and privacy, oh my! SOUPS 2006: 133-144
[e3]Lorrie Faith Cranor (Ed.): Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006. ACM International Conference Proceeding Series 149, ACM 2006, ISBN 1-59593-448-0- 2005
[c13]Ponnurangam Kumaraguru, Lorrie Faith Cranor: Privacy in India: Attitudes and Awareness. Privacy Enhancing Technologies 2005: 243-258
[c12]
[c11]Braden Kowitz, Lorrie Faith Cranor: Peripheral privacy notifications for wireless networks. WPES 2005: 90-96
[c10]
[e2]Lorrie Faith Cranor (Ed.): Proceedings of the 1st Symposium on Usable Privacy and Security, SOUPS 2005, Pittsburgh, Pennsylvania, USA, July 6-8, 2005. ACM International Conference Proceeding Series 93, ACM 2005, ISBN 1-59593-178-3- 2004
[j11]Lorrie Faith Cranor, Simson L. Garfinkel: Guest Editors' Introduction: Secure or Usable? IEEE Security & Privacy 2(5): 16-18 (2004)
[c9]Simon Byers, Lorrie Faith Cranor, David P. Kormann, Patrick Drew McDaniel: Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine. Privacy Enhancing Technologies 2004: 314-328- 2003
[j10]Lorrie Faith Cranor: P3P: Making Privacy Policies More Useful. IEEE Security & Privacy 1(6): 50-55 (2003)
[c8]Simon Byers, Lorrie Faith Cranor, David P. Kormann: Automated analysis of P3P-enabled Web sites. ICEC 2003: 326-338
[c7]Simon Byers, Lorrie Faith Cranor, David P. Kormann, Patrick Drew McDaniel, Eric Cronin: Analysis of security vulnerabilities in the movie production and distribution process. Digital Rights Management Workshop 2003: 1-12
[c6]Lorrie Faith Cranor: 'I didn't buy it for myself' privacy and ecommerce personalization. WPES 2003: 111-117
[p1]Lorrie Faith Cranor: In Search of the Perfect Voting Technology: No Easy Answers. Secure Electronic Voting 2003: 17-30
[e1]Norman M. Sadeh, Mary Jo Dively, Robert J. Kauffman, Yannis Labrou, Onn Shehory, Rahul Telang, Lorrie Faith Cranor (Eds.): Proceedings of the 5th International Conference on Electronic Commerce, ICEC 2003, Pittsburgh, Pennsylvania, USA, September 30 - October 03, 2003. ACM International Conference Proceeding Series 50, ACM 2003, ISBN 1-58113-788-5- 2002
[b1]Lorrie Faith Cranor: Web privacy with P3P - the platform for privacy preferences. O'Reilly 2002, ISBN 978-0-596-00371-5, pp. I-XX, 1-321
[j9]Lorrie Faith Cranor: Letter from the Special Section Editors, Ten Years of Computers, Freedom and Privacy. Inf. Soc. 18(3) (2002)
[j8]
[c5]Lorrie Faith Cranor, Manjula Arjula, Praveen Guduru: Use of a P3P user agent by early adopters. WPES 2002: 1-10- 2001
[j7]Lance J. Hoffman, Lorrie Faith Cranor: Internet voting for public officials: introduction. Commun. ACM 44(1): 69-71 (2001)
[j6]Marc Waldman, Aviel D. Rubin, Lorrie Faith Cranor: The architecture of robust publishing systems. ACM Trans. Internet Techn. 1(2): 199-230 (2001)- 2000
[j5]Lorrie Faith Cranor: Platform for Privacy Preferences - P3P. Datenschutz und Datensicherheit 24(8) (2000)
[i3]Lorrie Faith Cranor: Agents of Choice: Tools that Facilitate Notice and Choice about Web Site Data Practices. CoRR cs.CY/0001011 (2000)
1990 – 1999
- 1999
[j4]
[j3]Joseph Reagle, Lorrie Faith Cranor: The Platform for Privacy Preferences. Commun. ACM 42(2): 48-55 (1999)
[c4]Mark S. Ackerman, Lorrie Faith Cranor, Joseph Reagle: Privacy in e-commerce: examining user scenarios and privacy preferences. ACM Conference on Electronic Commerce 1999: 1-8
[c3]Lorrie Faith Cranor: Minding Your Own Business: The Platform for Privacy Preferences Project and Privacy Minder. USENIX Annual Technical Conference, FREENIX Track 1999: 103-108
[i2]Lorrie Faith Cranor, Joseph Reagle, Mark S. Ackerman: Beyond Concern: Understanding Net Users' Attitudes About Online Privacy. CoRR cs.CY/9904010 (1999)- 1998
[j2]
[j1]Lorrie Faith Cranor: Laws, Self-Regulation, and P3P: Will W3C's Privacy Platform Help Make the Web Safe for Privacy? Computer Networks 30(1-7): 751-753 (1998)
[c2]
[i1]- 1997
[c1]Lorrie Faith Cranor, Ron Cytron: Sensus: A Security-Conscious Electronic Polling System for the Internet. HICSS (3) 1997: 561-570
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:20 CEST by the dblp team



