Lorrie Cranor
American academic
Lorrie Cranor's AcademicInfluence.com Rankings
Download Badge
Computer Science Engineering
Lorrie Cranor's Degrees
- PhD Engineering and Public Policy Carnegie Mellon University
- Bachelors Engineering and Public Policy Carnegie Mellon University
Why Is Lorrie Cranor Influential?
(Suggest an Edit or Addition)According to Wikipedia, Lorrie Faith Cranor, D.Sc. is the FORE Systems Professor of Computer Science and Engineering and Public Policy at Carnegie Mellon University and is the director of the Carnegie Mellon Usable Privacy and Security Laboratory. She has served as Chief Technologist of the Federal Trade Commission, and she was formerly a member of the Electronic Frontier Foundation Board of Directors. Previously she was a researcher at AT&T Labs-Research and taught in the Stern School of Business at New York University. She has authored over 110 research papers on online privacy, phishing and semantic attacks, spam, electronic voting, anonymous publishing, usable access control, and other topics.
Lorrie Cranor's Published Works
Published Works
- The platform for privacy preferences 1.0 (p3p1.0) specification (2002) (879)
- The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study (2011) (851)
- The platform for privacy preferences (1999) (838)
- Cantina: a content-based approach to detecting phishing web sites (2007) (774)
- The Cost of Reading Privacy Policies (2009) (718)
- Privacy in e-commerce: examining user scenarios and privacy preferences (1999) (622)
- You've been warned: an empirical study of the effectiveness of web browser phishing warnings (2008) (621)
- Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions (2010) (588)
- Security and Usability: Designing Secure Systems that People Can Use (2005) (554)
- "I regretted the minute I pressed share": a qualitative study of regrets on Facebook (2011) (527)
- Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish (2007) (524)
- Beyond Concern: Understanding Net Users' Attitudes About Online Privacy (1999) (482)
- Crying Wolf: An Empirical Study of SSL Warning Effectiveness (2009) (479)
- Are your participants gaming the system?: screening mechanical turk workers (2010) (469)
- CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites (2011) (452)
- Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms (2011) (449)
- Engineering Privacy (2009) (424)
- A "nutrition label" for privacy (2009) (410)
- Of passwords and people: measuring the effect of password-composition policies (2011) (409)
- An Empirical Analysis of Phishing Blacklists (2009) (382)
- Privacy Indexes: A Survey of Westin's Studies (2005) (381)
- Decision strategies and susceptibility to phishing (2006) (374)
- A Conundrum of Permissions: Installing Applications on an Android Smartphone (2012) (367)
- Encountering stronger password requirements: user attitudes and behaviors (2010) (363)
- Publius: a robust, tamper-evident, censorship-resistant web publishing system (2000) (363)
- Your Location has been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging (2015) (354)
- Understanding and capturing people’s privacy policies in a mobile social networking application (2009) (352)
- Teaching Johnny not to fall for phish (2010) (347)
- Smart, useful, scary, creepy: perceptions of online behavioral advertising (2012) (328)
- A Framework for Reasoning About the Human in the Loop (2008) (322)
- How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation (2012) (322)
- Protecting people from phishing: the design and evaluation of an embedded training email system (2007) (306)
- Phinding Phish: Evaluating Anti-Phishing Tools (2006) (305)
- Privacy as part of the app decision-making process (2013) (304)
- Web Privacy with P3p (2002) (298)
- A Design Space for Effective Privacy Notices (2015) (282)
- User interfaces for privacy agents (2006) (271)
- Sensus: a security-conscious electronic polling system for the Internet (1997) (264)
- School of phish: a real-world evaluation of anti-phishing training (2009) (260)
- Human selection of mnemonic phrase-based passwords (2006) (238)
- Standardizing privacy notices: an online study of the nutrition label approach (2010) (234)
- Measuring password guessability for an entire university (2013) (232)
- Nudges for Privacy and Security (2017) (222)
- Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks (2016) (218)
- The post that wasn't: exploring self-censorship on facebook (2013) (215)
- Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems (2012) (213)
- Disagreeable Privacy Policies: Mismatches between Meaning and Users’ Understanding (2014) (210)
- Who's viewed you?: the impact of feedback in a mobile location-sharing application (2009) (209)
- Security and Usability (2005) (209)
- Bridging the Gap in Computer Security Warnings: A Mental Model Approach (2011) (208)
- Privacy Expectations and Preferences in an IoT World (2017) (206)
- Nudges for Privacy and Security: Understanding and Assisting Userss Choices Online (2016) (202)
- Necessary But Not Sufficient: Standardized Mechanisms for Privacy Notice and Choice (2012) (199)
- Behavioral response to phishing risk (2007) (199)
- P3P: Making Privacy Policies More Useful (2003) (196)
- A comparative study of online privacy policies and formats (2009) (195)
- Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs (2011) (194)
- A field trial of privacy nudges for facebook (2014) (193)
- Location-Sharing Technologies: Privacy Risks and Controls (2009) (193)
- Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising (2012) (186)
- Empirical models of privacy in location sharing (2010) (184)
- Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share (2011) (180)
- Internet privacy (1999) (178)
- "I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab (2015) (178)
- The Privacy and Security Behaviors of Smartphone App Developers (2014) (178)
- Privacy nudges for social media: an exploratory Facebook study (2013) (173)
- "Little brothers watching you": raising awareness of data leaks on smartphones (2013) (165)
- Expandable grids for visualizing and authoring computer security policies (2008) (164)
- Measuring Real-World Accuracies and Biases in Modeling Password Guessability (2015) (163)
- Tag, you can see it!: using tags for access control in photo sharing (2012) (163)
- Getting users to pay attention to anti-phishing education: evaluation of retention and transfer (2007) (161)
- Access Control for Home Data Sharing: Attitudes, Needs and Practices (2010) (156)
- Americans' attitudes about internet behavioral advertising practices (2010) (155)
- Curbing Android Permission Creep (2011) (153)
- Correct horse battery staple: exploring the usability of system-assigned passphrases (2012) (146)
- Do Users' Perceptions of Password Security Match Reality? (2016) (145)
- Can long passwords be secure and usable? (2014) (142)
- What matters to users?: factors that affect users' willingness to share information with online advertisers (2013) (140)
- Beliefs and Behaviors: Internet Users' Understanding of Behavioral Advertising (2010) (139)
- Timing is everything?: the effects of timing and placement of online privacy indicators (2009) (136)
- Biometric authentication on iPhone and Android: Usability, perceptions, and influences on adoption (2015) (134)
- "i read my Twitter the next morning and was astonished": a conversational perspective on Twitter regrets (2013) (134)
- Exploring How Privacy and Security Factor into IoT Device Purchase Behavior (2019) (133)
- Privacy critics: UI components to safeguard users' privacy (1999) (133)
- 'I didn't buy it for myself' privacy and ecommerce personalization (2003) (130)
- email (1995) (130)
- Who Is Concerned about What? A Study of American, Chinese and Indian Users' Privacy Concerns on Social Network Sites - (Short Paper) (2011) (128)
- Your attention please: designing security-decision UIs to make genuine risks harder to ignore (2013) (128)
- Use of a P3P user agent by early adopters (2002) (122)
- Lessons from a real world evaluation of anti-phishing training (2008) (118)
- Phinding Phish: An Evaluation of Anti-Phishing Toolbars (2007) (116)
- Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System (2000) (109)
- Design and Evaluation of a Data-Driven Password Meter (2017) (106)
- Designing Password Policies for Strength and Usability (2016) (106)
- Privacy in India: Attitudes and Awareness (2005) (105)
- Let's Go in for a Closer Look: Observing Passwords in Their Natural Habitat (2017) (103)
- Usability and Security of Text Passwords on Mobile Devices (2016) (102)
- Designing Effective Privacy Notices and Controls (2017) (102)
- Push-Button Verification of File Systems via Crash Refinement (2016) (93)
- “It's not actually that horrible”: Exploring Adoption of Two-Factor Authentication at a University (2018) (90)
- A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior (2015) (86)
- Ask the Experts: What Should Be on an IoT Privacy and Security Label? (2020) (86)
- How Short Is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices (2016) (86)
- Building an Ontology of Cyber Security (2014) (86)
- Spectrum Management: Property Rights, Markets, and the Commons (2003) (83)
- Design and Implementation of a Practical Security-Conscious Electronic Polling System (1996) (83)
- Improving App Privacy: Nudging App Developers to Protect User Privacy (2014) (83)
- User-controllable learning of security and privacy policies (2008) (82)
- Real life challenges in access-control management (2009) (78)
- QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks (2013) (77)
- Telepathwords: Preventing Weak Passwords by Reading Users' Minds (2014) (77)
- User-Controllable Security and Privacy for Pervasive Computing (2007) (77)
- Privacy patterns for online interactions (2006) (77)
- An Investigation into Facebook Friend Grouping (2011) (77)
- Platform for Privacy Preferences - P3P (2000) (76)
- Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes (2016) (74)
- Perspective: Semantic Data Management for the Home (2009) (73)
- When are users comfortable sharing locations with advertisers? (2011) (68)
- A user study of the expandable grid applied to P3P privacy policy visualization (2008) (67)
- What do online behavioral advertising privacy disclosures communicate to users? (2012) (65)
- Improving Computer Security Dialogs (2011) (64)
- A user study of policy creation in a flexible access-control system (2008) (64)
- Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It (2014) (64)
- Lessons learned from the deployment of a smartphone-based access-control system (2007) (64)
- Can Unicorns Help Users Compare Crypto Key Fingerprints? (2017) (62)
- Are They Worth Reading? An In-Depth Analysis of Online Trackers’ Privacy Policies (2015) (62)
- More than skin deep: measuring effects of the underlying model on access-control system usability (2011) (62)
- The post anachronism: the temporal dimension of facebook privacy (2013) (61)
- Informing the Design of a Personalized Privacy Assistant for the Internet of Things (2020) (61)
- IWantPrivacy : Widespread Violation of Privacy Settings in the Twitter Social Network (2010) (61)
- Power strips, prophylactics, and privacy, oh my! (2006) (60)
- "It's a scavenger hunt": Usability of Websites' Opt-Out and Data Deletion Choices (2020) (59)
- The Impact of Timing on the Salience of Smartphone App Privacy Notices (2015) (58)
- Automated analysis of P3P-enabled Web sites (2003) (58)
- Locaccino: a privacy-centric location sharing application (2010) (56)
- P3P deployment on websites (2008) (54)
- An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites (2019) (54)
- Guest Editors' Introduction: Secure or Usable? (2004) (53)
- Analysis of security vulnerabilities in the movie production and distribution process (2003) (51)
- Watching Them Watching Me: Browser Extensions Impact on User Privacy Awareness and Concern (2016) (50)
- The Usable Privacy Policy Project : Combining Crowdsourcing , Machine Learning and Natural Language Processing to Semi-Automatically Answer Those Privacy Questions Users Care About (2014) (50)
- Token attempt: the misrepresentation of website privacy policies through the misuse of p3p compact policy tokens (2010) (50)
- Protocols for automated negotiations with buyer anonymity and seller reputations (2000) (49)
- Privacy manipulation and acclimation in a location sharing application (2013) (48)
- Parents' and Teens' Perspectives on Privacy In a Technology-Filled World (2014) (48)
- Can User Agents Accurately Represent Privacy Policies (2002) (47)
- What do they "indicate?": evaluating security and privacy indicators (2006) (47)
- Security Considerations for Remote Electronic Voting over the Internet (2002) (46)
- An analysis of P3P-enabled web sites among top-20 search results (2006) (45)
- A Survey of the Use of Adobe Flash Local Shared Objects to Respawn HTTP Cookies (2011) (45)
- Usability of Forensics Tools: A User Study (2011) (44)
- Analysis of privacy and security policies (2009) (43)
- Declared-strategy voting: an instrument for group decision-making (1996) (43)
- Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine (2004) (43)
- Finding a Choice in a Haystack: Automatic Extraction of Opt-Out Statements from Privacy Policy Text (2020) (42)
- Sharing Personal Content Online: Exploring Channel Choice and Multi-Channel Behaviors (2016) (40)
- Electronic voting: computerized polls may save money, protect privacy (1996) (40)
- Rethinking Rights and Regulations: Institutional Responses to New Communications Technologies (2003) (40)
- Understanding and Capturing People’s Privacy Policies in a People Finder Application (2008) (39)
- Diversify to Survive: Making Passwords Stronger with Adaptive Policies (2017) (37)
- Turtles, Locks, and Bathrooms: Understanding Mental Models of Privacy Through Illustration (2018) (37)
- I Didn't buy It for Myself (2004) (36)
- Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords (2014) (36)
- Better Together: Usability and Security Go Hand in Hand (2014) (35)
- Can Users Control Online Behavioral Advertising Effectively? (2012) (35)
- Password Creation in the Presence of Blacklists (2017) (35)
- From Facebook Regrets to Facebook Privacy Nudges (2013) (35)
- Human-Computer Interaction and International Public Policymaking: A Framework for Understanding and Taking Future Actions (2016) (35)
- Improving phishing countermeasures: An analysis of expert interviews (2009) (33)
- An Analysis of P3P Deployment on Commercial, Government, and Children's Web Sites as of May 2003 (2003) (32)
- AdChoices? Compliance with Online Behavioral Advertising Notice and Choice Requirements. Revised Version (2011) (32)
- Supporting Privacy-Conscious App Update Decisions with User Reviews (2015) (30)
- Phishguru: a system for educating users about semantic attacks (2009) (30)
- Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing (2018) (29)
- Warning Design Guidelines (2013) (29)
- Policy framework for security and privacy management (2009) (29)
- Trust modelling for online transactions: a phishing scenario (2006) (29)
- The Influence of Friends and Experts on Privacy Decision Making in IoT Scenarios (2018) (28)
- I Would Like To..., I Shouldn't..., I Wish I...: Exploring Behavior-Change Goals for Social Networking Sites (2015) (28)
- Are They Actually Any Different ? Comparing Thousands of Financial Institutions ’ Privacy Practices (2013) (28)
- An Empirical Study of How People Perceive Online Behavioral Advertising (CMU-CyLab-09-015) (2009) (28)
- Expandable grids: a user interface visualization technique and a policy semantics to support fast, accurate security and privacy policy authoring (2008) (27)
- A Large-Scale Evaluation of U.S. Financial Institutions’ Standardized Privacy Notices (2016) (27)
- Agents of Choice: Tools that Facilitate Notice and Choice about Web Site Data Practices (2000) (26)
- Access Control Policy Analysis and Visualization Tools for Security Professionals (2008) (26)
- Putting it together: Internet privacy: a public concern (1998) (25)
- Voting after Florida: no easy answers (2001) (25)
- Trust me: design patterns for constructing trustworthy trust indicators (2009) (25)
- Toggles, Dollar Signs, and Triangles: How to (In)Effectively Convey Privacy Choices with Icons and Link Texts (2021) (25)
- Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements (2020) (24)
- Out of sight, out of mind: Effects of displaying access-control information near the item it controls (2012) (24)
- User Behaviors and Attitudes Under Password Expiration Policies (2018) (23)
- A Shortage of Privacy Engineers (2013) (23)
- An analysis of security vulnerabilities in the movie production and distribution process (2004) (22)
- Peripheral privacy notifications for wireless networks (2005) (22)
- The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing (2009) (21)
- What's it to You? A Survey of Online Privacy Concerns and Risks (2006) (20)
- Designing a Privacy Preference Specification Interface : A Case Study (2003) (20)
- Are They Worth Reading? An In-Depth Analysis of Online Advertising Companies’ Privacy Policies (2014) (20)
- Scrubbing Stubborn Data: An Evaluation of Counter-Forensic Privacy Tools (2006) (19)
- An Evaluation of the Effect of US Financial Privacy Legislation Through the Analysis of Privacy Policies (2006) (19)
- Which Privacy and Security Attributes Most Impact Consumers’ Risk Perception and Willingness to Purchase IoT Devices? (2021) (19)
- Awareness, Adoption, and Misconceptions of Web Privacy Tools (2021) (18)
- Who's Viewed You? The Impact of Feedback in a mobile location Sharing System (2009) (18)
- Giving notice: why privacy policies and security breach notifications aren't enough (2005) (17)
- Why People Are (Un)willing to Share Information with Online Advertisers (2014) (16)
- Anti-Phishing Landing Page : Turning a 404 into a Teachable Moment for End Users (2009) (16)
- Institutional review boards and your research (2010) (16)
- From Intent to Action: Nudging Users Towards Secure Mobile Payments (2020) (16)
- Operating system framed in case of mistaken identity: measuring the success of web-based spoofing attacks on OS password-entry dialogs (2012) (16)
- The architecture of robust publishing systems (2001) (16)
- Security Behavior Observatory: Infrastructure for Long-term Monitoring of Client Machines (CMU-CyLab-14-009) (2014) (16)
- Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007 (2007) (15)
- Web privacy with P3P - the platform for privacy preferences (2002) (15)
- Privacy and Behavioral Advertising: Towards Meeting Users' Preferences (2015) (15)
- Towards a Privacy Research Roadmap for the Computing Community (2016) (15)
- diagnosing performance changes by comparing request Flows (15)
- How Technology Drives Vehicular Privacy (2006) (15)
- “Okay, whatever”: An Evaluation of Cookie Consent Interfaces (2022) (14)
- AdChoices? Compliance with Online Behavioral Advertising Notice and Choice Requirements (CMU-CyLab-11-005) (2011) (14)
- General Requirements of a Hybrid-Modeling Framework for Cyber Security (2014) (14)
- Is Your Inseam a Biometric? Evaluating the Understandability of Mobile Privacy Notice Categories (2013) (13)
- Warning Design Guidelines (CMU-CyLab-13-002) (2013) (13)
- Is Your Inseam a Biometric? A Case Study on the Role of Usability Studies in Developing Public Policy (2014) (13)
- Internet voting for public officials: introduction (2001) (13)
- What Do Online Behavioral Advertising Disclosures Communicate to Users? (CMU-CyLab-12-008) (2012) (13)
- Communications Policy and Information Technology: Promises, Problems, Prospects (2002) (12)
- Proceedings of the Tenth Conference on Computers, Freedom and Privacy: Challenging the Assumptions, CFP 2000, Toronto, Ontario, Canada, April 4-7, 2000 (2000) (12)
- School of Phish: A Real-Word Evaluation of Anti-Phishing Training (CMU-CyLab-09-002) (2009) (12)
- Disposition toward privacy and information disclosure in the context of emerging health technologies (2019) (12)
- The role of privacy advocates and data protection authorities in the design and deployment of the platform for privacy preferences (2002) (12)
- Helping Users Create Better Passwords (2012) (12)
- Adapt-a-ride: understanding the dynamics of commuting preferences through an experience design framework (2011) (12)
- Towards Usable Privacy Policies : Semi-automatically Extracting Data Practices From Websites ’ Privacy Policies (2014) (11)
- Can phishing be foiled? (2008) (11)
- Building the security behavior observatory: an infrastructure for long-term monitoring of client machines (2014) (11)
- Proceedings of the 2005 symposium on Usable privacy and security (2005) (11)
- Why Johnny Can’t Opt Out: A Usability Evaluation of Tools to Limit Online Behavioral Advertising (CMU-CyLab-11-017) (2011) (11)
- Understanding Challenges for Developers to Create Accurate Privacy Nutrition Labels (2022) (11)
- Proceedings of the second symposium on Usable privacy and security (2006) (10)
- Computational ontology of network operations (2015) (10)
- Privacy Engineering Emerges as a Hot New Career (2013) (9)
- “Did you know this camera tracks your mood?”: Understanding Privacy Expectations and Preferences in the Age of Video Analytics (2021) (9)
- Comparing Access-Control Technologies: A Study of Keys and Smartphones (2007) (9)
- “You Gotta Watch What You Say”: Surveillance of Communication with Incarcerated People (2021) (9)
- Effects of access-control policy conflict-resolution methods on policy-authoring usability (2009) (9)
- In Search of the Perfect Voting Technology: No Easy Answers (2003) (9)
- Ownership Concentration and Product Variety in Daily Newspaper Markets (2002) (9)
- The impact of privacy indicators on search engine browsing patterns (2009) (9)
- Counter-forensic privacy tools : a forensic evaluation (2005) (9)
- Footprints near the surf: individual privacy decisions in online contexts (2010) (8)
- Access control for home data sharing: evaluating social acceptability (2010) (8)
- Who's viewed you?: the impact of feedback in a mobile location-sharing application (2009) (8)
- Informing California privacy regulations with evidence from research (2021) (8)
- Hey, That's Personal! (2005) (8)
- The Geographic Dispersion of Commercial Internet Use (2003) (8)
- A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research (2021) (7)
- A user study of the expandable grid applied to P3P privacy policy visualization (2009) (7)
- Exploring reactive access control (2011) (7)
- Digital contact tracing may protect privacy, but it is unlikely to stop the pandemic (2020) (7)
- Telecommunications and Rural Economies: Findings from the Appalachian Region (2002) (7)
- The Real ID Act: Fixing Identity Documents with Duct Tape (2006) (7)
- Location Tracking (2008) (7)
- Identifying User Needs for Advertising Controls on Facebook (2022) (7)
- Towards usable Web privacy and security (2005) (7)
- Assessing Privacy Awareness from Browser Plugins (2014) (7)
- P 3 P Deployment on Websites (2015) (6)
- Internet Privacy - Introduction. (1999) (6)
- The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs (2013) (6)
- HCI Ethics, Privacy, Accessibility, and the Environment: A Town Hall Forum on Global Policy Issues (2020) (6)
- {Privacy, privacidad, Приватност} policies in social media: providing translated privacy notice (2012) (6)
- Understanding People’s Privacy Attitudes Towards Video Analytics Technologies (2020) (6)
- ICANN, “Internet Stability,” and New Top Level Domains (2002) (6)
- Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems (2012) (5)
- Communications policy and information technology (2003) (5)
- Exploring the Usability of Pronounceable Passwords (2014) (5)
- Emergent Locations: Implementing Wireless 9-1-1 in Texas, Virginia, and Ontario (2003) (5)
- Institutional Review Boards and Your Research: A Proposal for Improving the Review Procedures for Research Projects that Involve Human Subjects and Their Associated Identifiable Private Information (2010) (5)
- Analyzing use of privacy policy attributes in a location sharing application (2009) (5)
- Influencing software usage (1998) (5)
- Studying access-control usability in the lab: lessons learned from four studies (2012) (4)
- Is Notice Enough: Mitigating the Risks of Smartphone Data Sharing (2015) (4)
- Stronger than Barbed Wire: How Geo-Policy Barriers Construct Rural Internet Access (2002) (4)
- Proceedings of the Seventh Symposium on Usable Privacy and Security (2011) (4)
- Electronic privacy and surveillance (2014) (4)
- Advantage ISP: Terms of Service as Media Law (2003) (4)
- Towards an Information-Neutral Voting Scheme That Does Not Leave Too Much To Chance (1996) (4)
- Experts ’ Views on Digital Parenting Strategies (2017) (4)
- Efficient Choice, Inefficient Democracy? The Implications of Cable and Internet Access for Political Knowledge and Voter Turnout (2002) (4)
- Proceedings of the Eighth Symposium on Usable Privacy and Security (2012) (4)
- Understanding iOS Privacy Nutrition Labels: An Exploratory Large-Scale Analysis of App Store Data (2022) (4)
- Better Passwords through Science (and Neural Networks) (2017) (4)
- Proceedings of the Ninth Symposium on Usable Privacy and Security (2013) (3)
- How Usable Are iOS App Privacy Labels? (2022) (3)
- Audio, video, chat, email, or survey: How much does online interview mode matter? (2022) (3)
- A Privacy Assistant for the Internet of Things (2017) (3)
- Mobile-app privacy nutrition labels missing key ingredients for success (2022) (3)
- Can Declared Strategy Voting be an Effective Instrument for Group Decision-Making? (1995) (3)
- Experts’ Views on Digital Parenting Strategies (CMU-CyLab-17-002) (2017) (3)
- Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects (2010) (3)
- Laws, Self-Regulation, and P3P: Will W3C's Privacy Platform Help Make the Web Safe for Privacy? (1998) (3)
- Vewpoint Institutional Review Boards and Your Research (2010) (3)
- Cyberspace as Place (2003) (3)
- Creative Destruction in Emerging Markets: Privatizing Telecoms and the State* A paper presentation to be published as a book chapter in the TPRC 2002 conference best papers proceedings volume entitled: Rethinking Rights and Regulations: Institutional Responses to New Communication Technologies (2003) (3)
- The Potential Relevance to the United States of the European Union's Newly Adopted Regulatory Framework for Telecommunications (2003) (3)
- Improving Network Reliability—Liability Rules Must Recognize Investor Risk/Reward Strategies (2003) (2)
- Bias and responsibility in 'neutral' social protocols (1998) (2)
- The Art of Password Creation (2013) (2)
- Programming Perl: an interview with Larry Wall (1994) (2)
- Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, Redmond, Washington, USA, July 14-16, 2010 (2010) (2)
- An Informative Security and Privacy “Nutrition” Label for Internet of Things Devices (2022) (2)
- Is a privacy crisis experienced, a privacy crisis avoided? (2022) (2)
- Is it a concern or a preference? An investigation into the ability of privacy scales to capture and distinguish granular privacy constructs (2022) (2)
- How Do Home Computer Users Browse the Web? (2022) (2)
- Increasing Adoption of Tor Browser Using Informational and Planning Nudges (2022) (2)
- SIGCHI Social Impact Award Talk -- Making Privacy and Security More Usable (2018) (2)
- Perspective: Semantic data management for the home (CMU-PDL-08-105) (2008) (2)
- Web Security Requirements : A Phishing Perspective (2006) (2)
- Programs worth one thousand words: visual languages bring programming to the masses (1994) (2)
- Ten years of computers, freedom and privacy: a personal retrospective (2000) (2)
- Will the Real Internet Please Stand Up? An Attorney's Quest to Define the Internet (2003) (2)
- Digital liberties: free speech and privacy under attack in cyberspace (1995) (2)
- Is It the Typeset or the Type of Statistics? Disfluent Font and Self-Disclosure (2013) (1)
- How to (In)Effectively Convey Privacy Choices with Icons and Link Text (2020) (1)
- Putting Privacy Notices to the Test (2017) (1)
- Exposing digital content piracy: approaches, issues and experiences (2004) (1)
- Getting the Chad Out : Elections , Technology , and Reform (2001) (1)
- Place and Cyberspace (2003) (1)
- Is it the Typeset or the Type of Statistics? Disfluent Font does not Reduce Self-disclosure (2013) (1)
- Vicarious infringement creates a privacy ceiling (2006) (1)
- The road less traveled: Internet collaboration: good, bad, and downright ugly (1996) (1)
- A Survey to Guide Group Key Protocol Development (2008) (1)
- Locaccino (2010) (1)
- A Discussion of Election Security, Cryptography, and Exceptional Access With Michael Alan Specter (2021) (1)
- A Competitive Analysis of International Long Distance (2002) (1)
- Universal Service in Times of Reform: Affordability and Accessibility of Telecommunication Services in Latin America (2002) (1)
- User-friendly yet rarely read: A case study on the redesign of an online HIPAA authorization (2022) (1)
- Cookie monster (2022) (1)
- Design and Evaluation of a Data-Driven Password Meter ( Supplementary Material ) (2017) (1)
- Book Note: Understanding Qualitative Research and Ethnomethodology (2004) (1)
- Requirements for a P3P Query Language (1998) (1)
- Detecting iPhone Security Compromise in Simulated Stalking Scenarios: Strategies and Obstacles (2022) (1)
- ENUM: The Collision of Telephony and DNS Policy (2002) (1)
- Testing PhishGuru in the Real World (2008) (1)
- Exploring Topic-Based Sharing Mechanisms (2017) (0)
- Proceedings of the 5th International Conference on Electronic Commerce, ICEC 2003, Pittsburgh, Pennsylvania, USA, September 30 - October 03, 2003 (2003) (0)
- Some Economics of Wireless Communications (2003) (0)
- SPECIAL SECTION: Computers, Freedom and Privacy (2002) (0)
- Informing (Public) Policy (2016) (0)
- The Road Less Traveled: an alternative review of Doom II (1995) (0)
- Science and Service, Innovation and Inspiration: Celebrating the Life of John Karat (2016) (0)
- A 20th Anniversary Episode Chat With S&P Editors George Cybenko, Carl Landwehr, Shari Lawrence Pfleeger, and Sean Peisert (2023) (0)
- Digital Democracy: Prospects and Possibilities (2002) (0)
- Privacy Bird User Study 1. the At&t Privacy Bird 1.2 Preference Configuration 2. User Study (2002) (0)
- Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory (2010) (0)
- The Evolution of Legal Rights (2003) (0)
- Understanding People’s Privacy Attitudes Towards (2020) (0)
- Evolving Conceptualizations of the New Communications Arena (2003) (0)
- A Model Based Framework For Privacy Preserving Clustering Using SOM (2016) (0)
- Book Note: Rethinking Rights and Regulations: Institutional Responses to New Communication Technologies (2004) (0)
- Chapter 5 Anti-Phishing Phil : A Case study in User education (2009) (0)
- Phishing Susceptibility Study (2009) (0)
- Measuring Password Guessability for an Entire University (CMU-CyLab-13-013) (2013) (0)
- A US-UK Usability Evaluation of Consent Management Platform Cookie Consent Interface Design on Desktop and Mobile (2023) (0)
- Book review: email style book jumps on the Internet bandwagon (1994) (0)
- lazytables : Faster distributed machine learning through staleness (2013) (0)
- 2007 Reviewers (2007) (0)
- Improving the Human Element : Usable Privacy and Sec urity (2009) (0)
- Towards a Code of Ethics for Computer Security Research (2010) (0)
- Big-learning Systems for Big Data (0)
- Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS 2008, Pittsburgh, Pennsylvania, USA, July 23-25, 2008 (2008) (0)
- An Informal Publication from Academia's Premiere (2008) (0)
- Privacy Perceptions in India and US : A Mental Model Study (2005) (0)
- Expanding the Understanding of Universal Service (2002) (0)
- Monopoly and Competition in Communications Markets (2002) (0)
- CS Expertise for Institutional Review Boards. Authors' reply (2010) (0)
- Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007 (2007) (0)
- Less is Not More: Improving Findability and Actionability of Privacy Controls for Online Behavioral Advertising (2023) (0)
- Book Note: Critical Discourse Analysis and Language Cognition (2004) (0)
- Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15-17, 2009 (2009) (0)
- On Target? The Shifting Standards for Determining Internet Jurisdiction (2002) (0)
- Database Management Systems for Non-Volatile Memory (2015) (0)
- Road crew: students at work (1995) (0)
- Property Rights, Flexible Spectrum Use, and Satellite v. Terrestrial Uses and Users (2002) (0)
- High Assurance in the Twenty-First Century With Roger Schell (2022) (0)
- Case Study of Browser-based Anti-phishing Solutions (0)
- 1 P 3 P User Agent Accuracy (2002) (0)
- I know where you live: analyzing privacy protection in public databases (2011) (0)
- The Road Less Traveled: it shouldn't be allowed! (1995) (0)
- Report on DIMACS ∗ Workshop and Working Group on Usable Privacy and Security Software Date of Workshop : July 7-8 , 2004 Date of Working Group : July 9 , 2004 Workshop Organizers (0)
- The Future of Wireless Communications (2002) (0)
- Government Surveillance (2020) (0)
- Privacy engineering superheroes (2021) (0)
- Regulatory Conundrums and the Internet (2002) (0)
- Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006 (2005) (0)
- Assessing the Effectiveness of Section 271 Five Years after the Telecommunications Act of 1996 (2002) (0)
- Road crew: students at work (1995) (0)
- Session details: Emergency response (2014) (0)
- Privacy Tools Overview (2001) (0)
- Road crew: students at work (1996) (0)
- Research posters 101 (1996) (0)
- Bringing the Internet to Schools: The U.S. and E.U. Policies (2002) (0)
- Securing Early Software Development (2012) (0)
- Regulatory Innovation and Responses to Technological Change (2003) (0)
- Conducting Usable Security Studies: It's Complicated (2015) (0)
- Letter from the Special Section Editor (2002) (0)
- Road crew: students at work (1996) (0)
- Is There a Reverse Privacy Paradox? An Exploratory Analysis of Gaps Between Privacy Perspectives and Privacy-Seeking Behaviors (2023) (0)
- Road crew: students at work (1996) (0)
- Proximity displays for access control (2012) (0)
- A Discussion of Public Health, Trust, and Privacy With Susan Landau (2021) (0)
- Minding Your Own Business: The Platform for Privacy Preferences Project and Privacy Minder (1999) (0)
- Conference report: conferences offer insifhts into how computers may affect our future (1995) (0)
- Letter from the Special Section Editors, Ten Years of Computers, Freedom and Privacy (2002) (0)
- Governance in Namespaces (2003) (0)
- Metrics for Success (2023) (0)
- Understanding the human factors that make people vulnerable to online criminals can improve both security training and technology (2008) (0)
- the Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). Evaluating the Usability of Privacy Choice Mechanisms (2022) (0)
- Massive Indexed Directories in DeltaFS (2018) (0)
- Signing Initiative Petitions Online: Possibilities, Problems, and Prospects (2002) (0)
- CMU Broadband Consumer Disclosure Label (0)
- Lessons from the loo (2021) (0)
- Best Effort versus Spectrum Markets: 802.11 versus 3G? (2002) (0)
- Katie Moussouris: Vulnerability Disclosure and Security Workforce Development (2023) (0)
- From Facebook Regrets to Facebook Privacy (2013) (0)
- Getting Consent From Drivers on the Go : A Privacy Consent Collection Framework for In-vehicle Systems (2018) (0)
- The Road Less Traveled: stop and smell the policy (1994) (0)
- Road crew: students at work (1995) (0)
- “Functionality” as the Distinction Between Patent and Copyright Subject Matter (2003) (0)
This paper list is powered by the following services:
Other Resources About Lorrie Cranor
What Schools Are Affiliated With Lorrie Cranor?
Lorrie Cranor is affiliated with the following schools: