Author: Lorrie Faith Cranor

Lorrie Faith Cranor

Lorrie Faith Cranor

http://lorrie.cranor.org/

Publications

Publication period start: 1997
Publication period end: 2012
Number of co-authors: 75

Co-authors

Number of publications with favourite co-authors
Richard Shay
6
Lujo Bauer
9
Patrick Gage Kelley
10

Productive Colleagues

Most productive colleagues in number of publications
Jason I. Hong
36
John Zimmerman
51
Robert J. Kauffman
64

Publications

Cranor, Lorrie Faith, Guduru, Praveen, Arjula, Manjula (2006): User interfaces for privacy agents. In ACM Transactions on Computer-Human Interaction, 13 (2) pp. 135-178. http://doi.acm.org/10.1145/1165734.1165735

Cranor, Lorrie Faith (2006): What do they \"indicate?\": evaluating security and privacy indicators. In Interactions, 13 (3) pp. 45-47.

Cranor, Lorrie Faith (2002): SPECIAL SECTION: Computers, Freedom and Privacy. In The Information Society, 18 (3) pp. .

Cranor, Lorrie Faith (2002): Letter from the Special Section Editors, Ten Years of Computers, Freedom and Privacy. In The Information Society, 18 (3) pp. . http://www.indiana.edu/~tisj/readers/full-text/18-3%20Cranor.pdf

Waldman, Marc, Rubin, Aviel D., Cranor, Lorrie Faith (2001): The architecture of robust publishing systems. In ACM Trans. Internet Techn., 1 (2) pp. 199-230. http://doi.acm.org/10.1145/502152.502154

Hoffman, Lance J., Cranor, Lorrie Faith (2001): Internet voting for public officials: introduction. In Communications of the ACM, 44 (1) pp. 69-71. http://doi.acm.org/10.1145/357489.357510

Cranor, Lorrie Faith (1999): Internet Privacy - Introduction. In Communications of the ACM, 42 (2) pp. 28-31. http://doi.acm.org/10.1145/293411.293440

Reagle, Joseph, Cranor, Lorrie Faith (1999): The Platform for Privacy Preferences. In Communications of the ACM, 42 (2) pp. 48-55. http://doi.acm.org/10.1145/293411.293455

Cranor, Lorrie Faith, LaMacchia, Brian A. (1998): Spam!. In Communications of the ACM, 41 (8) pp. 74-83.

McDonald, Aleecia M., Reeder, Robert W., Kelley, Patrick Gage, Cranor, Lorrie Faith (2009): A comparative study of online privacy policies and formats. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 46. http://doi.acm.org/10.1145/1572532.1572586

Kelley, Patrick Gage, Bresee, Joanna, Cranor, Lorrie Faith, Reeder, Robert W. (2009): A \"nutrition label\" for privacy. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 4. http://doi.acm.org/10.1145/1572532.1572538

Benisch, Michael, Kelley, Patrick Gage, Sadeh, Norman, Sandholm, Tuomas, Tsai, Janice, Cranor, Lorrie Faith, Drielsma, Paul Hankes (2009): The impact of expressiveness on the effectiveness of privacy mechanisms for location-shari. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 22. http://doi.acm.org/10.1145/1572532.1572561

Reeder, Robert W., Kelley, Patrick Gage, McDonald, Aleecia M., Cranor, Lorrie Faith (2009): A user study of the expandable grid applied to P3P privacy policy visualization. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 42. http://doi.acm.org/10.1145/1572532.1572582

Kumaraguru, Ponnurangam, Rhee, Yong, Acquisti, Alessandro, Cranor, Lorrie Faith, Hong, Jason, Nunge, Elizabeth (2007): Protecting people from phishing: the design and evaluation of an embedded training email s. In: Proceedings of ACM CHI 2007 Conference on Human Factors in Computing Systems , 2007, . pp. 905-914. http://doi.acm.org/10.1145/1240624.1240760

Shay, Richard, Komanduri, Saranga, Kelley, Patrick Gage, Leon, Pedro Giovanni, Mazurek, Michelle L., Bauer, Lujo, Christin, Nicolas, Cranor, Lorrie Faith (2010): Encountering stronger password requirements: user attitudes and behaviors. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 2. http://doi.acm.org/10.1145/1837110.1837113

Mazurek, Michelle L., Arsenault, J. P., Bresee, Joanna, Gupta, Nitin, Ion, Iulia, Johns, Christina, Lee, Daniel, Liang, Yuan, Olsen, Jenny, Salmon, Brandon, Shay, Richard, Vaniea, Kami, Bauer, Lujo, Cranor, Lorrie Faith, Ganger, Gregory R., Reiter, Michael K. (2010): Access control for home data sharing: evaluating social acceptability. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 645-654. http://doi.acm.org/10.1145/1753326.1753421

Kelley, Patrick Gage, Cesca, Lucian, Bresee, Joanna, Cranor, Lorrie Faith (2010): Standardizing privacy notices: an online study of the nutrition label approach. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 1573-1582. http://doi.acm.org/10.1145/1753326.1753561

Downs, Julie S., Holbrook, Mandy B., Sheng, Steve, Cranor, Lorrie Faith (2010): Are your participants gaming the system?: screening mechanical turk workers. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 2399-2402. http://doi.acm.org/10.1145/1753326.1753688

Mazurek, Michelle L., Klemperer, Peter F., Shay, Richard, Takabi, Hassan, Bauer, Lujo, Cranor, Lorrie Faith (2011): Exploring reactive access control. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2085-2094. http://dx.doi.org/10.1145/1978942.1979245

Kelley, Patrick Gage, Benisch, Michael, Cranor, Lorrie Faith, Sadeh, Norman (2011): When are users comfortable sharing locations with advertisers?. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2449-2452. http://dx.doi.org/10.1145/1978942.1979299

Komanduri, Saranga, Shay, Richard, Kelley, Patrick Gage, Mazurek, Michelle L., Bauer, Lujo, Christin, Nicolas, Cranor, Lorrie Faith, Egelman, Serge (2011): Of passwords and people: measuring the effect of password-composition policies. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2595-2604. http://dx.doi.org/10.1145/1978942.1979321

Wang, Yang, Norcie, Gregory, Komanduri, Saranga, Acquisti, Alessandro, Leon, Pedro Giovanni, Cranor, Lorrie Faith (2011): "I regretted the minute I pressed share": a qualitative study of regrets on Facebook. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 10. http://dx.doi.org/10.1145/2078827.2078841

Wiese, Jason, Kelley, Patrick Gage, Cranor, Lorrie Faith, Dabbish, Laura, Hong, Jason I., Zimmerman, John (2011): Are you close with me? are you nearby?: investigating social groups, closeness, and willin. In: Proceedings of the 2011 International Conference on Uniquitous Computing , 2011, . pp. 197-206. http://dx.doi.org/10.1145/2030112.2030140

Ur, Blase, Leon, Pedro Giovanni, Cranor, Lorrie Faith, Shay, Richard, Wang, Yang (2012): Smart, useful, scary, creepy: perceptions of online behavioral advertising. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 4. http://dx.doi.org/10.1145/2335356.2335362

Sheng, Steve, Holbrook, Mandy, Kumaraguru, Ponnurangam, Cranor, Lorrie Faith, Downs, Julie (2010): Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness . In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 373-382. http://doi.acm.org/10.1145/1753326.1753383

Cranor, Lorrie Faith (2005): Towards usable Web privacy and security. In: Proceedings of the 2005 International Conference on the World Wide Web , 2005, . pp. 352. http://doi.acm.org/10.1145/1060745.1060749

Cranor, Lorrie Faith, Cytron, Ron (1997): Sensus: A Security-Conscious Electronic Polling System for the Internet. In: HICSS 1997 , 1997, . pp. 561-570. http://csdl.computer.org/comp/proceedings/hicss/1997/7734/03/7734030561abs.htm

Downs, Julie S., Holbrook, Mandy B., Cranor, Lorrie Faith (2006): Decision strategies and susceptibility to phishing. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 79-90. http://cups.cs.cmu.edu/soups/2006/proceedings/p79_downs.pdf

Downs, Julie S., Holbrook, Mandy, Cranor, Lorrie Faith (2007): Behavioral response to phishing risk. In: Proceedings of the 2007 Anti-Phishing Working Groups eCrime Researchers Summit , 2007, . pp. 37-44. http://doi.acm.org/10.1145/1299015.1299019

Kumaraguru, Ponnurangam, Rhee, Yong, Sheng, Steve, Hasan, Sharique, Acquisti, Alessandro, Cranor, Lorrie Faith, Hong, Jason (2007): Getting users to pay attention to anti-phishing education: evaluation of retention and tra. In: Proceedings of the 2007 Anti-Phishing Working Groups eCrime Researchers Summit , 2007, . pp. 70-81. http://doi.acm.org/10.1145/1299015.1299022

Bauer, Lujo, Cranor, Lorrie Faith, Reeder, Robert W., Reiter, Michael K., Vaniea, Kami (2008): A user study of policy creation in a flexible access-control system. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 543-552. http://doi.acm.org/10.1145/1357054.1357143

Egelman, Serge, Cranor, Lorrie Faith, Hong, Jason (2008): You\'ve been warned: an empirical study of the effectiveness of web browser phishing warni. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 1065-1074. http://doi.acm.org/10.1145/1357054.1357219

Reeder, Robert W., Bauer, Lujo, Cranor, Lorrie Faith, Reiter, Michael K., Bacon, Kelli, How, Keisha, Strong, Heather (2008): Expandable grids for visualizing and authoring computer security policies. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 1473-1482. http://doi.acm.org/10.1145/1357054.1357285

Kuo, Cynthia, Romanosky, Sasha, Cranor, Lorrie Faith (2006): Human selection of mnemonic phrase-based passwords. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 67-78. http://cups.cs.cmu.edu/soups/2006/slides/kuo.zip Slides

Bauer, Lujo, Cranor, Lorrie Faith, Reiter, Michael K., Vaniea, Kami (2007): Lessons learned from the deployment of a smartphone-based access-control system. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 64-75. http://cups.cs.cmu.edu/soups/2007/proceedings/p64_bauer.pdf

Cranor, Lorrie Faith (2005): Hey, That\'s Personal!. In: Ardissono, Liliana, Brna, Paul, Mitrovic, Antonija (eds.) User Modeling 2005 - 10th International Conference - UM 2005 July 24-29, 2005, Edinburgh, Scotland, UK. pp. 4. http://dx.doi.org/10.1007/11527886_2

Sheng, Steve, Magnien, Bryant, Kumaraguru, Ponnurangam, Acquisti, Alessandro, Cranor, Lorrie Faith, Hong, Jason, Nunge, Elizabeth (2007): Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall fo. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 88-99. http://cups.cs.cmu.edu/soups/2007/proceedings/p88_sheng.pdf

Egelman, Serge, Tsai, Janice, Cranor, Lorrie Faith, Acquisti, Alessandro (2009): Timing is everything?: the effects of timing and placement of online privacy indicators. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 319-328. http://doi.acm.org/10.1145/1518701.1518752

Bauer, Lujo, Cranor, Lorrie Faith, Reeder, Robert W., Reiter, Michael K., Vaniea, Kami (2009): Real life challenges in access-control management. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 899-908. http://doi.acm.org/10.1145/1518701.1518838

Tsai, Janice Y., Kelley, Patrick, Drielsma, Paul, Cranor, Lorrie Faith, Hong, Jason, Sadeh, Norman (2009): Who\'s viewed you?: the impact of feedback in a mobile location-sharing application. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 2003-2012. http://doi.acm.org/10.1145/1518701.1519005

Sadeh, Norman M., Dively, Mary Jo, Kauffman, Robert J., Labrou, Yannis, Shehory, Onn, Telang, Rahul, Cranor, Lorrie Faith (eds.) Proceedings of the 5th International Conference on Electronic Commerce - ICEC 2003 September 30 - October 03, 2003, Pittsburgh, Pennsylvania, USA.

Egelman, Serge, Cranor, Lorrie Faith, Chowdhury, Abdur (2006): An analysis of P3P-enabled web sites among top-20 search results. In: Fox, Mark S., Spencer, Bruce (eds.) Proceedings of the 8th International Conference on Electronic Commerce - ICEC 2006 , 2006, Fredericton, New Brunswick, Canada. pp. 197-207. http://doi.acm.org/10.1145/1151454.1151492

Byers, Simon, Cranor, Lorrie Faith, Kormann, David P. (2003): Automated analysis of P3P-enabled Web sites. In: Sadeh, Norman M., Dively, Mary Jo, Kauffman, Robert J., Labrou, Yannis, Shehory, Onn, Telang, Rahul, Cranor, Lorrie Faith (eds.) Proceedings of the 5th International Conference on Electronic Commerce - ICEC 2003 September 30 - October 03, 2003, Pittsburgh, Pennsylvania, USA. pp. 326-338. http://doi.acm.org/10.1145/948005.948048

Shay, Richard, Kelley, Patrick Gage, Komanduri, Saranga, Mazurek, Michelle L., Ur, Blase, Vidas, Timothy, Bauer, Lujo, Christin, Nicolas, Cranor, Lorrie Faith (2012): Correct horse battery staple: exploring the usability of system-assigned passphrases. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 7. http://dx.doi.org/10.1145/2335356.2335366