Lorrie Faith Cranor

Author: Lorrie Faith Cranor

Publications

Publication period start: 1997
Publication period end: 2012
Number of co-authors: 75

Co-authors

Number of publications with favourite co-authors
Richard Shay
6
Lujo Bauer
9
Patrick Gage Kelley
10

Productive Colleagues

Most productive colleagues in number of publications
Jason I. Hong
36
John Zimmerman
51
Robert J. Kauffman
64

Publications

Cranor, Lorrie Faith, Guduru, Praveen, Arjula, Manjula (2006): User interfaces for privacy agents. In ACM Transactions on Computer-Human Interaction, 13 (2) pp. 135-178.

Cranor, Lorrie Faith (2006): What do they \"indicate?\": evaluating security and privacy indicators. In Interactions, 13 (3) pp. 45-47.

Cranor, Lorrie Faith (2002): SPECIAL SECTION: Computers, Freedom and Privacy. In The Information Society, 18 (3) pp. .

Cranor, Lorrie Faith (2002): Letter from the Special Section Editors, Ten Years of Computers, Freedom and Privacy. In The Information Society, 18 (3) pp. .

Waldman, Marc, Rubin, Aviel D., Cranor, Lorrie Faith (2001): The architecture of robust publishing systems. In ACM Trans. Internet Techn., 1 (2) pp. 199-230.

Hoffman, Lance J., Cranor, Lorrie Faith (2001): Internet voting for public officials: introduction. In Communications of the ACM, 44 (1) pp. 69-71.

Cranor, Lorrie Faith (1999): Internet Privacy - Introduction. In Communications of the ACM, 42 (2) pp. 28-31.

Reagle, Joseph, Cranor, Lorrie Faith (1999): The Platform for Privacy Preferences. In Communications of the ACM, 42 (2) pp. 48-55.

Cranor, Lorrie Faith, LaMacchia, Brian A. (1998): Spam!. In Communications of the ACM, 41 (8) pp. 74-83.

McDonald, Aleecia M., Reeder, Robert W., Kelley, Patrick Gage, Cranor, Lorrie Faith (2009): A comparative study of online privacy policies and formats. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 46.

Kelley, Patrick Gage, Bresee, Joanna, Cranor, Lorrie Faith, Reeder, Robert W. (2009): A \"nutrition label\" for privacy. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 4.

Benisch, Michael, Kelley, Patrick Gage, Sadeh, Norman, Sandholm, Tuomas, Tsai, Janice, Cranor, Lorrie Faith, Drielsma, Paul Hankes (2009): The impact of expressiveness on the effectiveness of privacy mechanisms for location-shari. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 22.

Reeder, Robert W., Kelley, Patrick Gage, McDonald, Aleecia M., Cranor, Lorrie Faith (2009): A user study of the expandable grid applied to P3P privacy policy visualization. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 42.

Kumaraguru, Ponnurangam, Rhee, Yong, Acquisti, Alessandro, Cranor, Lorrie Faith, Hong, Jason, Nunge, Elizabeth (2007): Protecting people from phishing: the design and evaluation of an embedded training email s. In: Proceedings of ACM CHI 2007 Conference on Human Factors in Computing Systems , 2007, . pp. 905-914.

Shay, Richard, Komanduri, Saranga, Kelley, Patrick Gage, Leon, Pedro Giovanni, Mazurek, Michelle L., Bauer, Lujo, Christin, Nicolas, Cranor, Lorrie Faith (2010): Encountering stronger password requirements: user attitudes and behaviors. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 2.

Mazurek, Michelle L., Arsenault, J. P., Bresee, Joanna, Gupta, Nitin, Ion, Iulia, Johns, Christina, Lee, Daniel, Liang, Yuan, Olsen, Jenny, Salmon, Brandon, Shay, Richard, Vaniea, Kami, Bauer, Lujo, Cranor, Lorrie Faith, Ganger, Gregory R., Reiter, Michael K. (2010): Access control for home data sharing: evaluating social acceptability. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 645-654.

Kelley, Patrick Gage, Cesca, Lucian, Bresee, Joanna, Cranor, Lorrie Faith (2010): Standardizing privacy notices: an online study of the nutrition label approach. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 1573-1582.

Downs, Julie S., Holbrook, Mandy B., Sheng, Steve, Cranor, Lorrie Faith (2010): Are your participants gaming the system?: screening mechanical turk workers. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 2399-2402.

Mazurek, Michelle L., Klemperer, Peter F., Shay, Richard, Takabi, Hassan, Bauer, Lujo, Cranor, Lorrie Faith (2011): Exploring reactive access control. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2085-2094.

Kelley, Patrick Gage, Benisch, Michael, Cranor, Lorrie Faith, Sadeh, Norman (2011): When are users comfortable sharing locations with advertisers?. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2449-2452.

Komanduri, Saranga, Shay, Richard, Kelley, Patrick Gage, Mazurek, Michelle L., Bauer, Lujo, Christin, Nicolas, Cranor, Lorrie Faith, Egelman, Serge (2011): Of passwords and people: measuring the effect of password-composition policies. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2595-2604.

Wang, Yang, Norcie, Gregory, Komanduri, Saranga, Acquisti, Alessandro, Leon, Pedro Giovanni, Cranor, Lorrie Faith (2011): "I regretted the minute I pressed share": a qualitative study of regrets on Facebook. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 10.

Wiese, Jason, Kelley, Patrick Gage, Cranor, Lorrie Faith, Dabbish, Laura, Hong, Jason I., Zimmerman, John (2011): Are you close with me? are you nearby?: investigating social groups, closeness, and willin. In: Proceedings of the 2011 International Conference on Uniquitous Computing , 2011, . pp. 197-206.

Ur, Blase, Leon, Pedro Giovanni, Cranor, Lorrie Faith, Shay, Richard, Wang, Yang (2012): Smart, useful, scary, creepy: perceptions of online behavioral advertising. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 4.

Sheng, Steve, Holbrook, Mandy, Kumaraguru, Ponnurangam, Cranor, Lorrie Faith, Downs, Julie (2010): Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness . In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 373-382.

Cranor, Lorrie Faith (2005): Towards usable Web privacy and security. In: Proceedings of the 2005 International Conference on the World Wide Web , 2005, . pp. 352.

Cranor, Lorrie Faith, Cytron, Ron (1997): Sensus: A Security-Conscious Electronic Polling System for the Internet. In: HICSS 1997 , 1997, . pp. 561-570.

Downs, Julie S., Holbrook, Mandy B., Cranor, Lorrie Faith (2006): Decision strategies and susceptibility to phishing. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 79-90.

Downs, Julie S., Holbrook, Mandy, Cranor, Lorrie Faith (2007): Behavioral response to phishing risk. In: Proceedings of the 2007 Anti-Phishing Working Groups eCrime Researchers Summit , 2007, . pp. 37-44.

Kumaraguru, Ponnurangam, Rhee, Yong, Sheng, Steve, Hasan, Sharique, Acquisti, Alessandro, Cranor, Lorrie Faith, Hong, Jason (2007): Getting users to pay attention to anti-phishing education: evaluation of retention and tra. In: Proceedings of the 2007 Anti-Phishing Working Groups eCrime Researchers Summit , 2007, . pp. 70-81.

Bauer, Lujo, Cranor, Lorrie Faith, Reeder, Robert W., Reiter, Michael K., Vaniea, Kami (2008): A user study of policy creation in a flexible access-control system. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 543-552.

Egelman, Serge, Cranor, Lorrie Faith, Hong, Jason (2008): You\'ve been warned: an empirical study of the effectiveness of web browser phishing warni. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 1065-1074.

Reeder, Robert W., Bauer, Lujo, Cranor, Lorrie Faith, Reiter, Michael K., Bacon, Kelli, How, Keisha, Strong, Heather (2008): Expandable grids for visualizing and authoring computer security policies. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 1473-1482.

Kuo, Cynthia, Romanosky, Sasha, Cranor, Lorrie Faith (2006): Human selection of mnemonic phrase-based passwords. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 67-78.

Bauer, Lujo, Cranor, Lorrie Faith, Reiter, Michael K., Vaniea, Kami (2007): Lessons learned from the deployment of a smartphone-based access-control system. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 64-75.

Cranor, Lorrie Faith (2005): Hey, That\'s Personal!. In: Ardissono, Liliana, Brna, Paul, Mitrovic, Antonija (eds.) User Modeling 2005 - 10th International Conference - UM 2005 July 24-29, 2005, Edinburgh, Scotland, UK. pp. 4.

Sheng, Steve, Magnien, Bryant, Kumaraguru, Ponnurangam, Acquisti, Alessandro, Cranor, Lorrie Faith, Hong, Jason, Nunge, Elizabeth (2007): Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall fo. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 88-99.

Egelman, Serge, Tsai, Janice, Cranor, Lorrie Faith, Acquisti, Alessandro (2009): Timing is everything?: the effects of timing and placement of online privacy indicators. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 319-328.

Bauer, Lujo, Cranor, Lorrie Faith, Reeder, Robert W., Reiter, Michael K., Vaniea, Kami (2009): Real life challenges in access-control management. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 899-908.

Tsai, Janice Y., Kelley, Patrick, Drielsma, Paul, Cranor, Lorrie Faith, Hong, Jason, Sadeh, Norman (2009): Who\'s viewed you?: the impact of feedback in a mobile location-sharing application. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 2003-2012.

Sadeh, Norman M., Dively, Mary Jo, Kauffman, Robert J., Labrou, Yannis, Shehory, Onn, Telang, Rahul, Cranor, Lorrie Faith (eds.) Proceedings of the 5th International Conference on Electronic Commerce - ICEC 2003 September 30 - October 03, 2003, Pittsburgh, Pennsylvania, USA.

Egelman, Serge, Cranor, Lorrie Faith, Chowdhury, Abdur (2006): An analysis of P3P-enabled web sites among top-20 search results. In: Fox, Mark S., Spencer, Bruce (eds.) Proceedings of the 8th International Conference on Electronic Commerce - ICEC 2006 , 2006, Fredericton, New Brunswick, Canada. pp. 197-207.

Byers, Simon, Cranor, Lorrie Faith, Kormann, David P. (2003): Automated analysis of P3P-enabled Web sites. In: Sadeh, Norman M., Dively, Mary Jo, Kauffman, Robert J., Labrou, Yannis, Shehory, Onn, Telang, Rahul, Cranor, Lorrie Faith (eds.) Proceedings of the 5th International Conference on Electronic Commerce - ICEC 2003 September 30 - October 03, 2003, Pittsburgh, Pennsylvania, USA. pp. 326-338.

Shay, Richard, Kelley, Patrick Gage, Komanduri, Saranga, Mazurek, Michelle L., Ur, Blase, Vidas, Timothy, Bauer, Lujo, Christin, Nicolas, Cranor, Lorrie Faith (2012): Correct horse battery staple: exploring the usability of system-assigned passphrases. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 7.