Travelled to:
1 × France
1 × Italy
1 × South Korea
3 × Canada
5 × USA
Collaborated with:
P.G.Kelley L.Bauer N.M.Sadeh A.Acquisti M.K.Reiter R.W.Reeder R.Shay S.Egelman J.I.Hong M.L.Mazurek K.Vaniea B.Ur M.Sleeper J.S.Downs M.B.Holbrook S.Sheng J.Y.Tsai P.Kumaraguru Y.Wang P.G.Leon R.Balebako N.Christin S.Komanduri J.Bresee P.F.Klemperer A.Forget M.Benisch L.Cesca S.M.Segreti Y.Liang N.Gupta S.A.Munson S.Das A.L.McConahy J.Wiese H.Takabi P.H.Drielsma Y.Rhee E.Nunge J.Cranshaw K.Bacon K.How H.Strong H.Almuhimedi F.Schaub I.Adjerid J.Gluck Y.Agarwal W.Melicher A.L.Durity P.(.Huh J.P.Arsenault I.Ion C.Johns D.Lee J.Olsen B.Salmon G.R.Ganger
Talks about:
control (6) access (6) privaci (5) effect (5) share (5) password (4) system (4) studi (4) phish (4) behavior (3)
Person: Lorrie Faith Cranor
DBLP: Cranor:Lorrie_Faith
Contributed to:
Wrote 25 papers:
- CHI-2015-AlmuhimediSSAAG #case study #exclamation #mobile #privacy
- Your Location has been Shared 5, 398 Times!: A Field Study on Mobile App Privacy Nudging (HA, FS, NMS, IA, AA, JG, LFC, YA), pp. 787–796.
- CHI-2015-ShayBCCFKMMSU #behaviour #feedback
- A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior (RS, LB, NC, LFC, AF, SK, MLM, WM, SMS, BU), pp. 2903–2912.
- CSCW-2015-SleeperACKMS #behaviour #network #social
- I Would Like To..., I Shouldn’t..., I Wish I...: Exploring Behavior-Change Goals for Social Networking Sites (MS, AA, LFC, PGK, SAM, NMS), pp. 1058–1069.
- CHI-2014-0005LACFS #facebook #privacy
- A field trial of privacy nudges for facebook (YW, PGL, AA, LFC, AF, NMS), pp. 2367–2376.
- CHI-2014-ShayKDHMSUBCC #question
- Can long passwords be secure and usable? (RS, SK, ALD, P(H, MLM, SMS, BU, LB, NC, LFC), pp. 2927–2936.
- CHI-2013-KelleyCS #privacy #process
- Privacy as part of the app decision-making process (PGK, LFC, NMS), pp. 3393–3402.
- CHI-2013-SleeperCKUACS #quote #twitter
- “I read my Twitter the next morning and was astonished”: a conversational perspective on Twitter regrets (MS, JC, PGK, BU, AA, LFC, NMS), pp. 3277–3286.
- CSCW-2013-SleeperBDMWC #facebook #self
- The post that wasn’t: exploring self-censorship on facebook (MS, RB, SD, ALM, JW, LFC), pp. 793–802.
- CHI-2012-KlempererLMSUBCGR #data access #exclamation #using
- Tag, you can see it!: using tags for access control in photo sharing (PFK, YL, MLM, MS, BU, LB, LFC, NG, MKR), pp. 377–386.
- CHI-2012-LeonUSWBC #behaviour #evaluation #online #tool support #usability #why
- Why Johnny can’t opt out: a usability evaluation of tools to limit online behavioral advertising (PGL, BU, RS, YW, RB, LFC), pp. 589–598.
- CHI-2011-KelleyBCS #question
- When are users comfortable sharing locations with advertisers? (PGK, MB, LFC, NMS), pp. 2449–2452.
- CHI-2011-KomanduriSKMBCCE #people #policy
- Of passwords and people: measuring the effect of password-composition policies (SK, RS, PGK, MLM, LB, NC, LFC, SE), pp. 2595–2604.
- CHI-2011-MazurekKSTBC #data access
- Exploring reactive access control (MLM, PFK, RS, HT, LB, LFC), pp. 2085–2094.
- CHI-2011-ReederBCRV #usability
- More than skin deep: measuring effects of the underlying model on access-control system usability (RWR, LB, LFC, MKR, KV), pp. 2065–2074.
- CHI-2010-DownsHSC #game studies
- Are your participants gaming the system?: screening mechanical turk workers (JSD, MBH, SS, LFC), pp. 2399–2402.
- CHI-2010-KelleyCBC #approach #online #privacy #standard
- Standardizing privacy notices: an online study of the nutrition label approach (PGK, LC, JB, LFC), pp. 1573–1582.
- CHI-2010-MazurekABGIJLLOSSVBCGR #data access #social
- Access control for home data sharing: evaluating social acceptability (MLM, JPA, JB, NG, II, CJ, DL, YL, JO, BS, RS, KV, LB, LFC, GRG, MKR), pp. 645–654.
- CHI-2010-ShengHKCD #analysis #effectiveness
- Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions (SS, MBH, PK, LFC, JSD), pp. 373–382.
- CHI-2009-BauerCRRV #challenge
- Real life challenges in access-control management (LB, LFC, RWR, MKR, KV), pp. 899–908.
- CHI-2009-EgelmanTCA #online #privacy
- Timing is everything?: the effects of timing and placement of online privacy indicators (SE, JYT, LFC, AA), pp. 319–328.
- CHI-2009-TsaiKDCHS #feedback #mobile
- Who’s viewed you?: the impact of feedback in a mobile location-sharing application (JYT, PGK, PHD, LFC, JIH, NMS), pp. 2003–2012.
- CHI-2008-BauerCRRV #case study #flexibility #policy #user study
- A user study of policy creation in a flexible access-control system (LB, LFC, RWR, MKR, KV), pp. 543–552.
- CHI-2008-EgelmanCH #effectiveness #empirical #web
- You’ve been warned: an empirical study of the effectiveness of web browser phishing warnings (SE, LFC, JIH), pp. 1065–1074.
- CHI-2008-ReederBCRBHS #authoring #policy #security #visualisation
- Expandable grids for visualizing and authoring computer security policies (RWR, LB, LFC, MKR, KB, KH, HS), pp. 1473–1482.
- CHI-2007-KumaraguruRACHN #design #email #embedded #evaluation #people
- Protecting people from phishing: the design and evaluation of an embedded training email system (PK, YR, AA, LFC, JIH, EN), pp. 905–914.