BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × France
1 × Italy
1 × South Korea
3 × Canada
5 × USA
Collaborated with:
P.G.Kelley L.Bauer N.M.Sadeh A.Acquisti M.K.Reiter R.W.Reeder R.Shay S.Egelman J.I.Hong M.L.Mazurek K.Vaniea B.Ur M.Sleeper J.S.Downs M.B.Holbrook S.Sheng J.Y.Tsai P.Kumaraguru Y.Wang P.G.Leon R.Balebako N.Christin S.Komanduri J.Bresee P.F.Klemperer A.Forget M.Benisch L.Cesca S.M.Segreti Y.Liang N.Gupta S.A.Munson S.Das A.L.McConahy J.Wiese H.Takabi P.H.Drielsma Y.Rhee E.Nunge J.Cranshaw K.Bacon K.How H.Strong H.Almuhimedi F.Schaub I.Adjerid J.Gluck Y.Agarwal W.Melicher A.L.Durity P.(.Huh J.P.Arsenault I.Ion C.Johns D.Lee J.Olsen B.Salmon G.R.Ganger
Talks about:
control (6) access (6) privaci (5) effect (5) share (5) password (4) system (4) studi (4) phish (4) behavior (3)

Person: Lorrie Faith Cranor

DBLP DBLP: Cranor:Lorrie_Faith

Contributed to:

CHI 20152015
CSCW 20152015
CHI 20142014
CHI 20132013
CSCW 20132013
CHI 20122012
CHI 20112011
CHI 20102010
CHI 20092009
CHI 20082008
CHI 20072007

Wrote 25 papers:

CHI-2015-AlmuhimediSSAAG #case study #exclamation #mobile #privacy
Your Location has been Shared 5, 398 Times!: A Field Study on Mobile App Privacy Nudging (HA, FS, NMS, IA, AA, JG, LFC, YA), pp. 787–796.
CHI-2015-ShayBCCFKMMSU #behaviour #feedback
A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior (RS, LB, NC, LFC, AF, SK, MLM, WM, SMS, BU), pp. 2903–2912.
CSCW-2015-SleeperACKMS #behaviour #network #social
I Would Like To..., I Shouldn’t..., I Wish I...: Exploring Behavior-Change Goals for Social Networking Sites (MS, AA, LFC, PGK, SAM, NMS), pp. 1058–1069.
CHI-2014-0005LACFS #facebook #privacy
A field trial of privacy nudges for facebook (YW, PGL, AA, LFC, AF, NMS), pp. 2367–2376.
CHI-2014-ShayKDHMSUBCC #question
Can long passwords be secure and usable? (RS, SK, ALD, P(H, MLM, SMS, BU, LB, NC, LFC), pp. 2927–2936.
CHI-2013-KelleyCS #privacy #process
Privacy as part of the app decision-making process (PGK, LFC, NMS), pp. 3393–3402.
CHI-2013-SleeperCKUACS #quote #twitter
“I read my Twitter the next morning and was astonished”: a conversational perspective on Twitter regrets (MS, JC, PGK, BU, AA, LFC, NMS), pp. 3277–3286.
CSCW-2013-SleeperBDMWC #facebook #self
The post that wasn’t: exploring self-censorship on facebook (MS, RB, SD, ALM, JW, LFC), pp. 793–802.
CHI-2012-KlempererLMSUBCGR #data access #exclamation #using
Tag, you can see it!: using tags for access control in photo sharing (PFK, YL, MLM, MS, BU, LB, LFC, NG, MKR), pp. 377–386.
CHI-2012-LeonUSWBC #behaviour #evaluation #online #tool support #usability #why
Why Johnny can’t opt out: a usability evaluation of tools to limit online behavioral advertising (PGL, BU, RS, YW, RB, LFC), pp. 589–598.
CHI-2011-KelleyBCS #question
When are users comfortable sharing locations with advertisers? (PGK, MB, LFC, NMS), pp. 2449–2452.
CHI-2011-KomanduriSKMBCCE #people #policy
Of passwords and people: measuring the effect of password-composition policies (SK, RS, PGK, MLM, LB, NC, LFC, SE), pp. 2595–2604.
CHI-2011-MazurekKSTBC #data access
Exploring reactive access control (MLM, PFK, RS, HT, LB, LFC), pp. 2085–2094.
CHI-2011-ReederBCRV #usability
More than skin deep: measuring effects of the underlying model on access-control system usability (RWR, LB, LFC, MKR, KV), pp. 2065–2074.
CHI-2010-DownsHSC #game studies
Are your participants gaming the system?: screening mechanical turk workers (JSD, MBH, SS, LFC), pp. 2399–2402.
CHI-2010-KelleyCBC #approach #online #privacy #standard
Standardizing privacy notices: an online study of the nutrition label approach (PGK, LC, JB, LFC), pp. 1573–1582.
CHI-2010-MazurekABGIJLLOSSVBCGR #data access #social
Access control for home data sharing: evaluating social acceptability (MLM, JPA, JB, NG, II, CJ, DL, YL, JO, BS, RS, KV, LB, LFC, GRG, MKR), pp. 645–654.
CHI-2010-ShengHKCD #analysis #effectiveness
Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions (SS, MBH, PK, LFC, JSD), pp. 373–382.
CHI-2009-BauerCRRV #challenge
Real life challenges in access-control management (LB, LFC, RWR, MKR, KV), pp. 899–908.
CHI-2009-EgelmanTCA #online #privacy
Timing is everything?: the effects of timing and placement of online privacy indicators (SE, JYT, LFC, AA), pp. 319–328.
CHI-2009-TsaiKDCHS #feedback #mobile
Who’s viewed you?: the impact of feedback in a mobile location-sharing application (JYT, PGK, PHD, LFC, JIH, NMS), pp. 2003–2012.
CHI-2008-BauerCRRV #case study #flexibility #policy #user study
A user study of policy creation in a flexible access-control system (LB, LFC, RWR, MKR, KV), pp. 543–552.
CHI-2008-EgelmanCH #effectiveness #empirical #web
You’ve been warned: an empirical study of the effectiveness of web browser phishing warnings (SE, LFC, JIH), pp. 1065–1074.
CHI-2008-ReederBCRBHS #authoring #policy #security #visualisation
Expandable grids for visualizing and authoring computer security policies (RWR, LB, LFC, MKR, KB, KH, HS), pp. 1473–1482.
CHI-2007-KumaraguruRACHN #design #email #embedded #evaluation #people
Protecting people from phishing: the design and evaluation of an embedded training email system (PK, YR, AA, LFC, JIH, EN), pp. 905–914.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.