Publications
Co-authors
Productive Colleagues
Publications
Cranor, Lorrie Faith (2006): What do they \"indicate?\": evaluating security and privacy indicators. In Interactions, 13 (3) pp. 45-47.
Cranor, Lorrie Faith, Guduru, Praveen, Arjula, Manjula (2006): User interfaces for privacy agents. In ACM Transactions on Computer-Human Interaction, 13 (2) pp. 135-178. https://dl.acm.org/doi/10.1145/1165734.1165735
Cranor, Lorrie Faith (2002): Letter from the Special Section Editors, Ten Years of Computers, Freedom and Privacy. In The Information Society, 18 (3) pp. . https://www.indiana.edu/~tisj/readers/full-text/18-3%20Cranor.pdf
Cranor, Lorrie Faith (2002): SPECIAL SECTION: Computers, Freedom and Privacy. In The Information Society, 18 (3) pp. .
Hoffman, Lance J., Cranor, Lorrie Faith (2001): Internet voting for public officials: introduction. In Communications of the ACM, 44 (1) pp. 69-71. https://dl.acm.org/doi/10.1145/357489.357510
Waldman, Marc, Rubin, Aviel D., Cranor, Lorrie Faith (2001): The architecture of robust publishing systems. In ACM Trans. Internet Techn., 1 (2) pp. 199-230. https://dl.acm.org/doi/10.1145/502152.502154
Cranor, Lorrie Faith (1999): Internet Privacy - Introduction. In Communications of the ACM, 42 (2) pp. 28-31. https://dl.acm.org/doi/10.1145/293411.293440
Reagle, Joseph, Cranor, Lorrie Faith (1999): The Platform for Privacy Preferences. In Communications of the ACM, 42 (2) pp. 48-55. https://dl.acm.org/doi/10.1145/293411.293455
Cranor, Lorrie Faith, LaMacchia, Brian A. (1998): Spam!. In Communications of the ACM, 41 (8) pp. 74-83.
Kumaraguru, Ponnurangam, Rhee, Yong, Acquisti, Alessandro, Cranor, Lorrie Faith, Hong, Jason, Nunge, Elizabeth (2007): Protecting people from phishing: the design and evaluation of an embedded training email s. In: Proceedings of ACM CHI 2007 Conference on Human Factors in Computing Systems , 2007, . pp. 905-914. https://doi.acm.org/10.1145/1240624.1240760
Downs, Julie S., Holbrook, Mandy, Cranor, Lorrie Faith (2007): Behavioral response to phishing risk. In: Proceedings of the 2007 Anti-Phishing Working Groups eCrime Researchers Summit , 2007, . pp. 37-44. https://doi.acm.org/10.1145/1299015.1299019
Kumaraguru, Ponnurangam, Rhee, Yong, Sheng, Steve, Hasan, Sharique, Acquisti, Alessandro, Cranor, Lorrie Faith, Hong, Jason (2007): Getting users to pay attention to anti-phishing education: evaluation of retention and tra. In: Proceedings of the 2007 Anti-Phishing Working Groups eCrime Researchers Summit , 2007, . pp. 70-81. https://doi.acm.org/10.1145/1299015.1299022
Bauer, Lujo, Cranor, Lorrie Faith, Reeder, Robert W., Reiter, Michael K., Vaniea, Kami (2008): A user study of policy creation in a flexible access-control system. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 543-552. https://doi.acm.org/10.1145/1357054.1357143
Egelman, Serge, Cranor, Lorrie Faith, Hong, Jason (2008): You\'ve been warned: an empirical study of the effectiveness of web browser phishing warni. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 1065-1074. https://doi.acm.org/10.1145/1357054.1357219
Reeder, Robert W., Bauer, Lujo, Cranor, Lorrie Faith, Reiter, Michael K., Bacon, Kelli, How, Keisha, Strong, Heather (2008): Expandable grids for visualizing and authoring computer security policies. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 1473-1482. https://doi.acm.org/10.1145/1357054.1357285
Kuo, Cynthia, Romanosky, Sasha, Cranor, Lorrie Faith (2006): Human selection of mnemonic phrase-based passwords. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 67-78. https://cups.cs.cmu.edu/soups/2006/slides/kuo.zip Slides
Downs, Julie S., Holbrook, Mandy B., Cranor, Lorrie Faith (2006): Decision strategies and susceptibility to phishing. In: Proceedings of the 2006 Symposium on Usable Privacy and Security , 2006, . pp. 79-90. https://cups.cs.cmu.edu/soups/2006/proceedings/p79_downs.pdf
Bauer, Lujo, Cranor, Lorrie Faith, Reiter, Michael K., Vaniea, Kami (2007): Lessons learned from the deployment of a smartphone-based access-control system. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 64-75. https://cups.cs.cmu.edu/soups/2007/proceedings/p64_bauer.pdf
Sheng, Steve, Magnien, Bryant, Kumaraguru, Ponnurangam, Acquisti, Alessandro, Cranor, Lorrie Faith, Hong, Jason, Nunge, Elizabeth (2007): Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall fo. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 88-99. https://cups.cs.cmu.edu/soups/2007/proceedings/p88_sheng.pdf
Egelman, Serge, Tsai, Janice, Cranor, Lorrie Faith, Acquisti, Alessandro (2009): Timing is everything?: the effects of timing and placement of online privacy indicators. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 319-328. https://doi.acm.org/10.1145/1518701.1518752
Bauer, Lujo, Cranor, Lorrie Faith, Reeder, Robert W., Reiter, Michael K., Vaniea, Kami (2009): Real life challenges in access-control management. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 899-908. https://doi.acm.org/10.1145/1518701.1518838
Tsai, Janice Y., Kelley, Patrick, Drielsma, Paul, Cranor, Lorrie Faith, Hong, Jason, Sadeh, Norman (2009): Who\'s viewed you?: the impact of feedback in a mobile location-sharing application. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 2003-2012. https://doi.acm.org/10.1145/1518701.1519005
Sadeh, Norman M., Dively, Mary Jo, Kauffman, Robert J., Labrou, Yannis, Shehory, Onn, Telang, Rahul, Cranor, Lorrie Faith (eds.) Proceedings of the 5th International Conference on Electronic Commerce - ICEC 2003 September 30 - October 03, 2003, Pittsburgh, Pennsylvania, USA.
Egelman, Serge, Cranor, Lorrie Faith, Chowdhury, Abdur (2006): An analysis of P3P-enabled web sites among top-20 search results. In: Fox, Mark S., Spencer, Bruce (eds.) Proceedings of the 8th International Conference on Electronic Commerce - ICEC 2006 , 2006, Fredericton, New Brunswick, Canada. pp. 197-207. https://doi.acm.org/10.1145/1151454.1151492
Byers, Simon, Cranor, Lorrie Faith, Kormann, David P. (2003): Automated analysis of P3P-enabled Web sites. In: Sadeh, Norman M., Dively, Mary Jo, Kauffman, Robert J., Labrou, Yannis, Shehory, Onn, Telang, Rahul, Cranor, Lorrie Faith (eds.) Proceedings of the 5th International Conference on Electronic Commerce - ICEC 2003 September 30 - October 03, 2003, Pittsburgh, Pennsylvania, USA. pp. 326-338. https://doi.acm.org/10.1145/948005.948048
Cranor, Lorrie Faith (2005): Hey, That\'s Personal!. In: Ardissono, Liliana, Brna, Paul, Mitrovic, Antonija (eds.) User Modeling 2005 - 10th International Conference - UM 2005 July 24-29, 2005, Edinburgh, Scotland, UK. pp. 4. https://dx.doi.org/10.1007/11527886_2
Cranor, Lorrie Faith, Cytron, Ron (1997): Sensus: A Security-Conscious Electronic Polling System for the Internet. In: HICSS 1997 , 1997, . pp. 561-570. https://csdl.computer.org/comp/proceedings/hicss/1997/7734/03/7734030561abs.htm
Cranor, Lorrie Faith (2005): Towards usable Web privacy and security. In: Proceedings of the 2005 International Conference on the World Wide Web , 2005, . pp. 352. https://doi.acm.org/10.1145/1060745.1060749
Kelley, Patrick Gage, Bresee, Joanna, Cranor, Lorrie Faith, Reeder, Robert W. (2009): A \"nutrition label\" for privacy. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 4. https://doi.acm.org/10.1145/1572532.1572538
Benisch, Michael, Kelley, Patrick Gage, Sadeh, Norman, Sandholm, Tuomas, Tsai, Janice, Cranor, Lorrie Faith, Drielsma, Paul Hankes (2009): The impact of expressiveness on the effectiveness of privacy mechanisms for location-shari. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 22. https://doi.acm.org/10.1145/1572532.1572561
Reeder, Robert W., Kelley, Patrick Gage, McDonald, Aleecia M., Cranor, Lorrie Faith (2009): A user study of the expandable grid applied to P3P privacy policy visualization. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 42. https://doi.acm.org/10.1145/1572532.1572582
McDonald, Aleecia M., Reeder, Robert W., Kelley, Patrick Gage, Cranor, Lorrie Faith (2009): A comparative study of online privacy policies and formats. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 46. https://doi.acm.org/10.1145/1572532.1572586
Shay, Richard, Komanduri, Saranga, Kelley, Patrick Gage, Leon, Pedro Giovanni, Mazurek, Michelle L., Bauer, Lujo, Christin, Nicolas, Cranor, Lorrie Faith (2010): Encountering stronger password requirements: user attitudes and behaviors. In: Proceedings of the 2010 Symposium on Usable Privacy and Security , 2010, . pp. 2. https://doi.acm.org/10.1145/1837110.1837113
Sheng, Steve, Holbrook, Mandy, Kumaraguru, Ponnurangam, Cranor, Lorrie Faith, Downs, Julie (2010): Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness . In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 373-382. https://doi.acm.org/10.1145/1753326.1753383
Mazurek, Michelle L., Arsenault, J. P., Bresee, Joanna, Gupta, Nitin, Ion, Iulia, Johns, Christina, Lee, Daniel, Liang, Yuan, Olsen, Jenny, Salmon, Brandon, Shay, Richard, Vaniea, Kami, Bauer, Lujo, Cranor, Lorrie Faith, Ganger, Gregory R., Reiter, Michael K. (2010): Access control for home data sharing: evaluating social acceptability. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 645-654. https://doi.acm.org/10.1145/1753326.1753421
Kelley, Patrick Gage, Cesca, Lucian, Bresee, Joanna, Cranor, Lorrie Faith (2010): Standardizing privacy notices: an online study of the nutrition label approach. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 1573-1582. https://doi.acm.org/10.1145/1753326.1753561
Downs, Julie S., Holbrook, Mandy B., Sheng, Steve, Cranor, Lorrie Faith (2010): Are your participants gaming the system?: screening mechanical turk workers. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 2399-2402. https://doi.acm.org/10.1145/1753326.1753688
Mazurek, Michelle L., Klemperer, Peter F., Shay, Richard, Takabi, Hassan, Bauer, Lujo, Cranor, Lorrie Faith (2011): Exploring reactive access control. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2085-2094. https://dx.doi.org/10.1145/1978942.1979245
Kelley, Patrick Gage, Benisch, Michael, Cranor, Lorrie Faith, Sadeh, Norman (2011): When are users comfortable sharing locations with advertisers?. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2449-2452. https://dx.doi.org/10.1145/1978942.1979299
Komanduri, Saranga, Shay, Richard, Kelley, Patrick Gage, Mazurek, Michelle L., Bauer, Lujo, Christin, Nicolas, Cranor, Lorrie Faith, Egelman, Serge (2011): Of passwords and people: measuring the effect of password-composition policies. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2595-2604. https://dx.doi.org/10.1145/1978942.1979321
Wang, Yang, Norcie, Gregory, Komanduri, Saranga, Acquisti, Alessandro, Leon, Pedro Giovanni, Cranor, Lorrie Faith (2011): "I regretted the minute I pressed share": a qualitative study of regrets on Facebook. In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 10. https://dx.doi.org/10.1145/2078827.2078841
Wiese, Jason, Kelley, Patrick Gage, Cranor, Lorrie Faith, Dabbish, Laura, Hong, Jason I., Zimmerman, John (2011): Are you close with me? are you nearby?: investigating social groups, closeness, and willin. In: Proceedings of the 2011 International Conference on Uniquitous Computing , 2011, . pp. 197-206. https://dx.doi.org/10.1145/2030112.2030140
Ur, Blase, Leon, Pedro Giovanni, Cranor, Lorrie Faith, Shay, Richard, Wang, Yang (2012): Smart, useful, scary, creepy: perceptions of online behavioral advertising. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 4. https://dx.doi.org/10.1145/2335356.2335362
Shay, Richard, Kelley, Patrick Gage, Komanduri, Saranga, Mazurek, Michelle L., Ur, Blase, Vidas, Timothy, Bauer, Lujo, Christin, Nicolas, Cranor, Lorrie Faith (2012): Correct horse battery staple: exploring the usability of system-assigned passphrases. In: Proceedings of the 2012 Symposium on Usable Privacy and Security , 2012, . pp. 7. https://dx.doi.org/10.1145/2335356.2335366