Author: Robert W. Reeder

Publications

Publication period start: 2011
Number of co-authors: 27

Co-authors

Number of publications with favourite co-authors
Lujo Bauer
4
Michael K. Reiter
4
Lorrie Faith Cranor
6

Productive Colleagues

Most productive colleagues in number of publications
Peter Pirolli
46
John Karat
47
Stuart K. Card
73

Publications

Maxion, Roy A., Reeder, Robert W. (2005): Improving user-interface dependability through mitigation of human error. In International Journal of Human-Computer Studies, 63 (1) pp. 25-50. https://dx.doi.org/10.1016/j.ijhcs.2005.04.009

Card, Stuart K., Pirolli, Peter, Wege, Mija M. Van Der, Morrison, Julie B., Reeder, Robert W., Schraedley, Pamela, Boshart, Jenea (2001): Information Scent as a Driver of Web Behavior Graphs: Results of a Protocol Analysis Metho. In: Beaudouin-Lafon, Michel, Jacob, Robert J. K. (eds.) Proceedings of the ACM CHI 2001 Human Factors in Computing Systems Conference March 31 - April 5, 2001, Seattle, Washington, USA. pp. 498-505. https://www.acm.org/pubs/articles/proceedings/chi/365024/p498-card/p498-card.pdf

Bauer, Lujo, Cranor, Lorrie Faith, Reeder, Robert W., Reiter, Michael K., Vaniea, Kami (2008): A user study of policy creation in a flexible access-control system. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 543-552. https://doi.acm.org/10.1145/1357054.1357143

Reeder, Robert W., Bauer, Lujo, Cranor, Lorrie Faith, Reiter, Michael K., Bacon, Kelli, How, Keisha, Strong, Heather (2008): Expandable grids for visualizing and authoring computer security policies. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 1473-1482. https://doi.acm.org/10.1145/1357054.1357285

Bauer, Lujo, Cranor, Lorrie Faith, Reeder, Robert W., Reiter, Michael K., Vaniea, Kami (2009): Real life challenges in access-control management. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 899-908. https://doi.acm.org/10.1145/1518701.1518838

Schechter, Stuart, Egelman, Serge, Reeder, Robert W. (2009): It\'s not what you know, but who you know: a social approach to last-resort authentication. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 1983-1992. https://doi.acm.org/10.1145/1518701.1519003

Reeder, Robert W., Karat, Clare-Marie, Karat, John, Brodie, Carolyn (2007): Usability Challenges in Security and Privacy Policy-Authoring Interfaces. In: Baranauskas, Maria Cecília Calani, Palanque, Philippe A., Abascal, Julio, Barbosa, Simone Diniz Junqueira (eds.) DEGAS 2007 - Proceedings of the 1st International Workshop on Design and Evaluation of e-Government Applications and Services September 11th, 2007, Rio de Janeiro, Brazil. pp. 141-155. https://dx.doi.org/10.1007/978-3-540-74800-7_11

Kelley, Patrick Gage, Bresee, Joanna, Cranor, Lorrie Faith, Reeder, Robert W. (2009): A \"nutrition label\" for privacy. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 4. https://doi.acm.org/10.1145/1572532.1572538

Schechter, Stuart, Reeder, Robert W. (2009): 1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentic. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 9. https://doi.acm.org/10.1145/1572532.1572544

Schechter, Stuart, Egelman, Serge, Reeder, Robert W. (2009): It\'s not what you know, but who you know: a social approach to last-resort authentication. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 41. https://doi.acm.org/10.1145/1572532.1572581

Reeder, Robert W., Kelley, Patrick Gage, McDonald, Aleecia M., Cranor, Lorrie Faith (2009): A user study of the expandable grid applied to P3P privacy policy visualization. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 42. https://doi.acm.org/10.1145/1572532.1572582

McDonald, Aleecia M., Reeder, Robert W., Kelley, Patrick Gage, Cranor, Lorrie Faith (2009): A comparative study of online privacy policies and formats. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 46. https://doi.acm.org/10.1145/1572532.1572586

Lipford, Heather Richter, Watson, Jason, Whitney, Michael, Froiland, Katherine, Reeder, Robert W. (2010): Visual vs. compact: a comparison of privacy policy interfaces. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 1111-1114. https://doi.acm.org/10.1145/1753326.1753492

Reeder, Robert W., Bauer, Lujo, Cranor, Lorrie F., Reiter, Michael K., Vaniea, Kami (2011): More than skin deep: measuring effects of the underlying model on access-control system us. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2065-2074. https://dx.doi.org/10.1145/1978942.1979243

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
314,765 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
314,765 designers enjoy our newsletter—sure you don’t want to receive it?