The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Lorrie Faith Cranor: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lorrie Faith Cranor
    Internet Privacy - Introduction. [Citation Graph (1, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:2, pp:28-31 [Journal]
  2. Joseph Reagle, Lorrie Faith Cranor
    The Platform for Privacy Preferences. [Citation Graph (1, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:2, pp:48-55 [Journal]
  3. Serge Egelman, Lorrie Faith Cranor, Abdur Chowdhury
    An analysis of P3P-enabled web sites among top-20 search results. [Citation Graph (0, 0)][DBLP]
    ICEC, 2006, pp:197-207 [Conf]
  4. Simon Byers, Lorrie Faith Cranor, David P. Kormann
    Automated analysis of P3P-enabled Web sites. [Citation Graph (0, 0)][DBLP]
    ICEC, 2003, pp:326-338 [Conf]
  5. Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge
    Protecting people from phishing: the design and evaluation of an embedded training email system. [Citation Graph (0, 0)][DBLP]
    CHI, 2007, pp:905-914 [Conf]
  6. Simon Byers, Lorrie Faith Cranor, David P. Kormann, Patrick Drew McDaniel, Eric Cronin
    Analysis of security vulnerabilities in the movie production and distribution process. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:1-12 [Conf]
  7. Lorrie Faith Cranor, Ron Cytron
    Sensus: A Security-Conscious Electronic Polling System for the Internet. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1997, pp:561-570 [Conf]
  8. Simon Byers, Lorrie Faith Cranor, David P. Kormann, Patrick Drew McDaniel
    Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2004, pp:314-328 [Conf]
  9. Ponnurangam Kumaraguru, Lorrie Faith Cranor
    Privacy in India: Attitudes and Awareness. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:243-258 [Conf]
  10. Mark S. Ackerman, Lorrie Faith Cranor, Joseph Reagle
    Privacy in e-commerce: examining user scenarios and privacy preferences. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 1999, pp:1-8 [Conf]
  11. Lorrie Faith Cranor
    Hey, That's Personal! [Citation Graph (0, 0)][DBLP]
    User Modeling, 2005, pp:4- [Conf]
  12. Lorrie Faith Cranor
    Minding Your Own Business: The Platform for Privacy Preferences Project and Privacy Minder. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, FREENIX Track, 1999, pp:103-108 [Conf]
  13. Lorrie Faith Cranor
    Requirements for a P3P Query Language. [Citation Graph (0, 0)][DBLP]
    QL, 1998, pp:- [Conf]
  14. Lorrie Faith Cranor
    'I didn't buy it for myself' privacy and ecommerce personalization. [Citation Graph (0, 0)][DBLP]
    WPES, 2003, pp:111-117 [Conf]
  15. Lorrie Faith Cranor, Manjula Arjula, Praveen Guduru
    Use of a P3P user agent by early adopters. [Citation Graph (0, 0)][DBLP]
    WPES, 2002, pp:1-10 [Conf]
  16. Braden Kowitz, Lorrie Faith Cranor
    Peripheral privacy notifications for wireless networks. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:90-96 [Conf]
  17. Lorrie Faith Cranor
    Towards usable Web privacy and security. [Citation Graph (0, 0)][DBLP]
    WWW, 2005, pp:352- [Conf]
  18. Lorrie Faith Cranor, Brian A. LaMacchia
    Spam! [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1998, v:41, n:8, pp:74-83 [Journal]
  19. Lance J. Hoffman, Lorrie Faith Cranor
    Internet voting for public officials: introduction. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:1, pp:69-71 [Journal]
  20. Lorrie Faith Cranor
    Laws, Self-Regulation, and P3P: Will W3C's Privacy Platform Help Make the Web Safe for Privacy? [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1998, v:30, n:1-7, pp:751-753 [Journal]
  21. Lorrie Faith Cranor
    Agents of Choice: Tools that Facilitate Notice and Choice about Web Site Data Practices [Citation Graph (0, 0)][DBLP]
    CoRR, 2000, v:0, n:, pp:- [Journal]
  22. Lorrie Faith Cranor, Rebecca N. Wright
    Influencing Software Usage [Citation Graph (0, 0)][DBLP]
    CoRR, 1998, v:0, n:, pp:- [Journal]
  23. Lorrie Faith Cranor, Joseph Reagle, Mark S. Ackerman
    Beyond Concern: Understanding Net Users' Attitudes About Online Privacy [Citation Graph (0, 0)][DBLP]
    CoRR, 1999, v:0, n:, pp:- [Journal]
  24. Lorrie Faith Cranor
    Platform for Privacy Preferences - P3P. [Citation Graph (0, 0)][DBLP]
    Datenschutz und Datensicherheit, 2000, v:24, n:8, pp:- [Journal]
  25. Lorrie Faith Cranor
    P3P: Making Privacy Policies More Useful. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:50-55 [Journal]
  26. Lorrie Faith Cranor, Simson L. Garfinkel
    Guest Editors' Introduction: Secure or Usable? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:16-18 [Journal]
  27. Lorrie Faith Cranor
    What do they "indicate?": evaluating security and privacy indicators. [Citation Graph (0, 0)][DBLP]
    Interactions, 2006, v:13, n:3, pp:45-47 [Journal]
  28. Lorrie Faith Cranor
    Letter from the Special Section Editors, Ten Years of Computers, Freedom and Privacy. [Citation Graph (0, 0)][DBLP]
    Inf. Soc., 2002, v:18, n:3, pp:- [Journal]
  29. Lorrie Faith Cranor
    SPECIAL SECTION: Computers, Freedom and Privacy. [Citation Graph (0, 0)][DBLP]
    Inf. Soc., 2002, v:18, n:3, pp:- [Journal]
  30. Lorrie Faith Cranor, Praveen Guduru, Manjula Arjula
    User interfaces for privacy agents. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput.-Hum. Interact., 2006, v:13, n:2, pp:135-178 [Journal]
  31. Marc Waldman, Aviel D. Rubin, Lorrie Faith Cranor
    The architecture of robust publishing systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Internet Techn., 2001, v:1, n:2, pp:199-230 [Journal]
  32. Yue Zhang, Jason I. Hong, Lorrie Faith Cranor
    Cantina: a content-based approach to detecting phishing web sites. [Citation Graph (0, 0)][DBLP]
    WWW, 2007, pp:639-648 [Conf]

  33. A Survey to Guide Group Key Protocol Development. [Citation Graph (, )][DBLP]


  34. User-controllable learning of security and privacy policies. [Citation Graph (, )][DBLP]


  35. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. [Citation Graph (, )][DBLP]


  36. A user study of policy creation in a flexible access-control system. [Citation Graph (, )][DBLP]


  37. Expandable grids for visualizing and authoring computer security policies. [Citation Graph (, )][DBLP]


  38. Timing is everything?: the effects of timing and placement of online privacy indicators. [Citation Graph (, )][DBLP]


  39. Who's viewed you?: the impact of feedback in a mobile location-sharing application. [Citation Graph (, )][DBLP]


  40. Real life challenges in access-control management. [Citation Graph (, )][DBLP]


  41. Are your participants gaming the system?: screening mechanical turk workers. [Citation Graph (, )][DBLP]


  42. Access control for home data sharing: evaluating social acceptability. [Citation Graph (, )][DBLP]


  43. Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions. [Citation Graph (, )][DBLP]


  44. Standardizing privacy notices: an online study of the nutrition label approach. [Citation Graph (, )][DBLP]


  45. Vicarious infringement creates a privacy ceiling. [Citation Graph (, )][DBLP]


  46. Perspective: Semantic Data Management for the Home. [Citation Graph (, )][DBLP]


  47. Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory. [Citation Graph (, )][DBLP]


  48. Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects. [Citation Graph (, )][DBLP]


  49. Phinding Phish: An Evaluation of Anti-Phishing Toolbars. [Citation Graph (, )][DBLP]


  50. A Framework for Reasoning About the Human in the Loop. [Citation Graph (, )][DBLP]


  51. A Comparative Study of Online Privacy Policies and Formats. [Citation Graph (, )][DBLP]


  52. Trust modelling for online transactions: a phishing scenario. [Citation Graph (, )][DBLP]


  53. A user study of the expandable grid applied to P3P privacy policy visualization. [Citation Graph (, )][DBLP]


  54. Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. [Citation Graph (, )][DBLP]


  55. Behavioral response to phishing risk. [Citation Graph (, )][DBLP]


  56. Lessons learned from the deployment of a smartphone-based access-control system. [Citation Graph (, )][DBLP]


  57. Power strips, prophylactics, and privacy, oh my! [Citation Graph (, )][DBLP]


  58. Decision strategies and susceptibility to phishing. [Citation Graph (, )][DBLP]


  59. Human selection of mnemonic phrase-based passwords. [Citation Graph (, )][DBLP]


  60. A comparative study of online privacy policies and formats. [Citation Graph (, )][DBLP]


  61. Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. [Citation Graph (, )][DBLP]


  62. The impact of privacy indicators on search engine browsing patterns. [Citation Graph (, )][DBLP]


  63. Who's viewed you?: the impact of feedback in a mobile location-sharing application. [Citation Graph (, )][DBLP]


  64. The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing. [Citation Graph (, )][DBLP]


  65. School of phish: a real-word evaluation of anti-phishing training. [Citation Graph (, )][DBLP]


  66. A "nutrition label" for privacy. [Citation Graph (, )][DBLP]


  67. A user study of the expandable grid applied to P3P privacy policy visualization. [Citation Graph (, )][DBLP]


  68. Analyzing use of privacy policy attributes in a location sharing application. [Citation Graph (, )][DBLP]


  69. Encountering stronger password requirements: user attitudes and behaviors. [Citation Graph (, )][DBLP]


  70. Institutional review boards and your research. [Citation Graph (, )][DBLP]


  71. P3P deployment on websites. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002