Search filters

List of works by Lorrie Cranor

"I regretted the minute I pressed share"

article published in 2011

"Little brothers watching you"

"i read my Twitter the next morning and was astonished"

scholarly article published 2013

A "nutrition label" for privacy

article

A Comparative Study of Online Privacy Policies and Formats

article

A Conundrum of Permissions: Installing Applications on an Android Smartphone

A Framework for Reasoning About the Human in the Loop

conference paper published in 2008

A Shortage of Privacy Engineers

A Survey to Guide Group Key Protocol Development

A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research

scientific article published in 2021

A field trial of privacy nudges for facebook

scholarly article published 2014

A user study of policy creation in a flexible access-control system

article published in 2008

A user study of the expandable grid applied to P3P privacy policy visualization

A user study of the expandable grid applied to P3P privacy policy visualization

scholarly article published 2008

Access control for home data sharing

Adapt-a-ride

Americans' attitudes about internet behavioral advertising practices

An Investigation into Facebook Friend Grouping

scholarly article by Patrick Gage Kelley et al published 2011 in Lecture Notes in Computer Science

An analysis of P3P-enabled web sites among top-20 search results

An analysis of security vulnerabilities in the movie production and distribution process

article

Analysis of security vulnerabilities in the movie production and distribution process

Analysis of security vulnerabilities in the movie production and distribution process

article

Analyzing use of privacy policy attributes in a location sharing application

Anti-Phishing Phil

article published in 2007

Are you close with me? are you nearby?

Are your participants gaming the system?

Automated analysis of P3P-enabled Web sites

Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing

journal article

Behavioral response to phishing risk

article

Better Together: Usability and Security Go Hand in Hand

article by Lorrie Cranor & Norbou Buchler published November 2014 in IEEE Security & Privacy

Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption

Bridging the Gap in Computer Security Warnings: A Mental Model Approach

article

CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites

Can Users Control Online Behavioral Advertising Effectively?

Can long passwords be secure and usable?

Can phishing be foiled?

scientific article published on 01 December 2008

Cantina

Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs

Correct horse battery staple

Decision strategies and susceptibility to phishing

Designing Password Policies for Strength and Usability

scientific article published in 2016

Disagreeable Privacy Policies: Mismatches between Meaning and Userss Understanding

scholarly article published in 2014

Disposition toward privacy and information disclosure in the context of emerging health technologies

scientific article published on 01 July 2019

Electronic privacy and surveillance

article published in 2014

Empirical models of privacy in location sharing

Encountering stronger password requirements

Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects

Expandable grids for visualizing and authoring computer security policies

article

Exploring reactive access control

Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks

scientific article published on 2016

General Requirements of a Hybrid-Modeling Framework for Cyber Security

scientific article

Getting users to pay attention to anti-phishing education

article published in 2007

Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms

How Do Home Computer Users Browse the Web?

scientific article published on 28 September 2021

Human selection of mnemonic phrase-based passwords

I Didn’t buy It for Myself

I Would Like To..., I Shouldn't..., I Wish I..

I know where you live

scholarly article published 2011

Improving App Privacy: Nudging App Developers to Protect User Privacy

article

Improving Computer Security Dialogs

Improving phishing countermeasures: An analysis of expert interviews

In Search of the Perfect Voting Technology: No Easy Answers

scholarly article published 2003

Influencing software usage

Institutional review boards and your research

Interdisciplinary Approaches to Cybervulnerability Impact Assessment for Energy Critical Infrastructure

scientific article published on 11 May 2024

Internet privacy

Internet voting for public officials: introduction

Is There a Reverse Privacy Paradox? An Exploratory Analysis of Gaps Between Privacy Perspectives and Privacy-Seeking Behaviors

scientific article published in 2023

Is Your Inseam a Biometric? A Case Study on the Role of Usability Studies in Developing Public Policy

Is a Trustmark and QR Code Enough? The Effect of IoT Security and Privacy Label Information Complexity on Consumer Comprehension and Behavior

scientific article published on 11 May 2024

Laws, self-relf-regulation, and P3P: will W3C's privacy platform help make the Web safe for privacy?

Lessons from a real world evaluation of anti-phishing training

Lessons learned from the deployment of a smartphone-based access-control system

Letter from the Special Section Editor

Locaccino

Lorrie Faith Cranor: What’s wrong with your pa$$w0rd?

TEDxCMU

Measuring password guessability for an entire university

article

More than skin deep

scientific article

Of passwords and people

Operating system framed in case of mistaken identity

Out of sight, out of mind: Effects of displaying access-control information near the item it controls

scholarly article published July 2012

P3P deployment on websites

scientific article published in September 2008

Peripheral privacy notifications for wireless networks

Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems

Physical Security

Power strips, prophylactics, and privacy, oh my!

Privacy Engineering Emerges as a Hot New Career

Privacy as part of the app decision-making process

article published in 2013

Privacy critics

Privacy critics

article published in 1999

Privacy in India: Attitudes and Awareness

article by Ponnurangam Kumaraguru & Lorrie Cranor published 2006 in Lecture Notes in Computer Science

Privacy in e-commerce

Privacy manipulation and acclimation in a location sharing application

Privacy patterns for online interactions

Protecting people from phishing

Putting it together: Internet privacy: a public concern

QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks

Real life challenges in access-control management

Research posters 101

scientific article

School of phish

scholarly article published 2009

Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine

Smart, useful, scary, creepy

Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords

Spam!

scientific article published in August 1998

Standardizing privacy notices

Studying access-control usability in the lab

Tag, you can see it!

Teaching Johnny not to fall for phish

The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study

The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs

The Privacy and Security Behaviors of Smartphone App Developers

article

The architecture of robust publishing systems

The impact of privacy indicators on search engine browsing patterns

The post anachronism

The post that wasn't

The role of privacy advocates and data protection authorities in the design and deployment of the platform for privacy preferences

The role of privacy advocates and data protection authorities in the design and deployment of the platform for privacy preferences

Timing is everything?

Token attempt

article

Turtles, Locks, and Bathrooms: Understanding Mental Models of Privacy Through Illustration

scientific article published in 2018

Understanding and capturing people’s privacy policies in a mobile social networking application

Usability of Forensics Tools: A User Study

Use of a P3P user agent by early adopters

User interfaces for privacy agents

User-Controllable Security and Privacy for Pervasive Computing

User-controllable learning of security and privacy policies

Vicarious infringement creates a privacy ceiling

Voting after Florida

What do online behavioral advertising privacy disclosures communicate to users?

article published in 2012

What do they "indicate?"

What matters to users?

When are users comfortable sharing locations with advertisers?

Who Is Concerned about What? A Study of American, Chinese and Indian Users’ Privacy Concerns on Social Network Sites

article

Who falls for phish?

Who's viewed you?

Who's viewed you?

Why Johnny can't opt out

You've been warned

Your Location has been Shared 5,398 Times!

Your attention please

article

{Privacy, privacidad, Приватност} policies in social media

scholarly article published 2012