Lorrie Faith Cranor
Orcid: 0000-0003-2125-0124Affiliations:
- Carnegie Mellon University, Pittsburgh, USA
According to our database1,
Lorrie Faith Cranor
authored at least 262 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2014, "For contributions to research and education in usable privacy and security.".
IEEE Fellow
IEEE Fellow 2016, "For contributions to privacy engineering".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on acm.org
-
on twitter.com
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., March, 2024
Commun. ACM, March, 2024
Proc. Priv. Enhancing Technol., 2024
Data Safety vs. App Privacy: Comparing the Usability of Android and iOS Privacy Labels.
Proc. Priv. Enhancing Technol., 2024
Crumbling Cookie Categories: Deconstructing Common Cookie Categories to Create Categories that People Understand.
Proc. Priv. Enhancing Technol., 2024
Exploring the Privacy Experiences of Closeted Users of Online Dating Services in the US.
Proc. Priv. Enhancing Technol., 2024
CoRR, 2024
Recruiting Teenage Participants for an Online Security Experiment: A Case Study Using Peachjar.
CoRR, 2024
CoRR, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
"It was honestly just gambling": Investigating the Experiences of Teenage Cryptocurrency Users on Reddit.
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
Privacy Perceptions and Behaviors of Google Personal Account Holders in Saudi Arabia.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2024
Interdisciplinary Approaches to Cybervulnerability Impact Assessment for Energy Critical Infrastructure.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
Is a Trustmark and QR Code Enough? The Effect of IoT Security and Privacy Label Information Complexity on Consumer Comprehension and Behavior.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
2023
Proc. Priv. Enhancing Technol., October, 2023
Commun. ACM, March, 2023
Is There a Reverse Privacy Paradox? An Exploratory Analysis of Gaps Between Privacy Perspectives and Privacy-Seeking Behaviors.
Proc. Priv. Enhancing Technol., January, 2023
A 20th Anniversary Episode Chat With S&P Editors George Cybenko, Carl Landwehr, Shari Lawrence Pfleeger, and Sean Peisert.
IEEE Secur. Priv., 2023
IEEE Secur. Priv., 2023
User Experiences with Third-Party SIM Cards and ID Registration in Kenya and Tanzania.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Less is Not More: Improving Findability and Actionability of Privacy Controls for Online Behavioral Advertising.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
A US-UK Usability Evaluation of Consent Management Platform Cookie Consent Interface Design on Desktop and Mobile.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
2022
Proc. Priv. Enhancing Technol., 2022
User-friendly yet rarely read: A case study on the redesign of an online HIPAA authorization.
Proc. Priv. Enhancing Technol., 2022
Proc. ACM Hum. Comput. Interact., 2022
An Informative Security and Privacy "Nutrition" Label for Internet of Things Devices.
IEEE Secur. Priv., 2022
IEEE Secur. Priv., 2022
Commun. ACM, 2022
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Detecting iPhone Security Compromise in Simulated Stalking Scenarios: Strategies and Obstacles.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Is it a concern or a preference? An investigation into the ability of privacy scales to capture and distinguish granular privacy constructs.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
Understanding iOS Privacy Nutrition Labels: An Exploratory Large-Scale Analysis of App Store Data.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
2021
A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security Research.
ACM Trans. Comput. Hum. Interact., 2021
"Did you know this camera tracks your mood?": Understanding Privacy Expectations and Preferences in the Age of Video Analytics.
Proc. Priv. Enhancing Technol., 2021
Proc. Priv. Enhancing Technol., 2021
A Discussion of Election Security, Cryptography, and Exceptional Access With Michael Alan Specter.
IEEE Secur. Priv., 2021
IEEE Secur. Priv., 2021
Commun. ACM, 2021
Which Privacy and Security Attributes Most Impact Consumers' Risk Perception and Willingness to Purchase IoT Devices?
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
"You Gotta Watch What You Say": Surveillance of Communication with Incarcerated People.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
Toggles, Dollar Signs, and Triangles: How to (In)Effectively Convey Privacy Choices with Icons and Link Texts.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
2020
Digital contact tracing may protect privacy, but it is unlikely to stop the pandemic.
Commun. ACM, 2020
Finding a Choice in a Haystack: Automatic Extraction of Opt-Out Statements from Privacy Policy Text.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020
HCI Ethics, Privacy, Accessibility, and the Environment: A Town Hall Forum on Global Policy Issues.
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Disposition toward privacy and information disclosure in the context of emerging health technologies.
J. Am. Medical Informatics Assoc., 2019
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
Turtles, Locks, and Bathrooms: Understanding Mental Models of Privacy Through Illustration.
Proc. Priv. Enhancing Technol., 2018
Proc. ACM Hum. Comput. Interact., 2018
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
Proceedings of the Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
"It's not actually that horrible": Exploring Adoption of Two-Factor Authentication at a University.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
2017
ACM Comput. Surv., 2017
Proceedings of the 2017 USENIX Annual Technical Conference, 2017
Proceedings of the 2017 USENIX Annual Technical Conference, 2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
ACM Trans. Inf. Syst. Secur., 2016
Human-Computer Interaction and International Public Policymaking: A Framework for Understanding and Taking Future Actions.
Found. Trends Hum. Comput. Interact., 2016
Proceedings of the 25th USENIX Security Symposium, 2016
How Short Is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
Sharing Personal Content Online: Exploring Channel Choice and Multi-Channel Behaviors.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
I Would Like To..., I Shouldn't..., I Wish I...: Exploring Behavior-Change Goals for Social Networking Sites.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015
A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
Your Location has been Shared 5, 398 Times!: A Field Study on Mobile App Privacy Nudging.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015
2014
IEEE Secur. Priv., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the Ninth Conference on Semantic Technology for Intelligence, 2014
Parents' and Teens' Perspectives on Privacy In a Technology-Filled World.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014
Proceedings of the 2014 IEEE Military Communications Conference, 2014
Building the security behavior observatory: an infrastructure for long-term monitoring of client machines.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
What matters to users?: factors that affect users' willingness to share information with online advertisers.
Proceedings of the Symposium On Usable Privacy and Security, 2013
Your attention please: designing security-decision UIs to make genuine risks harder to ignore.
Proceedings of the Symposium On Usable Privacy and Security, 2013
Proceedings of the Symposium On Usable Privacy and Security, 2013
Is it the Typeset or the Type of Statistics? Disfluent Font does not Reduce Self-disclosure.
Proceedings of the 2013 Workshop on Learning from Authoritative Security Experiment Results, 2013
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs.
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the Computer Supported Cooperative Work, 2013
"i read my Twitter the next morning and was astonished": a conversational perspective on Twitter regrets.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems.
User Model. User Adapt. Interact., 2012
J. Telecommun. High Technol. Law, 2012
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012
How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms.
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the Symposium On Usable Privacy and Security, 2012
Correct horse battery staple: exploring the usability of system-assigned passphrases.
Proceedings of the Symposium On Usable Privacy and Security, 2012
Out of sight, out of mind: Effects of displaying access-control information near the item it controls.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
Why Johnny can't opt out: a usability evaluation of tools to limit online behavioral advertising.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012
Operating system framed in case of mistaken identity: measuring the success of web-based spoofing attacks on OS password-entry dialogs.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites.
ACM Trans. Inf. Syst. Secur., 2011
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs.
Pers. Ubiquitous Comput., 2011
The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study.
Inf. Syst. Res., 2011
IEEE Secur. Priv., 2011
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
Who Is Concerned about What? A Study of American, Chinese and Indian Users' Privacy Concerns on Social Network Sites - (Short Paper).
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
"I regretted the minute I pressed share": a qualitative study of regrets on Facebook.
Proceedings of the Symposium On Usable Privacy and Security, 2011
Proceedings of the Human-Computer Interaction - INTERACT 2011, 2011
Proceedings of the Human-Computer Interaction - INTERACT 2011, 2011
Proceedings of the Sixth International Conference on IT Security Incident Management and IT Forensics, 2011
Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share.
Proceedings of the UbiComp 2011: Ubiquitous Computing, 13th International Conference, 2011
Adapt-a-ride: understanding the dynamics of commuting preferences through an experience design framework.
Proceedings of the Designing Pleasurable Products and Interfaces, 2011
More than skin deep: measuring effects of the underlying model on access-control system usability.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
2010
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010
Token attempt: the misrepresentation of website privacy policies through the misuse of p3p compact policy tokens.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010
Proceedings of the Financial Cryptography and Data Security, 2010
Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
2009
Understanding and capturing people's privacy policies in a mobile social networking application.
Pers. Ubiquitous Comput., 2009
Proceedings of the 18th USENIX Security Symposium, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 2009 eCrime Researchers Summit, 2009
Timing is everything?: the effects of timing and placement of online privacy indicators.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009
2008
Proceedings of the Usability, Psychology, and Security, 2008
Proceedings of the 2008 eCrime Researchers Summit, 2008
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008
You've been warned: an empirical study of the effectiveness of web browser phishing warnings.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008
Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
Proceedings of the 16th International Conference on World Wide Web, 2007
Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications, 2007
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007
Proceedings of the Network and Distributed System Security Symposium, 2007
Getting users to pay attention to anti-phishing education: evaluation of retention and transfer.
Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, 2007
Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, 2007
Protecting people from phishing: the design and evaluation of an embedded training email system.
Proceedings of the 2007 Conference on Human Factors in Computing Systems, 2007
2006
Interactions, 2006
IEEE Secur. Priv., 2006
Proceedings of the 2nd Symposium on Usable Privacy and Security, 2006
Proceedings of the 2nd Symposium on Usable Privacy and Security, 2006
Proceedings of the 2nd Symposium on Usable Privacy and Security, 2006
Proceedings of the 2006 International Conference on Privacy, 2006
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006
Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce, 2006
2005
IEEE Commun. Mag., 2005
Proceedings of the 14th international conference on World Wide Web, 2005
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005
2004
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004
Proceedings of the Designing Personalized User Experiences in eCommerce, 2004
2003
Proceedings of the Secure Electronic Voting, 2003
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003
Analysis of security vulnerabilities in the movie production and distribution process.
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003
Proceedings of the 5th International Conference on Electronic Commerce, 2003
2002
SPECIAL SECTION: Computers, Freedom and Privacy.
Inf. Soc., 2002
Letter from the Special Section Editors, Ten Years of Computers, Freedom and Privacy.
Inf. Soc., 2002
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002
The role of privacy advocates and data protection authorities in the design and deployment of the platform for privacy preferences.
Proceedings of the 12th Annual Conference on Computers, Freedom and Privacy, 2002
O'Reilly, ISBN: 978-0-596-00371-5, 2002
2001
2000
Platform for Privacy Preferences - P3P.
Datenschutz und Datensicherheit, 2000
Agents of Choice: Tools that Facilitate Notice and Choice about Web Site Data Practices
CoRR, 2000
Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System.
Proceedings of the 9th USENIX Security Symposium, 2000
Proceedings of the Tenth Conference on Computers, 2000
1999
Minding Your Own Business: The Platform for Privacy Preferences Project and Privacy Minder.
Proceedings of the FREENIX Track: 1999 USENIX Annual Technical Conference, 1999
Proceedings of the First ACM Conference on Electronic Commerce (EC-99), 1999
Proceedings of the CHI '99 Extended Abstracts on Human Factors in Computing Systems, 1999
1998
Laws, Self-Regulation, and P3P: Will W3C's Privacy Platform Help Make the Web Safe for Privacy?
Comput. Networks, 1998
Proceedings of the Query Languages Workshop, Boston, 1998
1997
Proceedings of the 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 1997
1996
XRDS, 1996
1995
Conference report: conferences offer insifhts into how computers may affect our future.
XRDS, 1995
1994
XRDS, 1994