Lorrie Faith Cranor
Lorrie Faith Cranor
FORE Systems Professor, Carnegie Mellon University
Geverifieerd e-mailadres voor cs.cmu.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Cantina: a content-based approach to detecting phishing web sites
Y Zhang, JI Hong, LF Cranor
Proceedings of the 16th international conference on World Wide Web, 639-648, 2007
8362007
The effect of online privacy information on purchasing behavior: An experimental study
JY Tsai, S Egelman, L Cranor, A Acquisti
Information systems research 22 (2), 254-268, 2011
8162011
The platform for privacy preferences 1.0 (P3P1. 0) specification
World Wide Web Consortium
World Wide Web Consortium, 2002
7542002
The cost of reading privacy policies
AM McDonald, LF Cranor
ISJLP 4, 543-897, 2009
7492009
The platform for privacy preferences 1.0 (P3P1. 0) specification
World Wide Web Consortium
World Wide Web Consortium, 2002
7092002
Privacy in e-commerce: examining user scenarios and privacy preferences
MS Ackerman, LF Cranor, J Reagle
Proceedings of the 1st ACM conference on Electronic commerce, 1-8, 1999
6901999
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
S Egelman, LF Cranor, J Hong
Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in …, 2008
6552008
Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions
S Sheng, M Holbrook, P Kumaraguru, LF Cranor, J Downs
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2010
5682010
Security and usability: Designing secure systems that people can use
LF Cranor, S Garfinkel
O'Reilly Media, Inc., 2005
5612005
Spam!
LF Cranor, BA LaMacchia
Communications of the ACM 41 (8), 74-83, 1998
5301998
" I regretted the minute I pressed share" a qualitative study of regrets on Facebook
Y Wang, G Norcie, S Komanduri, A Acquisti, PG Leon, LF Cranor
Proceedings of the seventh symposium on usable privacy and security, 1-16, 2011
5152011
Beyond concern: Understanding net users’ attitudes about online privacy
LF Cranor, J Reagle, MS Ackerman
The Internet upheaval: raising questions, seeking answers in communications …, 2000
5122000
Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish
S Sheng, B Magnien, P Kumaraguru, A Acquisti, LF Cranor, J Hong, ...
Proceedings of the 3rd symposium on Usable privacy and security, 88-99, 2007
5032007
Crying Wolf: An Empirical Study of SSL Warning Effectiveness.
J Sunshine, S Egelman, H Almuhimedi, N Atri, LF Cranor
USENIX security symposium, 399-416, 2009
5022009
Are your participants gaming the system?: screening mechanical turk workers
JS Downs, MB Holbrook, S Sheng, LF Cranor
Proceedings of the 28th international conference on Human factors in …, 2010
4642010
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ...
2012 IEEE symposium on security and privacy, 523-537, 2012
4442012
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ...
2012 IEEE symposium on security and privacy, 523-537, 2012
4442012
Engineering privacy
S Spiekermann, LF Cranor
IEEE Transactions on software engineering 35 (1), 67-82, 2008
4232008
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the sigchi conference on human factors in computing systems …, 2011
4072011
Decision strategies and susceptibility to phishing
JS Downs, MB Holbrook, LF Cranor
Proceedings of the second symposium on Usable privacy and security, 79-90, 2006
3972006
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20