Search

Your search keyword '"Cranor, Lorrie"' showing total 600 results

Search Constraints

Start Over You searched for: Author "Cranor, Lorrie" Remove constraint Author: "Cranor, Lorrie"
600 results on '"Cranor, Lorrie"'

Search Results

1. Conference Submission and Review Policies to Foster Responsible Computing Research

2. Detection and Impact of Debit/Credit Card Fraud: Victims' Experiences

3. Recruiting Teenage Participants for an Online Security Experiment: A Case Study Using Peachjar

4. Work-From-Home and Privacy: What Do Workers Face and What are They Doing About it?

5. What Do Privacy Advertisements Communicate to Consumers?

6. Matcha: An IDE Plugin for Creating Accurate Privacy Nutrition Labels

7. Data Safety vs. App Privacy: Comparing the Usability of Android and iOS Privacy Labels

8. User Experiences with Third-Party SIM Cards and ID Registration in Kenya and Tanzania

9. The Role of User-Agent Interactions on Mobile Money Practices in Kenya and Tanzania

10. Privacy Perceptions and Behaviors of Google Personal Account Holders in Saudi Arabia

11. Privacy Perceptions and Behaviors of Google Personal Account Holders in Saudi Arabia

14. Ask the Experts: What Should Be on an IoT Privacy and Security Label?

15. Disposition toward privacy and information disclosure in the context of emerging health technologies

16. Internet of Things Security and Privacy Labels Should Empower Consumers.

19. Matcha

20. Towards a Privacy Research Roadmap for the Computing Community

21. Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords

24. Agents of Choice: Tools that Facilitate Notice and Choice about Web Site Data Practices

25. Beyond Concern: Understanding Net Users' Attitudes About Online Privacy

26. Influencing Software Usage

27. Metrics for Success: Why and How to Evaluate Privacy Choice Usability: Assessing the usability of choice and consent mechanisms.

31. Privacy: Is a Privacy Crisis Experienced, a Privacy Crisis Avoided? Exploring immersive theatre as a way to educate audiences and study their perceptions of privacy and technology ethics.

37. The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs

38. QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks

39. Mobile-App Privacy Nutrition Labels Missing Key Ingredients for Success: Android and iOS privacy labels confuse developers and end users.

40. A Conundrum of Permissions: Installing Applications on an Android Smartphone

41. Improving Computer Security Dialogs

42. An Investigation into Facebook Friend Grouping

43. Who Is Concerned about What? A Study of American, Chinese and Indian Users’ Privacy Concerns on Social Network Sites : (Short Paper)

45. A Comparative Study of Online Privacy Policies and Formats

46. Privacy: Cookie Monster.

47. Privacy in India: Attitudes and Awareness

48. Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine

49. Privacy: Informing California Privacy Regulations with Evidence from Research.

Catalog

Books, media, physical & digital resources