Follow
Lorrie Faith Cranor
Lorrie Faith Cranor
FORE Systems Professor, Carnegie Mellon University
Verified email at cs.cmu.edu - Homepage
Title
Cited by
Cited by
Year
The cost of reading privacy policies
AM McDonald, LF Cranor
ISJLP 4, 543-897, 2009
10442009
The effect of online privacy information on purchasing behavior: An experimental study
JY Tsai, S Egelman, L Cranor, A Acquisti
Information systems research 22 (2), 254-268, 2011
10392011
Cantina: a content-based approach to detecting phishing web sites
Y Zhang, JI Hong, LF Cranor
Proceedings of the 16th international conference on World Wide Web, 639-648, 2007
10382007
The platform for privacy preferences 1.0 (P3P1. 0) specification
World Wide Web Consortium
World Wide Web Consortium, 2002
8132002
Privacy in e-commerce: examining user scenarios and privacy preferences
MS Ackerman, LF Cranor, J Reagle
Proceedings of the 1st ACM Conference on Electronic Commerce, 1-8, 1999
7741999
The platform for privacy preferences 1.0 (P3P1. 0) specification
World Wide Web Consortium
World Wide Web Consortium, 2002
7602002
Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions
S Sheng, M Holbrook, P Kumaraguru, LF Cranor, J Downs
Proceedings of the SIGCHI conference on human factors in computing systems …, 2010
7522010
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
S Egelman, LF Cranor, J Hong
Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in …, 2008
7482008
Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish
S Sheng, B Magnien, P Kumaraguru, A Acquisti, LF Cranor, J Hong, ...
Proceedings of the 3rd symposium on Usable privacy and security, 88-99, 2007
6272007
" I regretted the minute I pressed share" a qualitative study of regrets on Facebook
Y Wang, G Norcie, S Komanduri, A Acquisti, PG Leon, LF Cranor
Proceedings of the seventh symposium on usable privacy and security, 1-16, 2011
6212011
Security and usability: Designing secure systems that people can use
LF Cranor, S Garfinkel
O'Reilly Media, Inc., 2005
6182005
Beyond concern: Understanding net users’ attitudes about online privacy
LF Cranor, J Reagle, MS Ackerman
The Internet upheaval: raising questions, seeking answers in communications …, 2000
5752000
Spam!
LF Cranor, BA LaMacchia
Communications of the ACM 41 (8), 74-83, 1998
5711998
Crying wolf: An empirical study of ssl warning effectiveness.
J Sunshine, S Egelman, H Almuhimedi, N Atri, LF Cranor
USENIX security symposium, 399-416, 2009
5672009
Are your participants gaming the system?: screening mechanical turk workers
JS Downs, MB Holbrook, S Sheng, LF Cranor
Proceedings of the 28th international conference on Human factors in …, 2010
5422010
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ...
2012 IEEE symposium on security and privacy, 523-537, 2012
5182012
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ...
2012 IEEE symposium on security and privacy, 523-537, 2012
5182012
Engineering privacy
S Spiekermann, LF Cranor
IEEE Transactions on software engineering 35 (1), 67-82, 2008
5102008
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the sigchi conference on human factors in computing systems …, 2011
4892011
Cantina+ a feature-rich machine learning framework for detecting phishing web sites
G Xiang, J Hong, CP Rose, L Cranor
ACM Transactions on Information and System Security (TISSEC) 14 (2), 1-28, 2011
4822011
The system can't perform the operation now. Try again later.
Articles 1–20