Follow
Lorrie Faith Cranor
Title
Cited by
Cited by
Year
The cost of reading privacy policies
AM McDonald, LF Cranor
ISJLP 4, 543-897, 2009
12452009
The effect of online privacy information on purchasing behavior: An experimental study
JY Tsai, S Egelman, L Cranor, A Acquisti
Information systems research 22 (2), 254-268, 2011
11482011
Cantina: a content-based approach to detecting phishing web sites
Y Zhang, JI Hong, LF Cranor
Proceedings of the 16th international conference on World Wide Web, 639-648, 2007
11312007
Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions
S Sheng, M Holbrook, P Kumaraguru, LF Cranor, J Downs
Proceedings of the SIGCHI conference on human factors in computing systems …, 2010
8452010
The platform for privacy preferences 1.0 (P3P1. 0) specification
L Cranor, M Langheinrich, M Marchiori, M Presler-Marshall, J Reagle
W3C recommendation 16, 2002
8262002
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
S Egelman, LF Cranor, J Hong
Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in …, 2008
8082008
Privacy in e-commerce: examining user scenarios and privacy preferences
MS Ackerman, LF Cranor, J Reagle
Proceedings of the 1st ACM Conference on Electronic Commerce, 1-8, 1999
8071999
Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish
S Sheng, B Magnien, P Kumaraguru, A Acquisti, LF Cranor, J Hong, ...
Proceedings of the 3rd symposium on Usable privacy and security, 88-99, 2007
7092007
" I regretted the minute I pressed share" a qualitative study of regrets on Facebook
Y Wang, G Norcie, S Komanduri, A Acquisti, PG Leon, LF Cranor
Proceedings of the seventh symposium on usable privacy and security, 1-16, 2011
6952011
Security and usability: Designing secure systems that people can use
LF Cranor, S Garfinkel
O'Reilly Media, Inc., 2005
6552005
Beyond concern: Understanding net users’ attitudes about online privacy
LF Cranor, J Reagle, MS Ackerman
The Internet upheaval: raising questions, seeking answers in communications …, 2000
642*2000
Crying wolf: An empirical study of ssl warning effectiveness.
J Sunshine, S Egelman, H Almuhimedi, N Atri, LF Cranor
USENIX security symposium, 399-416, 2009
6042009
Spam!
LF Cranor, BA LaMacchia
Communications of the ACM 41 (8), 74-83, 1998
5791998
Are your participants gaming the system?: screening mechanical turk workers
JS Downs, MB Holbrook, S Sheng, LF Cranor
Proceedings of the 28th international conference on Human factors in …, 2010
5722010
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ...
2012 IEEE symposium on security and privacy, 523-537, 2012
5662012
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ...
2012 IEEE symposium on security and privacy, 523-537, 2012
5662012
Engineering privacy
S Spiekermann, LF Cranor
IEEE Transactions on software engineering 35 (1), 67-82, 2008
5472008
Cantina+ a feature-rich machine learning framework for detecting phishing web sites
G Xiang, J Hong, CP Rose, L Cranor
ACM Transactions on Information and System Security (TISSEC) 14 (2), 1-28, 2011
5392011
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the sigchi conference on human factors in computing systems …, 2011
5282011
A" nutrition label" for privacy
PG Kelley, J Bresee, LF Cranor, RW Reeder
Proceedings of the 5th Symposium on Usable Privacy and Security, 1-12, 2009
5232009
The system can't perform the operation now. Try again later.
Articles 1–20