Lorrie Cranor

Results: 246



#Item
21

Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People Not to Fall for Phish Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason Hong, Elizabeth Nunge

Add to Reading List

Source URL: cups.cs.cmu.edu

- Date: 2007-06-01 17:23:26
    22

    Initial Adoption of a Distributed Access-Control System Kami Vaniea Lujo Bauer Lorrie Cranor

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    - Date: 2006-06-02 17:53:17
      23

      Still Searching for Privacy Serge Egelman Lorrie Cranor Carnegie Mellon University

      Add to Reading List

      Source URL: cups.cs.cmu.edu

      - Date: 2005-06-21 09:58:21
        24

        Poster: You Can Do Better – Motivational Statements in Password-Meter Feedback David Eargle*, John Godfrey†, Hsin Miao†, Scott Stevenson†, Rich Shay†, Blase Ur†, Lorrie Cranor† *University of Pittsburgh †

        Add to Reading List

        Source URL: cups.cs.cmu.edu

        - Date: 2015-07-03 02:38:42
          25Computing / Software / Digital media / Social networking services / Videotelephony / Internet privacy / Privacy / Email / Information privacy / Presence information / Instant messaging / Privacy concerns with social networking services

          Peripheral Privacy Notifications for Wireless Networks Braden Kowitz Lorrie Cranor Carnegie Mellon University, HCII

          Add to Reading List

          Source URL: cups.cs.cmu.edu

          Language: English - Date: 2005-06-21 09:58:21
          26Privacy / Internet privacy / Computing / Economy / P3P / World Wide Web / Digital media / Identity management / Lorrie Cranor / HTTP cookie / FTC Fair Information Practice / Recommender system

          Designing a Privacy Preference Specification Interface: A Case Study Lorrie Faith Cranor AT&T Labs-Research 180 Park Ave. Room A205 Florham Park, NJUSA

          Add to Reading List

          Source URL: www.andrewpatrick.ca

          Language: English - Date: 2003-01-15 12:25:30
          27Software / Computing / Social networking services / Internet privacy / Blog hosting services / Photo sharing / Social information processing / Social media / Privacy / Facebook / Lorrie Cranor / Loopt

          Analyzing Use of Privacy Policy Attributes in a Location Sharing Application Eran Toch, Ramprasad Ravichandran, Lorrie F. Cranor, Paul H. Drielsma, Jason Hong, Patrick G. Kelley, Norman Sadeh, and Janice Y. Tsai Carnegie

          Add to Reading List

          Source URL: cups.cs.cmu.edu

          Language: English - Date: 2009-07-06 23:13:50
          28P3P / World Wide Web / Internet privacy / Computing / Privacy / Identity management / Computer security / Cyberspace / CUPS / Privacy policy / HTTP cookie / Medical privacy

          A “Nutrition Label” for Privacy Patrick Gage Kelley,* Joanna Bresee,* Lorrie Faith Cranor,* Robert W. Reeder** * Carnegie Mellon University School of Computer Science

          Add to Reading List

          Source URL: cups.cs.cmu.edu

          Language: English - Date: 2009-06-17 17:35:23
          29Cybercrime / Computing / Cyberspace / Spamming / Misconduct / Social engineering / E-commerce / Email / Phishing / Email spam / Computer security / Password

          School of Phish: A Real-World Evaluation of Anti-Phishing Training Ponnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie Cranor, Jason Hong, Mary Ann Blair, Theodore Pham Carnegie Mellon University

          Add to Reading List

          Source URL: cups.cs.cmu.edu

          Language: English - Date: 2009-09-22 14:35:41
          30P3P / World Wide Web / Internet search engines / Privacy / Internet privacy / Lorrie Cranor / Google Search / CUPS / Information privacy

          The Impact of Privacy Indicators on Search Engine Browsing Patterns Janice Tsai Carnegie Mellon University

          Add to Reading List

          Source URL: cups.cs.cmu.edu

          Language: English - Date: 2009-07-06 23:11:08
          UPDATE