Lorrie Cranor

Results: 246



#Item
11Let’s go in for a closer look: Observing passwords in their natural habitat Sarah Pearman* Jeremy Thomas* Pardis Emani Naeini* Hana Habib* Lujo Bauer* Nicolas Christin* Lorrie Faith Cranor* Serge Egelman† Alain Forge

Let’s go in for a closer look: Observing passwords in their natural habitat Sarah Pearman* Jeremy Thomas* Pardis Emani Naeini* Hana Habib* Lujo Bauer* Nicolas Christin* Lorrie Faith Cranor* Serge Egelman† Alain Forge

Add to Reading List

Source URL: www.andrew.cmu.edu

- Date: 2018-03-29 12:34:02
    12How Short is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices Joshua Gluck, Florian Schaub, Amy Friedman, Hana Habib, Norman Sadeh, Lorrie Faith Cranor, Yuvraj Agarwal School of Compu

    How Short is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices Joshua Gluck, Florian Schaub, Amy Friedman, Hana Habib, Norman Sadeh, Lorrie Faith Cranor, Yuvraj Agarwal School of Compu

    Add to Reading List

    Source URL: www.synergylabs.org

    - Date: 2016-06-24 11:10:14
      13Password Creation in the Presence of Blacklists Hana Habib, Jessica Colnago, William Melicher, Blase Ur† , Sean Segreti, Lujo Bauer, Nicolas Christin, and Lorrie Cranor Carnegie Mellon University {hana007, jcolnago, bi

      Password Creation in the Presence of Blacklists Hana Habib, Jessica Colnago, William Melicher, Blase Ur† , Sean Segreti, Lujo Bauer, Nicolas Christin, and Lorrie Cranor Carnegie Mellon University {hana007, jcolnago, bi

      Add to Reading List

      Source URL: www.internetsociety.org

      - Date: 2017-02-25 12:56:13
        14Your Location has been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging Hazim Almuhimedi,1 Florian Schaub,1 Norman Sadeh,1 Idris Adjerid,2 Alessandro Acquisti,1 Joshua Gluck,1 Lorrie Cranor,1 Yuvraj Agarwa

        Your Location has been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging Hazim Almuhimedi,1 Florian Schaub,1 Norman Sadeh,1 Idris Adjerid,2 Alessandro Acquisti,1 Joshua Gluck,1 Lorrie Cranor,1 Yuvraj Agarwa

        Add to Reading List

        Source URL: www.cs.cmu.edu

        - Date: 2015-02-18 00:23:22
          15Curbing Android Permission Creep Timothy Vidas Nicolas Christin  Lorrie Faith Cranor

          Curbing Android Permission Creep Timothy Vidas Nicolas Christin Lorrie Faith Cranor

          Add to Reading List

          Source URL: www.andrew.cmu.edu

          - Date: 2016-12-11 19:02:53
            16Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks William Melicher, Blase Ur, Sean M. Segreti, Saranga Komanduri, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor Carnegie Mellon University

            Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks William Melicher, Blase Ur, Sean M. Segreti, Saranga Komanduri, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor Carnegie Mellon University

            Add to Reading List

            Source URL: www.ece.cmu.edu

            - Date: 2016-07-05 14:27:48
              17Are Your Participants Gaming the System? Screening Mechanical Turk Workers 1 Julie S. Downs1, Mandy B. Holbrook1, Steve Sheng2, Lorrie Faith Cranor2,3 Social and Decision Sciences, 2Engineering & Public Policy, and 3Scho

              Are Your Participants Gaming the System? Screening Mechanical Turk Workers 1 Julie S. Downs1, Mandy B. Holbrook1, Steve Sheng2, Lorrie Faith Cranor2,3 Social and Decision Sciences, 2Engineering & Public Policy, and 3Scho

              Add to Reading List

              Source URL: lorrie.cranor.org

              - Date: 2010-01-11 10:48:43
                18V  viewpoints doi:

                V viewpoints doi:

                Add to Reading List

                Source URL: lorrie.cranor.org

                - Date: 2010-05-27 16:23:46
                  19How Technology Drives Vehicular Privacy ALEECIA M. MCDONALD & LORRIE FAITH CRANOR* AUTHOR’S PRE-PRESS VERSION Please cite to the published paper in: I/S: A Journal of Law and Policy for the Information Society Volume 2

                  How Technology Drives Vehicular Privacy ALEECIA M. MCDONALD & LORRIE FAITH CRANOR* AUTHOR’S PRE-PRESS VERSION Please cite to the published paper in: I/S: A Journal of Law and Policy for the Information Society Volume 2

                  Add to Reading List

                  Source URL: lorrie.cranor.org

                  - Date: 2009-04-16 16:04:46
                    20Studying Access Control Usability in the Lab: Lessons Learned From Four Studies Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor  Michael K. Reiter

                    Studying Access Control Usability in the Lab: Lessons Learned From Four Studies Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor Michael K. Reiter

                    Add to Reading List

                    Source URL: www.ece.cmu.edu

                    - Date: 2012-06-20 09:03:04