Lorrie Cranor

Results: 246



#Item
11

Let’s go in for a closer look: Observing passwords in their natural habitat Sarah Pearman* Jeremy Thomas* Pardis Emani Naeini* Hana Habib* Lujo Bauer* Nicolas Christin* Lorrie Faith Cranor* Serge Egelman† Alain Forge

Add to Reading List

Source URL: www.andrew.cmu.edu

- Date: 2018-03-29 12:34:02
    12

    How Short is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices Joshua Gluck, Florian Schaub, Amy Friedman, Hana Habib, Norman Sadeh, Lorrie Faith Cranor, Yuvraj Agarwal School of Compu

    Add to Reading List

    Source URL: www.synergylabs.org

    - Date: 2016-06-24 11:10:14
      13

      Password Creation in the Presence of Blacklists Hana Habib, Jessica Colnago, William Melicher, Blase Ur† , Sean Segreti, Lujo Bauer, Nicolas Christin, and Lorrie Cranor Carnegie Mellon University {hana007, jcolnago, bi

      Add to Reading List

      Source URL: www.internetsociety.org

      - Date: 2017-02-25 12:56:13
        14

        Your Location has been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging Hazim Almuhimedi,1 Florian Schaub,1 Norman Sadeh,1 Idris Adjerid,2 Alessandro Acquisti,1 Joshua Gluck,1 Lorrie Cranor,1 Yuvraj Agarwa

        Add to Reading List

        Source URL: www.cs.cmu.edu

        - Date: 2015-02-18 00:23:22
          15

          Curbing Android Permission Creep Timothy Vidas Nicolas Christin Lorrie Faith Cranor

          Add to Reading List

          Source URL: www.andrew.cmu.edu

          - Date: 2016-12-11 19:02:53
            16

            Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks William Melicher, Blase Ur, Sean M. Segreti, Saranga Komanduri, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor Carnegie Mellon University

            Add to Reading List

            Source URL: www.ece.cmu.edu

            - Date: 2016-07-05 14:27:48
              17

              Are Your Participants Gaming the System? Screening Mechanical Turk Workers 1 Julie S. Downs1, Mandy B. Holbrook1, Steve Sheng2, Lorrie Faith Cranor2,3 Social and Decision Sciences, 2Engineering & Public Policy, and 3Scho

              Add to Reading List

              Source URL: lorrie.cranor.org

              - Date: 2010-01-11 10:48:43
                18

                V viewpoints doi:

                Add to Reading List

                Source URL: lorrie.cranor.org

                - Date: 2010-05-27 16:23:46
                  19

                  How Technology Drives Vehicular Privacy ALEECIA M. MCDONALD & LORRIE FAITH CRANOR* AUTHOR’S PRE-PRESS VERSION Please cite to the published paper in: I/S: A Journal of Law and Policy for the Information Society Volume 2

                  Add to Reading List

                  Source URL: lorrie.cranor.org

                  - Date: 2009-04-16 16:04:46
                    20

                    Studying Access Control Usability in the Lab: Lessons Learned From Four Studies Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor Michael K. Reiter

                    Add to Reading List

                    Source URL: www.ece.cmu.edu

                    - Date: 2012-06-20 09:03:04
                      UPDATE