Lorrie Cranor

American academic

DBpedia resource is: http://dbpedia.org/resource/Lorrie_Cranor

Abstract is: Lorrie Faith Cranor, D.Sc. is the FORE Systems Professor of Computer Science and Engineering and Public Policy at Carnegie Mellon University and is the director of the Carnegie Mellon Usable Privacy and Security Laboratory. She has served as Chief Technologist of the Federal Trade Commission, and she was formerlya member of the Electronic Frontier Foundation Board of Directors. Previously she was a researcher at AT&T Labs-Research and taught in the Stern School of Business at New York University. She has authored over 110 research papers on online privacy, phishing and semantic attacks, spam, electronic voting, anonymous publishing, usable access control, and other topics.

Wikimedia Commons category is Lorrie Cranor

Born 1971-02-25

Lorrie Cranor is …
instance of (P31):
humanQ5

External links are
P864ACM Digital Library author ID81100472223
P2456DBLP author ID03/1595
P6178Dimensions author ID012313770727.30
P2013Facebook usernamelorrie.cranor
P646Freebase ID/m/03gy5xh
P227GND ID1057640255
P1960Google Scholar author IDkIUqgbcAAAAJ
P269IdRef ID080257488
P213ISNI0000000047636138
P11249KBR person ID21232815
P244Library of Congress authority IDn2002014342
P8189National Library of Israel J9U ID987007432807105171
P1006Nationale Thesaurus voor Auteursnamen ID242054706
P691NL CR AUT IDxx0101105
P856official websitehttp://lorrie.cranor.org/
P496ORCID iD0000-0003-2125-0124
P1153Scopus author ID6602378856
P3987SHARE Catalogue author ID288314
P3747SSRN author ID333622
P2611TED speaker IDlorrie_faith_cranor
P11182UOM ID48411
P214VIAF ID77241407
P10832WorldCat Entities IDE39PBJjHgCw34pk3Cd6jFDDKBP
P2002X usernamelorrietweet

P1416affiliationCarnegie Mellon University PressQ5043959
P6424affiliation stringCarnegie Mellon University
P166award receivedFellow of the American Association for the Advancement of ScienceQ5442484
ACM FellowQ18748039
Carnegie FellowQ125860258
P27country of citizenshipUnited States of AmericaQ30
P69educated atWashington University in St. LouisQ777403
Montgomery Blair High SchoolQ6905657
P108employerNew York UniversityQ49210
Carnegie Mellon UniversityQ190080
P734family nameCranorQ37463342
CranorQ37463342
CranorQ37463342
P735given nameLorrieQ20899039
LorrieQ20899039
P463member ofAssociation for Computing MachineryQ127992
P106occupationcomputer scientistQ82594
university teacherQ1622272
academicQ3400985
P1344participant inWorld Economic Forum Annual Meeting 2016Q114717232
P21sex or genderfemaleQ6581072
P8687social media followers6110

Reverse relations

author (P50)
Q57888220"I regretted the minute I pressed share"
Q57888040"Little brothers watching you"
Q57888018"i read my Twitter the next morning and was astonished"
Q57888462A "nutrition label" for privacy
Q57888473A Comparative Study of Online Privacy Policies and Formats
Q57888143A Conundrum of Permissions: Installing Applications on an Android Smartphone
Q57888027A Shortage of Privacy Engineers
Q57888562A Survey to Guide Group Key Protocol Development
Q57887943A field trial of privacy nudges for facebook
Q57888569A user study of policy creation in a flexible access-control system
Q57888479A user study of the expandable grid applied to P3P privacy policy visualization
Q57888574A user study of the expandable grid applied to P3P privacy policy visualization
Q57888360Access control for home data sharing
Q57888228Adapt-a-ride
Q57888370Americans' attitudes about internet behavioral advertising practices
Q57888238An Investigation into Facebook Friend Grouping
Q57888649An analysis of P3P-enabled web sites among top-20 search results
Q57888709An analysis of security vulnerabilities in the movie production and distribution process
Q57888726Analysis of security vulnerabilities in the movie production and distribution process
Q57888731Analysis of security vulnerabilities in the movie production and distribution process
Q57888492Analyzing use of privacy policy attributes in a location sharing application
Q57888612Anti-Phishing Phil
Q57888246Are you close with me? are you nearby?
Q57888379Are your participants gaming the system?
Q57888736Automated analysis of P3P-enabled Web sites
Q57888615Behavioral response to phishing risk
Q57887953Better Together: Usability and Security Go Hand in Hand
Q57887920Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption
Q57888215Bridging the Gap in Computer Security Warnings: A Mental Model Approach
Q57888207CANTINA+
Q57888150Can Users Control Online Behavioral Advertising Effectively?
Q57887964Can long passwords be secure and usable?
Q57888621Cantina
Q57888265Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs
Q56486002Correct horse battery staple
Q57888653Decision strategies and susceptibility to phishing
Q57887975Electronic privacy and surveillance
Q57888398Empirical models of privacy in location sharing
Q57888408Encountering stronger password requirements
Q57888416Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects
Q57888579Expandable grids for visualizing and authoring computer security policies
Q57888274Exploring reactive access control
Q40537921Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks
Q57887984General Requirements of a Hybrid-Modeling Framework for Cyber Security
Q57888626Getting users to pay attention to anti-phishing education
Q57888136Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms
Q57888658Human selection of mnemonic phrase-based passwords
Q57888715I Didn’t buy It for Myself
Q57887928I Would Like To..., I Shouldn't..., I Wish I..
Q57888282I know where you live
Q57887992Improving App Privacy: Nudging App Developers to Protect User Privacy
Q57888292Improving Computer Security Dialogs
Q57888514Improving phishing countermeasures: An analysis of expert interviews
Q57888740In Search of the Perfect Voting Technology: No Easy Answers
Q57888788Influencing software usage
Q57888423Institutional review boards and your research
Q57888794Internet privacy
Q57888784Internet voting for public officials: introduction
Q57888004Is Your Inseam a Biometric? A Case Study on the Role of Usability Studies in Developing Public Policy
Q57888584Lessons from a real world evaluation of anti-phishing training
Q57888631Lessons learned from the deployment of a smartphone-based access-control system
Q56892852Letter from the Special Section Editor
Q57888430Locaccino
Q23471159Lorrie Faith Cranor: What’s wrong with your pa$$w0rd?
Q57888050Measuring password guessability for an entire university
Q57888301More than skin deep
Q57888312Of passwords and people
Q57888163Operating system framed in case of mistaken identity
Q57888129Out of sight, out of mind: Effects of displaying access-control information near the item it controls
Q57888589P3P deployment on websites
Q57888696Peripheral privacy notifications for wireless networks
Q57888175Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems
Q57888663Power strips, prophylactics, and privacy, oh my!
Q57888070Privacy Engineering Emerges as a Hot New Career
Q57888060Privacy as part of the app decision-making process
Q57888799Privacy critics
Q57888804Privacy critics
Q57888667Privacy in India: Attitudes and Awareness
Q57888809Privacy in e-commerce
Q57888076Privacy manipulation and acclimation in a location sharing application
Q57888671Privacy patterns for online interactions
Q57888636Protecting people from phishing
Q57888814Putting it together: Internet privacy: a public concern
Q57888083QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks
Q57888527Real life challenges in access-control management
Q57888827Research posters 101
Q57888534School of phish
Q57888702Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine
Q57888178Smart, useful, scary, creepy
Q57887935Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords
Q52215140Spam!
Q57888436Standardizing privacy notices
Q57888183Studying access-control usability in the lab
Q57888188Tag, you can see it!
Q57888442Teaching Johnny not to fall for phish
Q57888212The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study
Q57888090The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs
Q57888011The Privacy and Security Behaviors of Smartphone App Developers
Q57888772The architecture of robust publishing systems
Q57888538The impact of privacy indicators on search engine browsing patterns
Q57888097The post anachronism
Q57888105The post that wasn't
Q57888752The role of privacy advocates and data protection authorities in the design and deployment of the platform for privacy preferences
Q57888758The role of privacy advocates and data protection authorities in the design and deployment of the platform for privacy preferences
Q57888544Timing is everything?
Q57888448Token attempt
Q57888547Understanding and capturing people’s privacy policies in a mobile social networking application
Q57888322Usability of Forensics Tools: A User Study
Q57888766Use of a P3P user agent by early adopters
Q57888677User interfaces for privacy agents
Q57888606User-Controllable Security and Privacy for Pervasive Computing
Q57888595User-controllable learning of security and privacy policies
Q57888682Vicarious infringement creates a privacy ceiling
Q57888778Voting after Florida
Q57888195What do online behavioral advertising privacy disclosures communicate to users?
Q57888643What do they "indicate?"
Q57888112What matters to users?
Q57888335When are users comfortable sharing locations with advertisers?
Q57888342Who Is Concerned about What? A Study of American, Chinese and Indian Users’ Privacy Concerns on Social Network Sites
Q57888455Who falls for phish?
Q57888553Who's viewed you?
Q57888557Who's viewed you?
Q57888200Why Johnny can't opt out
Q57888600You've been warned
Q57888120Your attention please
Q57888205{Privacy, privacidad, Приватност} policies in social media

Q48910401The Web Conference 2018speakerP823

The articles in Wikimedia projects and languages

      Category:Lorrie Cranorwikimedia
      Lorrie Cranorwikipedia
      Lorrie Cranorwikipedia

Search more.