Abstract is: Lorrie Faith Cranor, D.Sc. is the FORE Systems Professor of Computer Science and Engineering and Public Policy at Carnegie Mellon University and is the director of the Carnegie Mellon Usable Privacy and Security Laboratory. She has served as Chief Technologist of the Federal Trade Commission, and she was formerlya member of the Electronic Frontier Foundation Board of Directors. Previously she was a researcher at AT&T Labs-Research and taught in the Stern School of Business at New York University. She has authored over 110 research papers on online privacy, phishing and semantic attacks, spam, electronic voting, anonymous publishing, usable access control, and other topics.
human | Q5 |
P864 | ACM Digital Library author ID | 81100472223 |
P2456 | DBLP author ID | 03/1595 |
P6178 | Dimensions author ID | 012313770727.30 |
P2013 | Facebook username | lorrie.cranor |
P646 | Freebase ID | /m/03gy5xh |
P227 | GND ID | 1057640255 |
P1960 | Google Scholar author ID | kIUqgbcAAAAJ |
P269 | IdRef ID | 080257488 |
P213 | ISNI | 0000000047636138 |
P11249 | KBR person ID | 21232815 |
P244 | Library of Congress authority ID | n2002014342 |
P8189 | National Library of Israel J9U ID | 987007432807105171 |
P1006 | Nationale Thesaurus voor Auteursnamen ID | 242054706 |
P691 | NL CR AUT ID | xx0101105 |
P856 | official website | http://lorrie.cranor.org/ |
P496 | ORCID iD | 0000-0003-2125-0124 |
P1153 | Scopus author ID | 6602378856 |
P3987 | SHARE Catalogue author ID | 288314 |
P3747 | SSRN author ID | 333622 |
P2611 | TED speaker ID | lorrie_faith_cranor |
P11182 | UOM ID | 48411 |
P214 | VIAF ID | 77241407 |
P10832 | WorldCat Entities ID | E39PBJjHgCw34pk3Cd6jFDDKBP |
P2002 | X username | lorrietweet |
P1416 | affiliation | Carnegie Mellon University Press | Q5043959 |
P6424 | affiliation string | Carnegie Mellon University | |
P166 | award received | Fellow of the American Association for the Advancement of Science | Q5442484 |
ACM Fellow | Q18748039 | ||
Carnegie Fellow | Q125860258 | ||
P27 | country of citizenship | United States of America | Q30 |
P69 | educated at | Washington University in St. Louis | Q777403 |
Montgomery Blair High School | Q6905657 | ||
P108 | employer | New York University | Q49210 |
Carnegie Mellon University | Q190080 | ||
P734 | family name | Cranor | Q37463342 |
Cranor | Q37463342 | ||
Cranor | Q37463342 | ||
P735 | given name | Lorrie | Q20899039 |
Lorrie | Q20899039 | ||
P463 | member of | Association for Computing Machinery | Q127992 |
P106 | occupation | computer scientist | Q82594 |
university teacher | Q1622272 | ||
academic | Q3400985 | ||
P1344 | participant in | World Economic Forum Annual Meeting 2016 | Q114717232 |
P21 | sex or gender | female | Q6581072 |
P8687 | social media followers | 6110 |
Q57888220 | "I regretted the minute I pressed share" |
Q57888040 | "Little brothers watching you" |
Q57888018 | "i read my Twitter the next morning and was astonished" |
Q57888462 | A "nutrition label" for privacy |
Q57888473 | A Comparative Study of Online Privacy Policies and Formats |
Q57888143 | A Conundrum of Permissions: Installing Applications on an Android Smartphone |
Q57888027 | A Shortage of Privacy Engineers |
Q57888562 | A Survey to Guide Group Key Protocol Development |
Q57887943 | A field trial of privacy nudges for facebook |
Q57888569 | A user study of policy creation in a flexible access-control system |
Q57888479 | A user study of the expandable grid applied to P3P privacy policy visualization |
Q57888574 | A user study of the expandable grid applied to P3P privacy policy visualization |
Q57888360 | Access control for home data sharing |
Q57888228 | Adapt-a-ride |
Q57888370 | Americans' attitudes about internet behavioral advertising practices |
Q57888238 | An Investigation into Facebook Friend Grouping |
Q57888649 | An analysis of P3P-enabled web sites among top-20 search results |
Q57888709 | An analysis of security vulnerabilities in the movie production and distribution process |
Q57888726 | Analysis of security vulnerabilities in the movie production and distribution process |
Q57888731 | Analysis of security vulnerabilities in the movie production and distribution process |
Q57888492 | Analyzing use of privacy policy attributes in a location sharing application |
Q57888612 | Anti-Phishing Phil |
Q57888246 | Are you close with me? are you nearby? |
Q57888379 | Are your participants gaming the system? |
Q57888736 | Automated analysis of P3P-enabled Web sites |
Q57888615 | Behavioral response to phishing risk |
Q57887953 | Better Together: Usability and Security Go Hand in Hand |
Q57887920 | Biometric Authentication on iPhone and Android: Usability, Perceptions, and Influences on Adoption |
Q57888215 | Bridging the Gap in Computer Security Warnings: A Mental Model Approach |
Q57888207 | CANTINA+ |
Q57888150 | Can Users Control Online Behavioral Advertising Effectively? |
Q57887964 | Can long passwords be secure and usable? |
Q57888621 | Cantina |
Q57888265 | Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs |
Q56486002 | Correct horse battery staple |
Q57888653 | Decision strategies and susceptibility to phishing |
Q57887975 | Electronic privacy and surveillance |
Q57888398 | Empirical models of privacy in location sharing |
Q57888408 | Encountering stronger password requirements |
Q57888416 | Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects |
Q57888579 | Expandable grids for visualizing and authoring computer security policies |
Q57888274 | Exploring reactive access control |
Q40537921 | Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks |
Q57887984 | General Requirements of a Hybrid-Modeling Framework for Cyber Security |
Q57888626 | Getting users to pay attention to anti-phishing education |
Q57888136 | Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms |
Q57888658 | Human selection of mnemonic phrase-based passwords |
Q57888715 | I Didn’t buy It for Myself |
Q57887928 | I Would Like To..., I Shouldn't..., I Wish I.. |
Q57888282 | I know where you live |
Q57887992 | Improving App Privacy: Nudging App Developers to Protect User Privacy |
Q57888292 | Improving Computer Security Dialogs |
Q57888514 | Improving phishing countermeasures: An analysis of expert interviews |
Q57888740 | In Search of the Perfect Voting Technology: No Easy Answers |
Q57888788 | Influencing software usage |
Q57888423 | Institutional review boards and your research |
Q57888794 | Internet privacy |
Q57888784 | Internet voting for public officials: introduction |
Q57888004 | Is Your Inseam a Biometric? A Case Study on the Role of Usability Studies in Developing Public Policy |
Q57888584 | Lessons from a real world evaluation of anti-phishing training |
Q57888631 | Lessons learned from the deployment of a smartphone-based access-control system |
Q56892852 | Letter from the Special Section Editor |
Q57888430 | Locaccino |
Q23471159 | Lorrie Faith Cranor: What’s wrong with your pa$$w0rd? |
Q57888050 | Measuring password guessability for an entire university |
Q57888301 | More than skin deep |
Q57888312 | Of passwords and people |
Q57888163 | Operating system framed in case of mistaken identity |
Q57888129 | Out of sight, out of mind: Effects of displaying access-control information near the item it controls |
Q57888589 | P3P deployment on websites |
Q57888696 | Peripheral privacy notifications for wireless networks |
Q57888175 | Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems |
Q57888663 | Power strips, prophylactics, and privacy, oh my! |
Q57888070 | Privacy Engineering Emerges as a Hot New Career |
Q57888060 | Privacy as part of the app decision-making process |
Q57888799 | Privacy critics |
Q57888804 | Privacy critics |
Q57888667 | Privacy in India: Attitudes and Awareness |
Q57888809 | Privacy in e-commerce |
Q57888076 | Privacy manipulation and acclimation in a location sharing application |
Q57888671 | Privacy patterns for online interactions |
Q57888636 | Protecting people from phishing |
Q57888814 | Putting it together: Internet privacy: a public concern |
Q57888083 | QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks |
Q57888527 | Real life challenges in access-control management |
Q57888827 | Research posters 101 |
Q57888534 | School of phish |
Q57888702 | Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine |
Q57888178 | Smart, useful, scary, creepy |
Q57887935 | Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords |
Q52215140 | Spam! |
Q57888436 | Standardizing privacy notices |
Q57888183 | Studying access-control usability in the lab |
Q57888188 | Tag, you can see it! |
Q57888442 | Teaching Johnny not to fall for phish |
Q57888212 | The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study |
Q57888090 | The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs |
Q57888011 | The Privacy and Security Behaviors of Smartphone App Developers |
Q57888772 | The architecture of robust publishing systems |
Q57888538 | The impact of privacy indicators on search engine browsing patterns |
Q57888097 | The post anachronism |
Q57888105 | The post that wasn't |
Q57888752 | The role of privacy advocates and data protection authorities in the design and deployment of the platform for privacy preferences |
Q57888758 | The role of privacy advocates and data protection authorities in the design and deployment of the platform for privacy preferences |
Q57888544 | Timing is everything? |
Q57888448 | Token attempt |
Q57888547 | Understanding and capturing people’s privacy policies in a mobile social networking application |
Q57888322 | Usability of Forensics Tools: A User Study |
Q57888766 | Use of a P3P user agent by early adopters |
Q57888677 | User interfaces for privacy agents |
Q57888606 | User-Controllable Security and Privacy for Pervasive Computing |
Q57888595 | User-controllable learning of security and privacy policies |
Q57888682 | Vicarious infringement creates a privacy ceiling |
Q57888778 | Voting after Florida |
Q57888195 | What do online behavioral advertising privacy disclosures communicate to users? |
Q57888643 | What do they "indicate?" |
Q57888112 | What matters to users? |
Q57888335 | When are users comfortable sharing locations with advertisers? |
Q57888342 | Who Is Concerned about What? A Study of American, Chinese and Indian Users’ Privacy Concerns on Social Network Sites |
Q57888455 | Who falls for phish? |
Q57888553 | Who's viewed you? |
Q57888557 | Who's viewed you? |
Q57888200 | Why Johnny can't opt out |
Q57888600 | You've been warned |
Q57888120 | Your attention please |
Q57888205 | {Privacy, privacidad, Приватност} policies in social media |
Q48910401 | The Web Conference 2018 | speaker | P823 |
Category:Lorrie Cranor | wikimedia | |
Lorrie Cranor | wikipedia | |
Lorrie Cranor | wikipedia |
Search more.