Search
for Author
All Reviews
Cranor, Lorrie Faith
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
5
of
7
reviews
Designing password policies for strength and usability
Shay R., Komanduri S., Durity A., Huh P., Mazurek M., Segreti S., Ur B., Bauer L., Christin N., Cranor L. ACM Transactions on Information and System Security 18(4): Article No. 13, 2016. Type: Article
Have you ever wondered why some websites use really annoying password policies? Or have you been responsible for designing a password policy for your organization, and been caught between the users’ demands for easy-to-rememb...
...
Jun 27 2017
Your attention please: designing security-decision UIs to make genuine risks harder to ignore
Bravo-Lillo C., Komanduri S., Cranor L., Reeder R., Sleeper M., Downs J., Schechter S. SOUPS 2013 (Proceedings of the Ninth Symposium on Usable Privacy and Security, Newcastle, UK, Jul 24-26, 2013) 1-12, 2013. Type: Proceedings
Pop-up alerts carrying warning messages are issued by an operating system whenever a user wants to grant additional privileges to third-party software. Based on their own prior experience of having granted additional privileges to soft...
...
Apr 2 2014
Correct horse battery staple: exploring the usability of system-assigned passphrases
Shay R., Kelley P., Komanduri S., Mazurek M., Ur B., Vidas T., Bauer L., Christin N., Cranor L. SOUPS 2012 (Proceedings of the 8th Symposium on Usable Privacy and Security, Washington, DC, Jul 11-13, 2012) 1-20, 2012. Type: Proceedings
This paper describes research associated with systems security. It will be of interest to system administrators and people monitoring network security for an organization. It will also be of interest to people doing research in systems...
...
Nov 21 2012
‘I didn’t buy it for myself’
Cranor L. In
Designing personalized user experiences in ecommerce
. Norwell, MA: Kluwer Academic Publishers, 2004. Type: Book Chapter
The risks associated with e-commerce personalization (for example, data collection, change, and storage) are explored in this chapter. It describes a set of principles developed by the Organization for Economic Cooperation and Developm...
...
Dec 9 2004
Automated analysis of P3P-enabled Web sites
Byers S., Cranor L., Kormann D. Electronic commerce (Proceedings of the 5th international conference, Pittsburgh, Pennsylvania, 326-338, 2003. Type: Proceedings
The Platform for Privacy Preferences (P3P) provides a format and Web-based protocol for machine readable privacy policies. Developed by the World Wide Web Consortium, P3P is gaining acceptance, particularly among commercial Web sites, ...
...
Mar 31 2004
Display
5
10
15
25
50
100
per column
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy