Lorrie Faith Cranor

Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology

Associate Professor of Computer Science and Engineering & Public Policy

5000 Forbes Avenue

Pittsburgh, PA 15213

United States

SCHOLARLY PAPERS

45

DOWNLOADS
Rank 6,618

SSRN RANKINGS

Top 6,618

in Total Papers Downloads

13,012

TOTAL CITATIONS
Rank 11,265

SSRN RANKINGS

Top 11,265

in Total Papers Citations

107

Scholarly Papers (45)

1.

Engineering Privacy

IEEE Transactions on Software Engineering, Vol. 35, Nr. 1, 2009
Number of pages: 16 Posted: 05 Sep 2008 Last Revised: 05 Aug 2014
Sarah Spiekermann and Lorrie Faith Cranor
Vienna University of Economics and Business and Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology
Downloads 5,158 (3,528)
Citation 4

Abstract:

Loading...

anonymity, privacy, privacy enhancing technologies, engineering

2.

Beliefs and Behaviors: Internet Users' Understanding of Behavioral Advertising

TPRC 2010
Number of pages: 31 Posted: 22 Jan 2012
Aleecia McDonald and Lorrie Faith Cranor
affiliation not provided to SSRN and Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology
Downloads 2,863 (9,246)

Abstract:

Loading...

3.

Disagreeable Privacy Policies: Mismatches between Meaning and Users’ Understanding

2014 TPRC Conference Paper, Berkeley Technology Law Journal, Vol. 30, 2015, Fordham Law Legal Studies Research Paper No. 2418297
Number of pages: 118 Posted: 31 Mar 2014 Last Revised: 15 Oct 2015
Fordham University School of Law, Carnegie Mellon University, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology, Institute for Software Research, Carnegie Mellon, Fordham Center on Law and Information Policy (CLIP), Carnegie Mellon University, Carnegie Mellon University, Stanford University, Fordham Center on Law and Information Policy (CLIP), Carnegie Mellon University, Fordham Center on Law and Information Policy (CLIP), Carnegie Mellon University - School of Computer Science and University of Michigan at Ann Arbor - School of Information
Downloads 1,649 (22,225)
Citation 47

Abstract:

Loading...

privacy policies, natural language processing, automated processing, notice and choice,

4.

What's it to You? A Survey of Online Privacy Concerns and Risks

NET Institute Working Paper No. 06-29
Number of pages: 21 Posted: 01 Nov 2006
Carnegie Mellon University, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management and Carnegie Mellon University - Department of Social and Decision Sciences
Downloads 1,121 (39,191)
Citation 4

Abstract:

Loading...

5.

Location-Sharing Technologies: Privacy Risks and Controls

TPRC 2009
Number of pages: 26 Posted: 06 Feb 2012
Janice Tsai, Patrick Gage Kelley, Lorrie Faith Cranor and Norman Sadeh
Carnegie Mellon University, affiliation not provided to SSRN, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology and Carnegie Mellon University - School of Computer Science
Downloads 622 (86,706)
Citation 2

Abstract:

Loading...

6.

Are They Worth Reading? An In-Depth Analysis of Online Advertising Companies’ Privacy Policies

2014 TPRC Conference Paper
Number of pages: 23 Posted: 01 Apr 2014 Last Revised: 18 Jul 2015
Lorrie Faith Cranor, Candice Hoke, Pedro Leon and Alyssa Au
Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology, Carnegie Mellon University, Carnegie Mellon University and University of Pittsburgh
Downloads 567 (97,625)
Citation 12

Abstract:

Loading...

Privacy, online tracking, behavioral advertising, self-regulation, privacy notices, FIPPs

7.

Can User Agents Accurately Represent Privacy Policies?

Number of pages: 22 Posted: 28 Oct 2002 Last Revised: 15 May 2014
Joel R. Reidenberg and Lorrie Faith Cranor
Fordham University School of Law and Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology
Downloads 342 (176,006)
Citation 17

Abstract:

Loading...

Internet, privacy, P3P, user agent, web site, code, standardization, contract, misrepresentation, deception, negligence

8.

The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study

Information Systems Research 22(2):254-268 01 Jan 2011 http://doi.org/10.1287/isre.1090.0260
Number of pages: 35 Posted: 06 Jan 2019 Last Revised: 18 Nov 2021
Carnegie Mellon University, University of California, Berkeley - Department of Electrical Engineering & Computer Sciences (EECS)International Computer Science Institute (ICSI), Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology and Carnegie Mellon University - H. John Heinz III School of Public Policy and Management
Downloads 197 (305,574)
Citation 15

Abstract:

Loading...

privacy, information systems, economics, experimental economics

9.

Is There a Reverse Privacy Paradox? An Exploratory Analysis of Gaps Between Privacy Perspectives and Privacy-Seeking Behaviors

Proceedings on Privacy Enhancing Technologies Symposium | 2023(1), 455-476, July 2023
Number of pages: 22 Posted: 17 Nov 2023
Jessica Colnago, Lorrie Faith Cranor and Alessandro Acquisti
Google Inc., Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology and Carnegie Mellon University - H. John Heinz III School of Public Policy and Management
Downloads 176 (338,336)

Abstract:

Loading...

Privacy, Altman, Human Behavior, Privacy Paradox

10.

From Facebook Regrets to Facebook Privacy Nudges

Ohio State Law Journal, 74, 1307, 2013
Number of pages: 28 Posted: 03 Feb 2019
Syracuse University - School of Information Studies, Carnegie Mellon University, University of Illinois at Urbana-Champaign, Students, Carnegie Mellon University, Indiana University, Carnegie Mellon University, The Human-Computer Interaction Institute, Students, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology and Carnegie Mellon University - School of Computer Science
Downloads 99 (530,666)

Abstract:

Loading...

Privacy, Privacy Nudges, Facebook

11.

Consumer-Driven Design and Evaluation of Broadband Labels

Number of pages: 88 Posted: 03 Aug 2023
Christopher Choy, Ellie Young, Megan Li, Lorrie Faith Cranor and Jon M. Peha
Carnegie Mellon University - School of Computer Science, Carnegie Mellon University - School of Computer Science, Claremont Colleges - Harvey Mudd College, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology and Carnegie Mellon University
Downloads 97 (537,744)

Abstract:

Loading...

product labels, broadband labels

12.

Analysis of Security Vulnerabilities in the Movie Production and Distribution Process

TPRC 2003
Number of pages: 18 Posted: 10 May 2012
affiliation not provided to SSRN, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology, affiliation not provided to SSRN, affiliation not provided to SSRN and affiliation not provided to SSRN
Downloads 55 (730,496)

Abstract:

Loading...

13.

Teaching Johnny Not to Fall for Phish

ACM Transactions on Internet Technology (TOIT) 10(2) Article number ARTN 7 May 2010 http://doi.org/10.1145/1754393.1754396
Number of pages: 18 Posted: 06 Jan 2019 Last Revised: 18 Nov 2021
Indraprastha Institute of Information Technology, affiliation not provided to SSRN, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management and Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology
Downloads 47 (781,508)
Citation 6

Abstract:

Loading...

Operating Systems, Privacy, Security, Information Interfaces

14.

Is it a Concern or a Preference? An Investigation into the Ability of Privacy Scales to Capture and Distinguish Granular Privacy Constructs

Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022) 331-346, 2022
Number of pages: 17 Posted: 22 Nov 2023
Google Inc., Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management and University of Pittsburgh
Downloads 19 (1,028,638)

Abstract:

Loading...

Privacy, Privacy Constructs, Privacy Scales, Privacy Behavior, Privacy Expectation, Privacy Decision, Privacy Preference

15.

Power Strips, Prophylactics, and Privacy, Oh My!

SOUPS '06: Proceedings of the 2nd Symposium on Usable Privacy and Security 133–144, July 2006 https://doi.org/10.1145/1143120.1143137
Posted: 14 Dec 2022
Julia Gideon, Serge Egelman, Lorrie Faith Cranor and Alessandro Acquisti
affiliation not provided to SSRN, Independent, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology and Carnegie Mellon University - H. John Heinz III School of Public Policy and Management

Abstract:

Loading...

P3P, Privacy Policies, Search Engines, E-Commerce, User Studies

16.

School of Phish: A Real-World Evaluation of Anti-Phishing Training

Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS'09) 3, 1-12, July 15, 2009, DOI 10.1145/1572532.1572536
Posted: 07 Dec 2022
Independent, Independent, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology, Carnegie Mellon University - School of Computer Science, Independent and Independent

Abstract:

Loading...

Embedded Training, Phishing, Email, Usable Privacy And Security, Real-World Studies, Privacy

17.

Improving Phishing Countermeasures: An Analysis of Expert Interviews

2009 eCrime Researchers Summit (eCRIME '09),1-15, September 30, 2009
Posted: 07 Dec 2022
Independent, Independent, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology and Carnegie Mellon University - School of Computer Science

Abstract:

Loading...

Anti-phishing, expert interview, electronic crime

18.

Trust Modelling for Online Transactions: A Phishing Scenario

PST '06: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services 11, 1–9, October 2006 https://doi.org/10.1145/1501434.1501448
Posted: 02 Dec 2022
Ponnurangam Kumaraguru, Alessandro Acquisti and Lorrie Faith Cranor
Independent, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management and Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology

Abstract:

Loading...

Trust, Online Transactions, Spam, Phish, Privacy

19.

Privacy Patterns for Online Interactions

PLoP '06: Proceedings of the 2006 Conference on Pattern Languages of Programs 12, 1–9, October 21-23, 2006 https://doi.org/10.1145/1415472.1415486
Posted: 02 Dec 2022
RAND Corporation, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University - School of Computer Science, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology and affiliation not provided to SSRN

Abstract:

Loading...

Privacy Pattersn, Security, Asymmetric Information, Signaling, Informed Consent

20.

Protecting People from Phishing: The Design and Evaluation of an Embedded Training Email System

CHI '07: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 905–914, April 28–May 3, 2007, https://doi.org/10.1145/1240624.1240760
Posted: 02 Dec 2022
Independent, Independent, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology, Carnegie Mellon University - School of Computer Science and Independent

Abstract:

Loading...

Embedded training, phishing, email, usable privacy and security, situated learning

21.

'I Regretted the Minute I Pressed Share': A Qualitative Study of Regrets on Facebook

Proceedings of the Seventh Symposium on Usable Privacy and Security (SOUPS 2011) 10, 1-16, July 20-22, 2011 DOI: 10.1145/2078827.2078841
Posted: 01 Dec 2022
affiliation not provided to SSRN, affiliation not provided to SSRN, Carnegie Mellon University, affiliation not provided to SSRN, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management and Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology

Abstract:

Loading...

Social Media, Facebook, Regret, Privacy

22.

Building the Security Behavior Observatory: An Infrastructure for Long-Term Monitoring of Client Machines

HotSoS '14: Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 24; 1-11, 2014, DOI 10.1145/2600176.2600200
Posted: 30 Nov 2022
Carnegie Mellon University, affiliation not provided to SSRN, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology and Carnegie Mellon University - H. John Heinz III School of Public Policy and Management

Abstract:

Loading...

Privacy, Security Behavior, Computer Behavior, Security Behavior Observatory, Data Collection

23.

Getting Users to Pay Attention to Anti-Phishing Education: Evaluation of Retention and Transfer

eCrime '07: Proceedings of the Anti-Phishing Working Groups, 2nd annual eCrime Researchers Summit 70–81, October 4-5, 2007 https://doi.org/10.1145/1299015.1299022
Posted: 30 Nov 2022
Independent, Independent, Independent, Independent, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology and Carnegie Mellon University - School of Computer Science

Abstract:

Loading...

Embedded training, learning science, instructional principles, phishing, email, usable privacy and security, situated learning

24.

Anti-Phishing Phil: The Design and Evaluation of a Game that Teaches People Not to Fall for Phish

SOUPS '07: Proceedings of the 3rd Symposium on Usable privacy and Security 88–99, July 18-20, 2007 https://doi.org/10.1145/1280680.1280692
Posted: 30 Nov 2022
Independent, Independent, Independent, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology, Carnegie Mellon University - School of Computer Science and Independent

Abstract:

Loading...

Phishing, usable privacy and security, interactive learning, learning science, security user education, game design, development and testing

25.

Lessons From a Real World Evaluation of Anti-Phishing Training

2008 eCrime Researchers Summit 1-13, October 15-16, 2008 https://doi.org/10.1109/ECRIME.2008.4696970
Posted: 30 Nov 2022
Independent, Independent, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology and Carnegie Mellon University - School of Computer Science

Abstract:

Loading...

embedded training, phishing, email, usable privacy and security, real world studies, PhishGuru

26.

Timing Is Everything? The Effects of Timing and Placement of Online Privacy Indicators

CHI '09: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 319–328, April 3-9, 2009 https://doi.org/10.1145/1518701.1518752
Posted: 30 Nov 2022
Serge Egelman, Janice Tsai, Lorrie Faith Cranor and Alessandro Acquisti
Independent, Independent, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology and Carnegie Mellon University - H. John Heinz III School of Public Policy and Management

Abstract:

Loading...

Privacy, privacy policies, website indicators, mental models, usable privacy and security

27.

Privacy Nudges for Social Media: An Exploratory Facebook Study

Proceedings of the 22nd International Conference on World Wide Web (WWW'13 Companion) 763-770, May 13-17, 2013
Posted: 23 Nov 2022
Syracuse University - School of Information Studies, Carnegie Mellon University, Carnegie Mellon University, The Human-Computer Interaction Institute, Students, Independent, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management and Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology

Abstract:

Loading...

Facebook, nudge, privacy, online disclosure, soft paternalism

28.

'I Read My Twitter the Next Morning and was Astonished' A Conversational Perspective on Twitter Regrets

CHI '13: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 3277–3286, April 2013 DOI 10.1145/2470654.2466448
Posted: 23 Nov 2022
Carnegie Mellon University, Independent, Independent, Independent, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology and Carnegie Mellon University - School of Computer Science

Abstract:

Loading...

Twitter, regrets, messaging, conversation, survey

29.

Is it the Typeset or the Type of Statistics? Disfluent Font and Self-Disclosure

2013 Workshop on Learning from Authoritative Security Experiment Results, LASER 2013, p. 1-11, Jan 2013
Posted: 10 Nov 2022
Independent, Hebrew University of Jerusalem - Federmann School of Government and Public Policy, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology and Carnegie Mellon University - H. John Heinz III School of Public Policy and Management

Abstract:

Loading...

Security, Privacy, behavioral economics, psychology, decision making, disfluency, Font, self-disclosure

30.

A Field Trial of Privacy Nudges for Facebook

Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems (CHI 2014) 2367-2376. 2014 DOI: 10.1145/2556288.2557413
Posted: 07 Nov 2022
Syracuse University - School of Information Studies, Carnegie Mellon University, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology, Carnegie Mellon University and Carnegie Mellon University - School of Computer Science

Abstract:

Loading...

Behavioral bias, Online disclosure, Social media, Facebook, Nudge, Privacy, Regret, Soft-paternalism

31.

The Impact of Timing on the Salience of Smartphone App Privacy Notices

SPSM 2015 - Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, co-located with: CCS 2015. 63-74. 12 Oct 2015 DOI: 10.1145/2808117.2808119
Posted: 07 Nov 2022
Independent, University of Michigan at Ann Arbor - School of Information, Pamplin College of Business, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management and Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology

Abstract:

Loading...

Mobile, Privacy, Privacy Decision Making

32.

I Would Like to…, I Shouldn’t…, I Wish I…: Exploring Behavior-Change Goals for Social Networking Sites

CSCW'15 Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing 1058-1069, March 2015 DOI: 10.1145/2675133.267519'3
Posted: 07 Nov 2022
Carnegie Mellon University, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology, Independent, Independent and Carnegie Mellon University - School of Computer Science

Abstract:

Loading...

Social Networking Sites; online behaviors, Facebook, Instagram, Twitter, security, privacy, awareness, behavior change

33.

Privacy Manipulation and Acclimation in a Location Sharing Application

Ubicomp'13: Proceedings of The 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 549-558, September 8-12, 2013
Posted: 07 Nov 2022
Carnegie Mellon University, Independent, Carnegie Mellon University - School of Computer Science, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology, Independent, Independent and Independent

Abstract:

Loading...

Location sharing, user study, mobile computing, privacy

34.

Nudging Users Towards Privacy on Mobile Devices

Proceedings of the 2nd International Workshop on Persuasion, Influence, Nudge & Coercion Through Mobile Devices (PINC2011) 1-4, May 8, 2011
Posted: 03 Nov 2022
Independent, Carnegie Mellon University, Carnegie Mellon University - School of Computer Science, Independent, Independent, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology and Carnegie Mellon University - School of Computer Science

Abstract:

Loading...

Nudge, Privacy, Security, Location Sharing, Mobile Devices, Soft Paternalism

35.

Your Location has Been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging

CHI 2015: Proceedings of the 33rd Annual Conference on Human Factors in Computing Systems 787-796. 2015 DOI: 10.1145/2702123.2702210
Posted: 17 Oct 2022
Carnegie Mellon University - School of Computer Science, University of Michigan at Ann Arbor - School of Information, Carnegie Mellon University - School of Computer Science, Pamplin College of Business, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, affiliation not provided to SSRN, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology and Carnegie Mellon University - School of Computer Science

Abstract:

Loading...

Mobile, Privacy, Privacy Decision Making, Privacy Nudges

36.

Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes

Proceedings of the 12th Symposium on Usable Privacy and Security (SOUPS 2016) 97-111. 2016
Posted: 24 Aug 2022 Last Revised: 17 Sep 2022
Carnegie Mellon University, Carnegie Mellon University, Carnegie Mellon University, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology, University of California, Berkeley - Department of Electrical Engineering & Computer Sciences (EECS)International Computer Science Institute (ICSI), International Computer Science Institute (ICSI) and Carnegie Mellon University - H. John Heinz III School of Public Policy and Management

Abstract:

Loading...

security, behavior, computer

37.

Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing

Proceedings of the 14th Symposium on Usable Privacy and Security 159-175. 2018
Posted: 24 Aug 2022 Last Revised: 17 Sep 2022
Carnegie Mellon University, Carnegie Mellon University, Carnegie Mellon University, Carnegie Mellon University, Carnegie Mellon University, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University and Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology

Abstract:

Loading...

browsing, privacy, security, security behavior observatory, software monitoring, tracking, targeted advertising

38.

An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites

Proceedings of the 15th Symposium on Usable Privacy and Security (SOUPS 2020) 387-406. 2019
Posted: 23 Aug 2022 Last Revised: 17 Sep 2022
Carnegie Mellon University, University of Michigan at Ann Arbor, Carnegie Mellon University, Carnegie Mellon University, Carnegie Mellon University, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology, Carnegie Mellon University - School of Computer Science and University of Michigan at Ann Arbor - School of Information

Abstract:

Loading...

privacy, opt-out choice, data deletion, advertising

39.

Informing the Design of a Personalized Privacy Assistant for the Internet of Things

CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems 1-13; April 2020. https://doi.org/10.1145/3313831.3376389
Posted: 23 Aug 2022 Last Revised: 17 Sep 2022
Carnegie Mellon University, Carnegie Mellon University, Carnegie Mellon University, Carnegie Mellon University, Carnegie Mellon University, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology and Carnegie Mellon University - School of Computer Science

Abstract:

Loading...

Internet of Things, Personalized Privacy Assistant, Interviews

40.

From Intent to Action: Nudging Users Towards Secure Mobile Payments

Proceedings of the 16th Symposium on Usable Privacy and Security (SOUPS 2020). 379-415. 2020
Posted: 23 Aug 2022 Last Revised: 17 Sep 2022
Clark University, Amazon, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology, Carnegie Mellon University - School of Computer Science and University of Michigan at Ann Arbor - School of Information

Abstract:

Loading...

privacy, security, user behavior, mobile payments, PMT

41.

Toggles, Dollar Signs, and Triangles: How to (In)Effectively Convey Privacy Choices with Icons and Link Texts

CHI '21: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems 63; 1-25, May 2021 https://doi.org/10.1145/3411764.3445387
Posted: 19 Aug 2022 Last Revised: 17 Sep 2022
Carnegie Mellon University, University of Michigan at Ann Arbor, Carnegie Mellon University, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology, Fordham University School of Law, Carnegie Mellon University - School of Computer Science and University of Michigan at Ann Arbor - School of Information

Abstract:

Loading...

CCPA, privacy, choice, icon design

42.

Awareness, Adoption, and Misconceptions of Web Privacy Tools

Proceedings on Privacy Enhancing Technologies 3; 308-333, 27 Apr 2021 https://doi.org/10.2478/popets-2021-0049
Posted: 19 Aug 2022 Last Revised: 17 Sep 2022
Clark University, Amazon, Carnegie Mellon University, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology, Carnegie Mellon University - School of Computer Science and University of Michigan at Ann Arbor - School of Information

Abstract:

Loading...

privacy, technology adoption, mental models, private browsing, VPN, Tor, ad blocking, antivirus

43.

Increasing Adoption of Tor Browser Using Informational and Planning Nudges

Proceedings on Privacy Enhancing Technologies 2022(2):152-183 03 Mar 2022 http://doi.org/10.2478/popets-2022-0040
Posted: 19 Aug 2022 Last Revised: 17 Sep 2022
Clark University, Amazon, Carnegie Mellon University, University of Maryland, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology, Carnegie Mellon University - School of Computer Science and University of Michigan at Ann Arbor - School of Information

Abstract:

Loading...

privacy, technology adoption, nudges, protection motivation theory, implementation intentions, tor Browser

44.

'It's a Scavenger Hunt': Usability of Websites' Opt-Out and Data Deletion Choices

CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems 1-12, April 2020 https://doi.org/10.1145/3313831.3376511
Posted: 19 Aug 2022 Last Revised: 17 Sep 2022
Carnegie Mellon University, Carnegie Mellon University, Carnegie Mellon University, University of Michigan at Ann Arbor, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology, Carnegie Mellon University - School of Computer Science and University of Michigan at Ann Arbor - School of Information

Abstract:

Loading...

privacy, usability, privacy controls, email marketing, targeted advertising, data deletion

45.

Nudges for Privacy and Security: Understanding and Assisting Users’ Choices Online

A. Acquisti, I. Adjerid, R. Balebako, L. Brandimarte, L. Cranor, S. Komanduri, P. Leon, N. Sadeh, F. Schaub, M. Sleeper, Y. Wang, and S. Wilson. 2017. Nudges for Privacy and Security: Understanding and Assisting Users’ Choices Online. ACM Comput. Surv. 50, 3, Article 44 (August 2017).
Posted: 28 Oct 2016 Last Revised: 01 Nov 2021
Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Pamplin College of Business, Carnegie Mellon University, Carnegie Mellon University - H. John Heinz III School of Public Policy and Management, Carnegie Mellon University - School of Computer Science and Carnegie Institute of Technology, Carnegie Mellon University, Carnegie Mellon University, Carnegie Mellon University - School of Computer Science, University of Michigan at Ann Arbor - School of Information, Carnegie Mellon University, Syracuse University - School of Information Studies and Carnegie Mellon University

Abstract:

Loading...

Privacy, Security, Nudge, Soft Paternalism, Behavioral Economics