Ergebnis für URL: http://scholar.google.com/citations?user=kIUqgbcAAAAJ&hl=en
   Loading...
   The system can't perform the operation now. Try again later.

Citations per year

Duplicate citations

   The following articles are merged in Scholar. Their [1]combined citations are
   counted only for the first article.

Merged citations

   This "Cited by" count includes citations to the following articles in Scholar.
   The ones marked * may be different from the article in the profile.

Add co-authorsCo-authors

   (BUTTON)

   (BUTTON)

Follow

   [2]New articles by this author
   [3]New citations to this author
   [4]New articles related to this author's research
   Email address for updates
   ____________________
   (BUTTON) Done
   [5]My profile[6]My library[7]Metrics[8]Alerts
   [9]Settings
   [10]Sign in
   __________________________________________________
   (BUTTON)
   [11]Sign in
   [12]Get my own profile

Cited by (BUTTON) View all

                  All  Since 2019
   [13]Citations 48090 20915
   [14]h-index   112   80
   [15]i10-index 264   202
   0
   4100
   2050
   1025
   3075
   200120022003200420052006200720082009201020112012201320142015201620172018201920202
   021202220232024[16]172[17]256[18]363[19]405[20]527[21]585[22]749[23]730[24]989[25
   ]1226[26]1304[27]1803[28]2019[29]2434[30]2778[31]3201[32]3308[33]3394[34]3505[35]
   3929[36]4088[37]4031[38]3939[39]1401
   Public access
   [40]View all
   (BUTTON) View all
   56 articles
   0 articles
   available
   not available
   Based on funding mandates

Co-authors (BUTTON) View all

     * Lujo Bauer [41]Lujo BauerCarnegie Mellon UniversityVerified email at cmu.edu
     * Norman Sadeh [42]Norman SadehProfessor of Computer Science, Carnegie Mellon
       UniversityVerified email at cs.cmu.edu
     * Alessandro Acquisti [43]Alessandro AcquistiCarnegie Mellon UniversityVerified
       email at andrew.cmu.edu
     * Patrick Gage Kelley [44]Patrick Gage KelleyGoogle, University of New Mexico,
       Carnegie Mellon UniversityVerified email at google.com
     * Blase Ur [45]Blase UrAssociate Professor, University of ChicagoVerified email
       at uchicago.edu
     * Jason Hong [46]Jason HongCarnegie Mellon UniversityVerified email at
       cs.cmu.edu
     * Richard Shay [47]Richard ShaySkyflowVerified email at richshay.com
     * Nicolas Christin [48]Nicolas ChristinProfessor, Carnegie Mellon
       UniversityVerified email at andrew.cmu.edu
     * Saranga Komanduri [49]Saranga KomanduriCarnegie Mellon UniversityVerified
       email at cs.cmu.edu
     * Florian Schaub [50]Florian SchaubUniversity of MichiganVerified email at
       umich.edu
     * Michelle L. Mazurek [51]Michelle L. MazurekAssociate Professor, University of
       MarylandVerified email at umd.edu
     * Serge Egelman [52]Serge EgelmanUniversity of California, Berkeley /
       International Computer Science Institute (ICSI) / AppCensusVerified email at
       cs.berkeley.edu
     * Ponnurangam Kumaraguru "PK" [53]Ponnurangam Kumaraguru "PK"#ProfGiri Computer
       Science @ IIIT Hyderabad, Alumni @ Carnegie Mellon & @ BITS PilaniVerified
       email at iiit.ac.in
     * Rebecca Balebako [54]Rebecca BalebakoGoogleVerified email at google.com
     * Hana Habib [55]Hana HabibCarnegie Mellon UniversityVerified email at
       andrew.cmu.edu
     * Manya Sleeper [56]Manya SleeperGoogleVerified email at google.com
     * Yang Wang [57]Yang WangAssociate Professor, University of Illinois at
       Urbana-ChampaignVerified email at illinois.edu
     * Janice Y. Tsai [58]Janice Y. TsaiGoogleVerified email at google.com
     * Yuvraj Agarwal [59]Yuvraj AgarwalAssociate Professor of Computer Science,
       Carnegie Mellon UniversityVerified email at cs.cmu.edu
     * Tim Vidas [60]Tim VidasCarnegie Mellon UniveristyVerified email at cmu.edu

   (BUTTON) View all
   [61]Follow
   Lorrie Faith Cranor
   Lorrie Faith Cranor
   [62]Other namesLorrie Cranor
   FORE Systems Professor, [63]Carnegie Mellon University
   Verified email at cs.cmu.edu - [64]Homepage
   [65]usable privacy and security[66]usable security and privacy[67]usable
   security[68]human-computer interaction[69]privacy
   [70]Articles[71]Cited by[72]Public access[73]Co-authors
   [74]Title
   (BUTTON) Sort
   [75]Sort by citations[76]Sort by year[77]Sort by title
   Cited by
   Cited by
   [78]Year
   [79]The cost of reading privacy policies
   AM McDonald, LF Cranor
   ISJLP 4, 543-897, 2009
   [80]1399 2009
   [81]The effect of online privacy information on purchasing behavior: An
   experimental study
   JY Tsai, S Egelman, L Cranor, A Acquisti
   Information systems research 22 (2), 254-268, 2011
   [82]1240 2011
   [83]Cantina: a content-based approach to detecting phishing web sites
   Y Zhang, JI Hong, LF Cranor
   Proceedings of the 16th international conference on World Wide Web, 639-648, 2007
   [84]1213 2007
   [85]Who falls for phish? A demographic analysis of phishing susceptibility and
   effectiveness of interventions
   S Sheng, M Holbrook, P Kumaraguru, LF Cranor, J Downs
   Proceedings of the SIGCHI conference on human factors in computing systems ...,
   2010
   [86]965 2010
   [87]The platform for privacy preferences 1.0 (P3P1. 0) specification
   World Wide Web Consortium
   World Wide Web Consortium, 2002
   [88]908 2002
   [89]You've been warned: an empirical study of the effectiveness of web browser
   phishing warnings
   S Egelman, LF Cranor, J Hong
   Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in ...,
   2008
   [90]867 2008
   [91]Privacy in e-commerce: examining user scenarios and privacy preferences
   MS Ackerman, LF Cranor, J Reagle
   Proceedings of the 1st ACM Conference on Electronic Commerce, 1-8, 1999
   [92]837 1999
   [93]Anti-phishing phil: the design and evaluation of a game that teaches people
   not to fall for phish
   S Sheng, B Magnien, P Kumaraguru, A Acquisti, LF Cranor, J Hong, ...
   Proceedings of the 3rd symposium on Usable privacy and security, 88-99, 2007
   [94]772 2007
   [95]" I regretted the minute I pressed share" a qualitative study of regrets on
   Facebook
   Y Wang, G Norcie, S Komanduri, A Acquisti, PG Leon, LF Cranor
   Proceedings of the seventh symposium on usable privacy and security, 1-16, 2011
   [96]732 2011
   [97]Security and usability: Designing secure systems that people can use
   LF Cranor, S Garfinkel
   O'Reilly Media, Inc., 2005
   [98]677 2005
   [99]Nudges for privacy and security: Understanding and assisting users' choices
   online
   A Acquisti, I Adjerid, R Balebako, L Brandimarte, LF Cranor, S Komanduri, ...
   ACM Computing Surveys (CSUR) 50 (3), 1-41, 2017
   [100]656 2017
   [101]Beyond concern: Understanding net users' attitudes about online privacy
   LF Cranor, J Reagle, MS Ackerman
   [102]636 2000
   [103]Crying wolf: An empirical study of ssl warning effectiveness.
   J Sunshine, S Egelman, H Almuhimedi, N Atri, LF Cranor
   USENIX security symposium, 399-416, 2009
   [104]621 2009
   [105]Cantina+ a feature-rich machine learning framework for detecting phishing
   web sites
   G Xiang, J Hong, CP Rose, L Cranor
   ACM Transactions on Information and System Security (TISSEC) 14 (2), 1-28, 2011
   [106]609 2011
   [107]Guess again (and again and again): Measuring password strength by simulating
   password-cracking algorithms
   PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ...
   2012 IEEE symposium on security and privacy, 523-537, 2012
   [108]602 2012
   [109]A" nutrition label" for privacy
   PG Kelley, J Bresee, LF Cranor, RW Reeder
   Proceedings of the 5th Symposium on Usable Privacy and Security, 1-12, 2009
   [110]597 2009
   [111]Spam!
   LF Cranor, BA LaMacchia
   Communications of the ACM 41 (8), 74-83, 1998
   [112]595 1998
   [113]Are your participants gaming the system?: screening mechanical turk workers
   JS Downs, MB Holbrook, S Sheng, LF Cranor
   Proceedings of the 28th international conference on Human factors in ..., 2010
   [114]591 2010
   [115]Engineering privacy
   S Spiekermann, LF Cranor
   IEEE Transactions on software engineering 35 (1), 67-82, 2008
   [116]590 2008
   [117]Of passwords and people: measuring the effect of password-composition
   policies
   S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
   Proceedings of the sigchi conference on human factors in computing systems ...,
   2011
   [118]561 2011
   The system can't perform the operation now. Try again later.
   Articles 1-20
   (BUTTON) Show more
   [119]Privacy[120]Terms[121]Help
   [122]About Scholar[123]Search help

References

   Visible links:
   1. javascript:void(0)
   2. javascript:void(0)
   3. javascript:void(0)
   4. javascript:void(0)
   5. https://scholar.google.com/citations?hl=en&oe=ASCII
   6. https://scholar.google.com/scholar?scilib=1&hl=en&oe=ASCII
   7. https://scholar.google.com/citations?view_op=metrics_intro&hl=en&oe=ASCII
   8. https://scholar.google.com/scholar_alerts?view_op=list_alerts&hl=en&oe=ASCII
   9. https://scholar.google.com/scholar_settings?hl=en&oe=ASCII
  10. https://accounts.google.com/Login?hl=en&continue=https://scholar.google.com/schhp%3Fhl%3Den%26oe%3DASCII
  11. https://accounts.google.com/Login?hl=en&continue=https://scholar.google.com/schhp%3Fhl%3Den%26oe%3DASCII
  12. https://scholar.google.com/citations?hl=en&oe=ASCII
  13. javascript:void(0)
  14. javascript:void(0)
  15. javascript:void(0)
  16. javascript:void(0)
  17. javascript:void(0)
  18. javascript:void(0)
  19. javascript:void(0)
  20. javascript:void(0)
  21. javascript:void(0)
  22. javascript:void(0)
  23. javascript:void(0)
  24. javascript:void(0)
  25. javascript:void(0)
  26. javascript:void(0)
  27. javascript:void(0)
  28. javascript:void(0)
  29. javascript:void(0)
  30. javascript:void(0)
  31. javascript:void(0)
  32. javascript:void(0)
  33. javascript:void(0)
  34. javascript:void(0)
  35. javascript:void(0)
  36. javascript:void(0)
  37. javascript:void(0)
  38. javascript:void(0)
  39. javascript:void(0)
  40. https://scholar.google.com/citations?view_op=list_mandates&hl=en&oe=ASCII&user=kIUqgbcAAAAJ
  41. https://scholar.google.com/citations?user=5cJzDZEAAAAJ&hl=en&oe=ASCII
  42. https://scholar.google.com/citations?user=X57uzqcAAAAJ&hl=en&oe=ASCII
  43. https://scholar.google.com/citations?user=2XCryp4AAAAJ&hl=en&oe=ASCII
  44. https://scholar.google.com/citations?user=4_fN00YAAAAJ&hl=en&oe=ASCII
  45. https://scholar.google.com/citations?user=3Xql0fwAAAAJ&hl=en&oe=ASCII
  46. https://scholar.google.com/citations?user=MoFbcc0AAAAJ&hl=en&oe=ASCII
  47. https://scholar.google.com/citations?user=T2MTzJoAAAAJ&hl=en&oe=ASCII
  48. https://scholar.google.com/citations?user=X5buTmMAAAAJ&hl=en&oe=ASCII
  49. https://scholar.google.com/citations?user=rJzguXQAAAAJ&hl=en&oe=ASCII
  50. https://scholar.google.com/citations?user=zg29qGEAAAAJ&hl=en&oe=ASCII
  51. https://scholar.google.com/citations?user=5ExRjncAAAAJ&hl=en&oe=ASCII
  52. https://scholar.google.com/citations?user=WN9t4n0AAAAJ&hl=en&oe=ASCII
  53. https://scholar.google.com/citations?user=MfzQyP8AAAAJ&hl=en&oe=ASCII
  54. https://scholar.google.com/citations?user=YPz0thoAAAAJ&hl=en&oe=ASCII
  55. https://scholar.google.com/citations?user=ROhRS9gAAAAJ&hl=en&oe=ASCII
  56. https://scholar.google.com/citations?user=WIGKRjgAAAAJ&hl=en&oe=ASCII
  57. https://scholar.google.com/citations?user=bN-ipRAAAAAJ&hl=en&oe=ASCII
  58. https://scholar.google.com/citations?user=CjeCcfYAAAAJ&hl=en&oe=ASCII
  59. https://scholar.google.com/citations?user=H4UeZ2MAAAAJ&hl=en&oe=ASCII
  60. https://scholar.google.com/citations?user=eWVXVH4AAAAJ&hl=en&oe=ASCII
  61. javascript:void(0)
  62. javascript:void(0)
  63. https://scholar.google.com/citations?view_op=view_org&hl=en&oe=ASCII&org=17554517495610703090
  64. http://lorrie.cranor.org/
  65. https://scholar.google.com/citations?view_op=search_authors&hl=en&oe=ASCII&mauthors=label:usable_privacy_and_security
  66. https://scholar.google.com/citations?view_op=search_authors&hl=en&oe=ASCII&mauthors=label:usable_security_and_privacy
  67. https://scholar.google.com/citations?view_op=search_authors&hl=en&oe=ASCII&mauthors=label:usable_security
  68. https://scholar.google.com/citations?view_op=search_authors&hl=en&oe=ASCII&mauthors=label:human_computer_interaction
  69. https://scholar.google.com/citations?view_op=search_authors&hl=en&oe=ASCII&mauthors=label:privacy
  70. javascript:void(0)
  71. javascript:void(0)
  72. javascript:void(0)
  73. javascript:void(0)
  74. https://scholar.google.com/citations?hl=en&oe=ASCII&user=kIUqgbcAAAAJ&view_op=list_works&sortby=title
  75. https://scholar.google.com/citations?hl=en&oe=ASCII&user=kIUqgbcAAAAJ&view_op=list_works
  76. https://scholar.google.com/citations?hl=en&oe=ASCII&user=kIUqgbcAAAAJ&view_op=list_works&sortby=pubdate
  77. https://scholar.google.com/citations?hl=en&oe=ASCII&user=kIUqgbcAAAAJ&view_op=list_works&sortby=title
  78. https://scholar.google.com/citations?hl=en&oe=ASCII&user=kIUqgbcAAAAJ&view_op=list_works&sortby=pubdate
  79. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:fPk4N6BV_jEC
  80. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=185995145897716059
  81. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:8k81kl-MbHgC
  82. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=9655458560462351174
  83. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:W7OEmFMy1HYC
  84. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=8447681961226804116
  85. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:vV6vV6tmYwMC
  86. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=1662631431368947111
  87. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:u5HHmVD_uO8C
  88. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=5432794233790770766,1243119112516166455
  89. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:ufrVoPGSRksC
  90. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=14332508199475970168
  91. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:u-x6o8ySG0sC
  92. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=2339686230938728575
  93. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:0EnyYjriUFMC
  94. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=12153540200462989341
  95. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:uWQEDVKXjbEC
  96. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=8996169626826852568
  97. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:zYLM7Y9cAGgC
  98. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=7443623048117529248
  99. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:UZk6qv0A6XIC
 100. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=2857521586977635756
 101. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:9yKSN-GCB0IC
 102. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=3584508135828822334,2690260004623125038
 103. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:MXK_kJrjxJIC
 104. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=17250262855322484964
 105. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:bnK-pcrLprsC
 106. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=1013699911424020247
 107. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:SpbeaW3--B0C
 108. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=13121710142778026940
 109. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:hC7cP41nSMkC
 110. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=1979853099796278161
 111. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:2osOgNQ5qMEC
 112. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=2959037431421016483
 113. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:qUcmZB5y_30C
 114. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=11734640105734235266
 115. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:QIV2ME_5wuYC
 116. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=4495150190825290564
 117. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:sSrBHYA8nusC
 118. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=1693044839830132615
 119. https://www.google.com/intl/en/policies/privacy/
 120. https://www.google.com/intl/en/policies/terms/
 121. javascript:void(0)
 122. https://scholar.google.com/intl/en/scholar/about.html
 123. https://support.google.com/websearch?p=scholar_dsa&hl=en&oe=ASCII

   Hidden links:
 125. javascript:void(0)
 126. javascript:void(0)
 127. javascript:void(0)
 128. javascript:void(0)
 129. javascript:void(0)
 130. javascript:void(0)
 131. javascript:void(0)
 132. javascript:void(0)
 133. https://scholar.google.com/schhp?hl=en&oe=ASCII
 134. javascript:void(0)
 135. https://scholar.google.com/schhp?hl=en&oe=ASCII
 136. javascript:void(0)
 137. javascript:void(0)


Usage: http://www.kk-software.de/kklynxview/get/URL
e.g. http://www.kk-software.de/kklynxview/get/http://www.kk-software.de
Errormessages are in German, sorry ;-)