Ergebnis für URL: http://scholar.google.com/citations?user=kIUqgbcAAAAJ&hl=en Loading...
The system can't perform the operation now. Try again later.
Citations per year
Duplicate citations
The following articles are merged in Scholar. Their [1]combined citations are
counted only for the first article.
Merged citations
This "Cited by" count includes citations to the following articles in Scholar.
The ones marked * may be different from the article in the profile.
Add co-authorsCo-authors
(BUTTON)
(BUTTON)
Follow
[2]New articles by this author
[3]New citations to this author
[4]New articles related to this author's research
Email address for updates
____________________
(BUTTON) Done
[5]My profile[6]My library[7]Metrics[8]Alerts
[9]Settings
[10]Sign in
__________________________________________________
(BUTTON)
[11]Sign in
[12]Get my own profile
Cited by (BUTTON) View all
All Since 2019
[13]Citations 48090 20915
[14]h-index 112 80
[15]i10-index 264 202
0
4100
2050
1025
3075
200120022003200420052006200720082009201020112012201320142015201620172018201920202
021202220232024[16]172[17]256[18]363[19]405[20]527[21]585[22]749[23]730[24]989[25
]1226[26]1304[27]1803[28]2019[29]2434[30]2778[31]3201[32]3308[33]3394[34]3505[35]
3929[36]4088[37]4031[38]3939[39]1401
Public access
[40]View all
(BUTTON) View all
56 articles
0 articles
available
not available
Based on funding mandates
Co-authors (BUTTON) View all
* Lujo Bauer [41]Lujo BauerCarnegie Mellon UniversityVerified email at cmu.edu
* Norman Sadeh [42]Norman SadehProfessor of Computer Science, Carnegie Mellon
UniversityVerified email at cs.cmu.edu
* Alessandro Acquisti [43]Alessandro AcquistiCarnegie Mellon UniversityVerified
email at andrew.cmu.edu
* Patrick Gage Kelley [44]Patrick Gage KelleyGoogle, University of New Mexico,
Carnegie Mellon UniversityVerified email at google.com
* Blase Ur [45]Blase UrAssociate Professor, University of ChicagoVerified email
at uchicago.edu
* Jason Hong [46]Jason HongCarnegie Mellon UniversityVerified email at
cs.cmu.edu
* Richard Shay [47]Richard ShaySkyflowVerified email at richshay.com
* Nicolas Christin [48]Nicolas ChristinProfessor, Carnegie Mellon
UniversityVerified email at andrew.cmu.edu
* Saranga Komanduri [49]Saranga KomanduriCarnegie Mellon UniversityVerified
email at cs.cmu.edu
* Florian Schaub [50]Florian SchaubUniversity of MichiganVerified email at
umich.edu
* Michelle L. Mazurek [51]Michelle L. MazurekAssociate Professor, University of
MarylandVerified email at umd.edu
* Serge Egelman [52]Serge EgelmanUniversity of California, Berkeley /
International Computer Science Institute (ICSI) / AppCensusVerified email at
cs.berkeley.edu
* Ponnurangam Kumaraguru "PK" [53]Ponnurangam Kumaraguru "PK"#ProfGiri Computer
Science @ IIIT Hyderabad, Alumni @ Carnegie Mellon & @ BITS PilaniVerified
email at iiit.ac.in
* Rebecca Balebako [54]Rebecca BalebakoGoogleVerified email at google.com
* Hana Habib [55]Hana HabibCarnegie Mellon UniversityVerified email at
andrew.cmu.edu
* Manya Sleeper [56]Manya SleeperGoogleVerified email at google.com
* Yang Wang [57]Yang WangAssociate Professor, University of Illinois at
Urbana-ChampaignVerified email at illinois.edu
* Janice Y. Tsai [58]Janice Y. TsaiGoogleVerified email at google.com
* Yuvraj Agarwal [59]Yuvraj AgarwalAssociate Professor of Computer Science,
Carnegie Mellon UniversityVerified email at cs.cmu.edu
* Tim Vidas [60]Tim VidasCarnegie Mellon UniveristyVerified email at cmu.edu
(BUTTON) View all
[61]Follow
Lorrie Faith Cranor
Lorrie Faith Cranor
[62]Other namesLorrie Cranor
FORE Systems Professor, [63]Carnegie Mellon University
Verified email at cs.cmu.edu - [64]Homepage
[65]usable privacy and security[66]usable security and privacy[67]usable
security[68]human-computer interaction[69]privacy
[70]Articles[71]Cited by[72]Public access[73]Co-authors
[74]Title
(BUTTON) Sort
[75]Sort by citations[76]Sort by year[77]Sort by title
Cited by
Cited by
[78]Year
[79]The cost of reading privacy policies
AM McDonald, LF Cranor
ISJLP 4, 543-897, 2009
[80]1399 2009
[81]The effect of online privacy information on purchasing behavior: An
experimental study
JY Tsai, S Egelman, L Cranor, A Acquisti
Information systems research 22 (2), 254-268, 2011
[82]1240 2011
[83]Cantina: a content-based approach to detecting phishing web sites
Y Zhang, JI Hong, LF Cranor
Proceedings of the 16th international conference on World Wide Web, 639-648, 2007
[84]1213 2007
[85]Who falls for phish? A demographic analysis of phishing susceptibility and
effectiveness of interventions
S Sheng, M Holbrook, P Kumaraguru, LF Cranor, J Downs
Proceedings of the SIGCHI conference on human factors in computing systems ...,
2010
[86]965 2010
[87]The platform for privacy preferences 1.0 (P3P1. 0) specification
World Wide Web Consortium
World Wide Web Consortium, 2002
[88]908 2002
[89]You've been warned: an empirical study of the effectiveness of web browser
phishing warnings
S Egelman, LF Cranor, J Hong
Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in ...,
2008
[90]867 2008
[91]Privacy in e-commerce: examining user scenarios and privacy preferences
MS Ackerman, LF Cranor, J Reagle
Proceedings of the 1st ACM Conference on Electronic Commerce, 1-8, 1999
[92]837 1999
[93]Anti-phishing phil: the design and evaluation of a game that teaches people
not to fall for phish
S Sheng, B Magnien, P Kumaraguru, A Acquisti, LF Cranor, J Hong, ...
Proceedings of the 3rd symposium on Usable privacy and security, 88-99, 2007
[94]772 2007
[95]" I regretted the minute I pressed share" a qualitative study of regrets on
Facebook
Y Wang, G Norcie, S Komanduri, A Acquisti, PG Leon, LF Cranor
Proceedings of the seventh symposium on usable privacy and security, 1-16, 2011
[96]732 2011
[97]Security and usability: Designing secure systems that people can use
LF Cranor, S Garfinkel
O'Reilly Media, Inc., 2005
[98]677 2005
[99]Nudges for privacy and security: Understanding and assisting users' choices
online
A Acquisti, I Adjerid, R Balebako, L Brandimarte, LF Cranor, S Komanduri, ...
ACM Computing Surveys (CSUR) 50 (3), 1-41, 2017
[100]656 2017
[101]Beyond concern: Understanding net users' attitudes about online privacy
LF Cranor, J Reagle, MS Ackerman
[102]636 2000
[103]Crying wolf: An empirical study of ssl warning effectiveness.
J Sunshine, S Egelman, H Almuhimedi, N Atri, LF Cranor
USENIX security symposium, 399-416, 2009
[104]621 2009
[105]Cantina+ a feature-rich machine learning framework for detecting phishing
web sites
G Xiang, J Hong, CP Rose, L Cranor
ACM Transactions on Information and System Security (TISSEC) 14 (2), 1-28, 2011
[106]609 2011
[107]Guess again (and again and again): Measuring password strength by simulating
password-cracking algorithms
PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ...
2012 IEEE symposium on security and privacy, 523-537, 2012
[108]602 2012
[109]A" nutrition label" for privacy
PG Kelley, J Bresee, LF Cranor, RW Reeder
Proceedings of the 5th Symposium on Usable Privacy and Security, 1-12, 2009
[110]597 2009
[111]Spam!
LF Cranor, BA LaMacchia
Communications of the ACM 41 (8), 74-83, 1998
[112]595 1998
[113]Are your participants gaming the system?: screening mechanical turk workers
JS Downs, MB Holbrook, S Sheng, LF Cranor
Proceedings of the 28th international conference on Human factors in ..., 2010
[114]591 2010
[115]Engineering privacy
S Spiekermann, LF Cranor
IEEE Transactions on software engineering 35 (1), 67-82, 2008
[116]590 2008
[117]Of passwords and people: measuring the effect of password-composition
policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the sigchi conference on human factors in computing systems ...,
2011
[118]561 2011
The system can't perform the operation now. Try again later.
Articles 1-20
(BUTTON) Show more
[119]Privacy[120]Terms[121]Help
[122]About Scholar[123]Search help
References
Visible links:
1. javascript:void(0)
2. javascript:void(0)
3. javascript:void(0)
4. javascript:void(0)
5. https://scholar.google.com/citations?hl=en&oe=ASCII
6. https://scholar.google.com/scholar?scilib=1&hl=en&oe=ASCII
7. https://scholar.google.com/citations?view_op=metrics_intro&hl=en&oe=ASCII
8. https://scholar.google.com/scholar_alerts?view_op=list_alerts&hl=en&oe=ASCII
9. https://scholar.google.com/scholar_settings?hl=en&oe=ASCII
10. https://accounts.google.com/Login?hl=en&continue=https://scholar.google.com/schhp%3Fhl%3Den%26oe%3DASCII
11. https://accounts.google.com/Login?hl=en&continue=https://scholar.google.com/schhp%3Fhl%3Den%26oe%3DASCII
12. https://scholar.google.com/citations?hl=en&oe=ASCII
13. javascript:void(0)
14. javascript:void(0)
15. javascript:void(0)
16. javascript:void(0)
17. javascript:void(0)
18. javascript:void(0)
19. javascript:void(0)
20. javascript:void(0)
21. javascript:void(0)
22. javascript:void(0)
23. javascript:void(0)
24. javascript:void(0)
25. javascript:void(0)
26. javascript:void(0)
27. javascript:void(0)
28. javascript:void(0)
29. javascript:void(0)
30. javascript:void(0)
31. javascript:void(0)
32. javascript:void(0)
33. javascript:void(0)
34. javascript:void(0)
35. javascript:void(0)
36. javascript:void(0)
37. javascript:void(0)
38. javascript:void(0)
39. javascript:void(0)
40. https://scholar.google.com/citations?view_op=list_mandates&hl=en&oe=ASCII&user=kIUqgbcAAAAJ
41. https://scholar.google.com/citations?user=5cJzDZEAAAAJ&hl=en&oe=ASCII
42. https://scholar.google.com/citations?user=X57uzqcAAAAJ&hl=en&oe=ASCII
43. https://scholar.google.com/citations?user=2XCryp4AAAAJ&hl=en&oe=ASCII
44. https://scholar.google.com/citations?user=4_fN00YAAAAJ&hl=en&oe=ASCII
45. https://scholar.google.com/citations?user=3Xql0fwAAAAJ&hl=en&oe=ASCII
46. https://scholar.google.com/citations?user=MoFbcc0AAAAJ&hl=en&oe=ASCII
47. https://scholar.google.com/citations?user=T2MTzJoAAAAJ&hl=en&oe=ASCII
48. https://scholar.google.com/citations?user=X5buTmMAAAAJ&hl=en&oe=ASCII
49. https://scholar.google.com/citations?user=rJzguXQAAAAJ&hl=en&oe=ASCII
50. https://scholar.google.com/citations?user=zg29qGEAAAAJ&hl=en&oe=ASCII
51. https://scholar.google.com/citations?user=5ExRjncAAAAJ&hl=en&oe=ASCII
52. https://scholar.google.com/citations?user=WN9t4n0AAAAJ&hl=en&oe=ASCII
53. https://scholar.google.com/citations?user=MfzQyP8AAAAJ&hl=en&oe=ASCII
54. https://scholar.google.com/citations?user=YPz0thoAAAAJ&hl=en&oe=ASCII
55. https://scholar.google.com/citations?user=ROhRS9gAAAAJ&hl=en&oe=ASCII
56. https://scholar.google.com/citations?user=WIGKRjgAAAAJ&hl=en&oe=ASCII
57. https://scholar.google.com/citations?user=bN-ipRAAAAAJ&hl=en&oe=ASCII
58. https://scholar.google.com/citations?user=CjeCcfYAAAAJ&hl=en&oe=ASCII
59. https://scholar.google.com/citations?user=H4UeZ2MAAAAJ&hl=en&oe=ASCII
60. https://scholar.google.com/citations?user=eWVXVH4AAAAJ&hl=en&oe=ASCII
61. javascript:void(0)
62. javascript:void(0)
63. https://scholar.google.com/citations?view_op=view_org&hl=en&oe=ASCII&org=17554517495610703090
64. http://lorrie.cranor.org/
65. https://scholar.google.com/citations?view_op=search_authors&hl=en&oe=ASCII&mauthors=label:usable_privacy_and_security
66. https://scholar.google.com/citations?view_op=search_authors&hl=en&oe=ASCII&mauthors=label:usable_security_and_privacy
67. https://scholar.google.com/citations?view_op=search_authors&hl=en&oe=ASCII&mauthors=label:usable_security
68. https://scholar.google.com/citations?view_op=search_authors&hl=en&oe=ASCII&mauthors=label:human_computer_interaction
69. https://scholar.google.com/citations?view_op=search_authors&hl=en&oe=ASCII&mauthors=label:privacy
70. javascript:void(0)
71. javascript:void(0)
72. javascript:void(0)
73. javascript:void(0)
74. https://scholar.google.com/citations?hl=en&oe=ASCII&user=kIUqgbcAAAAJ&view_op=list_works&sortby=title
75. https://scholar.google.com/citations?hl=en&oe=ASCII&user=kIUqgbcAAAAJ&view_op=list_works
76. https://scholar.google.com/citations?hl=en&oe=ASCII&user=kIUqgbcAAAAJ&view_op=list_works&sortby=pubdate
77. https://scholar.google.com/citations?hl=en&oe=ASCII&user=kIUqgbcAAAAJ&view_op=list_works&sortby=title
78. https://scholar.google.com/citations?hl=en&oe=ASCII&user=kIUqgbcAAAAJ&view_op=list_works&sortby=pubdate
79. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:fPk4N6BV_jEC
80. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=185995145897716059
81. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:8k81kl-MbHgC
82. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=9655458560462351174
83. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:W7OEmFMy1HYC
84. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=8447681961226804116
85. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:vV6vV6tmYwMC
86. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=1662631431368947111
87. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:u5HHmVD_uO8C
88. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=5432794233790770766,1243119112516166455
89. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:ufrVoPGSRksC
90. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=14332508199475970168
91. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:u-x6o8ySG0sC
92. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=2339686230938728575
93. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:0EnyYjriUFMC
94. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=12153540200462989341
95. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:uWQEDVKXjbEC
96. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=8996169626826852568
97. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:zYLM7Y9cAGgC
98. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=7443623048117529248
99. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:UZk6qv0A6XIC
100. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=2857521586977635756
101. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:9yKSN-GCB0IC
102. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=3584508135828822334,2690260004623125038
103. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:MXK_kJrjxJIC
104. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=17250262855322484964
105. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:bnK-pcrLprsC
106. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=1013699911424020247
107. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:SpbeaW3--B0C
108. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=13121710142778026940
109. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:hC7cP41nSMkC
110. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=1979853099796278161
111. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:2osOgNQ5qMEC
112. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=2959037431421016483
113. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:qUcmZB5y_30C
114. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=11734640105734235266
115. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:QIV2ME_5wuYC
116. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=4495150190825290564
117. https://scholar.google.com/citations?view_op=view_citation&hl=en&oe=ASCII&user=kIUqgbcAAAAJ&citation_for_view=kIUqgbcAAAAJ:sSrBHYA8nusC
118. https://scholar.google.com/scholar?oi=bibs&hl=en&oe=ASCII&cites=1693044839830132615
119. https://www.google.com/intl/en/policies/privacy/
120. https://www.google.com/intl/en/policies/terms/
121. javascript:void(0)
122. https://scholar.google.com/intl/en/scholar/about.html
123. https://support.google.com/websearch?p=scholar_dsa&hl=en&oe=ASCII
Hidden links:
125. javascript:void(0)
126. javascript:void(0)
127. javascript:void(0)
128. javascript:void(0)
129. javascript:void(0)
130. javascript:void(0)
131. javascript:void(0)
132. javascript:void(0)
133. https://scholar.google.com/schhp?hl=en&oe=ASCII
134. javascript:void(0)
135. https://scholar.google.com/schhp?hl=en&oe=ASCII
136. javascript:void(0)
137. javascript:void(0)
Usage: http://www.kk-software.de/kklynxview/get/URL
e.g. http://www.kk-software.de/kklynxview/get/http://www.kk-software.de
Errormessages are in German, sorry ;-)