Suivre
Manya Sleeper
Manya Sleeper
Adresse e-mail validée de google.com
Titre
Citée par
Citée par
Année
Nudges for privacy and security: Understanding and assisting users’ choices online
A Acquisti, I Adjerid, R Balebako, L Brandimarte, LF Cranor, S Komanduri, ...
ACM Computing Surveys (CSUR) 50 (3), 1-41, 2017
5182017
The post that wasn't: exploring self-censorship on facebook
M Sleeper, R Balebako, S Das, AL McConahy, J Wiese, LF Cranor
Proceedings of the 2013 conference on Computer supported cooperative work …, 2013
2742013
Your attention please: Designing security-decision UIs to make genuine risks harder to ignore
C Bravo-Lillo, S Komanduri, LF Cranor, RW Reeder, M Sleeper, J Downs, ...
Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-12, 2013
2022013
Tag, you can see it! Using tags for access control in photo sharing
P Klemperer, Y Liang, M Mazurek, M Sleeper, B Ur, L Bauer, LF Cranor, ...
Proceedings of the SIGCHI conference on human factors in computing systems …, 2012
1872012
Stories from survivors: Privacy & security practices when coping with intimate partner abuse
T Matthews, K O'Leary, A Turner, M Sleeper, JP Woelfer, M Shelton, ...
Proceedings of the 2017 CHI conference on human factors in computing systems …, 2017
1812017
What matters to users? Factors that affect users' willingness to share information with online advertisers
PG Leon, B Ur, Y Wang, M Sleeper, R Balebako, R Shay, L Bauer, ...
Proceedings of the ninth symposium on usable privacy and security, 1-12, 2013
1792013
Distribution of density along magnetospheric field lines
RE Denton, K Takahashi, IA Galkin, PA Nsumei, X Huang, BW Reinisch, ...
Journal of Geophysical Research: Space Physics 111 (A4), 2006
1552006
I read my Twitter the next morning and was astonished: A conversational perspective on Twitter regrets
M Sleeper, J Cranshaw, PG Kelley, B Ur, A Acquisti, LF Cranor, N Sadeh
Proceedings of the 2013 ACM annual conference on Human factors in computing …, 2013
1442013
Harder to ignore
C Bravo-Lillo, L Cranor, S Komanduri, S Schechter, M Sleeper
Revisiting pop-up fatigue and approaches to prevent it, USENIX Association …, 2014
962014
Improving computer security dialogs
C Bravo-Lillo, LF Cranor, J Downs, S Komanduri, M Sleeper
Human-Computer Interaction–INTERACT 2011: 13th IFIP TC 13 International …, 2011
782011
The post anachronism: The temporal dimension of Facebook privacy
L Bauer, LF Cranor, S Komanduri, ML Mazurek, MK Reiter, M Sleeper, ...
Proceedings of the 12th ACM Workshop on Workshop on Privacy in the …, 2013
762013
Sharing personal content online: Exploring channel choice and multi-channel behaviors
M Sleeper, W Melicher, H Habib, L Bauer, LF Cranor, ML Mazurek
Proceedings of the 2016 CHI conference on human factors in computing systems …, 2016
542016
I Would Like To..., I Shouldn't..., I Wish I... Exploring Behavior-Change Goals for Social Networking Sites
M Sleeper, A Acquisti, LF Cranor, PG Kelley, SA Munson, N Sadeh
Proceedings of the 18th ACM Conference on Computer Supported Cooperative …, 2015
412015
Toward strong, usable access control for shared distributed data
ML Mazurek, Y Liang, W Melicher, M Sleeper, L Bauer, GR Ganger, ...
12th {USENIX} Conference on File and Storage Technologies ({FAST} 14), 89-103, 2014
392014
Privacy and power: Acknowledging the importance of privacy research and design for vulnerable populations
N McDonald, K Badillo-Urquiola, MG Ames, N Dell, E Keneski, M Sleeper, ...
Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing …, 2020
362020
Are they actually any different? Comparing thousands of financial institutions’ privacy practices
LF Cranor, K Idouchi, PG Leon, M Sleeper, B Ur
Proc. WEIS 13, 2013
352013
The future of networked privacy: challenges and opportunities
J Vitak, P Wisniewski, X Page, A Lampinen, E Litt, R De Wolf, PG Kelley, ...
Proceedings of the 18th ACM Conference Companion on Computer Supported …, 2015
202015
Operating system framed in case of mistaken identity: measuring the success of web-based spoofing attacks on os password-entry dialogs
C Bravo-Lillo, L Cranor, J Downs, S Komanduri, S Schechter, M Sleeper
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
202012
Conducting research on Twitter: A call for guidelines and metrics
PG Kelley, M Sleeper, J Cranshaw
CSCW Measuring Networked Social Privacy Workshop 2013, 2013
182013
Sok: A framework for unifying at-risk user research
N Warford, T Matthews, K Yang, O Akgul, S Consolvo, PG Kelley, ...
2022 IEEE Symposium on Security and Privacy (SP), 2344-2360, 2022
162022
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20