Manya Sleeper
Manya Sleeper
Dirección de correo verificada de
Citado por
Citado por
Nudges for privacy and security: Understanding and assisting users’ choices online
A Acquisti, I Adjerid, R Balebako, L Brandimarte, LF Cranor, S Komanduri, ...
ACM Computing Surveys (CSUR) 50 (3), 1-41, 2017
The post that wasn't: exploring self-censorship on facebook
M Sleeper, R Balebako, S Das, AL McConahy, J Wiese, LF Cranor
Proceedings of the 2013 conference on Computer supported cooperative work …, 2013
Your attention please: Designing security-decision UIs to make genuine risks harder to ignore
C Bravo-Lillo, S Komanduri, LF Cranor, RW Reeder, M Sleeper, J Downs, ...
Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-12, 2013
Tag, you can see it! Using tags for access control in photo sharing
P Klemperer, Y Liang, M Mazurek, M Sleeper, B Ur, L Bauer, LF Cranor, ...
Proceedings of the SIGCHI conference on human factors in computing systems …, 2012
What matters to users? Factors that affect users' willingness to share information with online advertisers
PG Leon, B Ur, Y Wang, M Sleeper, R Balebako, R Shay, L Bauer, ...
Proceedings of the ninth symposium on usable privacy and security, 1-12, 2013
Stories from survivors: Privacy & security practices when coping with intimate partner abuse
T Matthews, K O'Leary, A Turner, M Sleeper, JP Woelfer, M Shelton, ...
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
Distribution of density along magnetospheric field lines
RE Denton, K Takahashi, IA Galkin, PA Nsumei, X Huang, BW Reinisch, ...
Journal of Geophysical Research: Space Physics 111 (A4), 2006
I read my Twitter the next morning and was astonished: A conversational perspective on Twitter regrets
M Sleeper, J Cranshaw, PG Kelley, B Ur, A Acquisti, LF Cranor, N Sadeh
Proceedings of the 2013 ACM annual conference on Human factors in computing …, 2013
Harder to ignore? revisiting {Pop-Up} fatigue and approaches to prevent it
C Bravo-Lillo, L Cranor, S Komanduri, S Schechter, M Sleeper
10th Symposium On Usable Privacy and Security (SOUPS 2014), 105-111, 2014
Improving computer security dialogs
C Bravo-Lillo, LF Cranor, J Downs, S Komanduri, M Sleeper
IFIP conference on human-computer interaction, 18-35, 2011
The post anachronism: The temporal dimension of Facebook privacy
L Bauer, LF Cranor, S Komanduri, ML Mazurek, MK Reiter, M Sleeper, ...
Proceedings of the 12th ACM Workshop on Workshop on Privacy in the …, 2013
Sharing personal content online: Exploring channel choice and multi-channel behaviors
M Sleeper, W Melicher, H Habib, L Bauer, LF Cranor, ML Mazurek
Proceedings of the 2016 CHI conference on human factors in computing systems …, 2016
I Would Like To..., I Shouldn't..., I Wish I... Exploring Behavior-Change Goals for Social Networking Sites
M Sleeper, A Acquisti, LF Cranor, PG Kelley, SA Munson, N Sadeh
Proceedings of the 18th ACM Conference on Computer Supported Cooperative …, 2015
Toward strong, usable access control for shared distributed data
ML Mazurek, Y Liang, W Melicher, M Sleeper, L Bauer, GR Ganger, ...
12th USENIX Conference on File and Storage Technologies (FAST 14), 89-103, 2014
Are they actually any different? Comparing thousands of financial institutions’ privacy practices
LF Cranor, K Idouchi, PG Leon, M Sleeper, B Ur
Proc. WEIS 13, 2013
Privacy and power: Acknowledging the importance of privacy research and design for vulnerable populations
N McDonald, K Badillo-Urquiola, MG Ames, N Dell, E Keneski, M Sleeper, ...
Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing …, 2020
Operating system framed in case of mistaken identity: measuring the success of web-based spoofing attacks on os password-entry dialogs
C Bravo-Lillo, L Cranor, J Downs, S Komanduri, S Schechter, M Sleeper
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
The future of networked privacy: challenges and opportunities
J Vitak, P Wisniewski, X Page, A Lampinen, E Litt, R De Wolf, PG Kelley, ...
Proceedings of the 18th ACM Conference Companion on Computer Supported …, 2015
Conducting research on Twitter: A call for guidelines and metrics
PG Kelley, J Cranshaw, M Sleeper
Tough times at transitional homeless shelters: Considering the impact of financial insecurity on digital security and privacy
M Sleeper, T Matthews, K O'Leary, A Turner, JP Woelfer, M Shelton, ...
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20