Seguir
Manya Sleeper
Manya Sleeper
Dirección de correo verificada de google.com
Título
Citado por
Citado por
Año
Nudges for privacy and security: Understanding and assisting users’ choices online
A Acquisti, I Adjerid, R Balebako, L Brandimarte, LF Cranor, S Komanduri, ...
ACM Computing Surveys (CSUR) 50 (3), 1-41, 2017
6422017
The post that wasn't: exploring self-censorship on facebook
M Sleeper, R Balebako, S Das, AL McConahy, J Wiese, LF Cranor
Proceedings of the 2013 conference on Computer supported cooperative work …, 2013
2882013
Stories from survivors: Privacy & security practices when coping with intimate partner abuse
T Matthews, K O'Leary, A Turner, M Sleeper, JP Woelfer, M Shelton, ...
Proceedings of the 2017 CHI conference on human factors in computing systems …, 2017
2262017
Your attention please: Designing security-decision UIs to make genuine risks harder to ignore
C Bravo-Lillo, S Komanduri, LF Cranor, RW Reeder, M Sleeper, J Downs, ...
Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-12, 2013
2182013
What matters to users? Factors that affect users' willingness to share information with online advertisers
PG Leon, B Ur, Y Wang, M Sleeper, R Balebako, R Shay, L Bauer, ...
Proceedings of the ninth symposium on usable privacy and security, 1-12, 2013
1892013
Tag, you can see it! Using tags for access control in photo sharing
P Klemperer, Y Liang, M Mazurek, M Sleeper, B Ur, L Bauer, LF Cranor, ...
Proceedings of the SIGCHI conference on human factors in computing systems …, 2012
1872012
Distribution of density along magnetospheric field lines
RE Denton, K Takahashi, IA Galkin, PA Nsumei, X Huang, BW Reinisch, ...
Journal of Geophysical Research: Space Physics 111 (A4), 2006
1652006
I read my Twitter the next morning and was astonished: A conversational perspective on Twitter regrets
M Sleeper, J Cranshaw, PG Kelley, B Ur, A Acquisti, LF Cranor, N Sadeh
Proceedings of the 2013 ACM annual conference on Human factors in computing …, 2013
1552013
Harder to ignore? revisiting {Pop-Up} fatigue and approaches to prevent it
C Bravo-Lillo, L Cranor, S Komanduri, S Schechter, M Sleeper
10th Symposium On Usable Privacy and Security (SOUPS 2014), 105-111, 2014
1002014
The post anachronism: The temporal dimension of Facebook privacy
L Bauer, LF Cranor, S Komanduri, ML Mazurek, MK Reiter, M Sleeper, ...
Proceedings of the 12th ACM Workshop on Workshop on Privacy in the …, 2013
822013
Improving computer security dialogs
C Bravo-Lillo, LF Cranor, J Downs, S Komanduri, M Sleeper
Human-Computer Interaction–INTERACT 2011: 13th IFIP TC 13 International …, 2011
812011
Sharing personal content online: Exploring channel choice and multi-channel behaviors
M Sleeper, W Melicher, H Habib, L Bauer, LF Cranor, ML Mazurek
Proceedings of the 2016 CHI conference on human factors in computing systems …, 2016
562016
SoK: A framework for unifying at-risk user research
N Warford, T Matthews, K Yang, O Akgul, S Consolvo, PG Kelley, ...
2022 IEEE Symposium on Security and Privacy (SP), 2344-2360, 2022
492022
I Would Like To..., I Shouldn't..., I Wish I... Exploring Behavior-Change Goals for Social Networking Sites
M Sleeper, A Acquisti, LF Cranor, PG Kelley, SA Munson, N Sadeh
Proceedings of the 18th ACM Conference on Computer Supported Cooperative …, 2015
442015
Privacy and power: Acknowledging the importance of privacy research and design for vulnerable populations
N McDonald, K Badillo-Urquiola, MG Ames, N Dell, E Keneski, M Sleeper, ...
Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing …, 2020
432020
Toward strong, usable access control for shared distributed data
ML Mazurek, Y Liang, W Melicher, M Sleeper, L Bauer, GR Ganger, ...
12th USENIX Conference on File and Storage Technologies (FAST 14), 89-103, 2014
392014
Are they actually any different? Comparing thousands of financial institutions’ privacy practices
LF Cranor, K Idouchi, PG Leon, M Sleeper, B Ur
Proc. WEIS 13, 2013
342013
The future of networked privacy: challenges and opportunities
J Vitak, P Wisniewski, X Page, A Lampinen, E Litt, R De Wolf, PG Kelley, ...
Proceedings of the 18th ACM Conference Companion on Computer Supported …, 2015
212015
Operating system framed in case of mistaken identity: measuring the success of web-based spoofing attacks on os password-entry dialogs
C Bravo-Lillo, L Cranor, J Downs, S Komanduri, S Schechter, M Sleeper
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
202012
Tough times at transitional homeless shelters: Considering the impact of financial insecurity on digital security and privacy
M Sleeper, T Matthews, K O'Leary, A Turner, JP Woelfer, M Shelton, ...
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
192019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20