" I regretted the minute I pressed share" a qualitative study of regrets on Facebook Y Wang, G Norcie, S Komanduri, A Acquisti, PG Leon, LF Cranor Proceedings of the seventh symposium on usable privacy and security, 1-16, 2011 | 739 | 2011 |
Who Is Concerned about What? A Study of American, Chinese and Indian Users’ Privacy Concerns on Social Network Sites: (Short Paper) Y Wang, G Norice, LF Cranor Trust and Trustworthy Computing: 4th International Conference, TRUST 2011 …, 2011 | 188 | 2011 |
A comparative usability study of two-factor authentication E De Cristofaro, H Du, J Freudiger, G Norcie arXiv preprint arXiv:1309.5344, 2013 | 113 | 2013 |
Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing as an Interactive Practice S Patil, G Norcie, A Kapadia, AJ Lee Symposium on Usable Privacy and Security (SOUPS), 2012 | 100 | 2012 |
From facebook regrets to facebook privacy nudges Y Wang, PG Leon, X Chen, S Komanduri Ohio St. LJ 74, 1307, 2013 | 67 | 2013 |
Adchoices-compliance with online behavioral advertising notice and choice requirements S Komanduri, R Shay, G Norcie, B Ur ISJLP 7, 603, 2011 | 59 | 2011 |
" Check out where I am!" location-sharing motivations, preferences, and practices S Patil, G Norcie, A Kapadia, A Lee CHI'12 Extended Abstracts on Human Factors in Computing Systems, 1997-2002, 2012 | 53 | 2012 |
Why Johnny can’t blow the whistle: Identifying and reducing usability issues in anonymity systems G Norcie, J Blythe, K Caine, LJ Camp Workshop on Usable Security 6, 50-60, 2014 | 36 | 2014 |
Computer-Implemented System And Method For Verifying Online Dating Profiles E De Cristofaro, VM Bellotti, G Norcie US Patent App. 13/706,251, 2014 | 34 | 2014 |
Bootstrapping trust in online dating: Social verification of online dating profiles G Norcie, E De Cristofaro, V Bellotti Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC …, 2013 | 32 | 2013 |
Eliminating stop-points in the installation and use of anonymity systems: a usability evaluation of the tor browser bundle G Norcie, K Caine, LJ Camp 5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETS), 2012 | 24 | 2012 |
Two-factor or not two-factor? A comparative usability study of two-factor authentication ED Cristofaro, H Du, J Freudiger, G Norcie Computing Research Repository, 2013 | 22 | 2013 |
Two-factor or not two-factor ED Cristofaro, H Du, J Freudiger, G Norcie A comparative usability study of two-factor authentication. CoRR, abs/1309.5344, 2013 | 10 | 2013 |
Ethical and practical considerations for compensation of crowdsourced research participants G Norcie CHI WS on ethics logs and videotape: Ethics in large scale trials & user …, 2011 | 10 | 2011 |
The Price Of Privacy: An Examination of the Economic Costs of Abstention from Social Networks G Norcie, LJ Camp Proceedings of the Amsterdam Privacy Conference, 2015 | 2 | 2015 |
AdChoices? Compliance with Online Behavioral Advertising Notice and Choice Requirements. Revised Version S Komanduri, R Shay, G Norcie, B Ur, LF Cranor, ... | | 2011 |
AdChoices? Compliance with Online Behavioral Advertising Notice and Choice Requirements (CMU-CyLab-11-005) S Komanduri, R Shay, G Norcie, B Ur, L Cranor Carnegie Mellon University, 0 | | |
I/S: A JouRNAL OF LAW AND POLICY FOR THE INFORMATION SOCIETY VOLUME 7 NUMBER 3 SPRING 2012 S Komanduri, R Shay, G Norcie, B Ur, LF Cranor, AM McDonald, ... | | |
Poster: Privacy Attitudes of Facebook Users G Norcie Changes 17, 6.3, 0 | | |