Skip to main content

Showing 1–18 of 18 results for author: Cranor, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.22073  [pdf, ps, other

    cs.CY

    A Closer Look at the Existing Risks of Generative AI: Mapping the Who, What, and How of Real-World Incidents

    Authors: Megan Li, Wendy Bickersteth, Ningjing Tang, Jason Hong, Lorrie Cranor, Hong Shen, Hoda Heidari

    Abstract: Due to its general-purpose nature, Generative AI is applied in an ever-growing set of domains and tasks, leading to an expanding set of risks of harm impacting people, communities, society, and the environment. These risks may arise due to failures during the design and development of the technology, as well as during its release, deployment, or downstream usages and appropriations of its outputs.… ▽ More

    Submitted 2 June, 2025; v1 submitted 28 May, 2025; originally announced May 2025.

    Comments: 21 pages including references and appendices, 5 figures, submitted to Conference on AI, Ethics, and Society (AIES 2025)

  2. arXiv:2412.18716  [pdf, other

    cs.CR cs.HC

    Design and Evaluation of Privacy-Preserving Protocols for Agent-Facilitated Mobile Money Services in Kenya

    Authors: Karen Sowon, Collins W. Munyendo, Lily Klucinec, Eunice Maingi, Gerald Suleh, Lorrie Faith Cranor, Giulia Fanti, Conrad Tucker, Assane Gueye

    Abstract: Mobile Money (MoMo), a technology that allows users to complete digital financial transactions using a mobile phone without requiring a bank account, has become a common method for processing financial transactions in Africa and other developing regions. Operationally, users can deposit (exchange cash for mobile money tokens) and withdraw with the help of human agents who facilitate a near end-to-… ▽ More

    Submitted 24 December, 2024; originally announced December 2024.

  3. arXiv:2408.09678  [pdf

    cs.CY

    Conference Submission and Review Policies to Foster Responsible Computing Research

    Authors: Lorrie Cranor, Kim Hazelwood, Daniel Lopresti, Amanda Stent

    Abstract: This report by the CRA Working Group on Socially Responsible Computing outlines guidelines for ethical and responsible research practices in computing conferences. Key areas include avoiding harm, responsible vulnerability disclosure, ethics board review, obtaining consent, accurate reporting, managing financial conflicts of interest, and the use of generative AI. The report emphasizes the need fo… ▽ More

    Submitted 18 August, 2024; originally announced August 2024.

    Comments: Computing Research Association (CRA)

  4. arXiv:2408.08131  [pdf, other

    cs.CR

    Detection and Impact of Debit/Credit Card Fraud: Victims' Experiences

    Authors: Eman Alashwali, Ragashree Mysuru Chandrashekar, Mandy Lanyon, Lorrie Faith Cranor

    Abstract: It might be intuitive to expect that small or reimbursed financial loss resulting from credit or debit card fraud would have low or no financial impact on victims. However, little is known about the extent to which financial fraud impacts victims psychologically, how victims detect the fraud, which detection methods are most efficient, and how the fraud detection and reporting processes can be imp… ▽ More

    Submitted 15 August, 2024; originally announced August 2024.

    Comments: This document is the author's manuscript for a paper to appear in Proceedings of the European Symposium on Usable Security (EuroUSEC), 2024

  5. arXiv:2408.00864  [pdf, other

    cs.HC

    Recruiting Teenage Participants for an Online Security Experiment: A Case Study Using Peachjar

    Authors: Elijah Bouma-Sims, Lily Klucinec, Mandy Lanyon, Lorrie Faith Cranor, Julie Downs

    Abstract: The recruitment of teenagers for usable privacy and security research is challenging, but essential. This case study presents our experience using the online flier distribution service Peachjar to recruit minor teenagers for an online security experiment. By distributing fliers to 90 K-12 schools, we recruited a diverse sample of 55 participants at an estimated cost per participant of $43.18. We d… ▽ More

    Submitted 1 August, 2024; originally announced August 2024.

    Comments: To be presented at the 9th Workshop on Inclusive Privacy and Security (WIPS 2024) at the Twentieth Symposium on Usable Privacy and Security (SOUPS 2024)

  6. arXiv:2407.10094  [pdf, other

    cs.HC

    Work From Home and Privacy Challenges: What Do Workers Face and What are They Doing About it?

    Authors: Eman Alashwali, Joanne Peca, Mandy Lanyon, Lorrie Cranor

    Abstract: The COVID-19 pandemic has reshaped the way people work, normalizing the practice of working from home. However, work from home (WFH) can cause a blurring of personal and professional boundaries, surfacing new privacy issues, especially when workers take work meetings from their homes. As WFH arrangements are now standard practice in many organizations, addressing the associated privacy concerns sh… ▽ More

    Submitted 19 March, 2025; v1 submitted 14 July, 2024; originally announced July 2024.

    Comments: This document is the author's manuscript for a paper accepted at the Journal of Cybersecurity. V2->V3 updates: added post-conclusion sections (Sections 7 to 10) to be compatible with the journal's paper

  7. arXiv:2405.13857  [pdf, other

    cs.CR cs.CY cs.HC

    What Do Privacy Advertisements Communicate to Consumers?

    Authors: Xiaoxin Shen, Eman Alashwali, Lorrie Faith Cranor

    Abstract: When companies release marketing materials aimed at promoting their privacy practices or highlighting specific privacy features, what do they actually communicate to consumers? In this paper, we explore the impact of privacy marketing on: (1) consumers' attitudes toward the organizations providing the campaigns, (2) overall privacy awareness, and (3) the actionability of suggested privacy advice.… ▽ More

    Submitted 24 July, 2024; v1 submitted 22 May, 2024; originally announced May 2024.

    Comments: This document is the author's manuscript for a paper appeared at the Proceedings on Privacy Enhancing Technologies 2024(4)

  8. arXiv:2402.03582  [pdf, other

    cs.HC cs.CR

    Matcha: An IDE Plugin for Creating Accurate Privacy Nutrition Labels

    Authors: Tianshi Li, Lorrie Faith Cranor, Yuvraj Agarwal, Jason I. Hong

    Abstract: Apple and Google introduced their versions of privacy nutrition labels to the mobile app stores to better inform users of the apps' data practices. However, these labels are self-reported by developers and have been found to contain many inaccuracies due to misunderstandings of the label taxonomy. In this work, we present Matcha, an IDE plugin that uses automated code analysis to help developers c… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

    Comments: 38 pages

  9. arXiv:2312.03918  [pdf, other

    cs.HC

    Data Safety vs. App Privacy: Comparing the Usability of Android and iOS Privacy Labels

    Authors: Yanzi Lin, Jaideep Juneja, Eleanor Birrell, Lorrie Faith Cranor

    Abstract: Privacy labels -- standardized, compact representations of data collection and data use practices -- are often presented as a solution to the shortcomings of privacy policies. Apple introduced mandatory privacy labels for apps in its App Store in December 2020; Google introduced mandatory labels for Android apps in July 2022. iOS app privacy labels have been evaluated and critiqued in prior work.… ▽ More

    Submitted 6 January, 2024; v1 submitted 6 December, 2023; originally announced December 2023.

    Comments: This paper has been accepted to Privacy Enhancing Technologies Symposium (PETS) 2024

  10. arXiv:2311.00830  [pdf, other

    cs.HC

    User Experiences with Third-Party SIM Cards and ID Registration in Kenya and Tanzania

    Authors: Edith Luhanga, Karen Sowon, Lorrie Faith Cranor, Giulia Fanti, Conrad Tucker, Assane Gueye

    Abstract: Mobile money services in Sub-Saharan Africa (SSA) have increased access to financial services. To ensure proper identification of users, countries have put in place Know-Your-Customer (KYC) measures such as SIM registration using an official identification. However, half of the 850 million people without IDs globally live in SSA, and the use of SIM cards registered in another person's name (third-… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

  11. arXiv:2309.00226  [pdf, other

    cs.HC

    The Role of User-Agent Interactions on Mobile Money Practices in Kenya and Tanzania

    Authors: Karen Sowon, Edith Luhanga, Lorrie Faith Cranor, Giulia Fanti, Conrad Tucker, Assane Gueye

    Abstract: Digital financial services have catalyzed financial inclusion in Africa. Commonly implemented as a mobile wallet service referred to as mobile money (MoMo), the technology provides enormous benefits to its users, some of whom have long been unbanked. While the benefits of mobile money services have largely been documented, the challenges that arise -- especially in the interactions between human s… ▽ More

    Submitted 31 August, 2023; originally announced September 2023.

    Comments: To be published in IEEE Symposium on Security and Privacy 2024

    ACM Class: H.1.2

  12. arXiv:2308.10148  [pdf, ps, other

    cs.CY cs.CR cs.HC

    Privacy Perceptions and Behaviors of Google Personal Account Holders in Saudi Arabia

    Authors: Eman Alashwali, Lorrie Faith Cranor

    Abstract: While privacy perceptions and behaviors have been investigated in Western societies, little is known about these issues in non-Western societies. To bridge this gap, we interviewed 30 Google personal account holders in Saudi Arabia about their privacy perceptions and behaviors regarding the activity data that Google saves about them. Our study focuses on Google's Activity Controls, which enable us… ▽ More

    Submitted 7 August, 2024; v1 submitted 19 August, 2023; originally announced August 2023.

    Comments: Appeared in Proceedings of Human-Computer Interaction International (HCII), 2024. Changes from prev. version: correct a typo in author country name

  13. arXiv:2002.04631  [pdf, other

    cs.CY cs.CR cs.HC

    Ask the Experts: What Should Be on an IoT Privacy and Security Label?

    Authors: Pardis Emami-Naeini, Yuvraj Agarwal, Lorrie Faith Cranor, Hanan Hibshi

    Abstract: Information about the privacy and security of Internet of Things (IoT) devices is not readily available to consumers who want to consider it before making purchase decisions. While legislators have proposed adding succinct, consumer accessible, labels, they do not provide guidance on the content of these labels. In this paper, we report on the results of a series of interviews and surveys with pri… ▽ More

    Submitted 11 February, 2020; originally announced February 2020.

    Comments: To appear at the 41st IEEE Symposium on Security and Privacy (S&P'20)

  14. arXiv:1604.03160  [pdf

    cs.CY

    Towards a Privacy Research Roadmap for the Computing Community

    Authors: Lorrie Cranor, Tal Rabin, Vitaly Shmatikov, Salil Vadhan, Daniel Weitzner

    Abstract: Great advances in computing and communication technology are bringing many benefits to society, with transformative changes and financial opportunities being created in health care, transportation, education, law enforcement, national security, commerce, and social interactions. Many of these benefits, however, involve the use of sensitive personal data, and thereby raise concerns about privacy. F… ▽ More

    Submitted 11 April, 2016; originally announced April 2016.

    Comments: A Computing Community Consortium (CCC) white paper, 23 pages

  15. Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords

    Authors: Jeremiah Blocki, Saranga Komanduri, Lorrie Cranor, Anupam Datta

    Abstract: We report on a user study that provides evidence that spaced repetition and a specific mnemonic technique enable users to successfully recall multiple strong passwords over time. Remote research participants were asked to memorize 4 Person-Action-Object (PAO) stories where they chose a famous person from a drop-down list and were given machine-generated random action-object pairs. Users were also… ▽ More

    Submitted 23 January, 2020; v1 submitted 6 October, 2014; originally announced October 2014.

  16. arXiv:cs/0001011  [pdf

    cs.CY

    Agents of Choice: Tools that Facilitate Notice and Choice about Web Site Data Practices

    Authors: Lorrie Faith Cranor

    Abstract: A variety of tools have been introduced recently that are designed to help people protect their privacy on the Internet. These tools perform many different functions in-cluding encrypting and/or anonymizing communications, preventing the use of persistent identifiers such as cookies, automatically fetching and analyzing web site privacy policies, and displaying privacy-related information to use… ▽ More

    Submitted 14 January, 2000; originally announced January 2000.

    Comments: 8 pages

    ACM Class: K.4.1

    Journal ref: Proceedings of the 21st International Conference on Privacy and Personal Data Protection, 13-15 September 1999, Hong Kong SAR, China, p. 19-25

  17. arXiv:cs/9904010  other

    cs.CY cs.HC

    Beyond Concern: Understanding Net Users' Attitudes About Online Privacy

    Authors: Lorrie Faith Cranor, Joseph Reagle, Mark S. Ackerman

    Abstract: People are concerned about privacy, particularly on the Internet. While many studies have provided evidence of this concern, few have explored the nature of the concern in detail, especially for the online environment. With this study, we have tried to better understand the nature of online privacy concerns; we look beyond the fact that people are concerned and attempt to understand how they are… ▽ More

    Submitted 18 April, 1999; originally announced April 1999.

    Comments: 5 figures and appendix

    Report number: AT&T Labs-Research Technical Report TR 99.4.3 ACM Class: K.4.1

  18. arXiv:cs/9809018  [pdf, ps, other

    cs.CY

    Influencing Software Usage

    Authors: Lorrie Faith Cranor, Rebecca N. Wright

    Abstract: Technology designers often strive to design systems that are flexible enough to be used in a wide range of situations. Software engineers, in particular, are trained to seek general solutions to problems. General solutions can be used not only to address the problem at hand, but also to address a wide range of problems that the designers may not have even anticipated. Sometimes designers wish to… ▽ More

    Submitted 11 September, 1998; originally announced September 1998.

    Comments: Prepared for the 26th Telecommunications Policy Research Conference, October 3-5, 1998, Alexandria, VA

    ACM Class: K.4.0; K.6.3