关注
Greg Norcie
Greg Norcie
在 indiana.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
" I regretted the minute I pressed share" a qualitative study of regrets on Facebook
Y Wang, G Norcie, S Komanduri, A Acquisti, PG Leon, LF Cranor
Proceedings of the seventh symposium on usable privacy and security, 1-16, 2011
7392011
Who Is Concerned about What? A Study of American, Chinese and Indian Users’ Privacy Concerns on Social Network Sites: (Short Paper)
Y Wang, G Norice, LF Cranor
Trust and Trustworthy Computing: 4th International Conference, TRUST 2011 …, 2011
1882011
A comparative usability study of two-factor authentication
E De Cristofaro, H Du, J Freudiger, G Norcie
arXiv preprint arXiv:1309.5344, 2013
1132013
Reasons, Rewards, Regrets: Privacy Considerations in Location Sharing as an Interactive Practice
S Patil, G Norcie, A Kapadia, AJ Lee
Symposium on Usable Privacy and Security (SOUPS), 2012
1002012
From facebook regrets to facebook privacy nudges
Y Wang, PG Leon, X Chen, S Komanduri
Ohio St. LJ 74, 1307, 2013
672013
Adchoices-compliance with online behavioral advertising notice and choice requirements
S Komanduri, R Shay, G Norcie, B Ur
ISJLP 7, 603, 2011
592011
" Check out where I am!" location-sharing motivations, preferences, and practices
S Patil, G Norcie, A Kapadia, A Lee
CHI'12 Extended Abstracts on Human Factors in Computing Systems, 1997-2002, 2012
532012
Why Johnny can’t blow the whistle: Identifying and reducing usability issues in anonymity systems
G Norcie, J Blythe, K Caine, LJ Camp
Workshop on Usable Security 6, 50-60, 2014
362014
Computer-Implemented System And Method For Verifying Online Dating Profiles
E De Cristofaro, VM Bellotti, G Norcie
US Patent App. 13/706,251, 2014
342014
Bootstrapping trust in online dating: Social verification of online dating profiles
G Norcie, E De Cristofaro, V Bellotti
Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC …, 2013
322013
Eliminating stop-points in the installation and use of anonymity systems: a usability evaluation of the tor browser bundle
G Norcie, K Caine, LJ Camp
5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETS), 2012
242012
Two-factor or not two-factor? A comparative usability study of two-factor authentication
ED Cristofaro, H Du, J Freudiger, G Norcie
Computing Research Repository, 2013
222013
Two-factor or not two-factor
ED Cristofaro, H Du, J Freudiger, G Norcie
A comparative usability study of two-factor authentication. CoRR, abs/1309.5344, 2013
102013
Ethical and practical considerations for compensation of crowdsourced research participants
G Norcie
CHI WS on ethics logs and videotape: Ethics in large scale trials & user …, 2011
102011
The Price Of Privacy: An Examination of the Economic Costs of Abstention from Social Networks
G Norcie, LJ Camp
Proceedings of the Amsterdam Privacy Conference, 2015
22015
AdChoices? Compliance with Online Behavioral Advertising Notice and Choice Requirements. Revised Version
S Komanduri, R Shay, G Norcie, B Ur, LF Cranor, ...
2011
AdChoices? Compliance with Online Behavioral Advertising Notice and Choice Requirements (CMU-CyLab-11-005)
S Komanduri, R Shay, G Norcie, B Ur, L Cranor
Carnegie Mellon University, 0
I/S: A JouRNAL OF LAW AND POLICY FOR THE INFORMATION SOCIETY VOLUME 7 NUMBER 3 SPRING 2012
S Komanduri, R Shay, G Norcie, B Ur, LF Cranor, AM McDonald, ...
Poster: Privacy Attitudes of Facebook Users
G Norcie
Changes 17, 6.3, 0
系统目前无法执行此操作,请稍后再试。
文章 1–19