Patrick Gage Kelley
Patrick Gage Kelley
Google, University of New Mexico, Carnegie Mellon University
Verified email at google.com - Homepage
TitleCited byYear
Understanding and capturing people's privacy policies in a mobile social networking application
N Sadeh, J Hong, L Cranor, I Fette, P Kelley, M Prabaker, J Rao
Personal and Ubiquitous Computing 13 (6), 401-412, 2009
3882009
Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms
PG Kelley, S Komanduri, ML Mazurek, R Shay, T Vidas, L Bauer, ...
2012 IEEE symposium on security and privacy, 523-537, 2012
3872012
Of passwords and people: measuring the effect of password-composition policies
S Komanduri, R Shay, PG Kelley, ML Mazurek, L Bauer, N Christin, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2011
3552011
A conundrum of permissions: installing applications on an android smartphone
PG Kelley, S Consolvo, LF Cranor, J Jung, N Sadeh, D Wetherall
International conference on financial cryptography and data security, 68-79, 2012
3382012
Encountering stronger password requirements: user attitudes and behaviors
R Shay, S Komanduri, PG Kelley, PG Leon, ML Mazurek, L Bauer, ...
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2, 2010
3142010
A nutrition label for privacy
PG Kelley, J Bresee, LF Cranor, RW Reeder
Proceedings of the 5th Symposium on Usable Privacy and Security, 4, 2009
2982009
How does your password measure up? the effect of strength meters on password creation
B Ur, PG Kelley, S Komanduri, J Lee, M Maass, ML Mazurek, T Passaro, ...
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
2532012
Privacy as part of the app decision-making process
PG Kelley, LF Cranor, N Sadeh
Proceedings of the SIGCHI conference on human factors in computing systems …, 2013
2422013
Who's viewed you?: the impact of feedback in a mobile location-sharing application
JY Tsai, P Kelley, P Drielsma, LF Cranor, J Hong, N Sadeh
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2009
2082009
Location-sharing technologies: Privacy risks and controls
JY Tsai, PG Kelley, LF Cranor, N Sadeh
ISJLP 6, 119, 2010
1972010
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs
M Benisch, PG Kelley, N Sadeh, LF Cranor
Personal and Ubiquitous Computing 15 (7), 679-694, 2011
1962011
Empirical models of privacy in location sharing
E Toch, J Cranshaw, PH Drielsma, JY Tsai, PG Kelley, J Springfield, ...
Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010
1862010
Measuring password guessability for an entire university
ML Mazurek, S Komanduri, T Vidas, L Bauer, N Christin, LF Cranor, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1852013
Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share
J Wiese, PG Kelley, LF Cranor, L Dabbish, JI Hong, J Zimmerman
Proceedings of the 13th international conference on Ubiquitous computing …, 2011
1662011
A comparative study of online privacy policies and formats
AM Mcdonald, RW Reeder, PG Kelley, LF Cranor
International Symposium on Privacy Enhancing Technologies Symposium, 37-55, 2009
1612009
Standardizing privacy notices: an online study of the nutrition label approach
PG Kelley, L Cesca, J Bresee, LF Cranor
Proceedings of the SIGCHI Conference on Human factors in Computing Systems …, 2010
1542010
User-controllable learning of policies
N Sadeh-Koniecpol, PH Drielsma, LF Candor, P Kelley
US Patent 8,423,483, 2013
1382013
Correct horse battery staple: Exploring the usability of system-assigned passphrases
R Shay, PG Kelley, S Komanduri, ML Mazurek, B Ur, T Vidas, L Bauer, ...
Proceedings of the eighth symposium on usable privacy and security, 7, 2012
1302012
Capturing social networking privacy preferences
R Ravichandran, M Benisch, PG Kelley, NM Sadeh
International Symposium on Privacy Enhancing Technologies Symposium, 1-18, 2009
1002009
I read my Twitter the next morning and was astonished: A conversational perspective on Twitter regrets
M Sleeper, J Cranshaw, PG Kelley, B Ur, A Acquisti, LF Cranor, N Sadeh
Proceedings of the SIGCHI conference on human factors in computing systems …, 2013
862013
The system can't perform the operation now. Try again later.
Articles 1–20