Follow
Manya Sleeper
Manya Sleeper
Verified email at google.com
Title
Cited by
Cited by
Year
Nudges for privacy and security: Understanding and assisting users’ choices online
A Acquisti, I Adjerid, R Balebako, L Brandimarte, LF Cranor, S Komanduri, ...
ACM Computing Surveys (CSUR) 50 (3), 1-41, 2017
6282017
The post that wasn't: exploring self-censorship on facebook
M Sleeper, R Balebako, S Das, AL McConahy, J Wiese, LF Cranor
Proceedings of the 2013 conference on Computer supported cooperative work …, 2013
2842013
Stories from survivors: Privacy & security practices when coping with intimate partner abuse
T Matthews, K O'Leary, A Turner, M Sleeper, JP Woelfer, M Shelton, ...
Proceedings of the 2017 CHI conference on human factors in computing systems …, 2017
2212017
Your attention please: Designing security-decision UIs to make genuine risks harder to ignore
C Bravo-Lillo, S Komanduri, LF Cranor, RW Reeder, M Sleeper, J Downs, ...
Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-12, 2013
2162013
What matters to users? Factors that affect users' willingness to share information with online advertisers
PG Leon, B Ur, Y Wang, M Sleeper, R Balebako, R Shay, L Bauer, ...
Proceedings of the ninth symposium on usable privacy and security, 1-12, 2013
1862013
Tag, you can see it! Using tags for access control in photo sharing
P Klemperer, Y Liang, M Mazurek, M Sleeper, B Ur, L Bauer, LF Cranor, ...
Proceedings of the SIGCHI conference on human factors in computing systems …, 2012
1852012
Distribution of density along magnetospheric field lines
RE Denton, K Takahashi, IA Galkin, PA Nsumei, X Huang, BW Reinisch, ...
Journal of Geophysical Research: Space Physics 111 (A4), 2006
1642006
I read my Twitter the next morning and was astonished: A conversational perspective on Twitter regrets
M Sleeper, J Cranshaw, PG Kelley, B Ur, A Acquisti, LF Cranor, N Sadeh
Proceedings of the 2013 ACM annual conference on Human factors in computing …, 2013
1542013
Harder to ignore? revisiting {Pop-Up} fatigue and approaches to prevent it
C Bravo-Lillo, L Cranor, S Komanduri, S Schechter, M Sleeper
10th Symposium On Usable Privacy and Security (SOUPS 2014), 105-111, 2014
1002014
The post anachronism: The temporal dimension of Facebook privacy
L Bauer, LF Cranor, S Komanduri, ML Mazurek, MK Reiter, M Sleeper, ...
Proceedings of the 12th ACM Workshop on Workshop on Privacy in the …, 2013
822013
Improving computer security dialogs
C Bravo-Lillo, LF Cranor, J Downs, S Komanduri, M Sleeper
Human-Computer Interaction–INTERACT 2011: 13th IFIP TC 13 International …, 2011
802011
Sharing personal content online: Exploring channel choice and multi-channel behaviors
M Sleeper, W Melicher, H Habib, L Bauer, LF Cranor, ML Mazurek
Proceedings of the 2016 CHI conference on human factors in computing systems …, 2016
562016
SoK: A framework for unifying at-risk user research
N Warford, T Matthews, K Yang, O Akgul, S Consolvo, PG Kelley, ...
2022 IEEE Symposium on Security and Privacy (SP), 2344-2360, 2022
452022
I Would Like To..., I Shouldn't..., I Wish I... Exploring Behavior-Change Goals for Social Networking Sites
M Sleeper, A Acquisti, LF Cranor, PG Kelley, SA Munson, N Sadeh
Proceedings of the 18th ACM Conference on Computer Supported Cooperative …, 2015
442015
Privacy and power: Acknowledging the importance of privacy research and design for vulnerable populations
N McDonald, K Badillo-Urquiola, MG Ames, N Dell, E Keneski, M Sleeper, ...
Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing …, 2020
412020
Toward strong, usable access control for shared distributed data
ML Mazurek, Y Liang, W Melicher, M Sleeper, L Bauer, GR Ganger, ...
12th USENIX Conference on File and Storage Technologies (FAST 14), 89-103, 2014
392014
Are they actually any different? Comparing thousands of financial institutions’ privacy practices
LF Cranor, K Idouchi, PG Leon, M Sleeper, B Ur
Proc. WEIS 13, 2013
342013
The future of networked privacy: challenges and opportunities
J Vitak, P Wisniewski, X Page, A Lampinen, E Litt, R De Wolf, PG Kelley, ...
Proceedings of the 18th ACM Conference Companion on Computer Supported …, 2015
212015
Operating system framed in case of mistaken identity: measuring the success of web-based spoofing attacks on os password-entry dialogs
C Bravo-Lillo, L Cranor, J Downs, S Komanduri, S Schechter, M Sleeper
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
202012
Tough times at transitional homeless shelters: Considering the impact of financial insecurity on digital security and privacy
M Sleeper, T Matthews, K O'Leary, A Turner, JP Woelfer, M Shelton, ...
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
182019
The system can't perform the operation now. Try again later.
Articles 1–20