Follow
Manya Sleeper
Manya Sleeper
Verified email at google.com
Title
Cited by
Cited by
Year
Nudges for privacy and security: Understanding and assisting users’ choices online
A Acquisti, I Adjerid, R Balebako, L Brandimarte, LF Cranor, S Komanduri, ...
ACM Computing Surveys (CSUR) 50 (3), 1-41, 2017
4262017
The post that wasn't: exploring self-censorship on facebook
M Sleeper, R Balebako, S Das, AL McConahy, J Wiese, LF Cranor
Proceedings of the 2013 conference on Computer supported cooperative work …, 2013
2522013
Your attention please: Designing security-decision UIs to make genuine risks harder to ignore
C Bravo-Lillo, S Komanduri, LF Cranor, RW Reeder, M Sleeper, J Downs, ...
Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-12, 2013
1902013
Tag, you can see it! Using tags for access control in photo sharing
P Klemperer, Y Liang, M Mazurek, M Sleeper, B Ur, L Bauer, LF Cranor, ...
Proceedings of the SIGCHI conference on human factors in computing systems …, 2012
1812012
What matters to users? Factors that affect users' willingness to share information with online advertisers
PG Leon, B Ur, Y Wang, M Sleeper, R Balebako, R Shay, L Bauer, ...
Proceedings of the ninth symposium on usable privacy and security, 1-12, 2013
1682013
Stories from survivors: Privacy & security practices when coping with intimate partner abuse
T Matthews, K O'Leary, A Turner, M Sleeper, JP Woelfer, M Shelton, ...
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
1492017
Distribution of density along magnetospheric field lines
RE Denton, K Takahashi, IA Galkin, PA Nsumei, X Huang, BW Reinisch, ...
Journal of Geophysical Research: Space Physics 111 (A4), 2006
1442006
I read my Twitter the next morning and was astonished: A conversational perspective on Twitter regrets
M Sleeper, J Cranshaw, PG Kelley, B Ur, A Acquisti, LF Cranor, N Sadeh
Proceedings of the 2013 ACM annual conference on Human factors in computing …, 2013
1392013
Harder to ignore? revisiting {Pop-Up} fatigue and approaches to prevent it
C Bravo-Lillo, L Cranor, S Komanduri, S Schechter, M Sleeper
10th Symposium On Usable Privacy and Security (SOUPS 2014), 105-111, 2014
922014
Improving computer security dialogs
C Bravo-Lillo, LF Cranor, J Downs, S Komanduri, M Sleeper
IFIP conference on human-computer interaction, 18-35, 2011
742011
The post anachronism: The temporal dimension of Facebook privacy
L Bauer, LF Cranor, S Komanduri, ML Mazurek, MK Reiter, M Sleeper, ...
Proceedings of the 12th ACM Workshop on Workshop on Privacy in the …, 2013
722013
Sharing personal content online: Exploring channel choice and multi-channel behaviors
M Sleeper, W Melicher, H Habib, L Bauer, LF Cranor, ML Mazurek
Proceedings of the 2016 CHI conference on human factors in computing systems …, 2016
452016
I Would Like To..., I Shouldn't..., I Wish I... Exploring Behavior-Change Goals for Social Networking Sites
M Sleeper, A Acquisti, LF Cranor, PG Kelley, SA Munson, N Sadeh
Proceedings of the 18th ACM Conference on Computer Supported Cooperative …, 2015
372015
Toward strong, usable access control for shared distributed data
ML Mazurek, Y Liang, W Melicher, M Sleeper, L Bauer, GR Ganger, ...
12th USENIX Conference on File and Storage Technologies (FAST 14), 89-103, 2014
372014
Are they actually any different? Comparing thousands of financial institutions’ privacy practices
LF Cranor, K Idouchi, PG Leon, M Sleeper, B Ur
Proc. WEIS 13, 2013
352013
Operating system framed in case of mistaken identity: measuring the success of web-based spoofing attacks on os password-entry dialogs
C Bravo-Lillo, L Cranor, J Downs, S Komanduri, S Schechter, M Sleeper
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
202012
Privacy and power: Acknowledging the importance of privacy research and design for vulnerable populations
N McDonald, K Badillo-Urquiola, MG Ames, N Dell, E Keneski, M Sleeper, ...
Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing …, 2020
192020
The future of networked privacy: challenges and opportunities
J Vitak, P Wisniewski, X Page, A Lampinen, E Litt, R De Wolf, PG Kelley, ...
Proceedings of the 18th ACM Conference Companion on Computer Supported …, 2015
192015
Conducting research on Twitter: A call for guidelines and metrics
PG Kelley, J Cranshaw, M Sleeper
182013
Tough times at transitional homeless shelters: Considering the impact of financial insecurity on digital security and privacy
M Sleeper, T Matthews, K O'Leary, A Turner, JP Woelfer, M Shelton, ...
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
122019
The system can't perform the operation now. Try again later.
Articles 1–20