Patrick G. Kelley, Ph.D. - Publications

Affiliations: 
2013 Computer Science Carnegie Mellon University, Pittsburgh, PA 
Area:
Computer Science, Information Technology

22 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2013 Mazurek ML, Komanduri S, Vidas T, Bauer L, Christin N, Cranor LF, Kelley PG, Shay R, Ur B. Measuring password guessability for an entire university Proceedings of the Acm Conference On Computer and Communications Security. 173-186. DOI: 10.1145/2508859.2516726  0.485
2013 Kelley PG, Cranor LF, Sadeh N. Privacy as part of the app decision-making process Conference On Human Factors in Computing Systems - Proceedings. 3393-3402. DOI: 10.1145/2470654.2466466  0.489
2013 Sleeper M, Cranshaw J, Kelley PG, Ur B, Acquisti A, Cranor LF, Sadeh N. "I read my Twitter the next morning and was astonished" a conversational perspective on Twitter regrets Conference On Human Factors in Computing Systems - Proceedings. 3277-3286. DOI: 10.1145/2470654.2466448  0.577
2013 Kelley PG, Komanduri S, Mazurek ML, Shay R, Vidas T, Bauer L, Christin N, Cranor LF. The impact of length and mathematical operators on the usability and security of system-assigned one-time PINs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7862: 34-51. DOI: 10.1007/978-3-642-41320-9_3  0.492
2012 Shay R, Kelley PG, Komanduri S, Mazurek ML, Ur B, Vidas T, Bauer L, Christin N, Cranor LF. Correct horse battery staple: Exploring the usability of system-assigned passphrases Soups 2012 - Proceedings of the 8th Symposium On Usable Privacy and Security. DOI: 10.1145/2335356.2335366  0.483
2012 Kelley PG, Komanduri S, Mazurek ML, Shay R, Vidas T, Bauer L, Christin N, Cranor LF, López J. Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms Proceedings - Ieee Symposium On Security and Privacy. 523-537. DOI: 10.1109/SP.2012.38  0.46
2012 Kelley PG, Consolvo S, Cranor LF, Jung J, Sadeh N, Wetherall D. A conundrum of permissions: Installing applications on an android smartphone Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7398: 68-79. DOI: 10.1007/978-3-642-34638-5_6  0.604
2011 Wiese J, Kelley PG, Cranor LF, Dabbish L, Hong JI, Zimmerman J. Are you close with me? Are you nearby? Investigating social groups, closeness, and willingness to share Ubicomp'11 - Proceedings of the 2011 Acm Conference On Ubiquitous Computing. 197-206. DOI: 10.1145/2030112.2030140  0.53
2011 Komanduri S, Shay R, Kelley PG, Mazurek ML, Bauer L, Christin N, Cranor LF, Egelman S. Of passwords and people: Measuring the effect of password-composition policies Conference On Human Factors in Computing Systems - Proceedings. 2595-2604. DOI: 10.1145/1978942.1979321  0.695
2011 Kelley PG, Benisch M, Cranor LF, Sadeh N. When are users comfortable sharing locations with advertisers? Conference On Human Factors in Computing Systems - Proceedings. 2449-2452. DOI: 10.1145/1978942.1979299  0.612
2011 Benisch M, Kelley PG, Sadeh N, Cranor LF. Capturing location-privacy preferences: Quantifying accuracy and user-burden tradeoffs Personal and Ubiquitous Computing. 15: 679-694. DOI: 10.1007/s00779-010-0346-0  0.628
2011 Kelley PG, Brewer R, Mayer Y, Cranor LF, Sadeh N. An investigation into facebook friend grouping Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6948: 216-233. DOI: 10.1007/978-3-642-23765-2_15  0.587
2011 Balebako R, Leon PG, Almuhimedi H, Kelley PG, Mugan J, Acquisti A, Cranor LF, Sadeh N. Nudging users towards privacy on mobile devices Ceur Workshop Proceedings. 722: 23-26.  0.561
2010 Toch E, Cranshaw J, Hankes-Drielsma P, Springfield J, Kelley PG, Cranor L, Hong J, Sadeh N. Locaccino: A privacy-centric location sharing application Ubicomp'10 - Proceedings of the 2010 Acm Conference On Ubiquitous Computing. 381-382. DOI: 10.1145/1864431.1864446  0.401
2010 Shay R, Komanduri S, Kelley PG, Leon PG, Mazurek ML, Bauer L, Christin N, Cranor LF. Encountering stronger password requirements: User attitudes and behaviors Acm International Conference Proceeding Series. DOI: 10.1145/1837110.1837113  0.662
2010 Kelley PG, Cesca L, Bresee J, Cranor LF. Standardizing privacy notices: An online study of the nutrition label approach Conference On Human Factors in Computing Systems - Proceedings. 3: 1573-1582. DOI: 10.1145/1753326.1753561  0.659
2009 Kelley PG, Bresee J, Cranor LF, Reeder RW. A "nutrition label" for privacy Soups 2009 - Proceedings of the 5th Symposium On Usable Privacy and Security. DOI: 10.1145/1572532.1572538  0.629
2009 Kelley PG. Designing a privacy label: Assisting consumer understanding of online privacy practices Conference On Human Factors in Computing Systems - Proceedings. 3347-3352. DOI: 10.1145/1520340.1520484  0.392
2009 McDonald AM, Reeder RW, Kelley PG, Cranor LF. A comparative study of online privacy policies and formats Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5672: 37-55. DOI: 10.1007/978-3-642-03168-7_3  0.7
2009 Ravichandran R, Benisch M, Kelley PG, Sadeh NM. Capturing social networking privacy preferences: Can default policies help alleviate tradeoffs between expressiveness and user burden? Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5672: 1-18. DOI: 10.1007/978-3-642-03168-7_1  0.346
2008 Reeder RW, Kelley PG, McDonald AM, Cranor LF. A user study of the expandable grid applied to P3P privacy policy visualization Proceedings of the Acm Conference On Computer and Communications Security. 45-54. DOI: 10.1145/1456403.1456413  0.712
2008 Kelley PG, Drielsma PH, Sadeh N, Cranor LF. User-controllable learning of security and privacy policies Proceedings of the Acm Conference On Computer and Communications Security. 11-18. DOI: 10.1145/1456377.1456380  0.625
Show low-probability matches.