-
1تقرير
-
2تقرير
المؤلفون: Li, Tianshi, Cranor, Lorrie Faith, Agarwal, Yuvraj, Hong, Jason I.
مصطلحات موضوعية: Computer Science - Human-Computer Interaction, Computer Science - Cryptography and Security
الوصول الحر: http://arxiv.org/abs/2402.03582Test
-
3تقرير
-
4تقرير
المؤلفون: Luhanga, Edith, Sowon, Karen, Cranor, Lorrie Faith, Fanti, Giulia, Tucker, Conrad, Gueye, Assane
مصطلحات موضوعية: Computer Science - Human-Computer Interaction
الوصول الحر: http://arxiv.org/abs/2311.00830Test
-
5تقرير
المؤلفون: Sowon, Karen, Luhanga, Edith, Cranor, Lorrie Faith, Fanti, Giulia, Tucker, Conrad, Gueye, Assane
مصطلحات موضوعية: Computer Science - Human-Computer Interaction, H.1.2
الوصول الحر: http://arxiv.org/abs/2309.00226Test
-
6تقرير
-
7دورية أكاديمية
المؤلفون: Choy, Christopher, Young, Ellie, Li, Megan, Cranor, Lorrie Faith, Peha, Jon M.
المساهمون: National Science Foundation
المصدر: Telecommunications Policy ; page 102717 ; ISSN 0308-5961
مصطلحات موضوعية: Information Systems, Communication, Library and Information Sciences, Economics and Econometrics, Management, Monitoring, Policy and Law, Management Information Systems
الإتاحة: https://doi.org/10.1016/j.telpol.2024.102717Test
https://api.elsevier.com/content/article/PII:S0308596124000144?httpAccept=text/xmlTest
https://api.elsevier.com/content/article/PII:S0308596124000144?httpAccept=text/plainTest -
8تقرير
-
9دورية
المؤلفون: Cranor, Lorrie Faith1 (AUTHOR) lorrie@cmu.edu, Agarwal, Yuvraj1 (AUTHOR) yuvraj@cs.cmu.edu, Emami-Naeini, Pardis2 (AUTHOR) pardis@cs.duke.edu
المصدر: Communications of the ACM. Mar2024, Vol. 67 Issue 3, p29-31. 3p.
مصطلحات موضوعية: *DATA security, *CONSUMER preferences, *LABELS, INTERNET of things, DATA privacy, TWO-dimensional bar codes
-
10كتاب
المؤلفون: DISTLER, Verena, Fassl, Matthias, Habib, Hana, Krombholz, Katharina, LENZINI, Gabriele, LALLEMAND, Carine, KOENIG, Vincent, Cranor, Lorrie Faith
المصدر: urn:isbn:978-3-03-128643-8 ; urn:isbn:978-3-03-128642-1 ; Human Factors in Privacy Research (2023)
مصطلحات موضوعية: usable security and privacy, UPS, methodology, methods, empirical methods, review, handbook, risk representation, ethics, deception, Engineering, computing & technology, Computer science, Ingénierie, informatique & technologie, Sciences informatiques
العلاقة: https://link.springer.com/content/pdf/10.1007/978-3-031-28643-8_3Test; https://orbilu.uni.lu/handle/10993/57038Test; info:hdl:10993/57038; https://orbilu.uni.lu/bitstream/10993/57038/1/578691976.pdfTest
الإتاحة: https://doi.org/10.1007/978-3-031-28643-8_3Test
https://orbilu.uni.lu/handle/10993/57038Test
https://orbilu.uni.lu/bitstream/10993/57038/1/578691976.pdfTest