Follow
Robert W. Reeder
Robert W. Reeder
Senior Research Scientist, Google
Verified email at google.com
Title
Cited by
Year
" My religious aunt asked why i was trying to sell her viagra" experiences with account hijacking
R Shay, I Ion, RW Reeder, S Consolvo
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
852014
" She'll just grab any device that's closer" A Study of Everyday Device & Account Sharing in Households
T Matthews, K Liao, A Turner, M Berkovich, R Reeder, S Consolvo
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016
1392016
{“... No} one Can Hack My {Mind”}: Comparing Expert and {Non-Expert} Security Practices
I Ion, R Reeder, S Consolvo
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 327-346, 2015
3682015
1+ 1= you: measuring the comprehensibility of metaphors for configuring backup authentication
S Schechter, RW Reeder
Proceedings of the 5th Symposium on Usable Privacy and Security, 1-31, 2009
342009
152 Simple Steps to Stay Safe Online
RW Reeder, I Ion, S Consolvo
152 simple steps to stay safe online: Security advice for non-tech-savvy users
RW Reeder, I Ion, S Consolvo
IEEE Security & Privacy 15 (5), 55-64, 2017
1122017
2008 Theses by Author
MF BALCAN, D BRUMLEY, H DEYOUNG, C GARROD, BC GAZEN, ...
A comparative study of online privacy policies and formats
AM McDonald, RW Reeder, PG Kelley, LF Cranor
International Symposium on Privacy Enhancing Technologies Symposium, 37-55, 2009
2712009
A Question of Access
R Johnson
D-Lib Magazine 6 (5), 2000
12000
A user study of policy creation in a flexible access-control system
L Bauer, LF Cranor, RW Reeder, MK Reiter, K Vaniea
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
752008
A user study of the expandable grid applied to P3P privacy policy visualization
RW Reeder, PG Kelley, AM McDonald, LF Cranor
Proceedings of the 7th ACM workshop on Privacy in the electronic society, 45-54, 2008
832008
A user-tracing architecture for modeling interaction with the World Wide Web
P Pirolli, WT Fu, R Reeder, SK Card
Proceedings of the Working Conference on Advanced Visual Interfaces, 75-83, 2002
462002
A" nutrition label" for privacy
PG Kelley, J Bresee, LF Cranor, RW Reeder
Proceedings of the 5th Symposium on Usable Privacy and Security, 1-12, 2009
5972009
ACAR, Umut A. CMU-CS-08-141 AGARWAL, Pratul K. CMU-CS-08-109 ALDRICH, Jonathan CMU-CS-08-120, CMU-CS-08-169 BAILEY-KELLOGG, Chris CMU-CS-08-162
MF BALCAN, Z BAR-JOSEPH, GE BLELLOCH, D BRUMLEY, ...
Access control management mapping resource/action pairs to principals
SE Schechter, RW Reeder
US Patent App. 12/788,245, 2011
82011
An experience sampling study of user reactions to browser warnings in the field
RW Reeder, AP Felt, S Consolvo, N Malkin, C Thompson, S Egelman
Proceedings of the 2018 CHI conference on human factors in computing systems …, 2018
1432018
Comparing access-control technologies: A study of keys and smartphones
L Bauer, L Cranor, RW Reeder, MK Reiter, K Vaniea
Technical Report CMU-CYLAB-07-005, Carnegie Mellon University, 2007
92007
Effects of access-control policy conflict-resolution methods on policy-authoring usability
RW Reeder, L Bauer, LF Cranor, MK Reiter, K Vaniea
72009
Effects of Access-Control Policy Conflict-Resolution Methods on Policy-Authoring Usability (CMU-CyLab-09-006)
RW Reeder, L Bauer, L Cranor, MK Reiter, K Vaniea
Carnegie Mellon University, 2009
12009
Error analysis of a security-oriented user interface
RW Reeder, RA Maxion
School of Computing Science Technical Report Series, 2004
12004
The system can't perform the operation now. Try again later.
Articles 1–20