Author: Robert W. Reeder

Publication Overview

Publication period start: 2011
Number of co-authors: 27

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Maxion, Roy A., Reeder, Robert W. (2005): Improving user-interface dependability through mitigation of human error. In International Journal of Human-Computer Studies, 63 (1) pp. 25-50. https://dx.doi.org/10.1016/j.ijhcs.2005.04.009
Card, Stuart K., Pirolli, Peter, Wege, Mija M. Van Der, Morrison, Julie B., Reeder, Robert W., Schraedley, Pamela, Boshart, Jenea (2001): Information Scent as a Driver of Web Behavior Graphs: Results of a Protocol Analysis Metho. In: Beaudouin-Lafon, Michel, Jacob, Robert J. K. (eds.) Proceedings of the ACM CHI 2001 Human Factors in Computing Systems Conference March 31 - April 5, 2001, Seattle, Washington, USA. pp. 498-505. https://www.acm.org/pubs/articles/proceedings/chi/365024/p498-card/p498-card.pdf
Bauer, Lujo, Cranor, Lorrie Faith, Reeder, Robert W., Reiter, Michael K., Vaniea, Kami (2008): A user study of policy creation in a flexible access-control system. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 543-552. https://doi.acm.org/10.1145/1357054.1357143
Reeder, Robert W., Bauer, Lujo, Cranor, Lorrie Faith, Reiter, Michael K., Bacon, Kelli, How, Keisha, Strong, Heather (2008): Expandable grids for visualizing and authoring computer security policies. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 1473-1482. https://doi.acm.org/10.1145/1357054.1357285
Bauer, Lujo, Cranor, Lorrie Faith, Reeder, Robert W., Reiter, Michael K., Vaniea, Kami (2009): Real life challenges in access-control management. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 899-908. https://doi.acm.org/10.1145/1518701.1518838
Schechter, Stuart, Egelman, Serge, Reeder, Robert W. (2009): It\'s not what you know, but who you know: a social approach to last-resort authentication. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 1983-1992. https://doi.acm.org/10.1145/1518701.1519003
Reeder, Robert W., Karat, Clare-Marie, Karat, John, Brodie, Carolyn (2007): Usability Challenges in Security and Privacy Policy-Authoring Interfaces. In: Baranauskas, Maria Cecília Calani, Palanque, Philippe A., Abascal, Julio, Barbosa, Simone Diniz Junqueira (eds.) DEGAS 2007 - Proceedings of the 1st International Workshop on Design and Evaluation of e-Government Applications and Services September 11th, 2007, Rio de Janeiro, Brazil. pp. 141-155. https://dx.doi.org/10.1007/978-3-540-74800-7_11
Kelley, Patrick Gage, Bresee, Joanna, Cranor, Lorrie Faith, Reeder, Robert W. (2009): A \"nutrition label\" for privacy. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 4. https://doi.acm.org/10.1145/1572532.1572538
Schechter, Stuart, Reeder, Robert W. (2009): 1 + 1 = you: measuring the comprehensibility of metaphors for configuring backup authentic. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 9. https://doi.acm.org/10.1145/1572532.1572544
Schechter, Stuart, Egelman, Serge, Reeder, Robert W. (2009): It\'s not what you know, but who you know: a social approach to last-resort authentication. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 41. https://doi.acm.org/10.1145/1572532.1572581
Reeder, Robert W., Kelley, Patrick Gage, McDonald, Aleecia M., Cranor, Lorrie Faith (2009): A user study of the expandable grid applied to P3P privacy policy visualization. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 42. https://doi.acm.org/10.1145/1572532.1572582
McDonald, Aleecia M., Reeder, Robert W., Kelley, Patrick Gage, Cranor, Lorrie Faith (2009): A comparative study of online privacy policies and formats. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 46. https://doi.acm.org/10.1145/1572532.1572586
Lipford, Heather Richter, Watson, Jason, Whitney, Michael, Froiland, Katherine, Reeder, Robert W. (2010): Visual vs. compact: a comparison of privacy policy interfaces. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 1111-1114. https://doi.acm.org/10.1145/1753326.1753492
Reeder, Robert W., Bauer, Lujo, Cranor, Lorrie F., Reiter, Michael K., Vaniea, Kami (2011): More than skin deep: measuring effects of the underlying model on access-control system us. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2065-2074. https://dx.doi.org/10.1145/1978942.1979243
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel stuck? Want Freedom?

Get one powerful email each week, like 325,720 others.

Learn to design a life you love.

Next email in:
5
days
5
hrs
0
mins
48
secs