@inproceedings{samat2017raise, title={Raise the Curtains: The Effect of Awareness About Targeting on Consumer Attitudes and Purchase Intentions}, author={Samat, Sonam and Acquisti, Alessandro and Babcock, Linda}, booktitle={Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017)}, pages={299--319}, year={2017}, organization={{USENIX Association}}, url={https://www.usenix.org/system/files/conference/soups2017/soups2017-samat-awareness.pdf} } @inproceedings{samat2017format, title={Format vs. Content: The Impact of Risk and Presentation on Disclosure Decisions}, author={Samat, Sonam and Acquisti, Alessandro}, booktitle={Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017)}, pages={377--384}, year={2017}, organization={{USENIX Association}}, url={https://pdfs.semanticscholar.org/d5c6/b07c8006b30a6ca56bce6aeafd19544c4027.pdf} } @inproceedings{forget2016do, title={Do Or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes}, author={Forget, Alain and Pearman, Sarah and Thomas, Jeremy and Acquisti, Alessandro and Christin, Nicolas, and Cranor, Lorrie and Egelman, Serge, and Harbach, Marian and Telang, Rahul}, year={2016}, organization={SOUPS}, url={http://www.andrew.cmu.edu/user/nicolasc/publications/F+-SOUPS16.pdf} } @inproceedings{chang2016engineering, title={Engineering Information Disclosure: Norm Shaping Designs}, author={Chang, Daphne and Krupka, Erin L and Adar, Eytan and Acquisti, Alessandro}, booktitle={Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems}, pages={587--597}, year={2016}, organization={ACM}, url={https://www.heinz.cmu.edu/~acquisti/papers/ChangKrupkaAdarAcquisti-CHI-2016.pdf} } @inproceedings{liu2016follow, title={Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions}, author={Liu, Bin and Andersen, Mads Schaarup and Schaub, Florian and Almuhimedi, Hazim and Zhang, SA and Sadeh, Norman and Agarwal, Y and Acquisti, A}, booktitle={Symposium on Usable Privacy and Security}, year={2016}, url={https://www.usenix.org/system/files/conference/soups2016/soups2016-paper-liu.pdf} } @inproceedings{rao2016expecting, title={Expecting the Unexpected: Understanding Mismatched Privacy Expectations Online}, author={Rao, Ashwini and Schaub, Florian and Sadeh, Norman and Acquisti, Alessandro and Kang, Ruogu}, booktitle={Symposium on Usable Privacy and Security (SOUPS)}, year={2016}, url={https://www.usenix.org/system/files/conference/soups2016/soups2016-paper-rao.pdf} } @inproceedings{almuhimedi2015your, title={Your Location as Been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging}, author={Almuhimedi, Hazim and Schaub, Florian and Sadeh, Norman and Adjerid, Idris and Acquisti, Alessandro and Gluck, Joshua and Cranor, Lorrie Faith and Agarwal, Yuvraj}, booktitle={Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems}, pages={787--796}, year={2015}, organization={ACM}, url={http://synergy.cs.cmu.edu/yuvraj/docs/Almuhimedi_CHI2015_YourLocationShared.pdf} } @inproceedings{balebako2015impact, title={The Impact of Timing on the Salience of Smartphone App Privacy Notices}, author={Balebako, Rebecca and Schaub, Florian and Adjerid, Idris and Acquisti, Alessandro and Cranor, Lorrie}, booktitle={Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices}, pages={63--74}, year={2015}, organization={ACM}, url={https://www.researchgate.net/profile/Florian_Schaub/publication/301415302_The_Impact_of_Timing_on_the_Salience_of_Smartphone_App_Privacy_Notices/links/574834a508ae2301b0b979b9.pdf} } @inproceedings{sleeper2015would, title={I Would Like To..., I Shouldn't..., I Wish I...: Exploring Behavior-Change Goals for Social Networking Sites}, author={Sleeper, Manya and Acquisti, Alessandro and Cranor, Lorrie Faith and Kelley, Patrick Gage and Munson, Sean A and Sadeh, Norman}, booktitle={Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing}, pages={1058--1069}, year={2015}, organization={ACM}, url={https://pdfs.semanticscholar.org/f232/f8617cf9835de78abd73a7c73d738ed6cf8d.pdf} } @inproceedings{wang2014field, title={A Field Trial of Privacy Nudges for Facebook}, author={Wang, Yang and Leon, Pedro Giovanni and Acquisti, Alessandro and Cranor, Lorrie Faith and Forget, Alain and Sadeh, Norman}, booktitle={Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems}, pages={2367--2376}, year={2014}, organization={ACM}, url={http://yangwang.syr.edu/papers/CHI2014.pdf} } @inproceedings{woodruff2014would, title={Would a Privacy Fundamentalist Sell Their DNA for $1000... If Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and Consequences}, author={Woodruff, Allison and Pihur, Vasyl and Consolvo, Sunny and Schmidt, Lauren and Brandimarte, Laura and Acquisti, Alessandro}, booktitle={Symposium on Usable Privacy and Security (SOUPS)}, year={2014}, url={https://static.googleusercontent.com/media/research.google.com/en/us/pubs/archive/42847.pdf} } @inproceedings{forget2014building, title={Building the Security Behavior Observatory: An Infrastructure for Long-Term Monitoring of Client Machines}, author={Forget, Alain and Komanduri, Saranga and Acquisti, Alessandro and Christin, Nicolas and Cranor, Lorrie Faith and Telang, Rahul}, booktitle={Proceedings of the 2014 Symposium and Bootcamp on the Science of Security}, pages={24}, year={2014}, organization={ACM}, url={https://www.cylab.cmu.edu/files/pdfs/tech_reports/CMUCyLab14009.pdf} } @inproceedings{balsa2014spiny, title={Spiny Cactos: OSN Users Attitudes and Perceptions Towards Cryptographic Access Control Tools}, author={Balsa, Ero and Brandimarte, Laura and Acquisti, Alessandro and Diaz, Claudia and Gurses, Seda}, booktitle={NDSS Symposium}, volume={2014}, year={2014}, organization={NIH Public Access}, url={https://www.researchgate.net/profile/Seda_Gurses/publication/269197013_Spiny_CACTOS_OSN_Users_Attitudes_and_Perceptions_Towards_Cryptographic_Access_Control_Tools/links/572cb77008ae3736095a3328/Spiny-CACTOS-OSN-Users-Attitudes-and-Perceptions-Towards-Cryptographic-Access-Control-Tools.pdf} } @inproceedings{wang2013privacy, title={Privacy Nudges for Social Media: An Exploratory Facebook Study}, author={Wang, Yang and Leon, Pedro Giovanni and Scott, Kevin and Chen, Xiaoxuan and Acquisti, Alessandro and Cranor, Lorrie Faith}, booktitle={Proceedings of the 22nd International Conference on World Wide Web Companion}, pages={763--770}, year={2013}, organization={International World Wide Web Conferences Steering Committee}, url={https://dl.acm.org/citation.cfm?id=2488038} } @article{balebako2013typeset, title={Is It the Typeset or the Type of Statistics? Disfluent Font and Self-Disclosure}, author={Balebako, Rebecca and Pe’er, Eyal and Brandimarte, Laura and Cranor, Lorrie Faith and Acquisti, Alessandro}, journal={Learning from Authoritative Security Experiment Results}, pages={1}, year={2013}, url={https://www.usenix.org/system/files/2013-laser-balebako.pdf} } @inproceedings{staddon2013self, title={Self-Reported Social Network Behavior: Accuracy Predictors and Implications for the Privacy Paradox}, author={Staddon, Jessica and Acquisti, Alessandro and LeFevre, Kristen}, booktitle={Social Computing (SocialCom), 2013 International Conference on}, pages={295--302}, year={2013}, organization={IEEE}, url={https://dl.acm.org/citation.cfm?id=2573881} } @inproceedings{adjerid2013sleights, title={Sleights of Privacy: Framing, Disclosures, and the Limits of Transparency}, author={Adjerid, Idris and Acquisti, Alessandro and Brandimarte, Laura and Loewenstein, George}, booktitle={Proceedings of the Ninth Symposium on Usable Privacy and Security}, pages={9}, year={2013}, organization={ACM}, url={http://cups.cs.cmu.edu/soups/2013/proceedings/a9_Adjerid.pdf} } @inproceedings{wilson2013privacy, title={Privacy Manipulation and Acclimation in a Location Sharing Application}, author={Wilson, Shomir and Cranshaw, Justin and Sadeh, Norman and Acquisti, Alessandro and Cranor, Lorrie Faith and Springfield, Jay and Jeong, Sae Young and Balasubramanian, Arun}, booktitle={Proceedings of the 2013 ACM international Joint Conference on Pervasive and Ubiquitous Computing}, pages={549--558}, year={2013}, organization={ACM}, url={https://www3.nd.edu/~dwang5/courses/spring16/papers/privacy/p4.pdf} } @inproceedings{sleeper2013read, title={I Read My Twitter The Next Morning And Was Astonished: A Conversational Perspective on Twitter Regrets}, author={Sleeper, Manya and Cranshaw, Justin and Kelley, Patrick Gage and Ur, Blase and Acquisti, Alessandro and Cranor, Lorrie Faith and Sadeh, Norman}, booktitle={Proceedings of the SIGCHI Conference on Human Factors in Computing Systems}, pages={3277--3286}, year={2013}, organization={ACM}, url={http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.701.6856&rep=rep1&type=pdf} } @inproceedings{almuhimedi2013tweets, title={Tweets Are Forever: A Large-Scale Quantitative Analysis Of Deleted Tweets}, author={Almuhimedi, Hazim and Wilson, Shomir and Liu, Bin and Sadeh, Norman and Acquisti, Alessandro}, booktitle={Proceedings of the 2013 Conference on Computer supported Cooperative Work}, pages={897--908}, year={2013}, organization={ACM}, url={http://www.cs.cmu.edu/~bliu1/Hazim_Almuhimedi_CSCW2013_Tweets.pdf} } @inproceedings{wang2011regretted, title={I Regretted The Minute I Pressed Share: A Qualitative Study Of Regrets On Facebook}, author={Wang, Yang and Norcie, Gregory and Komanduri, Saranga and Acquisti, Alessandro and Leon, Pedro Giovanni and Cranor, Lorrie Faith}, booktitle={Proceedings of the Seventh Symposium on Usable Privacy and Security}, pages={10}, year={2011}, organization={ACM}, url={https://cups.cs.cmu.edu/soups/2011/proceedings/a10_Wang.pdf} } @inproceedings{balebako2011nudging, title={Nudging Users Towards Privacy on Mobile Devices}, author={Balebako, Rebecca and Leon, Pedro G and Almuhimedi, Hazim and Kelley, Patrick Gage and Mugan, Jonathan and Acquisti, Alessandro and Cranor, Lorrie Faith and Sadeh, Norman}, booktitle={Proc. CHI 2011 Workshop on Persuasion, Nudge, Influence and Coercion}, year={2011}, url={http://www.cs.cmu.edu/~halmuhim/nudgin_users_privacy_mobile_devices.pdf} } @inproceedings{acquisti2009social, title={Social Insecurity: The Unintended Consequences of Identity Fraud Prevention Policies}, author={Acquisti, Alessandro and Gross, Ralph}, booktitle={WEIS}, year={2009}, url={https://www.heinz.cmu.edu/~acquisti/papers/acquisti-MISQ.pdf} } @inproceedings{egelman2009timing, title={Timing is Everything?: The Effects of Timing and Placement of Online Privacy Indicators}, author={Egelman, Serge and Tsai, Janice and Cranor, Lorrie Faith and Acquisti, Alessandro}, booktitle={Proceedings of the SIGCHI Conference on Human Factors in Computing Systems}, pages={319--328}, year={2009}, organization={ACM}, url={https://www.researchgate.net/profile/Janice_Tsai2/publication/221518894_Timing_Is_everything_The_effects_of_timing_and_placement_of_online_privacy_indicators/links/56d09e6008ae85c823487492.pdf} } @inproceedings{sheng2009improving, title={Improving Phishing Countermeasures: An Analysis of Expert Interviews}, author={Sheng, Steve and Kumaraguru, Ponnurangam and Acquisti, Alessandro and Cranor, Lorrie and Hong, Jason}, booktitle={Proceedings of the 4th APWG eCrime Researchers Summit}, year={2009}, url={http://www.cs.cmu.edu/~jasonh/publications/ecrs-ecrime2009-interviews.pdf} } @inproceedings{kumaraguru2009school, title={School of Phish: A Real-World Evaluation of Anti-Phishing Training}, author={Kumaraguru, Ponnurangam and Cranshaw, Justin and Acquisti, Alessandro and Cranor, Lorrie and Hong, Jason and Blair, Mary Ann and Pham, Theodore}, booktitle={Proceedings of the 5th Symposium on Usable Privacy and Security}, pages={3}, year={2009}, organization={ACM}, url={https://dl.acm.org/citation.cfm?id=1572536} } @inproceedings{acquisti2008countermeasures, title={Countermeasures Against Government-Scale Monetary Forgery}, author={Acquisti, Alessandro and Christin, Nicolas and Parno, Bryan and Perrig, Adrian}, booktitle={International Conference on Financial Cryptography and Data Security}, pages={262--266}, year={2008}, organization={Springer}, url={https://link.springer.com/chapter/10.1007/978-3-540-85230-8_23} } @inproceedings{kumaraguru2008anti, title={Anti-Phishing Education}, authors={Kumaraguru, Ponnurangam and Sheng, Steve and Acquisti, Alessandro and Cranor, Lorrie and Hong, Jason}, booktitle={Proceeding of the International Conference on E-Learning in the Workplace (ICELW)}, year={2008} } @inproceedings{kumaraguru2008lessons, title={Lessons From a Real World Evaluation of Anti-Phishing Training}, author={Kumaraguru, Ponnurangam and Sheng, Steve and Acquisti, Alessandro and Cranor, Lorrie Faith and Hong, Jason}, booktitle={eCrime Researchers Summit, 2008}, pages={1--12}, year={2008}, organization={IEEE}, url={http://www.cs.cmu.edu/afs/cs/Web/People/ponguru/eCrime_APWG_08.pdf} } @inproceedings{kumaraguru2007protecting, title={Protecting People From Phishing: The Design and Evaluation of an Embedded Training Email System}, author={Kumaraguru, Ponnurangam and Rhee, Yong and Acquisti, Alessandro and Cranor, Lorrie Faith and Hong, Jason and Nunge, Elizabeth}, booktitle={Proceedings of the SIGCHI Conference on Human Factors in Computing Systems}, pages={905--914}, year={2007}, organization={ACM}, url={https://www.researchgate.net/publication/221518419_Protecting_people_from_phishing_The_design_and_evaluation_of_an_embedded_training_email_system} } @inproceedings{sheng2007anti, title={Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People Not to Fall for Phish}, author={Sheng, Steve and Magnien, Bryant and Kumaraguru, Ponnurangam and Acquisti, Alessandro and Cranor, Lorrie Faith and Hong, Jason and Nunge, Elizabeth}, booktitle={Proceedings of the 3rd Symposium on Usable Privacy and Security}, pages={88--99}, year={2007}, organization={ACM}, url={http://cups.cs.cmu.edu/soups/2007/proceedings/p88_sheng.pdf} } @inproceedings{kumaraguru2007getting, title={Getting Users to Pay Attention to Anti-Phishing Education: Evaluation of Retention and Transfer}, author={Kumaraguru, Ponnurangam and Rhee, Yong and Sheng, Steve and Hasan, Sharique and Acquisti, Alessandro and Cranor, Lorrie Faith and Hong, Jason}, booktitle={Proceedings of the Anti-phishing Working Groups 2nd Annual eCrime Researchers Summit}, pages={70--81}, year={2007}, organization={ACM}, url={https://dl.acm.org/citation.cfm?id=1299022} } @inproceedings{gideon2006power, title={Power Strips, Prophylactics, and Privacy, Oh My!}, author={Gideon, Julia and Cranor, Lorrie and Egelman, Serge and Acquisti, Alessandro}, booktitle={Proceedings of the Second Symposium on Usable Privacy and Security}, pages={133--144}, year={2006}, organization={ACM}, url={http://cups.cs.cmu.edu/soups/2006/proceedings/p133_gideon.pdf} } @inproceedings{acquisti2006imagined, title={Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook}, author={Acquisti, Alessandro and Gross, Ralph}, booktitle={Privacy Enhancing Technologies}, pages={36--58}, year={2006}, organization={Springer}, url={http://www.heinz.cmu.edu/~acquisti/papers/acquisti-gross-facebook-privacy-PET-final.pdf} } @inproceedings{kumaraguru2006trust, title={Trust Modelling for Online Transactions: A Phishing Scenario}, author={Kumaraguru, Ponnurangam and Acquisti, Alessandro and Cranor, Lorrie Faith}, booktitle={Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services}, pages={11}, year={2006}, organization={ACM}, url={http://www.cs.cmu.edu/~ponguru/pk_aa_lc_pst_2006.pdf} } @inproceedings{romanosky2006privacy, title={Privacy Patterns for Online Interactions}, author={Romanosky, Sasha and Acquisti, Alessandro and Hong, Jason and Cranor, Lorrie Faith and Friedman, Batya}, booktitle={Proceedings of the 2006 Conference on Pattern Languages of Programs}, pages={12}, year={2006}, organization={ACM}, url={http://hillside.net/plop/2006/Papers/Library/romanosky_privacy_patterns_plop06.pdf} } @inproceedings{sierhuis2006agent, title={Agent-Based Mission Modeling and Simulation}, author={Sierhuis, Maarten and Clancey, William J and Seah, Chin and Acquisti, Alessandro and Bushnell, David and Damer, Bruce and Dorighi, Nancy and Edwards, Larry and Faithorn, Lisa and Flueckiger, Lorenzo and others}, booktitle={Proceedings of Agent-Directed Simulation Symposium}, year={2006}, publisher={Society for Computer Simulation}, url={https://pdfs.semanticscholar.org/9785/fd616ed667b58e5fdd77e11f81b043a0b812.pdf} } @inproceedings{gross2005information, title={Information Revelation and Privacy in Online Social Networks}, author={Gross, Ralph and Acquisti, Alessandro}, booktitle={Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society}, pages={71--80}, year={2005}, organization={ACM}, url={http://www.heinz.cmu.edu/~acquisti/papers/privacy-facebook-gross-acquisti.pdf} } @inproceedings{acquisti2004privacy, title={Privacy in Electronic Commerce and the Economics of Immediate Gratification}, author={Acquisti, Alessandro}, booktitle={Proceedings of the 5th ACM Conference on Electronic Commerce}, pages={21--29}, year={2004}, organization={ACM}, url={http://www.heinz.cmu.edu/~acquisti/papers/privacy-gratification.pdf} } @inproceedings{bradshaw2004teamwork, title={Teamwork-Centered Autonomy for Extended Human-Agent Interaction in Space Applications}, author={Bradshaw, Jeffrey M and Acquisti, Alessandro and Allen, James and Breedy, Maggie R and Bunch, Larry and Chambers, Nate and Feltovich, Paul and Galescu, Lucian and Goodrich, Michael A and Jeffers, Renia and others}, booktitle={AAAI 2004 Spring Symposium}, pages={22--24}, year={2004}, url={http://www.aaai.org/Papers/Symposia/Spring/2004/SS-04-03/SS04-03-026.pdf} } @inproceedings{acquisti2003economics, title={On the Economics of Anonymity}, author={Acquisti, Alessandro and Dingledine, Roger and Syverson, Paul}, booktitle={Financial Cryptography}, pages={84--102}, year={2003}, organization={Springer}, url={http://www.heinz.cmu.edu/~acquisti/papers/econymics.pdf} } @inproceedings{sierhuis2003human, title={Human-Agent Teamwork and Adjustable Autonomy in Practice}, author={Sierhuis, Maarten and Bradshaw, Jeffrey M and Acquisti, Alessandro and Van Hoof, Ron and Jeffers, Renia and Uszok, Andrzej}, booktitle={Proceedings of the Seventh International Symposium on Artificial Intelligence, Robotics and Automation in Space (I-SAIRAS)}, year={2003}, url={https://www.researchgate.net/profile/Maarten_Sierhuis/publication/2914496_Human-Agent_Teamwork_and_Adjustable_Autonomy_in_Practice/links/54a1c62f0cf257a6360377f3.pdf} } @article{bradshaw2003living, title={Living With Agents and Liking It: Addressing the Technical and Social Acceptability of Agent Technology}, author={Bradshaw, Jeffrey M and Sierhuis, Maarten and Acquisti, Alessandro and Feltovich, Paul and Hoffman, Robert and Jeffers, Renia and Suri, Niranjan and Uszok, Andrzej and Van Hoof, Ron}, booktitle={Proceedings of the 2003 AAAI Spring Symposia - Human Interaction with Autonomous Systems in Complex Environments}, year={2003}, url={https://pdfs.semanticscholar.org/e765/80091cf9c88675131231ff721b2b726ad3f9.pdf} } @inproceedings{bradshaw2003representation, title={Representation and Reasoning for DAML-Based Policy and Domain Services in KAoS and Nomads}, author={Bradshaw, J and Uszok, Andrzej and Jeffers, Renia and Suri, Niranjan and Hayes, P and Burstein, M and Acquisti, Alessandro and Benyo, Brett and Breedy, M and Carvalho, M and others}, booktitle={Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems}, pages={835--842}, year={2003}, organization={ACM}, url={http://www.dtic.mil/dtic/tr/fulltext/u2/p020678.pdf} } @inproceedings{sierhuis2002multiagent, title={Multiagent Plan Execution and Work Practice: Modeling Plans and Practices Onboard the ISS}, author={Sierhuis, Maarten and Acquisti, Alessandro and Clancey, William J}, booktitle={PROC. 3RD INTERNATIONAL NASA WORKSHOP ON PLANNING AND SCHEDULING FOR SPACE}, year={2002}, organization={Citeseer}, url={http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.73.525} } @inproceedings{acquisti2002agent, title={Agent-Based Modeling of Collaboration and Work Practices Onboard the International Space Station}, author={Acquisti, Alessandro and Sierhuis, Maarten and Clancey, William J and Bradshaw, Jeffrey M}, booktitle={Proceedings of the Eleventh Conference on Computer-Generated Forces and Behavior Representation}, volume={8}, pages={315--337}, year={2002}, organization={Orlando, FL}, url={https://ntrs.nasa.gov/search.jsp?R=20020063473} }