See also my videos page for videos of talks and press appearances
Internet Plans Now Come With ‘Nutrition Labels.’ No One Knows How to Read Them by Patience Haggin, The Wall Street Journal, December 8, 2024.
New password guidelines: What to know by Here & Now Newsroom, Here & Now, December 3, 2024.
Do Your Passwords Meet the Proposed New Federal Guidelines? New standards want to make passwords secure—but also more user-friendly by Jackie Snow, The Wall Street Journal, December 2, 2024.
How to protect your personal information, keep hackers out of your bank account by WPXI.com News Staff, Channel 11 WPXI, November 8, 2024.
Your Home Internet Bill Can Be Deceptively Confusing. Now It's (Slightly) Easier to Understand. by Rob Pegoraro, New York Times Worecutter, May 1, 2023.
Broadband "nutrition labels" help you comparison shop for cable by Meghan McCarty Carino, Marketplace, April 11, 2024.
Make Methodologies for Broadband Performance Publicly Available: Panelists by Jericho Casper, BroadbandBreakfast, March 8, 2024.
Anyone can be a victim as fraud losses hit record high by Jack Troy, Trib Live, March 8, 2024.
Former FTC Chief Technologist outlines better user privacy policies by Neel Kulkarni, Student Life, November 1, 2023.
How to tell if a gadget is secure? Look for this new governmen t seal. by Geoffrey A. Fowler, The Washington Post, July 19, 2023.
Annoying Password Rules Actually Make Us Less Secure by Christopher Mims, The Wall Street Journal, March 11, 2023.
Twitter's Two-Factor Authentication Change 'Doesn't Make Sense' by Lily Hay Newman, February 18, 2023.
IoT manufacturers should embrace privacy "nutrition labels" by John Donegan, ManageEngine Insights, February 9, 2023.
'Fortnite' maker Epic Games to pay $520 million in record-breaking FTC settlement interview with Sheldon Ingram, Pittsburgh's Action News 4 WTAE, December 19, 2022.
Faces of Security: Dr. Lorrie Faith Cranor from Carnegie Mellon University By Joe Bebon, Editor, Total Security Advisor, Nov 28, 2022.
Google Settings Still Confusing After $85 Million Lawsuit Over How Confusing They Were by Thomas Germain, Gizmodo, October 5, 2022.
Personalities of Pittsburgh: Lorrie Cranor is securing privacy in the digital age by Nate Doughty, Pittsburgh Business Times, September 30, 2022.
Mandatory password updates are passe by Tim Starkes, The Washington Post, August 18, 2022.
Period-Tracking Apps Are Just the Beginning of Post-Roe Data Concerns by Bree Fowler, CNET, June 30, 2022.
I tried to read all my app privacy policies. It was 1 million words. by Geoffrey A. Fowler, The Washington Post, May 31, 2022. [I also participated in accompanying 40-minute Twitter Space audio discussion]
What your Android phone's new "data safety" labels mean by Chris Valazco, The Washington Post, May 5, 2022.
Google Adds Privacy Labels to Apps. But Will They Help? by Thomas Germain, Consumer Reports, April 26, 2022.
Broadband Labels Must Be Simple, Have Comparable Data, Say Industry Observers by Benjamin Kahn, Broadband Breakfast, April 7, 2022.
Universities Tackle Cybersecurity Workforce Shortage by Rebecca Kelliher, Diverse Issues in Higher Education, April 4, 2022.
Swipe Right When You See a Conference Room You Like by Julie Weed, The New York Times, Jan 18, 2022.
Hyundai simplifies customers' control of data collection, sharing by Dave LaChance, RDN Repairer Driven News, December 15, 2021
How Can You Safely Store Your Vaccine Status on Your Phone? by Malena Carollo, The Markup, October 5, 2021.
The Case Against Tracking Your Kid's Phone by Parmy Olson, Bloomberg, September 8, 2021.
Fraud Alert: Malicious QR Codes Now Used by Online Scammers by Herb Weisbaum, The ConsumerMan, Consumer Checkbook, August 25, 2021.
Privacy and efficacy concerns remain for New York's vaccine passport apps by Cyrus Farivar, NBC News, 5 August 2021.
Q&A: Lorrie Cranor of Carnegie Mellon University by C.J. Thompson, Digital Privacy News, April 19, 2021.
Pitt and Carnegie Mellon University Partner to Create Extremist Hate Research Center by Sarah Wood, Diverse Issues in Higher Education. March 29, 2021.
The larger fight against hate is ours by the editorial board, Pittsburgh Post-Gazette, March 28, 2021.
CMU And Pitt Are Collaborating To Fight Extremist Hate by Kevin Gavin, Marylee Williams, Laura Tsutsui, and Isabelle Schmeler. The Confluence, 90.5 WESA, March 18, 2021.
Pitt And CMU Launching New Center To Fight Extremist Hate by Bryant Reed, KDKA 2 CBS Pittsburgh, March 18, 2021.
Local Asian rights advocates on alert after Atlanta shootings by Ryan Houston, WPXI-TV, March 18, 2021
'Love needs a helping hand': Pitt, Carnegie Mellon launch joint center to combat extremist hate by Deb Erdley, TribLIVE, March 17, 2021.
Turning hate, violence and grief into solutions after Tree of Life synagogue massacre by Bill Schackner, Pittsburgh Post-Gazette, March 17, 2021.
Pitt, CMU Launch Center to Research Extremist Hate by Julia Mericle, Pittsburgh Business Times, March 17, 2021.
LastPass to limit its free password manager. Here are other options, including Apple, Google by Rob Pegararo, USA Today, February 18, 2021.
Building Your Personal Privacy Risk Tolerance Profile by Seth Rosenblatt, DarkReading, January 28, 2021
Relentless Hacking Is Turning All of Us Into Data Nihilists by Joshua Brustein, Businessweek, December 24, 2020.
How to Use Apple's Privacy Labels for Apps by Thomas Germain, Consumer Reports, December 18, 2020.
Apple's App 'Privacy Labels' Are Here -- and They're a Big Step Forward by Lily Hay Newman, Wired, 14 December 2020.
Imagine a Nutrition Label -- for Cybersecurity by Cheryl Winokur Munk, The Wall Street Journal, December 8, 2020. [PDF reprint]
Rules for strong passwords don't work, researchers find. Here's what does by Laura Hautula, CNET News, November 12, 2020
How science selects a password policy by Joe Uchill, SC Magazine, October 26, 2020.
Neural Networks Help Users Pick More-Secure Passwords by Robert Lemos, DarkReading, October 26, 2020.
Digital Hygiene in the Zoom Era by Valeriya Safronova, The New York Times, October 22, 2020.
IoT security: University creates new labels for devices to increase awareness for consumers - interview with Karen Roby, TechRepublic, October 14, 2020.
The Importance of Teaching Cybersecurity to a 5-Year-Old by Adam Stone, EdTech, 5 October 2020.
CMU professor: Hackers in online classrooms can be prevented by Marcie Cipriani, WTAE PIttsburgh Action News 4.
Makers Use Facial Coverings as Creative Outlets by Heidi Opdyke, The Piper: CMU Community News, August 31, 2020.
Privacy concerns shadow popular voter registration website by Sherman Smith, Kansas Reflector, August 2, 2020.
What the New iPhone Privacy Features Will Really Do by Thomas Germain, Consumer Reports, June 24, 2020.
IoT Security Is a Mess. Privacy 'Nutrition' Labels Could Help by Lily Hay Newman, Wired, 9 June 2020.
Podcast: Surveillance scares and a nutrition-label for IoT security by Stacey Higginbotham, Stacey on IoT, 4 June 2020. [last 20 minutes of podcast, starting around minute 35]
Now's The Perfect Time to Start Using a Password Manager by Alan Henry, Wired, May 24, 2020.
Phishing Is Surging. Here's How To Spot Online Scams by Jeremy Hobson and Serena McMahon, Here & Now, May 22, 2020.
Here's why you need to talk to your aging parents about 'sextortion' scams by Meghan Holohan, TODAY Parents, May 14, 2020.
Contact tracing by app: life-saving or invasion of privacy? by Julian routh, Pittsburgh Post-Gazette, 4/10/2020.
User-Friendly Cybersecurity: Is a Better UX the Key to a Better Defense? by Ericka Chickowski, Dark Reading, 4/30/2020.
Agencies Lead Big Tech by Double Digits on Trust in Contact-Tracing Data Security by Sam Sabin, Morning Consult, April 27, 2020.
Can universities boost student experience without invading privacy? by Betsy Foresman, edscoop, February 18, 2020.
CMU hosts its seventh annual International Data Privacy Day event The Tartan, 2 February, 2020.
Alexa, Are You Spying On Me? How To Prevent Your Smart Devices From Listening To You by David Highfield, KDKA CBS Pittsburgh, November 18, 2019.
5 Cool Jobs in Cybersecurity (that you might have someday!). Scholastic. October 2019.
How Much Do You Know About Password Security? Take This Quiz by Chris Kornelia, The Wall Street Journal, September 17, 2019.
Apple, Google, WhatsApp condemn British spy agency proposal to access encrypted messages by Taylor Telford, The Washington Post, 30 May 2019.
CMU's CyLab director recalls first learning about 'mobile hijacking' -- after it happened to her by Courtney Linder, Pittsburgh Post-Gazette, March 28, 2019.
Women in Cybersecurity Conference brings three days of networking & career insight to Pittsburgh by Bill O'Toole, NEXT Pittsburgh, March 21, 2019.
You've been breached: Hackers stole nearly half a billion personal records in 2018 By Herb Weisbaum, NBC News, February 4, 2019.
Former FTC chief technologist named director of CMU's CyLab by Courtney Linder, Pittsburgh Post-Gazette, January 17, 2019.
Facebook emails show us again that profits come before privacy by Laura Hautala, CNET, December 5, 2018
Is the FBI's Fitness App a Cop? by Tom McKay, Gizmodo, 29 September 2018
FBI fitness app asks users to agree to 'all of their activities monitored and recorded' by Jaden Urbi, CNBC, September 28, 2018 [video]
How to Secure Your Accounts with Better Two-Factor Authentication by Brian Barrett, WIRED, July 22, 2018.
Why you should consider a password manager by Katherine Bindley, The Wall Street Journal, May 28, 2018
Why it's meaningless to accept a privacy policy by Laura Hautala, CNET, May 25, 2018
New privacy rules could spell the end of legalese - or create a lot more fine print by Elizabeth Dwoskin, The Washington Post, May 24, 2018.
How privacy is moving data security to the top of corporate agendas by Maria Korolov, CSO, May 16, 2018.
Why So Many People Make Their Password 'Dragon by Louise Matsakis, WIRED, April 22, 2018
Privacy imported: US weighs EU-style regulations to protect your data by Laura Hautala, CNET, April 11, 2018
Can Facebook's new hires take on troll farms and data privacy? by Laura Hautala, CNET, April 11, 2018
Policy experts trade ideas for intelligent ways to regulate artificial intelligence by Alan Boyle, April 10, 2018
A better, smarter way to use Venmo by Nicole Spector, NBCNews, April 9, 2018
Facebook makes its privacy controls simpler as company faces data reckoning by Elizabeth Dwoskin and Tony Romm, The Washington Post, March 28, 2018
How hackers are hijacking your cell phone account by Herb Weisbaum, March 27, 2018
How to create a genuinely strong password for your digital life by K.G. Orphanides, Wired, February 22, 2018.
Be Wary Of Tech Support Scams, 'Companies Like Microsoft Are Not Actually Going To Call You' by Sarah Boden, 90.5 WESA
What is two-factor authentication (2FA)? How to enable it and why you should by JR Raphael, CSO, November 30, 2017.
Brookings Report Finds Women Have Sharper Tech Skills Than Men by Janet Burns, Forbes, November 29, 2017
Scammers Hijacking Cellphone Accounts, Racking Up Big Bills In Victim's Name by David Highfield, CBS Pittsburgh, November 10, 2017
Expert Commends Facebook For Taking On Revenge Porn, Says Plan Needs Tweaking By David Highfield, CBS Pittsburgh, November 9, 2017
Security experts warn of account risks after Verizon customer data leak By Zack Whittaker, ZDNet, July 12, 2017.
The psychology of privacy in the era of the Internet of Things by Susan Scutti, CNN, March 2, 2017.
Everything You Need to Know About Password Managers by Andrew Chaikivsky, Consumer Reports, February 07, 2017.
Ramirez Leaves FTC Urging Continued Tech Focus By Alexei Alexis, Bloomberg BNA, February 8, 2017. Carnegie Mellon privacy clinic aims to help protect you from hackers by Aaron Aupperlee, Pittsburgh Tribune-Review, January 26, 2017.
Tech Law and Policy Podcast, Season 3 Episode 4: Lorrie Cranor, interview by Andrew Manley, December 2016.
P@$sword protector by Christopher Tritto, Washington University Engineering Momentum Magazine, Fall 2016.
Q&A with FTC Chief Technologist Lorrie Cranor by Alina Simone, Medium Practically Unhackable, September 1, 2016.
Regular password changes make things worse by Taylor Armerding, CSO, September 1, 2016.
New Bank Privacy Tool Exposes Opaque, Possibly Illegal Sharing Policies ny Michael Byrne, Motherboard, August 28, 2016.
A Life or Death Case of Identity Theft? by Peter Krebs, Krebs on Security, August 23, 2016.
There's a new way to make strong passwords, and it's way easier By Todd C. Frankel and Andrea Peterson, August 11, 2016, The Washington Post, p. 1.
Do we all really need to keep changing our passwords? By Lucy Schouten, August 9, 2016, The Christian Science Monitor
Password changes for the sake of it don't improve security, says FTC technologist by David Bisson, August 3, 2016, GrahamCluley
Carnegie Mellon university professor reveals why enforced password changes are a security risk by Jason Murdock, International Business Times, August 3, 2016.
Frequent password changes are the enemy of security, FTC technologist says by Dan Goodin, Ars Technica, August 2, 2016
Growing scam hijacks mobile phone accounts by Paul Muschick, Allentown Morning Call, July 6, 2016.
Thieves can steal your identity using just your phone number by Joe Fryer, TODAY Show, June 28 2016.
Fraud Alert: ID Thieves Hijack Mobile Phone Accounts by Herb Weisbaum, NBC News, June 27, 2016.
@Deray's twitter hack reminds us even two-factor isn't enough by Emily Dreyfuss, Wired, June 10, 2016.
Here's An Unexpected Way To Protect Yourself From Getting Hacked by Nicole Nguyen, BuzzFeed, june 10, 2016.
How even the FTC's lead technologist can get hacked by Brian Barrett, Wired, June 9, 2016.
FTC tech chief's phone hijacked, identity stolen, but who is to blame? by Charlie Osborne, ZDNet, June 8, 2016.
Burned by ID thief, FTC's chief technologist urges mobile customers, carriers to bolster security by Bradley Barth, SC Magazine, June 8, 2016.
FTC's chief technologist gets her mobile phone number hijacked by ID thief by Dan Goodin, Ars Technica, June 7, 2016.
FTC chief technologist had phone account hijacked by Joe Uchill, The Hill, June 7, 2016.
FTC To Examine Privacy Policies, AdChoices Icon by Wendy Davis, MediaPost, 25 March 2016.
Want a better password? Pretend you eat kale. We won't tell anyone by Richard Chirgwin, The Register, 24 May 2016.
How to hack the hackers: The human side of cybercrime M. Mitchell Waldrop, Nature, 11 May 2016.
7 Password Experts on How to Lock Down Your Online Security by Brian Barrett, Wired, May 15, 2016.
Why the names of six people who complained of sexual assault were published online by Dallas police By Andrea Peterson, The Washington Post, April 29, 2016.
People of ACM - Lorrie Faith Cranor, ACM, April 19, 2016.
Changing your password regularly is a terrible idea, and here's why by Steve Ranger, ZDNet, April 18, 2016.
Want Safer Passwords? Don't Change Them So Often by Brian Barrett. Wired. March 10, 2016.
From email accounts to Netflix queues, passing on passwords By Doug McIntyre, Los Angeles Daily News, March 5, 2016.
Forcing People to Change Their Passwords Isn't Just Annoying. It's Counterproductive. By Lily Hay Newman, Future Tense, March 3, 2016.
Why changing your password regularly may do more harm than good By Andrea Peterson, The Washington Post, March 2, 2016.
Privacy Pioneer Lorrie Cranor named CTO at FTC by Al Urbanski, Direct Marketing News, December 8, 2015.
The FTC's next chief technologist is on a quest for better passwords By Katherine Noyes, CIO, December 4, 2015.
Meet the FTC's new chief technologist by Steve Dent, Engadget, December 4, 2015
The FTC is getting a new chief technologist: Carnegie Mellon's Lorrie Cranor by Andrea Peterson, The Washington Post, December 3, 2015
CMU professor to become FTC's chief technologist by Rick Wills, Pittsburgh Tribune-Review, December 3, 2015
CMU professor tapped to be FTC's chief technologist Pittsburgh Post-Gazette, December 3, 2015.
FTC Hires Online Privacy Guru Lorrie Cranor by Wendy Davis, MediaPost, December 3, 2015
EU court invalidated agreement with U.S., Pittsburgh Post-Gazette, October 10, 2015.
Sale of drivers' data reaps tens of millions a year for Pennsylvania by Melissa Daniels, Pittsburgh Tribune-Review, July 14, 2015.
CMU experiment aspires to make Pittsburgh world's first 'smart city', By Deborah M. Todd, Pittsburgh Post-Gazette, July 9, 2015
Millions of webcams open to prying eyes on Internet by Paul Van Osdol, WTAE News 4, Jul 06, 2015
Emoji Passwords Could Be Coming Your Way. Is That A Good Thing? by Sam Sanders, NPR All Tech Considered, 15 June 2015.
Who's watching you surf the web? by Rich Lord, Pittsburgh Post-Gazette, June 14, 2015. [includes videos]
How cookies on computers put consumers in digital buckets by Deborah M. Todd, Pittsburgh Post-Gazette, June 14, 2015.
Why Apple's new security features set high bar for tech industry by Malena Carollo, The Christian Science Monitor, 10 June 2015.
Uber Broadens Rider Privacy Policy, Asks for New Permissions by Eric Newcomer, 28 May 2015, Bloomberg Business
Lorrie Faith Cranor: Digital Privacy is out of Control by Marguerite McNeal, 14 May 2015, Wired.com
This pa$$w0rd is not very secure: CMU studies reveal best and worst in passwords By Rich Lord, Pittsburgh Post-Gazette, May 4, 2015.
House bill slashes research critical to cybersecurity by Patrick Thibodeau, Computerworld, Apr 22, 2015.
New Technology Cracks 'Strong' Passwords -- What You Need To Know by Joseph Steinberg, Forbes.com, April 21, 2015.
One of the biggest threats to student privacy? Failure to communicate by Nichole Dobo, The Hechinger Report, March 27, 2015.
Should We Put Safety Labels on Software? by Lily Hay Newman, Slate, March 19 2015.
White House privacy bill of rights gets mixed reviews By Rich Lord, Chris Potter and Deborah M. Todd, Pittsburgh Post-Gazette, March 8, 2015
Is your phone leaking personal data? The Naked Scientists, February 17, 2015 [radio broadcast on BBC in UK and Australia]
Moving beyond passwords By Yuqing Pan, Peninsula Press, February 14, 2015
Wolverton: Putting the password problem in perspective By Troy Wolverton, San Jose Mercury News, February 6, 2015.
Cyberfeminists Go Deep on Big Data, Privacy, and Surveillance by Ben Valentine, Hyperallergic, February 3, 2015
Do you know where your data are? Privacy issues raised at CMU By Rich Lord, Pittsburgh Post-Gazette February 2, 2015
Your Private Data Isn't Yours - Maybe It Never Was: A gang of bad-ass cyberfeminists tear into the big question: Is there life after Snowden? By Hakan Tanriverdi, January 23, 2014.
What Does Privacy 'Look' Like? Carnegie Mellon Project Seeks Drawings By Dian Schaffhauser, Campus Technology, 01/22/15
Weak passwords persist despite recurring hacks by Rianna Hidalgo, The VIN News Service, January 15, 2015.
CMU hosts portraits of privacy by Rich Lord, Pittsburgh Post-Gazette, January 12, 2014.
What Connects Your Doctor With Your Credit Card? by Kimberly Rotter, Credit Card Insider, November 4, 2014.
A Physical Key to Your Google Account By Tom Simonite, MIT Technology Review, October 21, 2014.
Data Threats: Hackers, Government Agencies, and Defending Data Online by Julia Taylor Kennedy, Impact podcast from the Carnegie Council, September 29, 2014.
What makes a good password? The Naked Scientists, September 16, 2014 [radio broadcast on BBC in UK and Australia]
This dress is a steal By Eric Heyl, Pittsburgh Tribune-Review, July 29, 2014.
How to build the ultimate hack-proof password: Tips from Lorrie Faith Cranor, Return On Ideas, July 23, 2014.
Facebook's Emotional Manipulation Study Is Just the Latest Effort to Prod Users By David Talbot, MIT Technology Review, July 1, 2014
Online Security Is a Total Pain, But That May Soon Change by Klint Finley, Wired, 06.30.14
Kissing my privacy goodbye: How confidential is your personal data? by Tom Imerito, Pittsburgh Quarterly, Summer 2014
She Made Bad Passwords Fashionable: "Security Blanket" And Dress Promote Importance Of Using Good Passwords Online, Women You Should Know, June 10, 2014.
Password dress: A frock covered in security faux pas, by Leslie Katz, CNET, June 5, 2014.
California Wants to Make Online Privacy Policies a Little More Understandable By Ariel Bogle, Slate, May 22, 2014.
Heyl: Soccer moms just kickin' it by Eric Heyl, Pittsburgh Tribune-Review May 20, 2014.
The best defense against hackers is...paper? by Timothy B. Lee, Vox, April 16, 2014.
2013 International Science & Engineering Visualization Challenge, Science, February 7, 2014.
A Computational Security Blanket by Jim Austin, Science Careers, February 7, 2014
Usable Privacy: Lorrie Faith Cranor '89 by Xinyi Zhou, Blair Magnet Foundation Newsletter, Winter 2014.
Google And Facebook Get A Thumbs Down From This New Site That Reviews Privacy Policies by Adam Tanner, Forbes, October 28, 2013.
What Chase And Other Banks Won't Tell You About Selling Your Data by Adam Tanner, Forbes, October 17, 2013.
Army Wants Computer That Defends Against Human-Exploit Attacks by Kevin Fogarty, Slashdot, October 9, 2013
Study: Commerce Department App Privacy Proposal Confuses Consumers by Wendy Davis, July 18, 2013
When Social Sharing Goes Wrong: Regretting The Facebook Post by Elise Hu, NPR All Tech Considered, July 08, 2013.
Poll: Majority Of Americans Comfortable With Surveillance by Yuki Noguchi, NPR All things considered, June 12, 2013.
A guide to Facebook's privacy options by Lorrie Faith Cranor, The Wall Street Journal, March 11, 2013.
This Dopey, Decade-Old Tech Privacy Video Actually Got A Lot Of Things Right by John Pavlus, MIT Technology Review, February 8, 2013.
Electronic devices and services monitor us 24/7, but there are few ways to block them By Deborah M. Todd, Pittsburgh Post-Gazette, January 29, 2013.
Proposal before Congress on text messages stirs debate on rights, police work By Jeremy Boren Pittsburgh Tribune-Review, January 2, 2013.
Q&A: Privacy engineers could hold the key, by Eric Heyl, Pittsburgh Tribune-Review, December 15, 2012.
Advocates: Free market doesn't work for online privacy, By Grant Gross, ComputerWorld, December 6, 2012.
Professor: Do-Not-Track Won't Work Without New Laws by Wendy Davis, MediaPost, December 6, 2012.
CMU introduces new masters program for technological privacy certification by Deborah M. Todd, Pittsburgh Post-Gazette, October 16, 2012.
Password length is more beneficial than complexity by Deborah M. Todd, Pittsburgh Post-Gazette, August 30, 2012.
New Rules on Kids' Web Ads by Anton Troianovski, The Wall Street Journal, August 1, 2012.
CHI 2012 conference Q&A with Lorrie Cranor and Pedro Leon by Brad Stenger, beta620, July 17, 2012.
Are you checking privacy policies frequently? by Michael Kassner, TechRepublic, July 9, 2012.
MSKCC Patient Data Leak Related to Information Inadvertently Hidden in PowerPoint Presentations by Eric Rosenthal, Oncology Times, June 23, 2012.
Admen Spot an Enemy: W3C by Tom Simonite, Technology Review, June 19, 2012.
Mobile App Privacy and the Consumer: Cranor Offers Insight into the Strained Relationship, Technology, Academics, Policy, June 7, 2012.
Microsoft makes 'Do Not Track' the default by Jeff Horwich, Marketplace Tech Report, June 4, 2012.
Reading online privacy policies cost us $781 billion per year By Michael Kassner, TechRepublic, May 21, 2012.
To Read All Those Web Privacy Policies, Just Take A Month Off Work by Shankar Vedantam, NPR Morning Edition, April 19, 2012.
Bomb Threats Spread to More Colleges in Pittsburgh by James Hagerty, The Wall Street Journal, April 13, 2012.
Pitt suffers more threats, other schools targeted, Associated Press, April 12, 2012.
Experts say Pitt bomb threats suspect is nearly impossible to trace, profile, interview with Alan Jennings, WPXI Channel 11 news, April 10, 2012.
Experts say threatening Pitt emails are virtually impossible to trace by Liz Navratil, Pittsburgh Post-Gazette, April 6, 2012.
How Much Is Your Data Worth? Mmm, Somewhere Between Half a Cent and $1,200 by Alexis Madrigal, The Atlantic, March 19, 2012.
Reading the Privacy Policies You Encounter in a Year Would Take 76 Work Days by Alexis Madrigal, The Atlantic, March 1, 2012.
Google's New Privacy Settings Concern Some Users interview with Jon Delano, KDKA, March 1, 2012.
Can Do Not Track starve the Web's Cookie Monster? By Jon Brodkin, ars technica, February 28, 2012.
Google To Ramp Up Online Tracking by Steve Henn, NPR Morning Edition, February 28, 2012.
Dr. Cranor on "Do Not Track" & the Improbability of Complete Privacy By Scott M. Fulton, III, ReadWriteWeb, February 24, 2012.
Weaving Around Web Privacy Controls interview with Ira Flatow, produced by Charles Bergquist, NPR Science Friday, February 24, 2012.
Will online privacy laws actually make a difference? by John Moe, Marketplace, February 24, 2012.
Expert: Microsoft's P3P "Ineffective," Google's Privacy Bypass Unhelpful By Scott M. Fulton, III, ReadWriteWeb, February 23, 2012.
Firms embrace Do Not Track for targeted ads only by Elinor Mills, CNET News, February 23, 2012.
Web privacy standards: easy to break, hard to enforce By Jon Brodkin, ars technica, February 22, 2012.
Expert: Microsoft has itself to blame in browser-privacy flap by Tim Greene, Network World, February 22, 2012.
Google, Microsoft Butt Heads Over IE Privacy Skirting By Gregg Keizer, Computerworld, February 21, 2012.
Google, Microsoft tangle over tracking, online privacy By Byron Acohido, USA TODAY, February 21, 2012.
Google defense cites study arguing for stronger privacy regulation By Ed Bott, ZDNet, February 21, 2012.
Microsoft claims Google foils IE's privacy policies as well by Lee Kaelin, TechSport, February 21, 2012.
Microsoft: Google violates our users' privacy too by David Goldman @CNNMoneyTech, February 21, 2012
Google says IE privacy policy is impractical in modern Web by John Ribeiro, IDG News, February 21, 2012.
Google and Microsoft spar over user tracking by David Meyer, ZDNet UK, February 21, 2012.
It's Microsoft vs. Google in a Web-Tracking Battle by Jennifer Valentino-DeVries, The Wall Street Journal, February 20, 2012.
Microsoft says Google circumvents IE privacy policies too by Nancy Gohring, IDG News, February 20, 2012.
Google tricks Internet Explorer into accepting tracking cookies, Microsoft claims By Jon Brodkin, Ars Technica, February 20, 2012.
Not just Google: Facebook also bypasses privacy settings in IE by Emil Protalinski, ZDNet, February 20, 2012.
Could Google's data hoarding be good for you? by Kate Dailey, BBC News Magazine, 26 January 2012.
Do Not Track Legislation: What Small Businesses Need to Know, OPEN Forum, by Susan Kuchinskas, 11 January 2012
Consumers turn to do-not-track software to maintain privacy By Byron Acohido, USA TODAY, December 30, 2011.
Safeguarding Privacy and Improving Web Security, Cyber Law and Business Report Podcast interview with Bennet Kelley, November 23, 2011
As more advertisers monitor every click of your mouse, should someone monitor the monitoring? By Deborah M. Todd, Pittsburgh Post-Gazette, November 21, 2011.
Behavioral marketing: Why Johnny can't opt-out by Michael Kassner, TechRepublic. November 21, 2011.
Online Privacy Tools Don't Work Well, CMU Researchers Find by Fahmida Y. Rashid, eWeek, November 8, 2011.
Study Finds Online Privacy Tools Ineffective By John Wagley, Security Management, November 7, 2011.
Research finds that privacy tools don't work by Lisa Vaas, Naked Security, November 7, 2011.
Internet Privacy Tools Miss the Mark, Study Suggests By Dian Schaffhauser, The Journal, November 7, 2011.
Carnegie Mellon Research: Internet Privacy is Hard to Find By Dian Schaffhauser, Campus Technology, November 7, 2011.
Internet privacy tools too confusing for most users by Angela Moscaritolo, SC Magazine, November 3, 2011
Consumers Don't Understand Opt-Out Tools by Wendy Davis, Online Media Daily, October 31, 2011.
If you tried to opt out of online tracking, it probably didn't work by John Moe, Marketplace Tech Report, November 1, 2011.
Study: Usability Issues Plague Tools that Limit Online Behavioral Advertising by Tom Loftus, The Wall Street Journal, October 31, 2011.
The Default Choice, So Hard to Resist by Steve Lohr, The New York Times, October 15, 2011
Consumers are willing to pay more to protect their privacy online by Steve Henn, Marketplace Morning Report, July 14, 2011.
Don't Let These Happen to You by Kashmir Hill, Forbes.com, June 24, 2011.
Privacy on Social Networks: American, Chinese, and Indian Perspectives by Eliza Strickland,IEEE Spectrum Tech Talk, May 23, 2011.
Web Standards Group To Tackle Do-Not-Track by Wendy Davis, MediaPost, April 23, 2011.
Study shows lagging compliance with an online ad privacy program by Allison Enright, Internet Retailer, April 4, 2011.
Is It Time For Privacy Nutrition Labels? by Kashmir Hill, Forbes.com, March 23, 2011
Is the Internet destroying privacy? by Cristen Conger, Discovery News, March 22, 2011
Privacy suit takes aim at Amazon by Allison Enright, Internet Retailer, March 4, 2011.
Hack-Proof Your Life, Men's Health, March 2011, p. 57.
New Study Shows Persistence Of 'Flash Cookies' by Joe Mullin, paidContent.org, February 1, 2011.
Forum targets online privacy by Erich Schwartzel, Pittsburgh Post-Gazette, January 27, 2011.
Online privacy, the consumer and do not track lists, hour-long discussion with Marty Moss-Coane on WHYY Radio Times, January 6, 2011.
Microsoft will upgrade web browser privacy options in next release by Allison Enright, Internet Retailer, December 9, 2010.
FTC Considers 'Do Not Track' List For Internet Users By Jon Delano, KDKA, December 2, 2010.
Rule targets computer privacy: FTC report recommends 'Do Not Track' tool on Internet By Dan Majors, Pittsburgh Post-Gazette, December 02, 2010.
Manhunt Policy Change Raises Questions Anew About Internet Privacy by Peter Cassels, Edge, November 22, 2010.
Posting gripes about job a risky practice by Jeremy Boren, Pittsburgh Tribune-Review, Saturday, November 13, 2010.
Facebook Snafu Highlights Growing Privacy Concerns by Laura Sydell, NPR Morning Edition, October 19, 2010.
Internet anonymity at risk as real costs of free speech weighed By Mike Cronin, Pittsburgh Tribune-Review, Saturday, October 16, 2010.
Major sites are violating consumers privacy preferences, says a new study by Allison Enright, Internet Retailer, September 28, 2010.
A Loophole Big Enough for a Cookie to Fit Through By Riva Richmond, The New York Times, September 17, 2010.
Cyber security may depend on getting employees on board with best practices by Malia Spencer, Pittsburgh Business Times, May 28, 2010, p. 13,16.
Protect Yourself with Facebook Privacy Settings interview with Andrew Stockey on Pittsburgh Channel 4 news, March 16, 2010 (see also Andrew Stockey's blog post).
BBC Newshour interview with Claire Bolderson about privacy and location-sharing applications, March 12, 2010.
As Location-Sharing Services Grow, Privacy Concerns Do Too by Jennifer Valentino-DeVries, WSJ Blogs, March 10, 2010.
Location Privacy Goes to Washington by Deane Rimerman, ReadWriteWeb, March 8, 2010.
Redrawing the Route to Online Privacy by Steve Lohr, The New York Times, February 28, 2010, p. BU4 of the New York edition.
Web scams up; ID thefts in W.Pa. below average by Brian Bowling, Pittsburgh Tribune-Review, February 26, 2010.
Congress hears testimony on location-based services and online privacy by Alexander B. Howard, Compliance Management News, February 25, 2010.
CMU prof to testify in D.C. about location-sharing by Mike Cronin, Pittsburgh Tribune-Review, February 24, 2010.
Focused Research Awards grant professors $2 million for study by Sabrina Porter, The Tartan, February 15, 2010.
Experts warn: Be careful opening those electronic greetings by Teresa F. Lindeman, Pittsburgh Post-Gazette, February 9, 2010.
CMU lands three Google research grants by Malia Spencer, Pittsburgh Business Times, February 2, 2010.
Google gives millions of dollars in research awards by Lance Whitney, CNET News, February 2, 2010.
Mozilla weighs privacy warnings for Web pages by Declan McCullagh, CNET News, February 2, 2010.
Google Puts New Focus on Outside Research By Steve Lohr, The New York Times, February 1, 2010.
It's been 10 years: Why won't people pay for privacy? by Declan McCullagh, CNET News, January 28, 2010.
Staying connected a status (update) symbol By Erich Schwartzel, Pittsburgh Post-Gazette, January 06, 2010.
Spam e-mail growing because it works by Tim Barker, St. Louis Post-Dispatch, December 28, 2009.
Show 045 - An Interview with Lorrie Cranor, The Silver Bullet Security Podcast interview by Gary McGraw.
The Big Question: Does the latest online technology pose an unacceptable threat to our privacy? By Rhodri Marsden, 15 December 2009, The Independent.
Working to increase Internet security by Wayne Yoshioka, Hawaii Public Radio, December 10, 2009.
Groups Far Apart on Online Privacy Oversight by Stephanie Clifford, The New York Times, December 7, 2009
FTC to Consider Stricter Online Privacy Rules by Grant Gross, IDG News Service, Dec 7, 2009.
Does Using The Internet Mean Giving Up Privacy? by Laurie Burkitt, Forbes, 12.07.09.
FTC Takes On Online Privacy by Amy Schatz, December 7, 2009.
At F.T.C. Conference, Concerns About Advertising and Privacy by Stephanie Clifford, NYTimes.com, December 7, 2009.
Building a Better Password by Nick Summers, NEWSWEEK published Oct 9, 2009 from the magazine issue dated Oct 19, 2009.
The user is not the enemy: How to increase information security usability by Wendy M. Grossman, Info Security, 03 August 2009.
Crying Wolf: Do Security Warnings Help? Study: Internet Users Immune to Pop-Up Security Warnings by Ki Mae Heussner, ABC News.com, 30 July 2009.
Browser SSL warnings shown to be ineffective by Angela Moscaritolo, SC Magazine, July 28, 2009.
Research: Security certificate warnings are not working by Steve Ragan, The Tech Herald Jul 28 2009.
Security certificate warnings don't work, researchers say by Robert McMillan, Computerworld July 24, 2009.
Online life can be convenient as well as dangerous by Allison M. Heinrichs, Pittsburgh Tribune-Review, 18 May 2009.
ISO carries out phishing study by Edmund Huber, The Tartan, 6 April 2009.
Don't just talk about security - do something! by M.E. Kabay, Network Wold Security Strategies Alert, January 22, 2009.
Call 4 Action: Avoid Online Shopping Scams During Holiday Season, WTAE TV 4, December 1, 2008.
The Cost of Reading Privacy Policies, interview with Aleecia McDonald on Freepress Media Minutes, October 17, 2008.
How Safe Is That Web App? Researchers Want Online Privacy Policies Regulated by Sarah Perez, October 10, 2008.
Online Execs Object To Privacy Statement Report by Wendy Davis, Online Media Daily, October 9, 2008.
Reading privacy policies "would take 20 hours a month" by Barry Collins, PC Pro, October 9, 2008.
Study: Reading online privacy policies could cost $365 billion a year by Nate Anderson, ars technica, October 8, 2008.
Users, Enterprises Pay for Poor Privacy Policies, Study Says by Tim Wilson, Dark Reading, October 7, 2008. Average privacy policy takes 10 minutes to read, research finds, OUT-LAW News, October 6, 2008. Allegedly illegal Democratic e-mails 'waste' of taxes by Brad Bumsted and Debra Erdley, Pittsburgh Tribune-Review, August 2, 2008.
Do you agree not to read our privacy policy? by Wendy M. Grossman, The Guardian, January 10, 2008. Web
tool detects something phishy by Bonnie Pfister, Pittsburgh Tribune-Review 12/11/07. Online privacy policies need work, advocates say
by Grant Gross, NetworkWorld, 11/02/07. Researchers:
Current education inadequate to fight phishing by Elizabeth
Montalbano, Computerworld, 10 October 2007. Online game
teaches users about the threats of phishing
by Kun Xian Leong,
The Tartan, 8 October 2007. Phishing
victims learn online security lesson by Robert Jacques, vnunet.com, 3 October 2007. Fighting
Phish, Dr. Dobb's Journal, 2 October 2007. Coolest Security Tool Ever!
- Online game to teach cyber-security
by Alexandru Dumitru, Softpedia, 2 October 2007. Anti-Phishing
Game To Help Raise Awarness, Portalit.net, 1 October 2007. Scientists
develop Anti-Phishing game to educate Web users by Ruben Francia,
BLORGE.com, 29 September 2007. Carnegie
Mellon's Online Game Helps People Recognize Internet Scams,
Phishing by Regina Sass, Associated Press, 28 September 2007. A
new game developed at Carnegie Mellon University educates users on
phishing threats. by Christopher Nickson, Digital Trends, 27
September 2007. Phishers
caught hook, line and sinker by Stuart Turton, PC Pro, 26
September 2007. Carnegie
Mellon floats anti-phishing game by Robert Jaques, PC Magazine, 26
September 2007. CMU's
Anti-Phishing Phil helps users identify Internet scams--try it! by
Deb Smit, POP City, 26 September 2007.
Fish
named Phil helps foil phishers, CBC News, 26 September 2007. CNET News.com CNET News.com DM News Associated Press
School Conducts Anti-Phishing Research Dark Reading The San Diego Union-Tribune The Register Pittsburgh Post-Gazette Dark Reading Cnet News.com BBC News
Good privacy pays for web stores NetworkWorld Ars Technica Marketplace Cnet news.com Santa Rosa Press Democrat Beaver County Times & Allegheny Times Pittsburgh Post-Gazette Pittsburgh Tribune-Review Pittsburgh Post-Gazette Globe and Mail Pittsburgh Post-Gazette The Miami Herald cnews Washington University in St. Louis Magazine The Dallas Morning News The Star-Ledger The Star-Ledger Federal Computing Week NPR Talk of the Nation Associated Press Federal Computing Week Houston Chronicle Information Week Technology Reviw CNN Financial News: The Biz The New York Times NewScientist.com
CNET Asia PCPro UK InfoWorld Ubiquity InformationWeek Privacy Laws & Business International Newsletter Let's Talk Computers Federal Computer Week DM News CNET News.com Computerworld Computerworld Toronto Star PCWorld CNET News.com Dayton Daily News abcNews.com The Star-Ledger The Institute South Florida Sun-Sentinel San Francisco Chronicle NPR All Things Considered internetnews.com Newsbytes Associated Press Minnesota Public Radio: Future tense Reuters Computer User Associated Press CNET Radio Morning Show The Plain Dealer Computerworld Radio Parallax The New York Times Computerworld IEEE News & Views The Wall Street Journal NPR Morning Edition Scientific American Tallahassee Democrat ABC News Nightline U.S. 1 San Francisco Chronicle San Jose Mercury News
Bloomberg
The Orlando Sentinel
Los Angeles Times
Ventura County Star
The Wall Street Journal
IDG.net
Inter@ctive Week
Associated Press
Le Monde
Scientific American
tele.com
Scientific American
Investor's Business Daily
TechWeb
Forbes
The Industry Standard
The Industry Standard
Upside Today
The New York Times
Science Magazine USA Today ZDNet News The Washington Post CNET Associated Press Internet News Radio The New York Times InfoWorld Computerworld NPR All Things Considered The Star-Ledger Computerworld The New York Times Inter@ctive Week Inter@ctive Week Computerworld Associated Press Forbes USA Today More articles about CFP2000 BusinessWeek Online Daily Briefing BusinessWeek Associated Press National Public Radio, All Things Considered TechWeb Wired News South China Morning Post Red Herring Wired News The Star-Ledger The New York Times - Cybertimes The Washington Times The Star-Ledger USA Weekend NPR Weekend Edition - Sunday The New York Times - Circuits Knight Ridder/Tribune Business News Wired News Forbes ASAP The New York Times Washington Post ComputerWorld Wired News FamilyPC on the Web Wired News USA Today Wired News USA Today NPR Morning Edition Technology Review USA Today Internet Magazine Wired News Executive Summary Wired News The Boston Globe Intermediair Village Voice The New York Times - CyberTimes HotWired: HotSeat The New York Times - CyberTimes
National Journal
The Boston Globe
Los Angeles Times
Prior to 1996 I was twice featured in local newspapers, complete with
embarrassing photos. While in college, the St. Louis
Post-Dispatch pictured me seated at a Missouri bar and complaining
because local grocery stores and other bars in the area refused to
accept my valid Maryland driver's license as ID. Several years earlier
I was pictured in the Montgomery Journal wearing a bright green
Girl Scout uniform and holding a check that then President Reagan had
sent to our troop after I wrote him a letter.
2007
Court rules against TorrentSpy in hacking case
By Greg Sandoval
28 August 2007
http://news.com.com/Court+rules+against+TorrentSpy+in+hacking+case/2100-1030_3-6204948.html
E-voting predicament: Not-so-secret ballots
By Declan McCullagh
20 August 2007
http://news.com.com/E-voting+predicament+Not-so-secret+ballots/2100-1014_3-6203323.html
Enhanced privacy measures might produce bigger profits
By Robert Gellman
11 August 2007
http://www.dmnews.com/cms/dm-news/legal-privacy/42089.html
22 July 2007
http://www.nytimes.com/aponline/technology/AP-Phony-Phishing.html
Picture your password
By Kelly Jackson Higgins
23 July 2007
http://www.darkreading.com/document.asp?doc_id=129760&WT.svl=news1_1
Bye-bye, ballot box?
By Jennifer Davies
22 June 2007
http://www.signonsandiego.com/news/tech/20070622-9999-1b22votes.html
Better privacy policies can make money, finds P3P study
12 June 2007
http://www.theregister.co.uk/2007/06/12/online_privacy_study/
Online Shoppers will Pay for Security
By Theresa F. Lindeman
8 June 2007
http://www.post-gazette.com/pg/07159/792443-28.stm
Privacy Premium Doesn't Faze Buyers
By Tim Wilson
7 June 2007
http://www.darkreading.com/document.asp?doc_id=125940&WT.svl=news2_1
Study: Shoppers will pay for privacy
By Candace Lombardi
7 June 2007
http://news.com.com/Study+Shoppers+will+pay+for+privacy/2100-1029_3-6189380.html
7 June 2007
http://news.bbc.co.uk/2/hi/technology/6729565.stm
Shoppers
willing to pay extra for privacy confidence, study finds
By Jon Brodkin
6 June 2007
http://www.networkworld.com/news/2007/060607-privacy-confidence-survey.html
Americans willing to pay (a little) more for privacy
By Nate Anderson
7 June 2007
http://arstechnica.com/news.ars/post/20070607-americans-willing-to-pay-a-little-more-for-privacy.html
Filters will do just fine
By Pat Loeb
22 March 2007
http://marketplace.publicradio.org/shows/2007/03/22/PM200703225.html
Net porn ban faces another legal setback
By Declan McCullagh
22 March 2007
http://news.com.com/Net+porn+ban+faces+another+legal+setback/2100-1030_3-6169621.html
Swamped by passwords
By Derek J. Moore
15 January 2007
http://www1.pressdemocrat.com/apps/pbcs.dll/article?AID=/20070115/NEWS/70115002&SearchID=732695685005872006
Rule for internet: Reader beware
By Tom Fontaine
6 August 2006
http://www.timesonline.com/site/news.cfm?newsid=17019415&BRD=2305&PAG=461&dept_id=478569&rfi=6
Researchers work to thwart cleverer cyber scammers
By Corilyn Shropshire
12 July 2006
http://www.post-gazette.com/pg/06193/705079-96.stm
Don't Click anything!
By Thomas Olson
12 July 2006
http://www.pittsburghlive.com/x/pittsburghtrib/business/s_461503.html
Bits & Bytes
By Corilyn Shropshire
8 July 2006
http://www.post-gazette.com/pg/06189/704252-96.stm2005
The truth about security
By Mary Kirwan
31 August 2005
http://www.globetechnology.com/servlet/story/RTGAM.20050826.gtkirwanaug26/BNStory/Technology/
Cybersecurity experts to gather at Carnegie Mellon
By Corilyn Shropshire
6 July 2005
http://www.post-gazette.com/pg/05187/533266.stm
p. E1
2004
Touch-screen danger: slow voting, long lines
By Joe Mozingo, Evan S. Benn, and Tim Henderson
24 October 2004
http://www.miami.com/mld/miamiherald/news/state/10000065.htm?1c
Gadgets Needed - Tell Your Mayor
By Greg Gazin
21 October 2004
http://cnews.canoe.ca/CNEWS/TechNews/Gazin/2004/10/21/679362.html
Under Wraps
By David Linzee
Spring 2004
http://magazine.wustl.edu/Spring04/LorrieCramer.htm
Ballot-tampering charges fly in S. Texas recount
By Pete Slover
2 April 2004
http://www.dallasnews.com/s/dws/wfaa/latestnews/stories/040304dnpolsnafu.2646d.html
Talent leak drains AT&T think tank
21 March 2004
https://www.cis.upenn.edu/~mkearns/papers/njsl.html
If a check's in the e-mail, maybe spam won't be
By Kevin Coughlin
23 February 2004
http://www.nj.com/news/ledger/index.ssf?/base/news-13/1077520334112750.xml
p. 1, 8
Privacy safeguard proves elusive
By Sara Michael
23 February 2004
http://www.fcw.com/fcw/articles/2004/0223/pol-privacy-02-23-04.asp
Geeks Versus Non-Geeks
Host: Joe Palca
9 February 2004
http://www.npr.org/rundowns/segment.php?wfId=1667162
Michigan Democrats Proceed with Online Voting Despite Security Issues
By Anick Jesdanun
6 February 2004
http://www.mlive.com/newsflash/michigan/index.ssf?/base/business-2/1076097545295720.xml
Agencies on the path to P3P
By Sara Michael
21 January 2004
http://www.fcw.com/fcw/articles/2004/0119/web-machine-01-21-04.asp
2003
DVD black marketers grow bolder, police say: Some film rip-offs offered pre-release
By Andrew Tilghman
26 December 2003
http://www.chron.com/cs/CDA/ssistory.mpl/business/2321025
Q&A with Richard Purcell
by Parry Aftab
17 November 2003
http://www.informationweek.com/story/showArticle.jhtml?articleID=16100478
(see last question)
TR100/2003
October 2003
http://www.technologyreview.com/articles/tr100_1003.asp
Go directly to my profile: http://www.technologyreview.com/articles/tr10003_lcranor.asp
Movie Piracy: An Inside Job?
Interview by David Haffenreffer
16 September 2003
Hollywood Faces Online Piracy, but It Looks Like an Inside Job
By John Schwartz
15 September 2003
p. C1,C3
http://www.nytimes.com/2003/09/15/technology/15MOVI.html?ex=1378958400&en=5ff2b9031c983a39&ei=5007&partner=USERLAND
Insiders blamed for most online movie piracy
By Will Knight
http://www.newscientist.com/news/news.jsp?id=ns99994166
Most P2P movies leaked by studio: Study
17 September 2003
http://asia.cnet.com/newstech/security/0,39001150,39151412,00.htm
Movie industry faces music-style downloads battle
By Simon Aughton
15 September 2003
http://www.pcpro.co.uk/?http://www.pcpro.co.uk/news/news_story.php?id=47320
FTC forum: Internet users want cheap privacy
People don't want complexity or high prices
By Grant Gross
14 May 2003
http://www.infoworld.com/article/03/05/14/HNcheapprivacy_1.html
At the Crossroads of Technology and Policy:
Lorrie Cranor on privacy, online voting and Internet censorship
18 February 2003
http://www.acm.org/ubiquity/interviews/l_cranor_2.html
High Impact: What is technology's ultimate contribution to the world? Here are four people working to shape its social consequences
By Mary Hayes
10 Feburary 2003
http://www.informationweek.com/shared/printableArticle?doc_id=IWK20030206S0007
P3P -- problems, progress, potential
by Alan Pedersen
February 2003
p. 20-21
http://p3pbook.com/0302-plb.pdf2002
Web Privacy with P3P
Interview by Alan Ashendorf and Sandra Ashendorf
7 December 2002
http://www.lets-talk-computers.net/guests/oreilly/p3p/
Privacy made simple for high-tech minds:
New books make difficult issue more manageable
By Ari Schwartz
2 December 2002
http://www.fcw.com/fcw/articles/2002/1202/pol-books-12-02-02.asp
New Book May Be the Bible on P3P
by Robert Gellman
2 December 2002
http://www.dmnews.com/cgi-bin/artprevbot.cgi?article_id=22331&dest=article
p. 14
Turning up the heat on Web privacy
By Paul Festa
19 November 2002
http://news.com.com/2008-1082-966268.html
P3P Supporters Struggle to Increase Adoption of Data Privacy Standard
By Patrick Thibideau
18 November 2002
http://www.computerworld.com/securitytopics/security/privacy/story/0,10801,75986,00.html
Meeting to mull privacy standard's next step
By Patrick Thibideau
11 November 2002
http://www.computerworld.com/securitytopics/security/privacy/story/0,10801,75814,00.html
Will we, should we e-Vote?
By Tyler Hamilton
4 November 2002
http://www.torontostar.com/NASApp/cs/ContentServer?pagename=thestar/Layout/Article_PrintFriendly&c=Article&cid=1035773962641
p. D1
Privacy Watch: A Little Bird That Guards Your Online Privacy
by Andrew Brandt
December 2002 (posted online 23 October 2002)
http://www.pcworld.com/features/article/0,aid,105830,00.asp
Promise of P3P stalls as backers regroup
By Paul Festa
29 October 2002
http://news.com.com/2100-1023-963632.html
Anti-porn law aimed at Net argued: U.S. judgeÃÂÃÂÃÂÃÂÃÂÃÂÃÂÃÂs ruling due Friday
By Wes Hills
1 August 2002
http://www.activedayton.com/ddn/local/0801bill.html
Privacy on the Web: Will New Standards and Laws Help Protect Sensitive User Data?
By Paul Eng
30 July 2002
http://abcnews.go.com/sections/scitech/DailyNews/webprivacy020730.html
You've got porn, and guardians of e-mail can't help
by Kevin Coughlin
21 July 2002
http://www.njo.com/news/ledger/index.ssf?/base/news-3/1027242620320190.xml
p. 1, 10
Spam: Not Funny Anymore
by Helen Horowitz
July 2002
http://www.spectrum.ieee.org/INST/jul02/fspam.html
p. 1-2
A bird on the screen's worth two ...
by Christine Winter
12 May 2002
http://www.sun-sentinel.com/business/local/sfl-sbtech12may12.column?coll=sfl
p. 3G
Conference on privacy opens in S.F.
by Carrie Kirby
17 April 2002
http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2002/04/17/BU58965.DTL
[CFP2002 conference]
Online Privacy
by Larry Abramson
16 April 2002
http://discover.npr.org/features/feature.jhtml?wfId=1141807
Finally, Agreement on P3P
By Beth Cox
16 April 2002
http://www.internetnews.com/dev-news/article/0,,10_1010361,00.html
W3C Give Blessing To New Privacy Standard
By Kevin Featherly
16 April 2002
http://www.newsbytes.com/news/02/175924.html
Group OKs Web Site Privacy System
By Anick Jesdanun
16 April 2002
http://www.washingtonpost.com/wp-dyn/articles/A60279-2002Apr16.html
http://story.news.yahoo.com/news?tmpl=story&cid=528&ncid=528&e=2&u=/ap/20020416/ap_on_hi_te/privacy_labels_4
http://home.post-dispatch.com/channel/pdweb.nsf/da37732b0078d6c285256ad500494df3/86256a0e0068fe5086256b9e002ca14a?OpenDocument&Highlight=0,p3p
http://www.signonsandiego.com/news/business/20020417-9999_1b17privacy.html
http://www.orlandosentinel.com/business/nationworld/orl-bizlabel17041702apr17.story
http://www.bayarea.com/mld/bayarea/business/technology/3075822.htm
Privacy Bird
10 April 2002
Interview by Jon Gordon
http://news.mpr.org/programs/futuretense/daily_rafiles/20020410.ram
IBM, AT& T Release Free Internet Privacy Tools
By Elinor Mills Abreu
4 April 2002
http://www.nytimes.com/reuters/technology/tech-tech-ibm-privacy.html
http://www.totaltele.com/view.asp?ArticleID=50629&Pub=tt
http://story.news.yahoo.com/news?tmpl=story&cid=581&581&e=14&u=/nm/20020404/tc_nm/tech_ibm_privacy_dc_4
http://www.foxnews.com/story/0,2933,49560,00.html
Privacy's new platform:
Finally, users have control over how sites use their personal information
By James Mathewson
April 2002
http://www.computeruser.com/articles/2104,2,1,1,0401,02.html
Sites wary of automatic privacy disclosure
By Anick Jesdanun
16 March 2002
http://www.cnn.com/2002/TECH/internet/03/16/privacy.labels.ap/index.html
Interview with Brian Cooley about P3P
7 February 2002
10:15 am Eastern
2001
Taking control online: Surfers may soon choose what personal data goes
out to Web sites
By Chris Seper
29 October 2001
p. C1
[P3P]
Companies moving slowly on P3P adoption
By Patrick Thibodeau
19 October 2001
http://www.computerworld.com/cwi/story/0,1199,NAV47_STO64931,00.html
Interview with Dr. Lorrie Faith Cranor
(in English and German)
October 2001
http://www.theparallax.com/radio/nachlesen/cranor-e.html
[P3P]
The Browser as a Cookie-Control Key
By John Schwartz
5 September 2001
p. C6
http://archive.nytimes.com/2001/09/05/technology/05BROW.html
[P3P]
Giving Users Back Their Privacy
By Deborah Radcliff
9 July 2001
http://www.computerworld.com/itresources/rcstory/0,4167,STO61981_KEY73,00.html
[P3P]
Electronic Voting: Not Ready for Prime Time?
By Robert Bellinger
May 2001
http://www.todaysengineer.org/policyperspectives/feb_01features/evoting.html
The Battle Over Web Privacy: As Congress Mulls New Laws, Microsoft
Pushes a System That's Tied to Its Browser
By Glenn R. Simpson
21 March 2001
p. B1, B4
http://public.wsj.com/sn/y/SB985132165383902742.html
[P3P]
The Next Napster
By Larry Abramson
15 February 2000
http://www.npr.org/ramfiles/me/20010215.me.08.rmm
[peer-to-peer]
No E(asy) Cure: Electronic voting won't fix butterfly ballots,
dimpled chads or W.'s presidency
By Wendy M. Grossman
February 2001
p. 36
http://www.sciam.com/2001/0201issue/0201cyber.html
[voting]
2000
Big Lie: Every vote counts
By Paige St. John
17 December 2000
http://web.tallahasseedemocrat.com/content/tallahassee/2000/12/17/local/1217.loc.BigLie.htm
[voting]
Is the Voting System Broken?
By Dave Marash
14 December 2000
http://abcnews.go.com/onair/nightline/transcripts/nl001214_trans.html
[voting]
Internet Privacy? New P3P Guidelines
By Caroline Calogero
13 December 2000
http://www.princetoninfo.com/200012/01213s01.html
[P3P]
Time to Digitize Elections: State has certified digitized election
equipment from 4 manufacturers
By Henry Norr
27 November 2000
http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2000/11/27/BU91491.DTL
[voting]
ATM-like ballots seen as best answer in California
By Ken McLaughlin, Mary Anne Ostrom and Cheryl Devall
24 November 2000
http://cgi.mercurycenter.com/premium/nation/docs/atm112400.htm
[online voting]
Experts Warn About Security as Internet Voting Gains Ground
By Paul Horvitz
17 November 2000
[online voting]
Internet Voting Gets Harder Look
By Nancy Imperiale Wellons
12 November 2000
p. A15
[online votin]
Fiasco Reveals a Ballot System Full of Holes
Election: Punch-card voting has many drawbacks,
but high-tech alternatives have their own problems
By Michael A. Hiltzik and Greg Miller
11 November 2000
http://www.latimes.com/news/politics/decision2000/lat_ballot001111.htm
[voting]
Casting votes via Internet coming, but still years off
By T.J.Sullivan
11 November 2000
http://www.insidevc.com/elect2000/stories/20001111co1.shtml
[online voting]
Local Governments Lack the Money To Replace Old Machines, Pay Staff
By Glenn Simpson, Ted Bridis and Michael Orey
9 November 2000
p. A1, A18
[online voting]
Critical Florida votes cast online
By George A. Chidi Hr.
8 November 2000
http://www.idg.net/ic_282544_1794_9-10000.html
http://www.cnn.com/2000/TECH/computing/11/09/florida.e.voters.idg/index.html
[online voting]
Trials and Tribulations In The W3C
By James E. Gaskin
5 November 2000
http://www.zdnet.com/intweek/stories/news/0,4164,2650162,00.html
[W3C]
Online voting still meets resistance
By Anick Jesdanun
27 October 2000
http://www.usatoday.com/life/cyber/tech/cti727.htm
[online voting]
L'anonymat contre la censure
By Guillaume Fraissard
24 October 24 2000
http://www.lemonde.fr/article/0,2320,108442,00.html
[Publius]
Speech without Accountability
By W. Wayt Gibbs
October 2000
http://scientificamerican.com/2000/1000issue/1000techbus1.html
[Publius]
AT&T Divides and Conquers
By Amy Larsen DeCarlo
2 October 2000
http://www.teledotcom.com/article/TEL20001010S0048
[Publius]
How Publius Thwarts Censors
By W. Wayt Gibbs
October 2000
http://scientificamerican.com/2000/1000issue/1000techbus2.html
[Publius]
Microsoft Can't Lock Up All Online Security Issues
By Donna Howell
22 September 2000
[privacy]
Online Privacy Tools Are Within Reach
By Mary Mosquera
20 September 2000
http://www.techweb.com/printableArticle?doc_id=TWB20000920S0013
Stop, Thief! Master of Your Domain
11 September 2000
p. 102-103
[P3P]
Peer-to-Peer - We've Only Just Begun
By Elinore Abreu
21 August 2000
http://www.thestandard.com/article/display/0,1151,17757,00.html
[Publius]
The Nasruddin Model
By Richard Martin
21 August 21 2000>br>
http://www.thestandard.com/article/display/0,1151,17780,00.html
[Publius]
Corporate coders confined
By Ryan Tate
11 August 2000
http://www.upside.com/News/3993428b0.html
[publius]
Divided Data Can Elude the Censor
By Daniel Sorid
26 July 2000
p. G10
http://www.nytimes.com/library/tech/00/07/circuits/articles/27next.html
[Publius]
A Censor-Proof Internet?
By Jocelyn Kaiser
14 July 2000
[Publius]
Privacy plug-in will ask: 'Do you want to go there?'
By Elizabeth Weise
11 July 2000
p. 3D
http://www.usatoday.com/usatonline/20000711/2443199s.htm
[P3P]
P3P: A green light for privacy on the Web?
By Robert Lemos
5 July 2000
http://www.zdnet.com/zdnn/stories/news/0,4586,2598004,00.html?chkpt=zdhpnews01
[P3P]
Online and Unidentifiable
by John Schwartz
30 June 2000
p. E1, E11
http://www.washingtonpost.com/wp-dyn/articles/A21689-2000Jun29.html
[Publius]
AT&T developing Web anonymity, anti-censorship tool
By John Borland
30 June 30 2000
http://news.cnet.com/news/0-1004-200-2183852.html?tag=st.ne.1002.tgif.ni
[Publius]
AT&T Announces Web Speech Invention
30 June 2000
http://www.nytimes.com/aponline/f/AP-ATT-Publius.html
[Publius]
Publius, a censorship- resistant Web publishing system
by Brian McWilliams
30 June 2000
http://stream.internet.com/Content/inr20000630.ram
[Publius]
New Technology Is Aimed at Increasing Web Privacy
by Jeri Clausing
22 June 2000
http://www10.nytimes.com/library/tech/00/06/cyber/articles/22privacy.html
[P3P interop]
Vendors huddle over privacy
by Jennifer Jones
21 June 2000
http://www.nwfusion.com/news/2000/0621p3pmicrosoft.html
[P3P interop]
Microsoft, others unveil tools to protect online privacy
by Linda Rosencrance
21 June 2000
http://www.computerworld.com/cwi/story/0,1199,NAV47_STO46118,00.html
[P3P interop]
Privacy Software
by Larry Abramson
21 June 2000
http://search.npr.org/cf/cmn/cmnps05fm.cfm?SegID=75730
[P3P interop]
Software in works boosts Net privacy
By Kevin Coughlin
19 June 2000
http://www.njo.com/news/ledger/index.ssf?/page1/ledger/fdafa7.html
[P3P interop]
W3C updates online privacy proposal
By Carol Sliwa
17 May 2000
http://www.idg.net/go.cgi?id=265950
[P3P]
Efforts to Keep the Web From Getting Too Personal
By Catherine Greenman
27 April 2000
http://www.nytimes.com/library/tech/00/04/circuits/articles/27priv.html
[Infomediaries, P3P]
Privacy Standard Bows To Some Boos
By Doug Brown
17 April 2000
http://www.zdnet.com/intweek/stories/news/0,4164,2550560,00.html
[P3P]
FTC Mulls Net Privacy Policy
By Doug Brown
13 April 2000
http://www.zdnet.com/intweek/stories/news/0,4164,2541323,00.html
[FTC Advisory Committee on Online Access and Security]
Microsoft backs P3P Net privacy standard
By Ann Harrison
12 April 2000
http://www.computerworld.com/home/print.nsf/all/000412D49A
[P3P]
Microsoft Announces Internet Tools to Control Web Privacy
7 April 2000
http://www10.nytimes.com/library/tech/00/04/biztech/articles/07privacy.html
[P3P]
Microsoft, AOL Become Privacy Gatekeepers
By Marius Meland
7 April 2000
http://www.forbes.com/tool/html/00/apr/0407/mu7.htm
[P3P]
A weird path to the wired future
By Elizabeth Weise
4 April 2000
http://www.usatoday.com/life/cyber/tech/cth671.htm
[CFP2000 conference]
http://www.cfp2000.org/press/
Newsmaker Q&A: No Quick Fixes for Protecting Privacy Online
14 March 2000
http://businessweek.com/bwdaily/dnflash/mar2000/nf00314c.htm
[online privacy, P3P]
Online Privacy: It's Time for Rules in Wonderland
By Heather Green, Mike France, Marcia Stepanek, and Amy Borrus
20 March 2000
p. 83-94
http://businessweek.com/2000/00_12/b3673006.htm
[online privacy]
Arizona Set for Online Primary Vote
By Anick Jesdanun
6 March 2000
http://dailynews.yahoo.com/h/ap/20000306/tc/virtual_voting_2.html
[electronic voting, Arizona election]
Internet Security
By Larry Abramson
15 February 2000
http://www.npr.org/ramfiles/atc/20000215.atc.10.ram
[Internet security]
1999
W3C Releases Last Privacy-Standard Draft
By Mo Krochmal
5 November 1999
http://www.techweb.com/wire/story/TWB19991105S0018
[P3P]
W3C: Privacy Spec Safe
by Chris Oakes
29 October 1999
http://www.wired.com/news/technology/0,1282,32206,00.html
[P3P]
Airport chaos could last until weekend:
Thousands of travellers left waiting for flights
by Felix Chan
17 September 1999
[quotes me as a stranded traveller at the Hong Kong airport during
Typhoon York]
Is there a privacy time bomb?
by Kenneth Neil Cukier
September 1999
p. 90-98
[privacy, cites 'Beyond Concern' study, P3P]
Big Brother, Big Fun at Amazon
by Declan McCullagh
25 August 1999
http://www.wired.com/news/news/business/story/21417.html
[privacy]
E-votes spur election debate
by J. Scott Orr
16 August 1999
p. 1,8
http://www.njo.com/page1/ledger/ca403c.html
[electronic voting]
Study Warns of Risks in Internet Voting
by Rebecca Fairley Raney
14 August 1999
http://www.nytimes.com/library/tech/99/08/cyber/articles/14vote.html
[electronic voting]
Voting marches forward: Troops get limited on-line balloting
by William Glanz
5 August 1999
[electronic voting]
Speedy delivery:
System targets consumers for advertising e-mail
by Allan Hoffman
21 June 1999
p. 27,28
http://www.njo.com/business/ledger/c14f0e.html
[spam, cites 'Beyond Concern' study]
Ideas for a better America
by John F. Kennedy Jr.
11 June 1999
http://www.usaweekend.com/99_issues/990613/990613talk.html
[electronic voting, mentions AT&T voting work and paraphrases my
comments from an interview, but does not mention me by name]
Online Anonymity
by Larry Abramson
16 May 1999
http://programs.npr.org/npr2/PrgDisp.cfm?PrgDate=05/16/1999&PrgID=10
[P3P]
Web Surfers' Fears Prompt Privacy Seals
by Lisa Guernsey
29 April 1999
http://www.nytimes.com/library/tech/99/04/circuits/articles/29priv.html
[cites 'Beyond Concern' study]
Privacy at Forefront of Internet Worries
by Bernice Kanner
29 April 1999
[cites 'Beyond Concern' study]
Commerce Tech Boss Checks In
by Christopher Jones
26 April 1999
http://www.wired.com/news/news/politics/story/19343.html
[cites 'Beyond Concern' study]
Net Noise
by Sean Donahue
20 April 1999
http://www.forbes.com/asap/html/99/0420/side.htm
[cites 'Beyond Concern' study]
Peekaboo! Anonymity Is Not Always Secure
by Peter H. Lewis
15 April 1999
http://www.nytimes.com/library/tech/99/04/circuits/articles/15pete.html
[anonymity tools]
Privacy Policy Vs.Practice: Group Finds Contrast In Agency Web Sites
by John Schwartz
16 April 1999
[cites 'Beyond Concern' study]
AT&T: Multiple privacy approaches needed on Net
by Tom Diederich
16 April 1999
http://www.computerworld.com/home/news.nsf/all/9904165att
['Beyond Concern' study]
Take My Email, but Not My Data
by Chris Oakes
14 April 1999
http://www.wired.com/news/news/politics/story/19123.html
['Beyond Concern' study]
What Do Real People Think About Privacy on the Internet?
by Robin Raskin
14 April 1999
http://www1.zdnet.com/familypc/stories/main/0,4858,2241050,00.html
['Beyond Concern' study]
Shaping Online Privacy
by Declan McCullagh
6 April 1999
http://www.wired.com/news/news/politics/story/18969.html
[CFP 2000]
Keeping 'pry' out of the privacy debate
by Leslie Miller and Elizabeth Weise
31 March 1999
p. 4D
http://www.usatoday.com/life/cyber/tech/cte755.htm
[P3P/Privacy Minder]
Your Data, Your Choice
by Chris Oakes
24 March 1999
http://www.wired.com/news/news/technology/story/18678.html
[P3P/infomediaries]
Tips for keeping kids on 'safe' sites
by Marc Saltzman
26 January 1999
http://www.usatoday.com/life/cyber/tech/ctd935.htm
['Technology Inventory'/keeping kids safe online]
1998
Court Mandates VA. Library to Cease Internet Filtering
by Larry Abramson
29 December 1999
http://www.npr.org/programs/morning/archives/1998/981229.me.html
[filtering software]
The
Web's Unelected Government
by Simson L. Garfinkel
November/December 1998
[W3C/P3P]
Campaign unfurls safety Net for kids
by Leslie Miller
15 September 1998
[cites 'Technology Inventory']
Unsung Heroes
July 1998
p. 40-43
[P3P - names Lorrie Cranor an Unsung Hero of the Internet for work on P3P]
The Dawn of the Infomediary
by James Glave
24 February 1999
http://www.wired.com/news/news/business/story/18094.html
[P3P/infomediaries]
P3P: Programming Privacy
by Rick E. Bruner
http://www.x-summary.com/trends/980630.phtml
[P3P]
The Trouble with P3P
by Chris Oakes
25 June 1998
http://www.wired.com/news/news/technology/story/13242.html
[P3P]
Plugged In: The facts of Spam
by Simson L. Garfinkel
28 May 1998
p. D04
[spam]
Rekenen aan het ideale kiesstelsel (Calculating the Ideal Voting
System)
by Sjaak Adriaanse
23 April 1998
[Declared Strategy Voting - written in Dutch]
Click the Vote
by Austin Bunn
3 February 1998
p. 29
[electronic voting/Costa Rica election]
Online Test of Costa Rican Election Postponed
by Jeri Clausing
30 January 1998
http://www.nytimes.com/library/cyber/week/013098costarica.html
[electronic voting/Costa Rica election]
1997
Online Voting: The Costa Rica Experiment
with host John McChesney
26 November 1997
http://www.hotwired.com/synapse/hotseat/97/47/transcript2a.html
[electronic voting/Costa Rica election]
Costa Rica to Try Online Elections
by Jeri Clausing
22 October 1997
http://www.nytimes.com/library/cyber/week/102297costarica.html
[electronic voting/Costa Rica election]
1996
Ballot Lines
by Graeme Browning
20 April 1996
p. 879-882
[electronic voting/Sensus/DSV]
Casting ballots in cyberspace
by Danial Akst
21 March 1996
p. 37
[electronic voting/Sensus]
POSTCARD: Do We Really Want This Much Participatory Democracy?
by Danial Akst
18 March 1996
p. D11
[electronic voting/Sensus - same as 21 March Boston Globe article]
Earlier