Follow
Ada Lerner
Ada Lerner
Northeastern University
Verified email at northeastern.edu - Homepage
Title
Cited by
Cited by
Year
Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016.
A Lerner, AK Simpson, T Kohno, F Roesner
USENIX Security Symposium, 2016
3062016
Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education
T Denning, A Lerner, A Shostack, T Kohno
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2052013
Replication: How Well Do My Results Generalize Now? The External Validity of Online Privacy and Security Surveys
J Tang, E Birrell, A Lerner
Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 367-385, 2022
1102022
Computer Security and Privacy for Refugees in the United States
L Simko, A Lerner, S Ibtasam, F Roesner, T Kohno
2018 IEEE Symposium on Security and Privacy (SP), 409-423, 2018
802018
Privacy and Activism in the Transgender Community
A Lerner, HY He, A Kawakami, SC Zeamer, R Hoyle
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
732020
Confidante: Usable Encrypted Email: A Case Study with Lawyers and Journalists
A Lerner, E Zeng, F Roesner
Security and Privacy (EuroS&P), 2017 IEEE European Symposium on, 385-400, 2017
662017
Rewriting history: Changing the archived web from the present
A Lerner, T Kohno, F Roesner
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
512017
Defining Privacy: How Users Interpret Technical Terms in Privacy Policies.
J Tang, H Shoemaker, A Lerner, E Birrell
Proc. Priv. Enhancing Technol. 2021 (3), 70-94, 2021
442021
Analyzing the Use of Quick Response Codes in the Wild
A Lerner, A Saxena, K Ouimet, B Turley, A Vance, T Kohno, F Roesner
Proceedings of the 13th Annual International Conference on Mobile Systems …, 2015
312015
Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions
E McReynolds, A Lerner, W Scott, F Roesner, T Kohno
International Conference on Financial Cryptography and Data Security, 94-111, 2015
142015
Rangzen: Anonymously Getting the Word Out in a Blackout
A Lerner, G Fanti, Y Ben-David, J Garcia, P Schmitt, B Raghavan
arXiv preprint arXiv:1612.03371, 2016
72016
Counting Carrds: Investigating Personal Disclosure and Boundary Management in Transformative Fandom
K Wang, D Bially Levy, KT Nguyen, A Lerner, A Marsh
Proceedings of the CHI Conference on Human Factors in Computing Systems, 1-13, 2024
12024
“It's a Fair Game”, or Is It? Examining How Users Navigate Disclosure Risks and Benefits When Using LLM-Based Conversational Agents
Z Zhang, M Jia, HP Lee, B Yao, S Das, A Lerner, D Wang, T Li
Proceedings of the CHI Conference on Human Factors in Computing Systems, 1-26, 2024
12024
Privacy Norms of Transformative Fandom: A Case Study of an Activity-Defined Community
A Marsh, A Lerner
Proceedings of the ACM on Human-Computer Interaction 8 (CSCW1), 1-29, 2024
12024
SoK: Technical Implementation and Human Impact of Internet Privacy Regulations
E Birrell, J Rodolitz, A Ding, J Lee, E McReynolds, J Hutson, A Lerner
arXiv preprint arXiv:2312.15383, 2023
2023
Buying Privacy: User Perceptions of Privacy Threats from Mobile Apps
J Tang, H Shoemaker, L Teffera, E Birrell, A Lerner
arXiv preprint arXiv:2211.07235, 2022
2022
The Buffet Overflow Café
T Kohno, C Cobb, A Lerner, M Lin, A Shostack
IEEE Security & Privacy 20 (04), 4-7, 2022
2022
Tiktok, It's Threat to National Security O'clock: Investigating the Effects of Securitizing Narratives on User Perceptions of Mobile Apps
JR Tang, A Lerner, E Birrell
Wellesley College, 2021
2021
TikTok, It’s Threat to National Security O’Clock
JRJ Tang, A Lerner, E Birrell
2021
" Custodian of Online Communities": Investigating Mutual Support among Moderators in Managing Community Safety
M Tabassum, A Mackey, A Lerner
The system can't perform the operation now. Try again later.
Articles 1–20