Papers
- Turtles, Locks, and Bathrooms: Understanding Mental Models of Privacy Through Illustration.Oates M, Ahmadullah Y, Marsh A, Swoopes C, Zhang S, Balebako R, Cranor LF. Proceedings on Privacy Enhancing Technologies. 2018 Oct 1;2018(4):5-32.
-
The Latent Potential of Privacy Technologies: How Our Future Will Be Shaped by Today's Privacy Decisions. William Welser IV, Rebecca Balebako, Cameron Colquhoun, Osonde Osoba Strategic Latency Red, White, and Blue: Managing the National and International Security Consequences of Disruptive Technologies. Lawrence Livermore National Lab.(LLNL), Livermore, CA (United States). Chapter 11 2018
-
The Cambridge Handbook of Consumer Privacy Evan Selinger, Jules Polonetsky, Omer Tene 2018 (co-wrote Chapter 21).
-
Designing effective privacy notices and controls. Schaub, Florian, Rebecca Balebako, and Lorrie Faith Cranor. IEEE Internet Computing (2017).
- The Impact of Timing on the Salience of Smartphone App Privacy Notices Balebako, R., Schaub, F., Adjerid, I., Acquisti, A., Cranor, L. 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2015, ACM
- A Design Space for Effective Privacy Notices
Schaub, F., Balebako, R., Durity A., and Cranor L. In Proc. of the 2015 Sympo- sium on Usable Privacy and Security (Winner, Future of Privacy Forum's Privacy Papers for Policy Makers)
- Variations in Tracking in Relation to Geographic Location
Fruchter, N., Miao, H., Stevenson, S, Balebako, R., IEEE Security \& Privacy Workshop on Web 2.0 for Security and Privacy 2015
- Is Notice Enough: Mitigating the Risks of Smartphone Data Sharing
Balebako, R., C. Bravo-Lillo, Cranor, L.
I/S: A Journal of Law and Policy for the Information Society. Volume 11, Issue 2, Summer 2015
- The Privacy and Security Behaviors of Smartphone App Developers
Balebako, R., Marsh, A., Lin, J., Hong, J., Cranor, L.
NDSS Workshop 2014 Usable Security Experiments (USEC)
- Is Your Inseam a Biometric? A Case Study on the Role of Usability Studies in Developing Public Policy
Balebako, R., Shay, R., Cranor, L.
In NDSS Workshop 2014 Usable Security Experiments (USEC)
- Is it the typeset or the type of statistics? Disfluent font does not reduce self-disclosure
Balebako, R., Peer, E., Brandimarte, L., Cranor, L., Acquisti, A.,
In Proceedings of the 2013 Learning from Authoritative Security Experiment Results (LASER) Workshop Video of Presentation
- 'Little Brothers Watching You:' Raising Awareness of Data Leaks on Smartphones
Balebako, R., Jung, J., Lu, W., Cranor, L., Nguyen, C.,
In Proceedings of the 2013 Symposium on Usable Privacy and Security
- What Matters to Users? Factors that Affect Users' Willingness to Share Information with Online Advertisers
Leon, P., Ur, B., Wang, Y., Sleeper, M., Balebako, R., Shay, R., Bauer, L., Christodorescu, M., Cranor, L.
In Proceedings of the 2013 Symposium on Usable Privacy and Security
- The post that wasn't: Exploring self-censorship on Facebook.
Sleeper, M., Balebako, R., Das, S., McConahy, A., Wiese, J., and Cranor, L.In Proceedings of the 2013 conference on Computer Supported Collaborative Work p793-802 2013 ACM
-
Measuring the Effectiveness of Privacy Tools for Limiting Behavioral Advertising
Balebako, R., Leon, P., Shay, R., Ur, B., Wang, W. and L. Cranor
In Web 2.0 for Security and Privacy Workshop[ (2012)
- Why Johnny Can't Opt Out: A usability evaluation of tools to limit online behavioral advertising
Leon, P., Ur, B., Balebako, R., Cranor, L., Shay, R., Wang, Y.,
In Proceeedings of CHI 2012.
- Nudging Users Towards Privacy on Mobile Devices.
Balebako, R., Leon, P., Almuhimedi, H., Kelley, P., Mugan, J., Acquisti, A., Cranor, L., and Sadeh, N.,
In Proceedings of the 2nd Annual Workshop on Persuasion, Nudge, Influence, and Coercion on Mobile Devices, p23-26 CHI 2011
- Masters Thesis: Using Distributed Computing to solve the 0-1 Knapsack Problem (PDF)