Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Manya Sleeper is active.

Publication


Featured researches published by Manya Sleeper.


conference on computer supported cooperative work | 2013

The post that wasn't: exploring self-censorship on facebook

Manya Sleeper; Rebecca Balebako; Sauvik Das; Amber Lynn McConahy; Jason Wiese; Lorrie Faith Cranor

Social networking site users must decide what content to share and with whom. Many social networks, including Facebook, provide tools that allow users to selectively share content or block people from viewing content. However, sometimes instead of targeting a particular audience, users will self-censor, or choose not to share. We report the results from an 18-participant user study designed to explore self-censorship behavior as well as the subset of unshared content participants would have potentially shared if they could have specifically targeted desired audiences. We asked participants to report all content they thought about sharing but decided not to share on Facebook and interviewed participants about why they made sharing decisions and with whom they would have liked to have shared or not shared. Participants reported that they would have shared approximately half the unshared content if they had been able to exactly target their desired audiences.


human factors in computing systems | 2012

Tag, you can see it!: using tags for access control in photo sharing

Peter F. Klemperer; Yuan Liang; Michelle L. Mazurek; Manya Sleeper; Blase Ur; Lujo Bauer; Lorrie Faith Cranor; Nitin Gupta; Michael K. Reiter

Users often have rich and complex photo-sharing preferences, but properly configuring access control can be difficult and time-consuming. In an 18-participant laboratory study, we explore whether the keywords and captions with which users tag their photos can be used to help users more intuitively create and maintain access-control policies. We find that (a) tags created for organizational purposes can be repurposed to create efficient and reasonably accurate access-control rules; (b) users tagging with access control in mind develop coherent strategies that lead to significantly more accurate rules than those associated with organizational tags alone; and (c) participants can understand and actively engage with the concept of tag-based access control.


human factors in computing systems | 2013

i read my Twitter the next morning and was astonished: a conversational perspective on Twitter regrets

Manya Sleeper; Justin Cranshaw; Patrick Gage Kelley; Blase Ur; Alessandro Acquisti; Lorrie Faith Cranor; Norman M. Sadeh

We present the results of an online survey of 1,221 Twitter users, comparing messages individuals regretted either saying during in-person conversations or posting on Twitter. Participants generally reported similar types of regrets in person and on Twitter. In particular, they often regretted messages that were critical of others. However, regretted messages that were cathartic/expressive or revealed too much information were reported at a higher rate for Twitter. Regretted messages on Twitter also reached broader audiences. In addition, we found that participants who posted on Twitter became aware of, and tried to repair, regret more slowly than those reporting in-person regrets. From this comparison of Twitter and in-person regrets, we provide preliminary ideas for tools to help Twitter users avoid and cope with regret.


ACM Computing Surveys | 2017

Nudges for Privacy and Security: Understanding and Assisting Users’ Choices Online

Alessandro Acquisti; Idris Adjerid; Rebecca Balebako; Laura Brandimarte; Lorrie Faith Cranor; Saranga Komanduri; Pedro Giovanni Leon; Norman M. Sadeh; Florian Schaub; Manya Sleeper; Yang Wang; Shomir Wilson

Advancements in information technology often task users with complex and consequential privacy and security decisions. A growing body of research has investigated individuals’ choices in the presence of privacy and information security tradeoffs, the decision-making hurdles affecting those choices, and ways to mitigate such hurdles. This article provides a multi-disciplinary assessment of the literature pertaining to privacy and security decision making. It focuses on research on assisting individuals’ privacy and security choices with soft paternalistic interventions that nudge users toward more beneficial choices. The article discusses potential benefits of those interventions, highlights their shortcomings, and identifies key ethical, design, and research challenges.


human factors in computing systems | 2016

Sharing Personal Content Online: Exploring Channel Choice and Multi-Channel Behaviors

Manya Sleeper; William Melicher; Hana Habib; Lujo Bauer; Lorrie Faith Cranor; Michelle L. Mazurek

People share personal content online with varied audiences, as part of tasks ranging from conversational-style content sharing to collaborative activities. We use an interview- and diary-based study to explore: 1) what factors impact channel choice for sharing with particular audiences; and 2) what behavioral patterns emerge from the ability to combine or switch between channels. We find that in the context of different tasks, participants match channel features to selective-sharing and other task-based needs, shaped by recipient attributes and communication dynamics. Participants also combine multiple channels to create composite sharing features or reach broader audiences when one channel is insufficient. We discuss design implications of these channel dynamics.


Proceedings of the 18th ACM Conference Companion on Computer Supported Cooperative Work & Social Computing | 2015

The Future of Networked Privacy: Challenges and Opportunities

Jessica Vitak; Pamela J. Wisniewski; Xinru Page; Airi Lampinen; Eden Litt; Ralf De Wolf; Patrick Gage Kelley; Manya Sleeper

Building on recent work in privacy management and disclosure in networked spaces, this two-day workshop examines networked privacy challenges from a broader perspective by (1) identifying the most important issues researchers will need to address in the next decade and (2) working to create actionable solutions for these privacy issues. This workshop comes at a critical time for organizations, researchers, and consumers, as content-sharing applications soar in popularity and more privacy and security vulnerabilities emerge. Workshop participants and organizers will work together to develop a guiding framework for the community that highlights the future challenges and opportunities of networked privacy.


ubiquitous computing | 2015

Attitudes toward vehicle-based sensing and recording

Manya Sleeper; Sebastian Schnorf; Brian Kemler; Sunny Consolvo

Vehicles increasingly include features that rely on hi-tech sensors and recording; however, little is known of public attitudes toward such recording. We use two studies, an online survey (n=349) and an interview-based study (n=15), to examine perceptions of vehicle-based sensing and recording. We focus on: 1) how vehicle-based recording and sensing may differ from perceptions of current recording; 2) factors that impact comfort with vehicle-based recording for hypothetical drivers versus bystanders; and 3) perceptions of potential privacy-preserving techniques. We find that vehicle-based recording challenges current mental models of recording awareness. Comfort tends to depend on perceived benefits, which can vary by stakeholder type. Perceived privacy in spaces near cars can also impact comfort and reflect mental models of private spaces as well as the range of potentially sensitive activities people perform in and near cars. Privacy-preserving techniques may increase perceived comfort but may require addressing trust and usability issues.


designing interactive systems | 2014

Exploring the benefits and uses of web analytics tools for non-transactional websites

Manya Sleeper; Sunny Consolvo; Jessica Staddon

Website owners use web analytics tools to better understand their visitors for a range of purposes. However, there is limited understanding of how owners of non-transactional websites use and benefit from web analytics. Through semi-structured interviews (n=18) with non-transactional web analytics users we explore these uses and benefits. Participants tend to use web analytics to improve site design, by optimizing site structure, content, or technical specifications. However, participants also use web analytics to understand their audiences without a directed purpose, often for curiosity or entertainment. The design of web analytics tools should account for this full range of functionality.


symposium on usable privacy and security | 2013

What matters to users?: factors that affect users' willingness to share information with online advertisers

Pedro Giovanni Leon; Blase Ur; Yang Wang; Manya Sleeper; Rebecca Balebako; Richard Shay; Lujo Bauer; Mihai Christodorescu; Lorrie Faithlorrie Cranor


symposium on usable privacy and security | 2013

Your attention please: designing security-decision UIs to make genuine risks harder to ignore

Cristian Bravo-Lillo; Saranga Komanduri; Lorrie Faith Cranor; Robert W. Reeder; Manya Sleeper; Julie S. Downs; Stuart E. Schechter

Collaboration


Dive into the Manya Sleeper's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Saranga Komanduri

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Blase Ur

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Lujo Bauer

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Norman M. Sadeh

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Rebecca Balebako

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Julie S. Downs

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Michael K. Reiter

University of North Carolina at Chapel Hill

View shared research outputs
Researchain Logo
Decentralizing Knowledge