Author: Norman Sadeh

Publication Overview

Publication period start: 2012
Number of co-authors: 34

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Fette, Ian, Sadeh, Norman, Tomasic, Anthony (2007): Learning to detect phishing emails. In: Proceedings of the 2007 International Conference on the World Wide Web , 2007, . pp. 649-656. https://doi.acm.org/10.1145/1242572.1242660
Tsai, Janice Y., Kelley, Patrick, Drielsma, Paul, Cranor, Lorrie Faith, Hong, Jason, Sadeh, Norman (2009): Who\'s viewed you?: the impact of feedback in a mobile location-sharing application. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 2003-2012. https://doi.acm.org/10.1145/1518701.1519005
Benisch, Michael, Kelley, Patrick Gage, Sadeh, Norman, Sandholm, Tuomas, Tsai, Janice, Cranor, Lorrie Faith, Drielsma, Paul Hankes (2009): The impact of expressiveness on the effectiveness of privacy mechanisms for location-shari. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 22. https://doi.acm.org/10.1145/1572532.1572561
Toch, Eran, Ravichandran, Ramprasad, Cranor, Lorrie, Drielsma, Paul, Hong, Jason, Kelley, Patrick, Sadeh, Norman, Tsai, Janice (2009): Analyzing use of privacy policy attributes in a location sharing application. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 32. https://doi.acm.org/10.1145/1572532.1572571
Tsai, Janice, Kelley, Patrick, Drielsma, Paul Hankes, Cranor, Lorrie, Hong, Jason, Sadeh, Norman (2009): Who\'s viewed you?: the impact of feedback in a mobile location-sharing application. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 43. https://doi.acm.org/10.1145/1572532.1572583
Ravichandran, Ramprasad, Benisch, Michael, Kelley, Patrick Gauge, Sadeh, Norman (2009): Capturing social networking privacy preferences: can default policies help alleviate trade. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 47. https://doi.acm.org/10.1145/1572532.1572587
Lin, Jialiu, Xiang, Guang, Hong, Jason I., Sadeh, Norman (2010): Modeling people's place naming preferences in location sharing. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 75-84. https://doi.acm.org/10.1145/1864349.1864362
Tang, Karen P., Lin, Jialiu, Hong, Jason I., Siewiorek, Daniel P., Sadeh, Norman (2010): Rethinking location sharing: exploring the implications of social-driven vs. purpose-drive. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 85-94. https://doi.acm.org/10.1145/1864349.1864363
Cranshaw, Justin, Toch, Eran, Hong, Jason, Kittur, Aniket, Sadeh, Norman (2010): Bridging the gap between physical location and online social networks. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 119-128. https://doi.acm.org/10.1145/1864349.1864380
Toch, Eran, Cranshaw, Justin, Drielsma, Paul Hankes, Tsai, Janice Y., Kelley, Patrick Gage, Springfield, James, Cranor, Lorrie, Hong, Jason, Sadeh, Norman (2010): Empirical models of privacy in location sharing. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 129-138. https://doi.acm.org/10.1145/1864349.1864364
Toch, Eran, Cranshaw, Justin, Hankes-Drielsma, Paul, Springfield, Jay, Kelley, Patrick Gage, Cranor, Lorrie, Hong, Jason, Sadeh, Norman (2010): Locaccino: a privacy-centric location sharing application. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 381-382. https://doi.acm.org/10.1145/1864431.1864446
Kelley, Patrick Gage, Benisch, Michael, Cranor, Lorrie Faith, Sadeh, Norman (2011): When are users comfortable sharing locations with advertisers?. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2449-2452. https://dx.doi.org/10.1145/1978942.1979299
Kostakos, Vassilis, Venkatanathan, Jayant, Reynolds, Bernardo, Sadeh, Norman, Toch, Eran, Shaikh, Siraj A., Jones, Simon (2011): Who's your best friend?: targeted privacy attacks in location-sharing social networks. In: Proceedings of the 2011 International Conference on Uniquitous Computing , 2011, . pp. 177-186. https://dx.doi.org/10.1145/2030112.2030138
Lin, Jialiu, Sadeh, Norman, Amini, Shahriyar, Lindqvist, Janne, Hong, Jason I., Zhang, Joy (2012): Expectation and purpose: understanding users' mental models of mobile app privacy through . In: Proceedings of the 2012 International Conference on Uniquitous Computing , 2012, . pp. 501-510. https://dx.doi.org/10.1145/2370216.2370290
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel stuck? Want Freedom?

Get one powerful email each week, like 325,759 others.

Learn to design a life you love.

Next email in:
5
days
17
hrs
47
mins
39
secs