Author: Norman Sadeh
Publications
Co-authors
- Lorrie Cranor
- Eran Toch
- Jason Hong
- 4
- 5
- 6
Productive Colleagues
Publications
Fette, Ian, Sadeh, Norman, Tomasic, Anthony (2007): Learning to detect phishing emails. In: Proceedings of the 2007 International Conference on the World Wide Web , 2007, . pp. 649-656. https://doi.acm.org/10.1145/1242572.1242660
Tsai, Janice Y., Kelley, Patrick, Drielsma, Paul, Cranor, Lorrie Faith, Hong, Jason, Sadeh, Norman (2009): Who\'s viewed you?: the impact of feedback in a mobile location-sharing application. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 2003-2012. https://doi.acm.org/10.1145/1518701.1519005
Benisch, Michael, Kelley, Patrick Gage, Sadeh, Norman, Sandholm, Tuomas, Tsai, Janice, Cranor, Lorrie Faith, Drielsma, Paul Hankes (2009): The impact of expressiveness on the effectiveness of privacy mechanisms for location-shari. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 22. https://doi.acm.org/10.1145/1572532.1572561
Toch, Eran, Ravichandran, Ramprasad, Cranor, Lorrie, Drielsma, Paul, Hong, Jason, Kelley, Patrick, Sadeh, Norman, Tsai, Janice (2009): Analyzing use of privacy policy attributes in a location sharing application. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 32. https://doi.acm.org/10.1145/1572532.1572571
Tsai, Janice, Kelley, Patrick, Drielsma, Paul Hankes, Cranor, Lorrie, Hong, Jason, Sadeh, Norman (2009): Who\'s viewed you?: the impact of feedback in a mobile location-sharing application. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 43. https://doi.acm.org/10.1145/1572532.1572583
Ravichandran, Ramprasad, Benisch, Michael, Kelley, Patrick Gauge, Sadeh, Norman (2009): Capturing social networking privacy preferences: can default policies help alleviate trade. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 47. https://doi.acm.org/10.1145/1572532.1572587
Lin, Jialiu, Xiang, Guang, Hong, Jason I., Sadeh, Norman (2010): Modeling people's place naming preferences in location sharing. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 75-84. https://doi.acm.org/10.1145/1864349.1864362
Tang, Karen P., Lin, Jialiu, Hong, Jason I., Siewiorek, Daniel P., Sadeh, Norman (2010): Rethinking location sharing: exploring the implications of social-driven vs. purpose-drive. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 85-94. https://doi.acm.org/10.1145/1864349.1864363
Cranshaw, Justin, Toch, Eran, Hong, Jason, Kittur, Aniket, Sadeh, Norman (2010): Bridging the gap between physical location and online social networks. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 119-128. https://doi.acm.org/10.1145/1864349.1864380
Toch, Eran, Cranshaw, Justin, Drielsma, Paul Hankes, Tsai, Janice Y., Kelley, Patrick Gage, Springfield, James, Cranor, Lorrie, Hong, Jason, Sadeh, Norman (2010): Empirical models of privacy in location sharing. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 129-138. https://doi.acm.org/10.1145/1864349.1864364
Toch, Eran, Cranshaw, Justin, Hankes-Drielsma, Paul, Springfield, Jay, Kelley, Patrick Gage, Cranor, Lorrie, Hong, Jason, Sadeh, Norman (2010): Locaccino: a privacy-centric location sharing application. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 381-382. https://doi.acm.org/10.1145/1864431.1864446
Kelley, Patrick Gage, Benisch, Michael, Cranor, Lorrie Faith, Sadeh, Norman (2011): When are users comfortable sharing locations with advertisers?. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2449-2452. https://dx.doi.org/10.1145/1978942.1979299
Kostakos, Vassilis, Venkatanathan, Jayant, Reynolds, Bernardo, Sadeh, Norman, Toch, Eran, Shaikh, Siraj A., Jones, Simon (2011): Who's your best friend?: targeted privacy attacks in location-sharing social networks. In: Proceedings of the 2011 International Conference on Uniquitous Computing , 2011, . pp. 177-186. https://dx.doi.org/10.1145/2030112.2030138
Lin, Jialiu, Sadeh, Norman, Amini, Shahriyar, Lindqvist, Janne, Hong, Jason I., Zhang, Joy (2012): Expectation and purpose: understanding users' mental models of mobile app privacy through . In: Proceedings of the 2012 International Conference on Uniquitous Computing , 2012, . pp. 501-510. https://dx.doi.org/10.1145/2370216.2370290