Number of co-authors:34
Number of publications with 3 favourite co-authors:Aniket Kittur:James Springfield:Paul Hankes-Drielsma:
Norman Sadeh's 3 most productive colleagues in number of publications:Lorrie Faith Crano..:44Jason I. Hong:36Aniket Kittur:27
go to course
Psychology of Interaction Design: The Ultimate Guide
Starts tomorrow LAST CALL!
go to course
User-Centred Design - Module 3
90% booked. Starts in 5 days
Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess
User Experience and Experience Design !
Our Latest Books
The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
Publications by Norman Sadeh (bibliography)
Lin, Jialiu, Sadeh, Norman, Amini, Shahriyar, Lindqvist, Janne, Hong, Jason I. and Zhang, Joy (2012): Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. In: Proceedings of the 2012 International Conference on Uniquitous Computing 2012. pp. 501-510. http://dx.doi.org/10.1145/2370216.2370290
Smartphone security research has produced many useful tools to analyze the privacy-related behaviors of mobile apps. However, these automated tools cannot assess people's perceptions of whether a given action is legitimate, or how that action makes them feel with respect to privacy. For example, automated tools might detect that a blackjack game and a map app both use one's location information, but people would likely view the map's use of that data as more legitimate than the game. Our work introduces a new model for privacy, namely privacy as expectations. We report on the results of using crowdsourcing to capture users' expectations of what sensitive resources mobile apps use. We also report on a new privacy summary interface that prioritizes and highlights places where mobile apps break people's expectations. We conclude with a discussion of implications for employing crowdsourcing as a privacy evaluation technique.
© All rights reserved Lin et al. and/or ACM Press
Kelley, Patrick Gage, Benisch, Michael, Cranor, Lorrie Faith and Sadeh, Norman (2011): When are users comfortable sharing locations with advertisers?. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems 2011. pp. 2449-2452. http://dx.doi.org/10.1145/1978942.1979299
As smartphones and other mobile computing devices have increased in ubiquity, advertisers have begun to realize a more effective way of targeting users and a promising area for revenue growth: location-based advertising. This trend brings to bear new questions about whether or not users will adopt products involving this potentially invasive form of advertising and what sorts of protections they should be given. Our real-world user study of 27 participants echoes earlier findings that users have significant privacy concerns regarding sharing their locations with advertisers. However, we examine these concerns in more detail and find that they are complex (e.g., relating not only to the quantity of ads, but the locations and times at which they are received). With advanced privacy settings, users stated they would feel more comfortable and share more information than with a simple opt-in/opt-out mechanism.
© All rights reserved Kelley et al. and/or their publisher
Kostakos, Vassilis, Venkatanathan, Jayant, Reynolds, Bernardo, Sadeh, Norman, Toch, Eran, Shaikh, Siraj A. and Jones, Simon (2011): Who's your best friend?: targeted privacy attacks in location-sharing social networks. In: Proceedings of the 2011 International Conference on Uniquitous Computing 2011. pp. 177-186. http://dx.doi.org/10.1145/2030112.2030138
This paper presents a study that aims to answer two important questions related to targeted location-sharing privacy attacks: (1) given a group of users and their social graph, is it possible to predict which among them is likely to reveal most about their whereabouts, and (2) given a user, is it possible to predict which among her friends knows most about her whereabouts. To answer these questions we analyse the privacy policies of users of a real-time location sharing application, in which users actively shared their location with their contacts. The results show that users who are central to their network are more likely to reveal most about their whereabouts. Furthermore, we show that the friend most likely to know the whereabouts of a specific individual is the one with most common contacts and/or greatest number of contacts.
© All rights reserved Kostakos et al. and/or ACM Press
Lin, Jialiu, Xiang, Guang, Hong, Jason I. and Sadeh, Norman (2010): Modeling people's place naming preferences in location sharing. In: Proceedings of the 2010 International Conference on Uniquitous Computing 2010. pp. 75-84. http://doi.acm.org/10.1145/1864349.1864362
Most location sharing applications display people's locations on a map. However, people use a rich variety of terms to refer to their locations, such as "home," "Starbucks," or "the bus stop near my house." Our long-term goal is to create a system that can automatically generate appropriate place names based on real-time context and user preferences. As a first step, we analyze data from a two-week study involving 26 participants in two different cities, focusing on how people refer to places in location sharing. We derive a taxonomy of different place naming methods, and show that factors such as a person's perceived familiarity with a place and the entropy of that place (i.e. the variety of people who visit it) strongly influence the way people refer to it when interacting with others. We also present a machine learning model for predicting how people name places. Using our data, this model is able to predict the place naming method people choose with an average accuracy higher than 85%.
© All rights reserved Lin et al. and/or their publisher
Tang, Karen P., Lin, Jialiu, Hong, Jason I., Siewiorek, Daniel P. and Sadeh, Norman (2010): Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing. In: Proceedings of the 2010 International Conference on Uniquitous Computing 2010. pp. 85-94. http://doi.acm.org/10.1145/1864349.1864363
© All rights reserved Tang et al. and/or their publisher
Cranshaw, Justin, Toch, Eran, Hong, Jason, Kittur, Aniket and Sadeh, Norman (2010): Bridging the gap between physical location and online social networks. In: Proceedings of the 2010 International Conference on Uniquitous Computing 2010. pp. 119-128. http://doi.acm.org/10.1145/1864349.1864380
This paper examines the location traces of 489 users of a location sharing social network for relationships between the users' mobility patterns and structural properties of their underlying social network. We introduce a novel set of location-based features for analyzing the social context of a geographic region, including location entropy, which measures the diversity of unique visitors of a location. Using these features, we provide a model for predicting friendship between two users by analyzing their location trails. Our model achieves significant gains over simpler models based only on direct properties of the co-location histories, such as the number of co-locations. We also show a positive relationship between the entropy of the locations the user visits and the number of social ties that user has in the network. We discuss how the offline mobility of users can have implications for both researchers and designers of online social networks.
© All rights reserved Cranshaw et al. and/or their publisher
Toch, Eran, Cranshaw, Justin, Drielsma, Paul Hankes, Tsai, Janice Y., Kelley, Patrick Gage, Springfield, James, Cranor, Lorrie, Hong, Jason and Sadeh, Norman (2010): Empirical models of privacy in location sharing. In: Proceedings of the 2010 International Conference on Uniquitous Computing 2010. pp. 129-138. http://doi.acm.org/10.1145/1864349.1864364
The rapid adoption of location tracking and mobile social networking technologies raises significant privacy challenges. Today our understanding of people's location sharing privacy preferences remains very limited, including how these preferences are impacted by the type of location tracking device or the nature of the locations visited. To address this gap, we deployed Locaccino, a mobile location sharing system, in a four week long field study, where we examined the behavior of study participants (n=28) who shared their location with their acquaintances (n=373.) Our results show that users appear more comfortable sharing their presence at locations visited by a large and diverse set of people. Our study also indicates that people who visit a wider number of places tend to also be the subject of a greater number of requests for their locations. Over time these same people tend to also evolve more sophisticated privacy preferences, reflected by an increase in time- and location-based restrictions. We conclude by discussing the implications our findings.
© All rights reserved Toch et al. and/or their publisher
Toch, Eran, Cranshaw, Justin, Hankes-Drielsma, Paul, Springfield, Jay, Kelley, Patrick Gage, Cranor, Lorrie, Hong, Jason and Sadeh, Norman (2010): Locaccino: a privacy-centric location sharing application. In: Proceedings of the 2010 International Conference on Uniquitous Computing 2010. pp. 381-382. http://doi.acm.org/10.1145/1864431.1864446
Locaccino is a location sharing application designed to empower users to effectively control their privacy. It has been piloted by close to 2000 users and has been used by researchers as an experimental platform for conducting research on location-based social networks. Featured technologies include expressive privacy rule creation, detailed feedback mechanisms that help users understand their privacy, algorithms for analyzing privacy preferences, and clients for mobile computers and smartphone devices. In addition, variations of Locaccino are also being piloted as part of research on user-controllable policy learning, learning usable privacy personas and reconciling expressiveness and user burden. The purpose of this demo is to introduce participants to the features of Locaccino, so that they can try out the Locaccino smartphone and laptop applications on their own devices, locate their friends and colleagues, and set rich privacy policies for sharing their location.
© All rights reserved Toch et al. and/or their publisher
Tsai, Janice Y., Kelley, Patrick, Drielsma, Paul, Cranor, Lorrie Faith, Hong, Jason and Sadeh, Norman (2009): Who's viewed you?: the impact of feedback in a mobile location-sharing application. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems 2009. pp. 2003-2012. http://doi.acm.org/10.1145/1518701.1519005
Feedback is viewed as an essential element of ubiquitous computing systems in the HCI literature for helping people manage their privacy. However, the success of online social networks and existing commercial systems for mobile location sharing which do not incorporate feedback would seem to call the importance of feedback into question. We investigated this issue in the context of a mobile location sharing system. Specifically, we report on the findings of a field deployment of Locyoution, a mobile location sharing system. In our study of 56 users, one group was given feedback in the form of a history of location requests, and a second group was given no feedback at all. Our major contribution has been to show that feedback is an important contributing factor towards improving user comfort levels and allaying privacy concerns. Participants' privacy concerns were reduced after using the mobile location sharing system. Additionally, our study suggests that peer opinion and technical savviness contribute most to whether or not participants thought they would continue to use a mobile location technology.
© All rights reserved Tsai et al. and/or ACM Press
Benisch, Michael, Kelley, Patrick Gage, Sadeh, Norman, Sandholm, Tuomas, Tsai, Janice, Cranor, Lorrie Faith and Drielsma, Paul Hankes (2009): The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing. In: Proceedings of the 2009 Symposium on Usable Privacy and Security 2009. p. 22. http://doi.acm.org/10.1145/1572532.1572561
Tsai, Janice, Kelley, Patrick, Drielsma, Paul Hankes, Cranor, Lorrie, Hong, Jason and Sadeh, Norman (2009): Who's viewed you?: the impact of feedback in a mobile location-sharing application. In: Proceedings of the 2009 Symposium on Usable Privacy and Security 2009. p. 43. http://doi.acm.org/10.1145/1572532.1572583
Ravichandran, Ramprasad, Benisch, Michael, Kelley, Patrick Gauge and Sadeh, Norman (2009): Capturing social networking privacy preferences: can default policies help alleviate tradeoffs between expressiveness and user burden?. In: Proceedings of the 2009 Symposium on Usable Privacy and Security 2009. p. 47. http://doi.acm.org/10.1145/1572532.1572587
Fette, Ian, Sadeh, Norman and Tomasic, Anthony (2007): Learning to detect phishing emails. In: Proceedings of the 2007 International Conference on the World Wide Web 2007. pp. 649-656. http://doi.acm.org/10.1145/1242572.1242660
Each month, more attacks are launched with the aim of making web users believe that they are communicating with a trusted entity for the purpose of stealing account information, logon credentials, and identity information in general. This attack method, commonly known as "phishing," is most commonly initiated by sending out emails with links to spoofed websites that harvest information. We present a method for detecting these attacks, which in its most general form is an application of machine learning on a feature set designed to highlight user-targeted deception in electronic communication. This method is applicable, with slight modification, to detection of phishing websites, or the emails used to direct victims to these sites. We evaluate this method on a set of approximately 860 such phishing emails, and 6950 non-phishing emails, and correctly identify over 96% of the phishing emails while only mis-classifying on the order of 0.1% of the legitimate emails. We conclude with thoughts on the future for such techniques to specifically identify deception, specifically with respect to the evolutionary nature of the attacks and information available.
© All rights reserved Fette et al. and/or International World Wide Web Conference Committee
Join our community and advance:
Page maintainer: The Editorial Team