Author: Norman Sadeh
Publication Overview
Publication period start: 2012
Number of co-authors: 34
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Fette,
Ian,
Sadeh,
Norman,
Tomasic,
Anthony
(2007):
Learning to detect phishing emails.
In:
Proceedings of the 2007 International Conference on the World Wide Web
,
2007,
.
pp. 649-656.
https://doi.acm.org/10.1145/1242572.1242660
Tsai,
Janice Y.,
Kelley,
Patrick,
Drielsma,
Paul,
Cranor,
Lorrie Faith,
Hong,
Jason,
Sadeh,
Norman
(2009):
Who\'s viewed you?: the impact of feedback in a mobile location-sharing application.
In:
Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems
,
2009,
.
pp. 2003-2012.
https://doi.acm.org/10.1145/1518701.1519005
Benisch,
Michael,
Kelley,
Patrick Gage,
Sadeh,
Norman,
Sandholm,
Tuomas,
Tsai,
Janice,
Cranor,
Lorrie Faith,
Drielsma,
Paul Hankes
(2009):
The impact of expressiveness on the effectiveness of privacy mechanisms for location-shari.
In:
Proceedings of the 2009 Symposium on Usable Privacy and Security
,
2009,
.
pp. 22.
https://doi.acm.org/10.1145/1572532.1572561
Toch,
Eran,
Ravichandran,
Ramprasad,
Cranor,
Lorrie,
Drielsma,
Paul,
Hong,
Jason,
Kelley,
Patrick,
Sadeh,
Norman,
Tsai,
Janice
(2009):
Analyzing use of privacy policy attributes in a location sharing application.
In:
Proceedings of the 2009 Symposium on Usable Privacy and Security
,
2009,
.
pp. 32.
https://doi.acm.org/10.1145/1572532.1572571
Tsai,
Janice,
Kelley,
Patrick,
Drielsma,
Paul Hankes,
Cranor,
Lorrie,
Hong,
Jason,
Sadeh,
Norman
(2009):
Who\'s viewed you?: the impact of feedback in a mobile location-sharing application.
In:
Proceedings of the 2009 Symposium on Usable Privacy and Security
,
2009,
.
pp. 43.
https://doi.acm.org/10.1145/1572532.1572583
Ravichandran,
Ramprasad,
Benisch,
Michael,
Kelley,
Patrick Gauge,
Sadeh,
Norman
(2009):
Capturing social networking privacy preferences: can default policies help alleviate trade.
In:
Proceedings of the 2009 Symposium on Usable Privacy and Security
,
2009,
.
pp. 47.
https://doi.acm.org/10.1145/1572532.1572587
Lin,
Jialiu,
Xiang,
Guang,
Hong,
Jason I.,
Sadeh,
Norman
(2010):
Modeling people's place naming preferences in location sharing.
In:
Proceedings of the 2010 International Conference on Uniquitous Computing
,
2010,
.
pp. 75-84.
https://doi.acm.org/10.1145/1864349.1864362
Tang,
Karen P.,
Lin,
Jialiu,
Hong,
Jason I.,
Siewiorek,
Daniel P.,
Sadeh,
Norman
(2010):
Rethinking location sharing: exploring the implications of social-driven vs. purpose-drive.
In:
Proceedings of the 2010 International Conference on Uniquitous Computing
,
2010,
.
pp. 85-94.
https://doi.acm.org/10.1145/1864349.1864363
Cranshaw,
Justin,
Toch,
Eran,
Hong,
Jason,
Kittur,
Aniket,
Sadeh,
Norman
(2010):
Bridging the gap between physical location and online social networks.
In:
Proceedings of the 2010 International Conference on Uniquitous Computing
,
2010,
.
pp. 119-128.
https://doi.acm.org/10.1145/1864349.1864380
Toch,
Eran,
Cranshaw,
Justin,
Drielsma,
Paul Hankes,
Tsai,
Janice Y.,
Kelley,
Patrick Gage,
Springfield,
James,
Cranor,
Lorrie,
Hong,
Jason,
Sadeh,
Norman
(2010):
Empirical models of privacy in location sharing.
In:
Proceedings of the 2010 International Conference on Uniquitous Computing
,
2010,
.
pp. 129-138.
https://doi.acm.org/10.1145/1864349.1864364
Toch,
Eran,
Cranshaw,
Justin,
Hankes-Drielsma,
Paul,
Springfield,
Jay,
Kelley,
Patrick Gage,
Cranor,
Lorrie,
Hong,
Jason,
Sadeh,
Norman
(2010):
Locaccino: a privacy-centric location sharing application.
In:
Proceedings of the 2010 International Conference on Uniquitous Computing
,
2010,
.
pp. 381-382.
https://doi.acm.org/10.1145/1864431.1864446
Kelley,
Patrick Gage,
Benisch,
Michael,
Cranor,
Lorrie Faith,
Sadeh,
Norman
(2011):
When are users comfortable sharing locations with advertisers?.
In:
Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems
,
2011,
.
pp. 2449-2452.
https://dx.doi.org/10.1145/1978942.1979299
Kostakos,
Vassilis,
Venkatanathan,
Jayant,
Reynolds,
Bernardo,
Sadeh,
Norman,
Toch,
Eran,
Shaikh,
Siraj A.,
Jones,
Simon
(2011):
Who's your best friend?: targeted privacy attacks in location-sharing social networks.
In:
Proceedings of the 2011 International Conference on Uniquitous Computing
,
2011,
.
pp. 177-186.
https://dx.doi.org/10.1145/2030112.2030138
Lin,
Jialiu,
Sadeh,
Norman,
Amini,
Shahriyar,
Lindqvist,
Janne,
Hong,
Jason I.,
Zhang,
Joy
(2012):
Expectation and purpose: understanding users' mental models of mobile app privacy through .
In:
Proceedings of the 2012 International Conference on Uniquitous Computing
,
2012,
.
pp. 501-510.
https://dx.doi.org/10.1145/2370216.2370290