Follow
Norman Sadeh
Title
Cited by
Cited by
Year
Modeling supply chain dynamics: A multiagent approach
JM Swaminathan, SF Smith, NM Sadeh
Decision sciences 29 (3), 607-632, 1998
14021998
Learning to detect phishing emails
I Fette, N Sadeh, A Tomasic
Proceedings of the 16th international conference on World Wide Web, 649-656, 2007
9702007
The livehoods project: Utilizing social media to understand the dynamics of a city
J Cranshaw, R Schwartz, J Hong, N Sadeh
8172012
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing
J Lin, S Amini, JI Hong, N Sadeh, J Lindqvist, J Zhang
Proceedings of the 2012 ACM conference on ubiquitous computing, 501-510, 2012
6442012
Nudges for privacy and security: Understanding and assisting users’ choices online
A Acquisti, I Adjerid, R Balebako, L Brandimarte, LF Cranor, S Komanduri, ...
ACM Computing Surveys (CSUR) 50 (3), 1-41, 2017
6342017
Bridging the gap between physical location and online social networks
J Cranshaw, E Toch, J Hong, A Kittur, N Sadeh
Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010
6282010
A framework of energy efficient mobile sensing for automatic user state recognition
Y Wang, J Lin, M Annavaram, QA Jacobson, J Hong, B Krishnamachari, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
6232009
Why people hate your app: Making sense of user feedback in a mobile app store
B Fu, J Lin, L Li, C Faloutsos, J Hong, N Sadeh
Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013
5532013
M-commerce: technologies, services, and business models
N Sadeh
John Wiley & Sons, 2003
5412003
Your location has been shared 5,398 times! A field study on mobile app privacy nudging
H Almuhimedi, F Schaub, N Sadeh, I Adjerid, A Acquisti, J Gluck, ...
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
5252015
Understanding and capturing people’s privacy policies in a mobile social networking application
N Sadeh, J Hong, L Cranor, I Fette, P Kelley, M Prabaker, J Rao
Personal and ubiquitous computing 13, 401-412, 2009
4882009
A conundrum of permissions: installing applications on an android smartphone
PG Kelley, S Consolvo, LF Cranor, J Jung, N Sadeh, D Wetherall
Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR …, 2012
4762012
Privacy as part of the app decision-making process
PG Kelley, LF Cranor, N Sadeh
Proceedings of the SIGCHI conference on human factors in computing systems …, 2013
4312013
Look-ahead techniques for micro-opportunistic job shop scheduling
N Sadeh
Carnegie Mellon University, 1991
3591991
Modeling {Users’} mobile app privacy preferences: Restoring usability in a sea of permission settings
J Lin, B Liu, N Sadeh, JI Hong
10th Symposium On Usable Privacy and Security (SOUPS 2014), 199-212, 2014
3572014
Disagreeable privacy policies: Mismatches between meaning and users' understanding
JR Reidenberg, T Breaux, LF Cranor, B French, A Grannis, JT Graves, ...
Berkeley Tech. LJ 30, 39, 2015
3492015
Stress test evaluation for natural language inference
A Naik, A Ravichander, N Sadeh, C Rose, G Neubig
arXiv preprint arXiv:1806.00692, 2018
3332018
Privacy expectations and preferences in an {IoT} world
PE Naeini, S Bhagavatula, H Habib, M Degeling, L Bauer, LF Cranor, ...
Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 399-412, 2017
3332017
Toward abstractive summarization using semantic representations
F Liu, J Flanigan, S Thomson, N Sadeh, NA Smith
arXiv preprint arXiv:1805.10399, 2018
3312018
Distributed constrained heuristic search
K Sycara, SF Roth, N Sadeh, MS Fox
IEEE Transactions on systems, man, and cybernetics 21 (6), 1446-1461, 1991
3201991
The system can't perform the operation now. Try again later.
Articles 1–20