Modeling supply chain dynamics: A multiagent approach JM Swaminathan, SF Smith, NM Sadeh Decision sciences 29 (3), 607-632, 1998 | 1426 | 1998 |
Learning to detect phishing emails I Fette, N Sadeh, A Tomasic Proceedings of the 16th international conference on World Wide Web, 649-656, 2007 | 1024 | 2007 |
The livehoods project: Utilizing social media to understand the dynamics of a city J Cranshaw, R Schwartz, J Hong, N Sadeh | 838 | 2012 |
Nudges for privacy and security: Understanding and assisting users’ choices online A Acquisti, I Adjerid, R Balebako, L Brandimarte, LF Cranor, S Komanduri, ... ACM Computing Surveys (CSUR) 50 (3), 1-41, 2017 | 765 | 2017 |
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing J Lin, S Amini, JI Hong, N Sadeh, J Lindqvist, J Zhang Proceedings of the 2012 ACM conference on ubiquitous computing, 501-510, 2012 | 685 | 2012 |
Bridging the gap between physical location and online social networks J Cranshaw, E Toch, J Hong, A Kittur, N Sadeh Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010 | 639 | 2010 |
A framework of energy efficient mobile sensing for automatic user state recognition Y Wang, J Lin, M Annavaram, QA Jacobson, J Hong, B Krishnamachari, ... Proceedings of the 7th international conference on Mobile systems …, 2009 | 631 | 2009 |
Why people hate your app: Making sense of user feedback in a mobile app store B Fu, J Lin, L Li, C Faloutsos, J Hong, N Sadeh Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013 | 587 | 2013 |
Your location has been shared 5,398 times! A field study on mobile app privacy nudging H Almuhimedi, F Schaub, N Sadeh, I Adjerid, A Acquisti, J Gluck, ... Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015 | 573 | 2015 |
M-commerce: technologies, services, and business models N Sadeh John Wiley & Sons, 2003 | 556 | 2003 |
A conundrum of permissions: installing applications on an android smartphone PG Kelley, S Consolvo, LF Cranor, J Jung, N Sadeh, D Wetherall Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR …, 2012 | 507 | 2012 |
Understanding and capturing people’s privacy policies in a mobile social networking application N Sadeh, J Hong, L Cranor, I Fette, P Kelley, M Prabaker, J Rao Personal and ubiquitous computing 13, 401-412, 2009 | 505 | 2009 |
Privacy as part of the app decision-making process PG Kelley, LF Cranor, N Sadeh Proceedings of the SIGCHI conference on human factors in computing systems …, 2013 | 474 | 2013 |
Disagreeable privacy policies: Mismatches between meaning and users' understanding JR Reidenberg, T Breaux, LF Cranor, B French, A Grannis, JT Graves, ... Berkeley Tech. LJ 30, 39, 2015 | 422 | 2015 |
Stress test evaluation for natural language inference A Naik, A Ravichander, N Sadeh, C Rose, G Neubig arXiv preprint arXiv:1806.00692, 2018 | 401 | 2018 |
Privacy expectations and preferences in an {IoT} world PE Naeini, S Bhagavatula, H Habib, M Degeling, L Bauer, LF Cranor, ... Thirteenth symposium on usable privacy and security (SOUPS 2017), 399-412, 2017 | 393 | 2017 |
Modeling {Users’} mobile app privacy preferences: Restoring usability in a sea of permission settings J Lin, B Liu, N Sadeh, JI Hong 10th Symposium On Usable Privacy and Security (SOUPS 2014), 199-212, 2014 | 387 | 2014 |
Follow my recommendations: A personalized privacy assistant for mobile app permissions B Liu, MS Andersen, F Schaub, H Almuhimedi, SA Zhang, N Sadeh, ... Twelfth symposium on usable privacy and security (SOUPS 2016), 27-41, 2016 | 370* | 2016 |
Toward abstractive summarization using semantic representations F Liu, J Flanigan, S Thomson, N Sadeh, NA Smith arXiv preprint arXiv:1805.10399, 2018 | 366 | 2018 |
Look-ahead techniques for micro-opportunistic job shop scheduling NM Sadeh Carnegie Mellon University, 1991 | 359 | 1991 |