Norman M. Sadeh

Orcid: 0000-0003-4829-5533

Affiliations:
  • Carnegie Mellon University, Pittsburgh, PA, USA


According to our database1, Norman M. Sadeh authored at least 163 papers between 1989 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Missing Pieces: How Framing Uncertainty Impacts Longitudinal Trust in AI Decision Aids - A Gig Driver Case Study.
CoRR, 2024

Sharing is Not Always Caring: Delving Into Personal Data Transfer Compliance in Android Apps.
IEEE Access, 2024

Creation and Analysis of an International Corpus of Privacy Laws.
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024

2023
Understanding How to Inform Blind and Low-Vision Users about Data Privacy through Privacy Question Answering Assistants.
CoRR, 2023

ATLAS: Automatically Detecting Discrepancies Between Privacy Policies and Privacy Labels.
CoRR, 2023

Purpose in the Machine: Do Traffic Simulators Produce Distributionally Equivalent Outcomes for Reinforcement Learning Applications?
Proceedings of the Winter Simulation Conference, 2023

Comparing Privacy Label Disclosures of Apps Published in both the App Store and Google Play Stores.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

Exploring Smart Commercial Building Occupants' Perceptions and Notification Preferences of Internet of Things Data Collection in the United States.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

ATLAS: Automatically Detecting Discrepancies Between Privacy Policies and Privacy Labels.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

2022
How Usable Are iOS App Privacy Labels?
Proc. Priv. Enhancing Technol., 2022

Increasing Adoption of Tor Browser Using Informational and Planning Nudges.
Proc. Priv. Enhancing Technol., 2022

Exploring and Improving the Accessibility of Data Privacy-related Information for People Who Are Blind or Low-vision.
CoRR, 2022

Creation and Analysis of an International Corpus of Privacy Laws.
CoRR, 2022

A Tale of Two Regulatory Regimes: Creation and Analysis of a Bilingual Privacy Policy Corpus.
Proceedings of the Thirteenth Language Resources and Evaluation Conference, 2022

The Real Deal: A Review of Challenges and Opportunities in Moving Reinforcement Learning-Based Traffic Signal Control Systems Towards Reality.
Proceedings of the Twelfth International Workshop on Agents in Traffic and Transportation co-located with the the 31st International Joint Conference on Artificial Intelligence and the 25th European Conference on Artificial Intelligence (IJCAI-ECAI 2022), 2022

Why Usability Has Become Privacy's Biggest Challenge and What We Can Do About It.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Stop the Spread: A Contextual Integrity Perspective on the Appropriateness of COVID-19 Vaccination Certificates.
Proceedings of the FAccT '22: 2022 ACM Conference on Fairness, Accountability, and Transparency, Seoul, Republic of Korea, June 21, 2022

Helping Mobile Application Developers Create Accurate Privacy Labels.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

Explain, Edit, and Understand: Rethinking User Study Design for Evaluating Model Explanations.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
"Did you know this camera tracks your mood?": Understanding Privacy Expectations and Preferences in the Age of Video Analytics.
Proc. Priv. Enhancing Technol., 2021

Awareness, Adoption, and Misconceptions of Web Privacy Tools.
Proc. Priv. Enhancing Technol., 2021

Managing Potentially Intrusive Practices in the Browser: A User-Centered Perspective.
Proc. Priv. Enhancing Technol., 2021

Fighting the Fog: Evaluating the Clarity of Privacy Disclosures in the Age of CCPA.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021

Facial Recognition: Understanding Privacy Concerns and Attitudes Across Increasingly Diverse Deployment Scenarios.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

Toggles, Dollar Signs, and Triangles: How to (In)Effectively Convey Privacy Choices with Icons and Link Texts.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

A Design Space for Privacy Choices: Towards Meaningful Privacy Control in the Internet of Things.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

Breaking Down Walls of Text: How Can NLP Benefit Consumer Privacy?
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021

2020
The Best of Both Worlds: Mitigating Trade-offs Between Accuracy and User Burden in Capturing Mobile App Privacy Preferences.
Proc. Priv. Enhancing Technol., 2020

Finding a Choice in a Haystack: Automatic Extraction of Opt-Out Statements from Privacy Policy Text.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

From Intent to Action: Nudging Users Towards Secure Mobile Payments.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

From Prescription to Description: Mapping the GDPR to a Privacy Policy Corpus Annotation Scheme.
Proceedings of the Legal Knowledge and Information Systems, 2020

"It's a scavenger hunt": Usability of Websites' Opt-Out and Data Deletion Choices.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

Informing the Design of a Personalized Privacy Assistant for the Internet of Things.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
Analyzing Privacy Policies at Scale: From Crowdsourcing to Automated Annotations.
ACM Trans. Web, 2019

MAPS: Scaling Privacy Compliance Analysis to a Million Apps.
Proc. Priv. Enhancing Technol., 2019

An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

"It Only Tells Me How I Slept, Not How to Fix It": Exploring Sleep Behaviors and Opportunities for Sleep Technology.
Proceedings of the Information in Contemporary Society - 14th International Conference, 2019

Question Answering for Privacy Policies: Combining Computational and Legal Perspectives.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

2018
Enabling Live Video Analytics with a Scalable and Privacy-Aware Framework.
ACM Trans. Multim. Comput. Commun. Appl., 2018

PrivOnto: A semantic framework for the analysis of privacy policies.
Semantic Web, 2018

Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice.
IEEE Pervasive Comput., 2018

Supervised and Unsupervised Methods for Robust Separation of Section Titles and Prose Text in Web Documents.
Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, October 31, 2018

Stress Test Evaluation for Natural Language Inference.
Proceedings of the 27th International Conference on Computational Linguistics, 2018

Which Apps Have Privacy Policies? - An Analysis of Over One Million Google Play Store Apps.
Proceedings of the Privacy Technologies and Policy - 6th Annual Privacy Forum, 2018

Towards a Roadmap for Privacy Technologies and the General Data Protection Regulation: A Transatlantic Initiative.
Proceedings of the Privacy Technologies and Policy - 6th Annual Privacy Forum, 2018

2017
Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online.
ACM Comput. Surv., 2017

Privacy Expectations and Preferences in an IoT World.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Automated Analysis of Privacy Requirements for Mobile Apps.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

A Scalable and Privacy-Aware IoT Service for Live Video Analytics.
Proceedings of the 8th ACM on Multimedia Systems Conference, 2017

Towards Privacy-Aware Smart Buildings: Capturing, Communicating, and Enforcing Privacy Policies and Preferences.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

Identifying the Provision of Choices in Privacy Policy Text.
Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, 2017

Assisting Users in a World Full of Cameras: A Privacy-Aware Infrastructure for Computer Vision Applications.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

2016
Crowdsourcing privacy policy analysis: Potential, challenges and best practices.
it Inf. Technol., 2016

Crowdsourcing Annotations for Websites' Privacy Policies: Can It Really Work?
Proceedings of the 25th International Conference on World Wide Web, 2016

Expecting the Unexpected: Understanding Mismatched Privacy Expectations Online.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

How Short Is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

The Creation and Analysis of a Website Privacy Policy Corpus.
Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, 2016

Automatic Extraction of Opt-Out Choices from Privacy Policies.
Proceedings of the 2016 AAAI Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016, 2016

Analyzing Vocabulary Intersections of Expert Annotations and Topic Models for Data Practices in Privacy Policies.
Proceedings of the 2016 AAAI Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016, 2016

2015
What do they know about me? Contents and Concerns of Online Behavioral Profiles.
CoRR, 2015

Toward Abstractive Summarization Using Semantic Representations.
Proceedings of the NAACL HLT 2015, The 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Denver, Colorado, USA, May 31, 2015

I Would Like To..., I Shouldn't..., I Wish I...: Exploring Behavior-Change Goals for Social Networking Sites.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

Your Location has been Shared 5, 398 Times!: A Field Study on Mobile App Privacy Nudging.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
Reconciling mobile app privacy and usability on smartphones: could user privacy profiles help?
Proceedings of the 23rd International World Wide Web Conference, 2014

Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Crowdsourcing the Extraction of Data Practices from Privacy Policies.
Proceedings of the Seconf AAAI Conference on Human Computation and Crowdsourcing, 2014

Identifying Relevant Text Fragments to Help Crowdsource Privacy Policy Annotations.
Proceedings of the Seconf AAAI Conference on Human Computation and Crowdsourcing, 2014

A Step Towards Usable Privacy Policy: Automatic Alignment of Privacy Statements.
Proceedings of the COLING 2014, 2014

Curated city: capturing individual city guides through social curation.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

A field trial of privacy nudges for facebook.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Unsupervised Alignment of Privacy Policies using Hidden Markov Models.
Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, 2014

2013
A comparative study of location-sharing privacy preferences in the United States and China.
Pers. Ubiquitous Comput., 2013

A Shortage of Privacy Engineers.
IEEE Secur. Priv., 2013

Why people hate your app: making sense of user feedback in a mobile app store.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

Decentralized Preemptive Scheduling Across Heterogeneous Multi-core Grid Resources.
Proceedings of the Job Scheduling Strategies for Parallel Processing, 2013

Privacy manipulation and acclimation in a location sharing application.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

Tweets are forever: a large-scale quantitative analysis of deleted tweets.
Proceedings of the Computer Supported Cooperative Work, 2013

"i read my Twitter the next morning and was astonished": a conversational perspective on Twitter regrets.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

Privacy as part of the app decision-making process.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a City.
Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012

Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

A Conundrum of Permissions: Installing Applications on an Android Smartphone.
Proceedings of the Financial Cryptography and Data Security, 2012

2011
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs.
Pers. Ubiquitous Comput., 2011

Predict and spread: An efficient routing algorithm for opportunistic networking.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Caché: caching location-enhanced content to improve user privacy.
Proceedings of the 9th International Conference on Mobile Systems, 2011

Improving Users' Consistency When Recalling Location Sharing Preferences.
Proceedings of the Human-Computer Interaction - INTERACT 2011, 2011

An Investigation into Facebook Friend Grouping.
Proceedings of the Human-Computer Interaction - INTERACT 2011, 2011

Who's your best friend?: targeted privacy attacks In location-sharing social networks.
Proceedings of the UbiComp 2011: Ubiquitous Computing, 13th International Conference, 2011

When are users comfortable sharing locations with advertisers?
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

User-Controllable Learning of Location Privacy Policies With Gaussian Mixture Models.
Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011

2010
Caché: caching location-enhanced content to improve user privacy.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010

Pushing the Limits of Rational Agents: The Trading Agent Competition for Supply Chain Management.
AI Mag., 2010

Empirical models of privacy in location sharing.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Locaccino: a privacy-centric location sharing application.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Modeling people's place naming preferences in location sharing.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Bridging the gap between physical location and online social networks.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Generating default privacy policies for online social networks.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
A meta-control architecture for orchestrating policy enforcement across heterogeneous information sources.
J. Web Semant., 2009

Understanding and capturing people's privacy policies in a mobile social networking application.
Pers. Ubiquitous Comput., 2009

Coordinated selection of procurement bids in finite capacity environments.
Electron. Commer. Res. Appl., 2009

The 2007 procurement challenge: A competition to evaluate mixed procurement strategies.
Electron. Commer. Res. Appl., 2009

Guest Editors' introduction to special section: Supply chain trading agent research.
Electron. Commer. Res. Appl., 2009

CMieux: Adaptive strategies for competitive supply chain trading.
Electron. Commer. Res. Appl., 2009

AAAI 2008 Workshop Reports.
AI Mag., 2009

Analyzing use of privacy policy attributes in a location sharing application.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Capturing social networking privacy preferences: can default policies help alleviate tradeoffs between expressiveness and user burden?
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

A framework of energy efficient mobile sensing for automatic user state recognition.
Proceedings of the 7th International Conference on Mobile Systems, 2009

Methodology for Designing Reasonably Expressive Mechanisms with Application to Ad Auctions.
Proceedings of the IJCAI 2009, 2009

Who's viewed you?: the impact of feedback in a mobile location-sharing application.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

2008
User-controllable learning of security and privacy policies.
Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, 2008

A Theory of Expressiveness in Mechanisms.
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, 2008

2007
ECRA Volume 6 Number 2.
Electron. Commer. Res. Appl., 2007

Editor's introduction to regular section.
Electron. Commer. Res. Appl., 2007

ECRA Volume 6 Number 1.
Electron. Commer. Res. Appl., 2007

ECRA Volume 6, Number 4.
Electron. Commer. Res. Appl., 2007

ECRA Volume 6, Number 3.
Electron. Commer. Res. Appl., 2007

Learning to detect phishing emails.
Proceedings of the 16th International Conference on World Wide Web, 2007

User-Controllable Security and Privacy for Pervasive Computing.
Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications, 2007

Enforcing Context-Sensitive Policies in Collaborative Business Environments.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

Factoring games to isolate strategic interactions.
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007

Using Information Gain to Analyze and Fine Tune the Performance of Supply Chain Trading Agents.
Proceedings of the Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis, 2007

Publishing ecommerce research- or how to maintain quality and diversity.
Proceedings of the 9th International Conference on Electronic Commerce: The Wireless World of Electronic Commerce, 2007

2006
CMieux: adaptive strategies for competitive supply chain trading.
SIGecom Exch., 2006

ECRA Vol. 5. No. 1.
Electron. Commer. Res. Appl., 2006

A Mixed Initiative Semantic Web Framework for Process Composition.
Proceedings of the Semantic Web - ISWC 2006, 5th International Semantic Web Conference, 2006

A Mixed Initiative Approach to Semantic Web Service Discovery and Composition: SAP's Guided Procedures Framework.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

LOGICRUNCHER - A Logistics Planning and Scheduling Decision Support System for Emerging EMS and 3PL Business Practices.
Proceedings of the ICEIS 2006, 2006

Examining DCSP coordination tradeoffs.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

Adaptive Pricing for Customers with Probabilistic Valuations.
Proceedings of the Agent-Mediated Electronic Commerce. Automated Negotiation and Strategy Design for Electronic Markets, 2006

Pricing for customers with probabilistic valuations as a continuous knapsack problem.
Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce, 2006

2005
Introduction to the Special Section: The Role of Semantic Web Services in Enterprise Application Integration and E-Commerce.
Int. J. Electron. Commer., 2005

Introduction of Vol. 4, No. 4.
Electron. Commer. Res. Appl., 2005

The supply chain trading agent competition.
Electron. Commer. Res. Appl., 2005

A Semantic Web Framework for Interleaving Policy Reasoning and External Service Discovery.
Proceedings of the Rules and Rule Markup Languages for the Semantic Web, 2005

Semantic Web Technologies for Context-Aware Museum Tour Guide Applications.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Interleaving Semantic Web Reasoning and Service Discovery to Enforce Context-Sensitive Security and Privacy Policies.
Proceedings of the Agents and the Semantic Web, 2005

2004
Semantic web technologies to reconcile privacy and context awareness.
J. Web Semant., 2004

Applying case-based reasoning and multi-agent intelligent system to context-aware comparative shopping.
Decis. Support Syst., 2004

Context-awareness, privacy and mobile access: a web semantic and multiagent approach.
Proceedings of the Actes des 1ères journées francophones Mobilité et Ubiquité 2004, 2004

Dynamic Procurement Subject to Temporal and Capacity Constraints.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

The 2003 Supply Chain Management Trading Agent Competition.
Proceedings of the 6th International Conference on Electronic Commerce, 2004

2003
Advances in B2B e-Commerce and E-Supply Chain Management Guest Editors' Introduction.
J. Organ. Comput. Electron. Commer., 2003

Agent-Based E-Supply Chain Decision Support.
J. Organ. Comput. Electron. Commer., 2003

TAC-03 - A Supply-Chain Trading Competition.
AI Mag., 2003

Dynamic supply chain formation: integrating multi-attribute auctions and finite capacity scheduling.
Proceedings of the Proceedings 4th ACM Conference on Electronic Commerce (EC-2003), 2003

A semantic web environment for context-aware m-commerce.
Proceedings of the Proceedings 4th ACM Conference on Electronic Commerce (EC-2003), 2003

A Semantic E-Wallet to Reconcile Privacy and Context Awareness.
Proceedings of the Semantic Web, 2003

Multi-attribute supply chain negotiation: coordinating reverse auctions subject to finite capacity considerations.
Proceedings of the 5th International Conference on Electronic Commerce, 2003

2000
Agents on the Web: Agent Research and Development in Europe.
IEEE Internet Comput., 2000

1997
Learning to recognize (un)promising simulated annealing runs: Efficient search procedures for job shop scheduling and vehicle routing.
Ann. Oper. Res., 1997

Blackboard Agents for Mixed-Initiative Management of Integrated Process-Planning/Production-Scheduling Solutions Across the Supply Chain.
Proceedings of the Fourteenth National Conference on Artificial Intelligence and Ninth Innovative Applications of Artificial Intelligence Conference, 1997

1996
Focused simulated annealing search: An application to job shop scheduling.
Ann. Oper. Res., 1996

Variable and Value Ordering Heuristics for the Job Shop Scheduling Constraint Satisfaction Problem.
Artif. Intell., 1996

1995
Backtracking Techniques for the Job Shop Scheduling Constraint Satisfaction Problem.
Artif. Intell., 1995

1994
Increasing The Efficiency of Simulated Annealing Search by Learning to Recognize (Un)Promising Runs.
Proceedings of the 12th National Conference on Artificial Intelligence, Seattle, WA, USA, July 31, 1994

1992
Intelligent Backtracking Techniques for Job Shop Scheduling.
Proceedings of the 3rd International Conference on Principles of Knowledge Representation and Reasoning (KR'92). Cambridge, 1992

1991
Distributed constrained heuristic search.
IEEE Trans. Syst. Man Cybern., 1991

Resource Allocation in Distributed Factory Scheduling.
IEEE Expert, 1991

1990
Why is Scheduling Difficult? A CSP Perspective.
Proceedings of the 9th European Conference on Artificial Intelligence, 1990

1989
Constrained Heuristic Search.
Proceedings of the 11th International Joint Conference on Artificial Intelligence. Detroit, 1989


  Loading...