Eran Toch

Orcid: 0000-0001-6939-5870

Affiliations:
  • Tel Aviv University, Department of Industrial Engineering, The Iby and Aladar Fleischman Faculty of Engineering, Israel
  • Carnegie Mellon University, Pittsburgh, USA


According to our database1, Eran Toch authored at least 72 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Can Previews Mitigate the Effect of Interruptions? Findings from a Lab Experiment under Various Workloads.
Int. J. Hum. Comput. Interact., February, 2024

Improving Users' Passwords with DPAR: a Data-driven Password Recommendation System.
CoRR, 2024

Towards Speedy Permission-Based Debloating for Android Apps.
Proceedings of the IEEE/ACM 11th International Conference on Mobile Software Engineering and Systems, 2024

MiniMon: Minimizing Android Applications with Intelligent Monitoring-Based Debloating.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Strategies of Product Managers: Negotiating Social Values in Digital Product Design.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

2023
Evaluating organizational phishing awareness training on an enterprise scale.
Comput. Secur., September, 2023

How Mass surveillance Crowds Out Installations of COVID-19 Contact Tracing Applications.
Proc. ACM Hum. Comput. Interact., April, 2023

AutoDebloater: Automated Android App Debloating.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Social Support for Mobile Security: Comparing Close Connections and Community Volunteers in a Field Experiment.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Privacy-Preserving Transactions with Verifiable Local Differential Privacy.
Proceedings of the 5th Conference on Advances in Financial Technologies, 2023

2022
Evaluating package delivery crowdsourcing using location traces in different population densities.
Comput. Environ. Urban Syst., 2022

Synthesis of Longitudinal Human Location Sequences: Balancing Utility and Privacy.
ACM Trans. Knowl. Discov. Data, 2022

Crowd logistics: Understanding auction-based pricing and couriers' strategies in crowdsourcing package delivery.
J. Intell. Transp. Syst., 2022

Toward Proactive Support for Older Adults: Predicting the Right Moment for Providing Mobile Safety Help.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

Valuation of Differential Privacy Budget in Data Trade: A Conjoint Analysis.
Proceedings of the Privacy and Identity Management - 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30, 2022

Meerkat: A Social Community Support Application for Older Adults.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
User-Centered Privacy-by-Design: Evaluating the Appropriateness of Design Prototypes.
Int. J. Hum. Comput. Stud., 2021

How mass surveillance can crowd out installations of COVID-19 contact tracing apps.
CoRR, 2021

Nudging users towards online safety using gamified environments.
Comput. Secur., 2021

Website categorization via design attribute learning.
Comput. Secur., 2021

Between privacy and security: the factors that drive intentions to use cyber-security applications.
Behav. Inf. Technol., 2021

An Exploratory Study of Social Support Systems to Help Older Adults in Managing Mobile Safety.
Proceedings of the MobileHCI '21: 23rd International Conference on Mobile Human-Computer Interaction, Toulouse & Virtual Event, France, 27 September 2021, 2021

Detecting interruption events using EEG.
Proceedings of the 3rd IEEE Global Conference on Life Sciences and Technologies, 2021

2020
Can you Turn it Off?: The Spatial and Social Context of Mobile Disturbance.
Proc. ACM Hum. Comput. Interact., 2020

2019
Analyzing large-scale human mobility data: a survey of machine learning methods and applications.
Knowl. Inf. Syst., 2019

AppMoD: Helping Older Adults Manage Mobile Security with Online Social Help.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

My Mom was Getting this Popup: Understanding Motivations and Processes in Helping Older Relatives with Mobile Security and Privacy.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

Evaluating Users' Perceptions about a System's Privacy: Differentiating Social and Institutional Aspects.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

A/P(rivacy) Testing: Assessing Applications for Social and Institutional Privacy.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Privacy by designers: software developers' privacy mindset.
Empir. Softw. Eng., 2018

The Privacy Implications of Cyber Security Systems: A Technological Survey.
ACM Comput. Surv., 2018

Augmented-Genomics: Protecting Privacy for Clinical Genomics with Inferential Interfaces.
Proceedings of the 23rd International Conference on Intelligent User Interfaces Companion, 2018

Towards Behavioral Privacy: How to Understand AI's Privacy Threats in Ubiquitous Computing.
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018

Crowdsourcing Privacy Design Critique: An Empirical Evaluation of Framing Effects.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Privacy in Context: Critically Engaging with Theory to Guide Privacy Research and Design.
Proceedings of the Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2018

Moving Beyond a "one-size fits all": Exploring Individual Differences in Privacy.
Proceedings of the Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
Analyzing and Optimizing Access Control Choice Architectures in Online Social Networks.
ACM Trans. Intell. Syst. Technol., 2017

Not Even Past: Information Aging and Temporal Privacy in Online Social Networks.
Hum. Comput. Interact., 2017

Understanding the Valuation of Location Privacy: a Crowdsourcing-Based Approach.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Susceptibility to Social Influence of Privacy Behaviors: Peer versus Authoritative Sources.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

How Developers Make Design Decisions about Users' Privacy: The Place of Professional Communities and Organizational Climate.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

2016
Anonymizing mobility data using semantic cloaking.
Pervasive Mob. Comput., 2016

A methodology for estimating the value of privacy in information disclosure systems.
Comput. Hum. Behav., 2016

2015
Simplifying Data Disclosure Configurations in a Cloud Computing Environment.
ACM Trans. Intell. Syst. Technol., 2015

Let's Talk About Sex (Apps), CSCW.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

2014
Crowdsourcing privacy preferences in context-aware applications.
Pers. Ubiquitous Comput., 2014

2013
Retrospective privacy: managing longitudinal privacy in online social networks.
Proceedings of the Symposium On Usable Privacy and Security, 2013

Locality and privacy in people-nearby applications.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

The price is right?: economic value of location sharing.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

2012
Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems.
User Model. User Adapt. Interact., 2012

What can 'people-nearby' applications teach us about meeting new people?
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

OPOSSUM: Indexing Techniques for an Order-of-Magnitude Improvement of Service Matchmaking Times.
Proceedings of the Semantic Web Services, Advancement through Evaluation, 2012

2011
Humans, semantic services and similarity: A user study of semantic Web services matching and composition.
J. Web Semant., 2011

Caché: caching location-enhanced content to improve user privacy.
Proceedings of the 9th International Conference on Mobile Systems, 2011

Improving Users' Consistency When Recalling Location Sharing Preferences.
Proceedings of the Human-Computer Interaction - INTERACT 2011, 2011

Super-Ego: a framework for privacy-sensitive bounded context-awareness.
Proceedings of the CASEMANS@Ubicomp '11: The 5th ACM International workshop on context-awareness for self-managing systems, 2011

Who's your best friend?: targeted privacy attacks In location-sharing social networks.
Proceedings of the UbiComp 2011: Ubiquitous Computing, 13th International Conference, 2011

2010
Caché: caching location-enhanced content to improve user privacy.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010

Empirical models of privacy in location sharing.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Locaccino: a privacy-centric location sharing application.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Bridging the gap between physical location and online social networks.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Generating default privacy policies for online social networks.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
Context-Based Matching and Ranking of Web Services for Composition.
IEEE Trans. Serv. Comput., 2009

Analyzing use of privacy policy attributes in a location sharing application.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

2008
Generating and Optimizing Graphical User Interfaces for Semantic Service Compositions.
Proceedings of the Conceptual Modeling, 2008

2007
A semantic approach to approximate service retrieval.
ACM Trans. Internet Techn., 2007

Modeling Alternatives in Exception Executions.
Proceedings of the Business Process Management Workshops, 2007

2006
<i>OPOSSUM</i>: Bridging the Gap Between Web Services and the Semantic Web.
Proceedings of the Next Generation Information Technologies and Systems, 2006

2005
Automatically Grounding Semantically-Enriched Conceptual Models to Concrete Web Services.
Proceedings of the Conceptual Modeling, 2005

2004
QSIA - a Web-based environment for learning, assessing and knowledge sharing in communities.
Comput. Educ., 2004

Modeling Semantic Web Services with OPM/S A Human and Machine-Interpretable Language.
Proceedings of the Third International Workshop on Web Dynamics, 2004

OPCATeam - Collaborative Business Process Modeling with OPM.
Proceedings of the Business Process Management: Second International Conference, 2004


  Loading...