Jessica Staddon
Orcid: 0009-0001-9361-9413Affiliations:
- Google Research
According to our database1,
Jessica Staddon
authored at least 48 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Shortchanged: Uncovering and Analyzing Intimate Partner Financial Abuse in Consumer Complaints.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
2019
"it's a generally exhausting field" A Large-Scale Study of Security Incident Management Workflows and Pain Points.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
2017
No (Privacy) News is Good News: An Analysis of New York Times and Guardian Privacy News from 2010-2016.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, 2017
2016
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016
"I had no idea this was a thing": on the importance of understanding the user experience of personalized transparency tools.
Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, 2016
2014
Exploring the benefits and uses of web analytics tools for non-transactional websites.
Proceedings of the Designing Interactive Systems Conference 2014, DIS '14, Vancouver, BC, 2014
2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013
Self-Reported Social Network Behavior: Accuracy Predictors and Implications for the Privacy Paradox.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
2012
Proceedings of the Symposium On Usable Privacy and Security, 2012
Around the Water Cooler: Shared Discussion Topics and Contact Closeness in Social Search.
Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012
2011
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011
Proceedings of the Symposium On Usable Privacy and Security, 2011
2010
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010
Proceedings of the Intelligent Information Privacy Management, 2010
Proceedings of the Intelligent Information Privacy Management, 2010
2009
IEEE Secur. Priv., 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy.
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, 2009
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
2008
Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, 2008
Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2008
Proceedings of the 2nd ACM Workshop on Information Credibility on the Web, 2008
Sponsored ad-based similarity: an approach to mining collective advertiser intelligence.
Proceedings of the 2nd International Workshop on Data Mining and Audience Intelligence for Advertising, 2008
2007
Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security.
IEEE Trans. Inf. Theory, 2007
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
2005
Proceedings of the Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), 2005
2004
Proceedings of the First International Workshop on Vehicular Ad Hoc Networks, 2004
Proceedings of the Applied Cryptography and Network Security, 2004
2003
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003
Proceedings of the Public Key Cryptography, 2003
Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, 2003
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, 2003
2002
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002
Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications, 2002
Proceedings of the Security and Privacy in Digital Rights Management, 2002
2001
IEEE Trans. Inf. Theory, 2001
IACR Cryptol. ePrint Arch., 2001
2000
1999
Proceedings of the Advances in Cryptology, 1999
1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998