Norman M. Sadeh
Orcid: 0000-0003-4829-5533Affiliations:
- Carnegie Mellon University, Pittsburgh, PA, USA
According to our database1,
Norman M. Sadeh
authored at least 167 papers
between 1989 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Computing, December, 2024
Missing Pieces: How Framing Uncertainty Impacts Longitudinal Trust in AI Decision Aids - A Gig Driver Case Study.
CoRR, 2024
Sharing is Not Always Caring: Delving Into Personal Data Transfer Compliance in Android Apps.
IEEE Access, 2024
Incorporating Taxonomic Reasoning and Regulatory Knowledge into Automated Privacy Question Answering.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024
Generating Effective Answers to People's Everyday Cybersecurity Questions: An Initial Study.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024
Understanding How to Inform Blind and Low-Vision Users about Data Privacy through Privacy Question Answering Assistants.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Twentieth Symposium on Usable Privacy and Security, 2024
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024
2023
Purpose in the Machine: Do Traffic Simulators Produce Distributionally Equivalent Outcomes for Reinforcement Learning Applications?
Proceedings of the Winter Simulation Conference, 2023
Comparing Privacy Label Disclosures of Apps Published in both the App Store and Google Play Stores.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
Exploring Smart Commercial Building Occupants' Perceptions and Notification Preferences of Internet of Things Data Collection in the United States.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
ATLAS: Automatically Detecting Discrepancies Between Privacy Policies and Privacy Labels.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
2022
Proc. Priv. Enhancing Technol., 2022
Exploring and Improving the Accessibility of Data Privacy-related Information for People Who Are Blind or Low-vision.
CoRR, 2022
A Tale of Two Regulatory Regimes: Creation and Analysis of a Bilingual Privacy Policy Corpus.
Proceedings of the Thirteenth Language Resources and Evaluation Conference, 2022
The Real Deal: A Review of Challenges and Opportunities in Moving Reinforcement Learning-Based Traffic Signal Control Systems Towards Reality.
Proceedings of the Twelfth International Workshop on Agents in Traffic and Transportation co-located with the the 31st International Joint Conference on Artificial Intelligence and the 25th European Conference on Artificial Intelligence (IJCAI-ECAI 2022), 2022
Why Usability Has Become Privacy's Biggest Challenge and What We Can Do About It.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Stop the Spread: A Contextual Integrity Perspective on the Appropriateness of COVID-19 Vaccination Certificates.
Proceedings of the FAccT '22: 2022 ACM Conference on Fairness, Accountability, and Transparency, Seoul, Republic of Korea, June 21, 2022
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
Explain, Edit, and Understand: Rethinking User Study Design for Evaluating Model Explanations.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
"Did you know this camera tracks your mood?": Understanding Privacy Expectations and Preferences in the Age of Video Analytics.
Proc. Priv. Enhancing Technol., 2021
Proc. Priv. Enhancing Technol., 2021
Managing Potentially Intrusive Practices in the Browser: A User-Centered Perspective.
Proc. Priv. Enhancing Technol., 2021
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021
Facial Recognition: Understanding Privacy Concerns and Attitudes Across Increasingly Diverse Deployment Scenarios.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
Toggles, Dollar Signs, and Triangles: How to (In)Effectively Convey Privacy Choices with Icons and Link Texts.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
A Design Space for Privacy Choices: Towards Meaningful Privacy Control in the Internet of Things.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021
2020
The Best of Both Worlds: Mitigating Trade-offs Between Accuracy and User Burden in Capturing Mobile App Privacy Preferences.
Proc. Priv. Enhancing Technol., 2020
Finding a Choice in a Haystack: Automatic Extraction of Opt-Out Statements from Privacy Policy Text.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020
From Prescription to Description: Mapping the GDPR to a Privacy Policy Corpus Annotation Scheme.
Proceedings of the Legal Knowledge and Information Systems, 2020
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
2019
ACM Trans. Web, 2019
Proc. Priv. Enhancing Technol., 2019
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019
"It Only Tells Me How I Slept, Not How to Fix It": Exploring Sleep Behaviors and Opportunities for Sleep Technology.
Proceedings of the Information in Contemporary Society - 14th International Conference, 2019
Question Answering for Privacy Policies: Combining Computational and Legal Perspectives.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019
2018
ACM Trans. Multim. Comput. Commun. Appl., 2018
Semantic Web, 2018
Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice.
IEEE Pervasive Comput., 2018
Supervised and Unsupervised Methods for Robust Separation of Section Titles and Prose Text in Web Documents.
Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, October 31, 2018
Proceedings of the 27th International Conference on Computational Linguistics, 2018
Which Apps Have Privacy Policies? - An Analysis of Over One Million Google Play Store Apps.
Proceedings of the Privacy Technologies and Policy - 6th Annual Privacy Forum, 2018
Towards a Roadmap for Privacy Technologies and the General Data Protection Regulation: A Transatlantic Initiative.
Proceedings of the Privacy Technologies and Policy - 6th Annual Privacy Forum, 2018
2017
ACM Comput. Surv., 2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the 8th ACM on Multimedia Systems Conference, 2017
Towards Privacy-Aware Smart Buildings: Capturing, Communicating, and Enforcing Privacy Policies and Preferences.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017
Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, 2017
Assisting Users in a World Full of Cameras: A Privacy-Aware Infrastructure for Computer Vision Applications.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017
2016
it Inf. Technol., 2016
Proceedings of the 25th International Conference on World Wide Web, 2016
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
How Short Is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, 2016
Proceedings of the 2016 AAAI Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016, 2016
Proceedings of the 2016 AAAI Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016, 2016
Analyzing Vocabulary Intersections of Expert Annotations and Topic Models for Data Practices in Privacy Policies.
Proceedings of the 2016 AAAI Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016, 2016
2015
CoRR, 2015
Proceedings of the NAACL HLT 2015, The 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Denver, Colorado, USA, May 31, 2015
I Would Like To..., I Shouldn't..., I Wish I...: Exploring Behavior-Change Goals for Social Networking Sites.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015
Your Location has been Shared 5, 398 Times!: A Field Study on Mobile App Privacy Nudging.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
2014
Reconciling mobile app privacy and usability on smartphones: could user privacy profiles help?
Proceedings of the 23rd International World Wide Web Conference, 2014
Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014
Proceedings of the Seconf AAAI Conference on Human Computation and Crowdsourcing, 2014
Proceedings of the Seconf AAAI Conference on Human Computation and Crowdsourcing, 2014
Proceedings of the COLING 2014, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, 2014
2013
A comparative study of location-sharing privacy preferences in the United States and China.
Pers. Ubiquitous Comput., 2013
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013
Proceedings of the Job Scheduling Strategies for Parallel Processing, 2013
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013
Proceedings of the Computer Supported Cooperative Work, 2013
"i read my Twitter the next morning and was astonished": a conversational perspective on Twitter regrets.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013
2012
Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
2011
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs.
Pers. Ubiquitous Comput., 2011
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011
Proceedings of the 9th International Conference on Mobile Systems, 2011
Proceedings of the Human-Computer Interaction - INTERACT 2011, 2011
Proceedings of the Human-Computer Interaction - INTERACT 2011, 2011
Who's your best friend?: targeted privacy attacks In location-sharing social networks.
Proceedings of the UbiComp 2011: Ubiquitous Computing, 13th International Conference, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
User-Controllable Learning of Location Privacy Policies With Gaussian Mixture Models.
Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011
2010
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010
Pushing the Limits of Rational Agents: The Trading Agent Competition for Supply Chain Management.
AI Mag., 2010
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010
Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
2009
A meta-control architecture for orchestrating policy enforcement across heterogeneous information sources.
J. Web Semant., 2009
Understanding and capturing people's privacy policies in a mobile social networking application.
Pers. Ubiquitous Comput., 2009
Electron. Commer. Res. Appl., 2009
The 2007 procurement challenge: A competition to evaluate mixed procurement strategies.
Electron. Commer. Res. Appl., 2009
Electron. Commer. Res. Appl., 2009
Electron. Commer. Res. Appl., 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Capturing social networking privacy preferences: can default policies help alleviate tradeoffs between expressiveness and user burden?
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 7th International Conference on Mobile Systems, 2009
Methodology for Designing Reasonably Expressive Mechanisms with Application to Ad Auctions.
Proceedings of the IJCAI 2009, 2009
2008
Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, 2008
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence, 2008
2007
Proceedings of the 16th International Conference on World Wide Web, 2007
Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications, 2007
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007
Using Information Gain to Analyze and Fine Tune the Performance of Supply Chain Trading Agents.
Proceedings of the Agent-Mediated Electronic Commerce and Trading Agent Design and Analysis, 2007
Proceedings of the 9th International Conference on Electronic Commerce: The Wireless World of Electronic Commerce, 2007
2006
SIGecom Exch., 2006
Proceedings of the Semantic Web - ISWC 2006, 5th International Semantic Web Conference, 2006
A Mixed Initiative Approach to Semantic Web Service Discovery and Composition: SAP's Guided Procedures Framework.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006
LOGICRUNCHER - A Logistics Planning and Scheduling Decision Support System for Emerging EMS and 3PL Business Practices.
Proceedings of the ICEIS 2006, 2006
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006
Proceedings of the Agent-Mediated Electronic Commerce. Automated Negotiation and Strategy Design for Electronic Markets, 2006
Pricing for customers with probabilistic valuations as a continuous knapsack problem.
Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce, 2006
2005
Introduction to the Special Section: The Role of Semantic Web Services in Enterprise Application Integration and E-Commerce.
Int. J. Electron. Commer., 2005
A Semantic Web Framework for Interleaving Policy Reasoning and External Service Discovery.
Proceedings of the Rules and Rule Markup Languages for the Semantic Web, 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
Interleaving Semantic Web Reasoning and Service Discovery to Enforce Context-Sensitive Security and Privacy Policies.
Proceedings of the Agents and the Semantic Web, 2005
2004
J. Web Semant., 2004
Applying case-based reasoning and multi-agent intelligent system to context-aware comparative shopping.
Decis. Support Syst., 2004
Context-awareness, privacy and mobile access: a web semantic and multiagent approach.
Proceedings of the Actes des 1ères journées francophones Mobilité et Ubiquité 2004, 2004
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
Proceedings of the 6th International Conference on Electronic Commerce, 2004
2003
Advances in B2B e-Commerce and E-Supply Chain Management Guest Editors' Introduction.
J. Organ. Comput. Electron. Commer., 2003
J. Organ. Comput. Electron. Commer., 2003
Dynamic supply chain formation: integrating multi-attribute auctions and finite capacity scheduling.
Proceedings of the Proceedings 4th ACM Conference on Electronic Commerce (EC-2003), 2003
Proceedings of the Proceedings 4th ACM Conference on Electronic Commerce (EC-2003), 2003
Proceedings of the Semantic Web, 2003
Multi-attribute supply chain negotiation: coordinating reverse auctions subject to finite capacity considerations.
Proceedings of the 5th International Conference on Electronic Commerce, 2003
2000
IEEE Internet Comput., 2000
1997
Learning to recognize (un)promising simulated annealing runs: Efficient search procedures for job shop scheduling and vehicle routing.
Ann. Oper. Res., 1997
Blackboard Agents for Mixed-Initiative Management of Integrated Process-Planning/Production-Scheduling Solutions Across the Supply Chain.
Proceedings of the Fourteenth National Conference on Artificial Intelligence and Ninth Innovative Applications of Artificial Intelligence Conference, 1997
1996
Ann. Oper. Res., 1996
Variable and Value Ordering Heuristics for the Job Shop Scheduling Constraint Satisfaction Problem.
Artif. Intell., 1996
1995
Artif. Intell., 1995
1994
Increasing The Efficiency of Simulated Annealing Search by Learning to Recognize (Un)Promising Runs.
Proceedings of the 12th National Conference on Artificial Intelligence, Seattle, WA, USA, July 31, 1994
1992
Intelligent Backtracking Techniques for Job Shop Scheduling.
Proceedings of the 3rd International Conference on Principles of Knowledge Representation and Reasoning (KR'92). Cambridge, 1992
1991
1990
Why is Scheduling Difficult? A CSP Perspective.
Proceedings of the 9th European Conference on Artificial Intelligence, 1990
1989
Proceedings of the 11th International Joint Conference on Artificial Intelligence. Detroit, 1989