Shomir Wilson
Cited by
Cited by
Nudges for privacy and security: Understanding and assisting users’ choices online
A Acquisti, I Adjerid, R Balebako, L Brandimarte, LF Cranor, S Komanduri, ...
ACM Computing Surveys (CSUR) 50 (3), 1-41, 2017
Automated Analysis of Privacy Requirements for Mobile Apps.
S Zimmeck, Z Wang, L Zou, R Iyengar, B Liu, F Schaub, S Wilson, ...
NDSS, 2017
Tweets are forever: a large-scale quantitative analysis of deleted tweets
H Almuhimedi, S Wilson, B Liu, N Sadeh, A Acquisti
Proceedings of the 2013 conference on Computer supported cooperative work …, 2013
The usable privacy policy project
N Sadeh, A Acquisti, TD Breaux, LF Cranor, AM McDonald, ...
Technical report, Technical Report, CMU-ISR-13-119, 2013
The creation and analysis of a website privacy policy corpus
S Wilson, F Schaub, AA Dara, F Liu, S Cherivirala, PG Leon, ...
Proceedings of the 54th Annual Meeting of the Association for Computational …, 2016
Crowdsourcing annotations for websites' privacy policies: Can it really work?
S Wilson, F Schaub, R Ramanath, N Sadeh, F Liu, NA Smith, F Liu
Proceedings of the 25th International Conference on World Wide Web, 133-143, 2016
Privacy manipulation and acclimation in a location sharing application
S Wilson, J Cranshaw, N Sadeh, A Acquisti, LF Cranor, J Springfield, ...
Proceedings of the 2013 ACM international joint conference on Pervasive and …, 2013
PrivOnto: A semantic framework for the analysis of privacy policies
A Oltramari, D Piraviperumal, F Schaub, S Wilson, S Cherivirala, ...
Semantic Web 9 (2), 185-203, 2018
Identifying the provision of choices in privacy policy text
KM Sathyendra, S Wilson, F Schaub, S Zimmeck, N Sadeh
Proceedings of the 2017 Conference on Empirical Methods in Natural Language …, 2017
Kanthashree Mysore Sathyendra, N. Cameron Russell, Thomas B
S Wilson, F Schaub, AA Dara, F Liu, S Cherivirala, PG Leon, ...
Norton, Eduard Hovy, Joel Reidenberg, and Norman Sadeh, 2016
Automatic categorization of privacy policies: A pilot study
W Ammar, S Wilson, N Sadeh, NA Smith
School of Computer Science, Language Technology Institute, Technical Report …, 2012
12 The Metacognitive Loop and Reasoning about Anomalies
MD Schmill, ML Anderson, S Fults, D Josyula, T Oates, D Perlis, H Shahri, ...
Metareasoning: Thinking about thinking, 183, 2011
A self-help guide for autonomous systems
ML Anderson, S Fults, DP Josyula, T Oates, D Perlis, S Wilson, D Wright
AI Magazine 29 (2), 67-67, 2008
Ontologies for reasoning about failures in AI systems
M Schmill, D Josyula, ML Anderson, S Wilson, T Oates, D Perlis, S Fults
Proceedings from the Workshop on Metareasoning in Agent Based Systems at the …, 2007
Analyzing Vocabulary Intersections of Expert Annotations and Topic Models for Data Practices in Privacy Policies.
F Liu, S Wilson, F Schaub, NM Sadeh
AAAI Fall Symposia, 2016
The metacognitive loop: An architecture for building robust intelligent systems
H Haidarian, W Dinalankara, S Fults, S Wilson, D Perlis, M Schmill, ...
PAAAI Fall Symposium on Commonsense Knowledge (AAAI/CSK’10), 2010
Analyzing privacy policies at scale: From crowdsourcing to automated annotations
S Wilson, F Schaub, F Liu, KM Sathyendra, D Smullen, S Zimmeck, ...
ACM Transactions on the Web (TWEB) 13 (1), 1-29, 2018
Application of MCL in a dialog agent
DP Josyula, S Fults, ML Anderson, S Wilson, D Perlis
Third Language and Technology Conference, 2007
Automatic Extraction of Opt-Out Choices from Privacy Policies.
KM Sathyendra, F Schaub, S Wilson, NM Sadeh
AAAI Fall Symposia, 2016
The Usable Privacy Policy Project: Combining Crowdsourcing
N Sadeh, A Acquisti, TD Breaux, LF Cranor, AM McDonald, ...
Machine Learning and Natural Language Processing to Semi-Automatically …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20