Modeling supply chain dynamics: A multiagent approach JM Swaminathan, SF Smith, NM Sadeh Decision sciences 29 (3), 607-632, 1998 | 1266 | 1998 |
Learning to detect phishing emails I Fette, N Sadeh, A Tomasic Proceedings of the 16th international conference on World Wide Web, 649-656, 2007 | 769 | 2007 |
The livehoods project: Utilizing social media to understand the dynamics of a city J Cranshaw, R Schwartz, J Hong, N Sadeh | 692 | 2012 |
A framework of energy efficient mobile sensing for automatic user state recognition Y Wang, J Lin, M Annavaram, QA Jacobson, J Hong, B Krishnamachari, ... Proceedings of the 7th international conference on Mobile systems …, 2009 | 590 | 2009 |
Bridging the gap between physical location and online social networks J Cranshaw, E Toch, J Hong, A Kittur, N Sadeh Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010 | 568 | 2010 |
M-commerce: technologies, services, and business models N Sadeh John Wiley & Sons, 2003 | 495 | 2003 |
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing J Lin, S Amini, JI Hong, N Sadeh, J Lindqvist, J Zhang Proceedings of the 2012 ACM conference on ubiquitous computing, 501-510, 2012 | 487 | 2012 |
Understanding and capturing people’s privacy policies in a mobile social networking application N Sadeh, J Hong, L Cranor, I Fette, P Kelley, M Prabaker, J Rao Personal and Ubiquitous Computing 13 (6), 401-412, 2009 | 429 | 2009 |
Why people hate your app: Making sense of user feedback in a mobile app store B Fu, J Lin, L Li, C Faloutsos, J Hong, N Sadeh Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013 | 390 | 2013 |
A conundrum of permissions: installing applications on an android smartphone PG Kelley, S Consolvo, LF Cranor, J Jung, N Sadeh, D Wetherall International conference on financial cryptography and data security, 68-79, 2012 | 390 | 2012 |
Look-ahead techniques for micro-opportunistic job shop scheduling N Sadeh CARNEGIE-MELLON UNIV PITTSBURGH PA SCHOOL OF COMPUTER SCIENCE, 1991 | 331 | 1991 |
Your location has been shared 5,398 times! A field study on mobile app privacy nudging H Almuhimedi, F Schaub, N Sadeh, I Adjerid, A Acquisti, J Gluck, ... Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015 | 314 | 2015 |
Distributed constrained heuristic search K Sycara, SF Roth, N Sadeh, MS Fox IEEE Transactions on systems, man, and cybernetics 21 (6), 1446-1461, 1991 | 300 | 1991 |
Privacy as part of the app decision-making process PG Kelley, LF Cranor, N Sadeh Proceedings of the SIGCHI conference on human factors in computing systems …, 2013 | 299 | 2013 |
Semantic web technologies to reconcile privacy and context awareness FL Gandon, NM Sadeh Journal of Web Semantics 1 (3), 241-260, 2004 | 278 | 2004 |
Variable and value ordering heuristics for the job shop scheduling constraint satisfaction problem N Sadeh, MS Fox Artificial intelligence 86 (1), 1-41, 1996 | 260 | 1996 |
Modeling users’ mobile app privacy preferences: Restoring usability in a sea of permission settings J Lin, B Liu, N Sadeh, JI Hong 10th Symposium On Usable Privacy and Security ({SOUPS} 2014), 199-212, 2014 | 245 | 2014 |
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs M Benisch, PG Kelley, N Sadeh, LF Cranor Personal and Ubiquitous Computing 15 (7), 679-694, 2011 | 231 | 2011 |
Location-sharing technologies: Privacy risks and controls JY Tsai, PG Kelley, LF Cranor, N Sadeh Isjlp 6, 119, 2010 | 225 | 2010 |
Constrained heuristic search MS Fox, N Sadeh, C Baykan Proceedings of the Eleventh International Joint Conference on Artificial …, 1989 | 221 | 1989 |