Internet privacy, World Wide Web, Mobile apps, Privacy software and Information privacy are his primary areas of study. His Location sharing study, which is part of a larger body of work in Internet privacy, is frequently linked to Installation, bridging the gap between disciplines. His World Wide Web study frequently links to related topics such as Data science.
His Mobile apps study incorporates themes from Sentiment analysis, Information design and Topic model. His research integrates issues of Crowdsourcing and Mobile computing in his study of Privacy software. His study in the field of Privacy by Design also crosses realms of Nudge theory.
His biological study spans a wide range of topics, including Cluster analysis and Social network. His work in the fields of Information privacy, such as Privacy by Design, intersects with other areas such as Notice. Norman Sadeh interconnects Procurement and Competition, Microeconomics in the investigation of issues within Supply chain.
End user, Taxonomy and Multimedia is closely connected to Control in his research, which is encompassed under the umbrella topic of Information privacy. His work on Mobile apps and Semantic Web as part of general World Wide Web study is frequently linked to Composition, therefore connecting diverse disciplines of science. The various areas that he examines in his Artificial intelligence study include Task and Natural language processing.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Modeling Supply Chain Dynamics: A Multiagent Approach
Jayashankar M. Swaminathan;Stephen F. Smith;Norman M. Sadeh.
Decision Sciences (1998)
Learning to detect phishing emails
Ian Fette;Norman Sadeh;Anthony Tomasic.
the web conference (2007)
The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a City
Justin Cranshaw;Raz Schwartz;Jason I. Hong;Norman M. Sadeh.
Social Science Research Network (2012)
A framework of energy efficient mobile sensing for automatic user state recognition
Yi Wang;Jialiu Lin;Murali Annavaram;Quinn A. Jacobson.
international conference on mobile systems, applications, and services (2009)
Bridging the gap between physical location and online social networks
Justin Cranshaw;Eran Toch;Jason Hong;Aniket Kittur.
ubiquitous computing (2010)
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing
Jialiu Lin;Shahriyar Amini;Jason I. Hong;Norman Sadeh.
ubiquitous computing (2012)
M-Commerce: Technologies, Services, and Business Models
Norman M. Sadeh.
Understanding and capturing people's privacy policies in a mobile social networking application
Norman Sadeh;Jason Hong;Lorrie Cranor;Ian Fette.
ubiquitous computing (2009)
Why people hate your app: making sense of user feedback in a mobile app store
Bin Fu;Jialiu Lin;Lei Li;Christos Faloutsos.
knowledge discovery and data mining (2013)
A conundrum of permissions: installing applications on an android smartphone
Patrick Gage Kelley;Sunny Consolvo;Lorrie Faith Cranor;Jaeyeon Jung.
financial cryptography (2012)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: