D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 65 Citations 17,484 213 World Ranking 1528 National Ranking 852

Overview

What is he best known for?

The fields of study he is best known for:

  • Artificial intelligence
  • The Internet
  • World Wide Web

Internet privacy, World Wide Web, Mobile apps, Privacy software and Information privacy are his primary areas of study. His Location sharing study, which is part of a larger body of work in Internet privacy, is frequently linked to Installation, bridging the gap between disciplines. His World Wide Web study frequently links to related topics such as Data science.

His Mobile apps study incorporates themes from Sentiment analysis, Information design and Topic model. His research integrates issues of Crowdsourcing and Mobile computing in his study of Privacy software. His study in the field of Privacy by Design also crosses realms of Nudge theory.

His most cited work include:

  • Modeling Supply Chain Dynamics: A Multiagent Approach (747 citations)
  • Learning to detect phishing emails (473 citations)
  • A framework of energy efficient mobile sensing for automatic user state recognition (440 citations)

What are the main themes of his work throughout his whole career to date?

Norman Sadeh mainly focuses on Internet privacy, World Wide Web, Privacy policy, Information privacy and Supply chain. His work on Privacy software and Location sharing as part of general Internet privacy research is often related to Set and Nudge theory, thus linking different fields of science. His studies in World Wide Web integrate themes in fields like Key and Usability.

His biological study spans a wide range of topics, including Cluster analysis and Social network. His work in the fields of Information privacy, such as Privacy by Design, intersects with other areas such as Notice. Norman Sadeh interconnects Procurement and Competition, Microeconomics in the investigation of issues within Supply chain.

He most often published in these fields:

  • Internet privacy (32.20%)
  • World Wide Web (24.58%)
  • Privacy policy (13.98%)

What were the highlights of his more recent work (between 2015-2021)?

  • Internet privacy (32.20%)
  • Privacy policy (13.98%)
  • Information privacy (11.86%)

In recent papers he was focusing on the following fields of study:

The scientist’s investigation covers issues in Internet privacy, Privacy policy, Information privacy, World Wide Web and Artificial intelligence. His studies link Social media with Internet privacy. His research integrates issues of Crowdsourcing, Baseline, Usability and Question answering in his study of Privacy policy.

End user, Taxonomy and Multimedia is closely connected to Control in his research, which is encompassed under the umbrella topic of Information privacy. His work on Mobile apps and Semantic Web as part of general World Wide Web study is frequently linked to Composition, therefore connecting diverse disciplines of science. The various areas that he examines in his Artificial intelligence study include Task and Natural language processing.

Between 2015 and 2021, his most popular works were:

  • Nudges for Privacy and Security: Understanding and Assisting Users’ Choices Online (140 citations)
  • Stress Test Evaluation for Natural Language Inference (134 citations)
  • Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. (98 citations)

In his most recent research, the most cited papers focused on:

  • Artificial intelligence
  • The Internet
  • World Wide Web

Norman Sadeh focuses on Internet privacy, Information privacy, Privacy by Design, Privacy policy and Mobile apps. His Internet privacy research spans across into areas like Information technology, Data collection, Set and Nudge theory. His work in Information privacy addresses subjects such as Control, which are connected to disciplines such as Opt-in email, Ubiquitous computing and Opt-out.

His research ties Privacy software and Privacy policy together. In his research, Scalability is intimately related to Crowdsourcing, which falls under the overarching field of Privacy software. The subject of his Mobile apps research is within the realm of World Wide Web.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Modeling Supply Chain Dynamics: A Multiagent Approach

Jayashankar M. Swaminathan;Stephen F. Smith;Norman M. Sadeh.
(1998)

1373 Citations

Learning to detect phishing emails

Ian Fette;Norman Sadeh;Anthony Tomasic.
the web conference (2007)

838 Citations

The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a City

Justin Cranshaw;Raz Schwartz;Jason I. Hong;Norman M. Sadeh.
international conference on weblogs and social media (2012)

770 Citations

A framework of energy efficient mobile sensing for automatic user state recognition

Yi Wang;Jialiu Lin;Murali Annavaram;Quinn A. Jacobson.
international conference on mobile systems, applications, and services (2009)

616 Citations

Bridging the gap between physical location and online social networks

Justin Cranshaw;Eran Toch;Jason Hong;Aniket Kittur.
ubiquitous computing (2010)

605 Citations

Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing

Jialiu Lin;Shahriyar Amini;Jason I. Hong;Norman Sadeh.
ubiquitous computing (2012)

564 Citations

M-Commerce: Technologies, Services, and Business Models

Norman M. Sadeh.
(2002)

523 Citations

Understanding and capturing people's privacy policies in a mobile social networking application

Norman Sadeh;Jason Hong;Lorrie Cranor;Ian Fette.
ubiquitous computing (2009)

472 Citations

Why people hate your app: making sense of user feedback in a mobile app store

Bin Fu;Jialiu Lin;Lei Li;Christos Faloutsos.
knowledge discovery and data mining (2013)

467 Citations

A conundrum of permissions: installing applications on an android smartphone

Patrick Gage Kelley;Sunny Consolvo;Lorrie Faith Cranor;Jaeyeon Jung.
financial cryptography (2012)

434 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Norman Sadeh

Gregory G. Raleigh

Gregory G. Raleigh

New Enterprise Associates

Publications: 58

Jason Hong

Jason Hong

Carnegie Mellon University

Publications: 43

Lorrie Faith Cranor

Lorrie Faith Cranor

Carnegie Mellon University

Publications: 43

Maria Gini

Maria Gini

University of Minnesota

Publications: 35

Michael P. Wellman

Michael P. Wellman

University of Michigan–Ann Arbor

Publications: 31

Cecilia Mascolo

Cecilia Mascolo

University of Cambridge

Publications: 29

Stephen F. Smith

Stephen F. Smith

Carnegie Mellon University

Publications: 26

Serge Egelman

Serge Egelman

International Computer Science Institute

Publications: 22

Florian Schaub

Florian Schaub

University of Michigan–Ann Arbor

Publications: 22

Xing Xie

Xing Xie

Microsoft Research Asia (China)

Publications: 22

Victor Lesser

Victor Lesser

University of Massachusetts Amherst

Publications: 20

Antonio A. F. Loureiro

Antonio A. F. Loureiro

Universidade Federal de Minas Gerais

Publications: 20

Mark S. Fox

Mark S. Fox

University of Toronto

Publications: 20

David Wagner

David Wagner

University of California, Berkeley

Publications: 20

Makoto Yokoo

Makoto Yokoo

Kyushu University

Publications: 19

Jussara M. Almeida

Jussara M. Almeida

Universidade Federal de Minas Gerais

Publications: 19

Trending Scientists

Bin Guo

Bin Guo

Northwestern Polytechnical University

Michael S. Brown

Michael S. Brown

ISARA Corporation

Ken-ichi Harada

Ken-ichi Harada

Meijo University

Simon G. Bott

Simon G. Bott

University of Houston

Roderick H. Dashwood

Roderick H. Dashwood

Texas A&M University

Ernesto Carafoli

Ernesto Carafoli

University of Padua

Milton J. Schlesinger

Milton J. Schlesinger

Washington University in St. Louis

Hye-Kyung Na

Hye-Kyung Na

Sungshin Women's University

Ingo Pecher

Ingo Pecher

University of Auckland

Linda S. Lee

Linda S. Lee

Purdue University West Lafayette

Jessica D. Ribeiro

Jessica D. Ribeiro

Florida State University

Angela Favaro

Angela Favaro

University of Padua

Christopher G. Wood

Christopher G. Wood

The University of Texas MD Anderson Cancer Center

John P.H. Wilding

John P.H. Wilding

University of Liverpool

Peter J. Cunningham

Peter J. Cunningham

Virginia Commonwealth University

Michael B. Green

Michael B. Green

Queen Mary University of London

Something went wrong. Please try again later.