Jessica Staddon

Orcid: 0009-0001-9361-9413

  • Google Research

According to our database1, Jessica Staddon authored at least 48 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.



In proceedings 
PhD thesis 


Online presence:



Shortchanged: Uncovering and Analyzing Intimate Partner Financial Abuse in Consumer Complaints.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

"it's a generally exhausting field" A Large-Scale Study of Security Incident Management Workflows and Pain Points.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Policy by Example: An Approach for Security Policy Specification.
CoRR, 2017

No (Privacy) News is Good News: An Analysis of New York Times and Guardian Privacy News from 2010-2016.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Learning a Privacy Incidents Database.
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, 2017

Predicting Mobile App Privacy Preferences with Psychographics.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

"I had no idea this was a thing": on the importance of understanding the user experience of personalized transparency tools.
Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, 2016

Exploring the benefits and uses of web analytics tools for non-transactional websites.
Proceedings of the Designing Interactive Systems Conference 2014, DIS '14, Vancouver, BC, 2014

"I hereby leave my email to...": Data Usage Control and the Digital Estate.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Self-Reported Social Network Behavior: Accuracy Predictors and Implications for the Privacy Paradox.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Are privacy concerns a turn-off?: engagement and privacy in social networks.
Proceedings of the Symposium On Usable Privacy and Security, 2012

Around the Water Cooler: Shared Discussion Topics and Contact Closeness in Social Search.
Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012

Public vs. Publicized: Content Use Trends and Privacy Expectations.
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011

Indirect content privacy surveys: measuring privacy without asking about it.
Proceedings of the Symposium On Usable Privacy and Security, 2011

A framework for privacy-conducive recommendations.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Personalized Privacy Policies: Challenges for Data Loss Prevention.
Proceedings of the Intelligent Information Privacy Management, 2010

The Web as a Privacy Lab.
Proceedings of the Intelligent Information Privacy Management, 2010

The Rules of Redaction: Identify, Protect, Review (and Repeat).
IEEE Secur. Priv., 2009

Sanitization's slippery slope: the design and study of a text revision assistant.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy.
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, 2009

Controlling data in the cloud: outsourcing computation without outsourcing control.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

Testable commitments.
Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, 2008

Detecting privacy leaks using corpus-based association rules.
Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2008

A content-driven access control system.
Proceedings of the IDtrust 2008, 2008

Detecting reviewer bias through web-based association mining.
Proceedings of the 2nd ACM Workshop on Information Credibility on the Web, 2008

Sponsored ad-based similarity: an approach to mining collective advertiser intelligence.
Proceedings of the 2nd International Workshop on Data Mining and Audience Intelligence for Advertising, 2008

Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security.
IEEE Trans. Inf. Theory, 2007

Deflation-secure web metering.
Int. J. Inf. Comput. Secur., 2007

Web-Based Inference Detection.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

Graceful service degradation (or, how to know your payment is late).
Proceedings of the Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), 2005

Private Inference Control.
IACR Cryptol. ePrint Arch., 2004

Detecting and correcting malicious data in VANETs.
Proceedings of the First International Workshop on Vehicular Ad Hoc Networks, 2004

Secure Conjunctive Keyword Search over Encrypted Data.
Proceedings of the Applied Cryptography and Network Security, 2004

Applications of list decoding to tracing traitors.
IEEE Trans. Inf. Theory, 2003

Secret Handshakes from Pairing-Based Key Agreements.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

Randomness Re-use in Multi-recipient Encryption Schemeas.
Proceedings of the Public Key Cryptography, 2003

Dynamic inference control.
Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, 2003

Sliding-window self-healing key distribution.
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, 2003

Self-Healing Key Distribution with Revocation.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

Efficient tracing of failed nodes in sensor networks.
Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications, 2002

FAIR: Fair Audience InfeRence.
Proceedings of the Security and Privacy in Digital Rights Management, 2002

Combinatorial properties of frameproof and traceability codes.
IEEE Trans. Inf. Theory, 2001

Efficient Traitor Tracing Algorithms using List Decoding.
IACR Cryptol. ePrint Arch., 2001

Graph-Based Authentication of Digital Streams.
IACR Cryptol. ePrint Arch., 2000

Long-Lived Broadcast Encryption.
Proceedings of the Advances in Cryptology, 2000

Efficient Methods for Integrating Traceability and Broadcast Encryption.
Proceedings of the Advances in Cryptology, 1999

PKCS #1: RSA Cryptography Specifications Version 2.0.
RFC, October, 1998

Combinatorial Bounds for Broadcast Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998