Jessica Staddon

View Jessica Staddon's profile on LinkedIn

myFirstName.myLastName - at - gmail - dot - com

Starting Fall 2015: Associate Professor and Director of Privacy in the Computer Science department of N. C. State University.

Formerly: Manager and Research Scientist at Google, Area Manager at Xerox PARC, Research Scientist at Bell Labs and RSA Labs, and graduate student in Berkeley's math department (PhD 1997).

I am teaching a seminar course in privacy (CSC 591, Special Topics) this fall: Data-driven Privacy. Please reach out to me with any questions about the course.

Recent Papers

Engagement & Expectations

Are privacy concerns a turn-off? Engagement and privacy in social networks. J. Staddon, D. Huffaker, L. Brown and A. Sedley, SOUPS 2012

Around the Water Cooler: Shared Discussion Topics and Contact Closeness in Social Search. S. Komanduri, L. Fang, D. Huffaker and J. Staddon. ICWSM 2012.

Vanity or Privacy? Social Media as a Facilitator of Privacy and Trust. (position paper) J. Staddon. CSCW 2012 Workshop on Reconciling Privacy With Social Media.

Public vs. Publicized: Content Use Trends and Privacy Expectations. J. Staddon and A. Swerdlow. HotSec 2011.


Self-reported social network behavior: Accuracy predictors and implications for the privacy paradox. J. Staddon, A. Acquisti and K. LeFevre. SocialCom 2013.

Indirect Content Privacy Surveys: Measuring Privacy Without Asking About It. A. Braunstein, L. Granka, and J. Staddon. SOUPS 2011.

Data Mining

A Framework for Privacy-Conducive Recommendations. R. Chow and J. Staddon. The long version of a short paper from WPES 2010.

The Web as a privacy lab. (Position Paper) R. ChowJ. FangP. Golle and J. Staddon. AAAI Spring Symposium on Intelligent Information Privacy Management 2010.

Detecting privacy leaks with corpus-based association rulesR. ChowP. Golle and J. Staddon. KDD 2008.

Sponsored ad-based similarity: an approach to mining collective advertiser intelligence. J. Staddon. ADKDD 2008.

Web-based inference detection. J StaddonP. Golle and B. Zimny. In USENIX Security 2007.


The rules of redaction: identify, protect, review (and repeat). E. Bier, R. Chow, P. Golle , T. King and J. Staddon. IEEE Security & Privacy, 2009.

Sanitization's slippery slope: the design and study of a text revision assistant.  R. Chow,  I. Oberst and J. Staddon. SOUPS 2009.

Personalized Privacy Policies: Challenges for Data Loss Prevention. (Short paper) N. Gnanasambandam and J. Staddon. AAAI Spring Symposium on Intelligent Information Privacy Management 2010.



Finding "hidden" connections on LinkedIn, An argument for more pragmatic social network privacy. (Position Paper). J. Staddon. AISec 2009.

Detecting reviewer bias through Web-based association mining. J. Staddon and R. Chow. ACM WICOW 2008.



Testable commitmentsP. GolleR. Chow and J. Staddon. ACM StorageSS 2008.


A content-driven access control system. J. StaddonP. Golle, M. Gagne and P. Rasmussen. 7th Symposium on Identity and Trust on the Internet, 2008.

Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security. M. BellareA. BoldyrevaK. Kurosawa, J. Staddon.
IEEE Transactions on Information Theory, Volume 53,  Issue 11,  Date: Nov. 2007,  Pages: 3927 - 3943.


Private inference controlD. Woodruff and J. Staddon. In ACM CCS 2004.

Secure conjunctive keyword search over encrypted dataP. Golle, J. Staddon and B. Waters. In ACNS 2004.


Sliding-window self-healing key distributionS. Miner MoreM. Malkin, J. Staddon and D. Balfanz In the 2003 ACM Workshop on Survivable and Self-Regenerative Systems.


Secret handshakes from pairing-based key agreements. D. Balfanz, G. Durfee, N. Shankar, D. Smetters, J. Staddon and H. Wong. In 2003 IEEE Symposium on Security and Privacy.

Probabilistic Approaches to Security & Privacy

Deflation-secure Web meteringR. Johnson and J. StaddonInternational Journal of Information and Computer Security, Volume 1, 2007.


Graceful service degradation (or, How to know your payment is late)A. Andoni and J. Staddon. In ACM EC 2005.


Detecting and correcting malicious data in VANETsP. Golle, D. Greene and J. Staddon. In the MobiCom 2004 Workshop on Vehicular Ad Hoc Networks.


Dynamic inference control. J. Staddon. In DMKD 2003 (8th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery).



Disclaimer: Any views expressed at this site are mine alone and do not in any way represent those of my employer.