Privacy Research Funding!

Privacy/UX Positions

Videos

Jessica Staddon

 
View Jessica Staddon's profile on LinkedIn

myFirstName.myLastName - at - gmail - dot - com


I am a Privacy Analyst and Research/UX manager at Google


Areas of work:

  1. Guidelines/Policies: Guidelines for privacy-aware products in several areas including data aggregation, notice & consent and personalization
  2. Engagement, privacy and trust: Identify the conditions that drive engagement and build trust/privacy
  3. Rapid research: Combine quantitative methods with qualitative research for rapid results


Before this I was an area manager at PARC, a research scientist at Bell Labs and RSA Labs, and a graduate student in Berkeley's math department (PhD 1997).




Recent Papers


Engagement & Expectations


Are privacy concerns a turn-off? Engagement and privacy in social networks. J. Staddon, D. Huffaker, L. Brown and A. Sedley, SOUPS 2012


Around the Water Cooler: Shared Discussion Topics and Contact Closeness in Social Search. S. Komanduri, L. Fang, D. Huffaker and J. Staddon. ICWSM 2012.


Vanity or Privacy? Social Media as a Facilitator of Privacy and Trust. (position paper) J. Staddon. CSCW 2012 Workshop on Reconciling Privacy With Social Media.


Public vs. Publicized: Content Use Trends and Privacy Expectations. J. Staddon and A. Swerdlow. HotSec 2011.



Measurement

Self-reported social network behavior: Accuracy predictors and implications for the privacy paradox. J. Staddon, A. Acquisti and K. LeFevre. SocialCom 2013.

Indirect Content Privacy Surveys: Measuring Privacy Without Asking About It. A. Braunstein, L. Granka, and J. Staddon. SOUPS 2011.


Data Mining


A Framework for Privacy-Conducive Recommendations. R. Chow and J. Staddon. The long version of a short paper from WPES 2010.


The Web as a privacy lab. (Position Paper) R. ChowJ. FangP. Golle and J. Staddon. AAAI Spring Symposium on Intelligent Information Privacy Management 2010.


Detecting privacy leaks with corpus-based association rulesR. ChowP. Golle and J. Staddon. KDD 2008.


Web-based inference detection. J StaddonP. Golle and B. Zimny. In USENIX Security 2007.



Usability


The rules of redaction: identify, protect, review (and repeat). E. Bier, R. Chow, P. Golle , T. King and J. Staddon. IEEE Security & Privacy, 2009.


Sanitization's slippery slope: the design and study of a text revision assistant.  R. Chow,  I. Oberst and J. Staddon. SOUPS 2009.


Personalized Privacy Policies: Challenges for Data Loss Prevention. (Short paper) N. Gnanasambandam and J. Staddon. AAAI Spring Symposium on Intelligent Information Privacy Management 2010.



Attacks

 

Finding "hidden" connections on LinkedIn, An argument for more pragmatic social network privacy. (Position Paper). J. Staddon. AISec 2009.


Detecting reviewer bias through Web-based association mining. J. Staddon and R. Chow. ACM WICOW 2008.



Cryptography

 

Testable commitmentsP. GolleR. Chow and J. Staddon. ACM StorageSS 2008.

 

A content-driven access control system. J. StaddonP. Golle, M. Gagne and P. Rasmussen. 7th Symposium on Identity and Trust on the Internet, 2008.


Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security. M. BellareA. BoldyrevaK. Kurosawa, J. Staddon.
IEEE Transactions on Information Theory, Volume 53,  Issue 11,  Date: Nov. 2007,  Pages: 3927 - 3943.

 

Sponsored ad-based similarity: an approach to mining collective advertiser intelligence. J. Staddon. ADKDD 2008.

 

Private inference controlD. Woodruff and J. Staddon. In ACM CCS 2004.


Secure conjunctive keyword search over encrypted dataP. Golle, J. Staddon and B. Waters. In ACNS 2004.

 

Sliding-window self-healing key distributionS. Miner MoreM. Malkin, J. Staddon and D. Balfanz In the 2003 ACM Workshop on Survivable and Self-Regenerative Systems.

 

Secret handshakes from pairing-based key agreements. D. Balfanz, G. Durfee, N. Shankar, D. Smetters, J. Staddon and H. Wong. In 2003 IEEE Symposium on Security and Privacy.



Probabilistic Approaches to Security & Privacy


Deflation-secure Web meteringR. Johnson and J. StaddonInternational Journal of Information and Computer Security, Volume 1, 2007.

 

Graceful service degradation (or, How to know your payment is late)A. Andoni and J. Staddon. In ACM EC 2005.

 

Detecting and correcting malicious data in VANETsP. Golle, D. Greene and J. Staddon. In the MobiCom 2004 Workshop on Vehicular Ad Hoc Networks.

 

Dynamic inference control. J. Staddon. In DMKD 2003 (8th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery).

 


 

Disclaimer: Any views expressed at this site are mine alone and do not in any way represent those of my employer.