myFirstName.myLastName - at - gmail - dot - com
I am a manager and research scientist at Google.
Areas of work:
Engagement & Expectations
Are privacy concerns a turn-off? Engagement and privacy in social networks. J. Staddon, D. Huffaker, L. Brown and A. Sedley, SOUPS 2012
Around the Water Cooler: Shared Discussion Topics and Contact Closeness in Social Search. S. Komanduri, L. Fang, D. Huffaker and J. Staddon. ICWSM 2012.
Vanity or Privacy? Social Media as a Facilitator of Privacy and Trust. (position paper) J. Staddon. CSCW 2012 Workshop on Reconciling Privacy With Social Media.
Public vs. Publicized: Content Use Trends and Privacy Expectations. J. Staddon and A. Swerdlow. HotSec 2011.
Self-reported social network behavior: Accuracy predictors and implications for the privacy paradox. J. Staddon, A. Acquisti and K. LeFevre. SocialCom 2013.
Indirect Content Privacy Surveys: Measuring Privacy Without Asking About It. A. Braunstein, L. Granka, and J. Staddon. SOUPS 2011.
A Framework for Privacy-Conducive Recommendations. R. Chow and J. Staddon. The long version of a short paper from WPES 2010.
Detecting privacy leaks with corpus-based association rules. R. Chow, P. Golle and J. Staddon. KDD 2008.
Sponsored ad-based similarity: an approach to mining collective advertiser intelligence. J. Staddon. ADKDD 2008.
The rules of redaction: identify, protect, review (and repeat). E. Bier, R. Chow, P. Golle , T. King and J. Staddon. IEEE Security & Privacy, 2009.
Sanitization's slippery slope: the design and study of a text revision assistant. R. Chow, I. Oberst and J. Staddon. SOUPS 2009.
Personalized Privacy Policies: Challenges for Data Loss Prevention. (Short paper) N. Gnanasambandam and J. Staddon. AAAI Spring Symposium on Intelligent Information Privacy Management 2010.
Finding "hidden" connections on LinkedIn, An argument for more pragmatic social network privacy. (Position Paper). J. Staddon. AISec 2009.
Detecting reviewer bias through Web-based association mining. J. Staddon and R. Chow. ACM WICOW 2008.
Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security. M. Bellare, A. Boldyreva, K. Kurosawa, J. Staddon.
Secure conjunctive keyword search over encrypted data. P. Golle, J. Staddon and B. Waters. In ACNS 2004.
Secret handshakes from pairing-based key agreements. D. Balfanz, G. Durfee, N. Shankar, D. Smetters, J. Staddon and H. Wong. In 2003 IEEE Symposium on Security and Privacy.
Probabilistic Approaches to Security & Privacy
Graceful service degradation (or, How to know your payment is late). A. Andoni and J. Staddon. In ACM EC 2005.
Dynamic inference control. J. Staddon. In DMKD 2003 (8th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery).
Disclaimer: Any views expressed at this site are mine alone and do not in any way represent those of my employer.