Understanding the evolution of consumer trust in mobile commerce: a longitudinal study J Lin, B Wang, N Wang, Y Lu Information Technology and Management 15, 37-49, 2014 | 263 | 2014 |
Third-party apps on Facebook: Privacy and the illusion of control N Wang, H Xu, J Grossklags The 5th ACM Symposium on Computer Human Interaction for Management of …, 2011 | 201 | 2011 |
Resilience Mitigates the Negative Effects of Adolescent Internet Addiction and Online Risk Exposure P Wisniewski, H Jia, N Wang, H Xu, MB Rosson, JM Carroll The 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI …, 2015 | 145 | 2015 |
An online experiment of privacy authorization dialogues for social applications N Wang, J Grossklags, H Xu The 2013 conference on Computer supported cooperative work, 261-272, 2013 | 80 | 2013 |
Privacy concerns in online recommender systems: Influences of control and user data input B Zhang, N Wang, H Jin Symposium on Usable Privacy and Security (SOUPS), 159-173, 2014 | 79 | 2014 |
Puppies: Transformation-supported personalized privacy preserving partial image sharing J He, B Liu, D Kong, X Bao, N Wang, H Jin, G Kesidis 2016 46th annual IEEE/IFIP international conference on dependable systems …, 2016 | 71 | 2016 |
Investigating Effects of Control and Ads Awareness on Android Users' Privacy Behaviors and Perceptions N Wang, B Zhang, L Bin, H Jin the 17th International Conference on Human-Computer Interaction with Mobile …, 2015 | 54 | 2015 |
A semi-supervised and inductive embedding model for churn prediction of large-scale mobile games X Liu, M Xie, X Wen, R Chen, Y Ge, N Duffield, N Wang 2018 ieee international conference on data mining (icdm), 277-286, 2018 | 50 | 2018 |
Designing the default privacy settings for facebook applications N Wang, P Wisniewski, H Xu, J Grossklags The 17th ACM conference on Computer supported cooperative work & social …, 2014 | 40 | 2014 |
Micro-and macro-level churn analysis of large-scale mobile games X Liu, M Xie, X Wen, R Chen, Y Ge, N Duffield, N Wang Knowledge and Information Systems 62, 1465-1496, 2020 | 26 | 2020 |
Privacy by redesign: Alleviating privacy concerns for third-party apps H Xu, N Wang, J Grossklags International Conference on Information Systems (ICIS 2012), 2012 | 26 | 2012 |
The appropriation of GitHub for curation Y Wu, N Wang, J Kropczynski, JM Carroll PeerJ Computer Science 3, e134, 2017 | 19 | 2017 |
Electronic system with risk presentation mechanism and method of operation thereof R Wang, N Wang, H Jin, A Messer US Patent 9,626,515, 2017 | 16 | 2017 |
Third-party applications' data practices on facebook N Wang Conference on Human Factors in Computing Systems (CHI 2012), 1399-1404, 2012 | 15 | 2012 |
Context Matters?: How Adding the Obfuscation Option Affects End Users' Data Disclosure Decisions J Wang, N Wang, H Jin The 21st International Conference on Intelligent User Interfaces (IUI '16 …, 2016 | 13 | 2016 |
Electronic system with access management mechanism and method of operation thereof B Liu, H Jin, N Wang US Patent 9,811,679, 2017 | 9 | 2017 |
The sustainability of superior performance of platform complementor: evidence from the effects of iterative innovation and visibility of app in iOS platform in China N Wang, S Chen, L Xiao, F Fu Sustainability 13 (7), 4034, 2021 | 7 | 2021 |
RepoHunter: Supporting curation repositories on GitHub Y Wu, N Wang, JM Carroll iConference 2017 Proceedings, 2017 | 1 | 2017 |
Understanding Social Applications’ Data Practices and Privacy Notices on Social Networking Sites N Wang The Pennsylvania State University, 2018 | | 2018 |
Translating IUIPC into Design: The Case of Third-Party Applications on Facebook N Wang, H Xu, J Grossklags | | |