default search action
Eran Toch
Person information
- affiliation: Tel Aviv University, Department of Industrial Engineering, The Iby and Aladar Fleischman Faculty of Engineering, Israel
- affiliation: Carnegie Mellon University, Pittsburgh, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Frank John Bolton, Dov Te'eni, Eran Toch:
Can Previews Mitigate the Effect of Interruptions? Findings from a Lab Experiment under Various Workloads. Int. J. Hum. Comput. Interact. 40(4): 956-964 (2024) - [c41]Eilat Lev Ari, Maayan Roichman, Eran Toch:
Strategies of Product Managers: Negotiating Social Values in Digital Product Design. CHI 2024: 227:1-227:17 - [c40]Jiakun Liu, Zicheng Zhang, Xing Hu, Ferdian Thung, Shahar Maoz, Debin Gao, Eran Toch, Zhipeng Zhao, David Lo:
MiniMon: Minimizing Android Applications with Intelligent Monitoring-Based Debloating. ICSE 2024: 206:1-206:13 - [c39]Ferdian Thung, Jiakun Liu, Pattarakrit Rattanukul, Shahar Maoz, Eran Toch, Debin Gao, David Lo:
Towards Speedy Permission-Based Debloating for Android Apps. MOBILESoft@ICSE 2024: 84-87 - [i2]Assaf Morag, Liron David, Eran Toch, Avishai Wool:
Improving Users' Passwords with DPAR: a Data-driven Password Recommendation System. CoRR abs/2406.03423 (2024) - 2023
- [j28]Doron Hillman, Yaniv Harel, Eran Toch:
Evaluating organizational phishing awareness training on an enterprise scale. Comput. Secur. 132: 103364 (2023) - [j27]Eran Toch, Oshrat Ayalon:
How Mass surveillance Crowds Out Installations of COVID-19 Contact Tracing Applications. Proc. ACM Hum. Comput. Interact. 7(CSCW1): 1-26 (2023) - [c38]Danielle Movsowitz-Davidow, Yacov Manevich, Eran Toch:
Privacy-Preserving Transactions with Verifiable Local Differential Privacy. AFT 2023: 1:1-1:23 - [c37]Tamir Mendel, Eran Toch:
Social Support for Mobile Security: Comparing Close Connections and Community Volunteers in a Field Experiment. CHI 2023: 590:1-590:18 - [c36]Jiakun Liu, Xing Hu, Ferdian Thung, Shahar Maoz, Eran Toch, Debin Gao, David Lo:
AutoDebloater: Automated Android App Debloating. ASE 2023: 2090-2093 - 2022
- [j26]Tamir Mendel, Roei Schuster, Eran Tromer, Eran Toch:
Toward Proactive Support for Older Adults: Predicting the Right Moment for Providing Mobile Safety Help. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(1): 25:1-25:25 (2022) - [j25]Amit Rechavi, Eran Toch:
Crowd logistics: Understanding auction-based pricing and couriers' strategies in crowdsourcing package delivery. J. Intell. Transp. Syst. 26(2): 129-144 (2022) - [j24]Maya Benarous, Eran Toch, Irad Ben-Gal:
Synthesis of Longitudinal Human Location Sequences: Balancing Utility and Privacy. ACM Trans. Knowl. Discov. Data 16(6): 118:1-118:27 (2022) - [j23]Ayelet Arditi, Eran Toch:
Evaluating package delivery crowdsourcing using location traces in different population densities. Comput. Environ. Urban Syst. 96: 101842 (2022) - [c35]Tamir Mendel, Eran Toch:
Meerkat: A Social Community Support Application for Older Adults. CHI Extended Abstracts 2022: 177:1-177:4 - [c34]Michael Khavkin, Eran Toch:
Valuation of Differential Privacy Budget in Data Trade: A Conjoint Analysis. Privacy and Identity Management 2022: 69-84 - 2021
- [j22]Hadas Chassidim, Christos Perentis, Eran Toch, Bruno Lepri:
Between privacy and security: the factors that drive intentions to use cyber-security applications. Behav. Inf. Technol. 40(16): 1769-1783 (2021) - [j21]Doron Cohen, Or Naim, Eran Toch, Irad Ben-Gal:
Website categorization via design attribute learning. Comput. Secur. 107: 102312 (2021) - [j20]Yelena Petrykina, Hadas Schwartz-Chassidim, Eran Toch:
Nudging users towards online safety using gamified environments. Comput. Secur. 108: 102270 (2021) - [j19]Oshrat Ayalon, Eran Toch:
User-Centered Privacy-by-Design: Evaluating the Appropriateness of Design Prototypes. Int. J. Hum. Comput. Stud. 154: 102641 (2021) - [c33]Frank John Bolton, Dov Te'eni, Neta B. Maimon, Eran Toch:
Detecting interruption events using EEG. LifeTech 2021: 33-34 - [c32]Tamir Mendel, Debin Gao, David Lo, Eran Toch:
An Exploratory Study of Social Support Systems to Help Older Adults in Managing Mobile Safety. MobileHCI 2021: 30:1-30:13 - [i1]Eran Toch, Oshrat Ayalon:
How mass surveillance can crowd out installations of COVID-19 contact tracing apps. CoRR abs/2110.01567 (2021) - 2020
- [j18]Eran Toch, Hadas Schwartz-Chassidim, Tali Hatuka:
Can you Turn it Off?: The Spatial and Social Context of Mobile Disturbance. Proc. ACM Hum. Comput. Interact. 4(CSCW2): 91:1-91:18 (2020)
2010 – 2019
- 2019
- [j17]Tamir Mendel, Eran Toch:
My Mom was Getting this Popup: Understanding Motivations and Processes in Helping Older Relatives with Mobile Security and Privacy. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(4): 147:1-147:20 (2019) - [j16]Zhiyuan Wan, Lingfeng Bao, Debin Gao, Eran Toch, Xin Xia, Tamir Mendel, David Lo:
AppMoD: Helping Older Adults Manage Mobile Security with Online Social Help. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(4): 154:1-154:22 (2019) - [j15]Eran Toch, Boaz Lerner, Eyal Ben Zion, Irad Ben-Gal:
Analyzing large-scale human mobility data: a survey of machine learning methods and applications. Knowl. Inf. Syst. 58(3): 501-523 (2019) - [c31]Oshrat Ayalon, Eran Toch:
A/P(rivacy) Testing: Assessing Applications for Social and Institutional Privacy. CHI Extended Abstracts 2019 - [c30]Oshrat Ayalon, Eran Toch:
Evaluating Users' Perceptions about a System's Privacy: Differentiating Social and Institutional Aspects. SOUPS @ USENIX Security Symposium 2019 - 2018
- [j14]Eran Toch, Claudio Bettini, Erez Shmueli, Laura Radaelli, Andrea Lanzi, Daniele Riboni, Bruno Lepri:
The Privacy Implications of Cyber Security Systems: A Technological Survey. ACM Comput. Surv. 51(2): 36:1-36:27 (2018) - [j13]Irit Hadar, Tomer Hasson, Oshrat Ayalon, Eran Toch, Michael Birnhack, Sofia Sherman, Arod Balissa:
Privacy by designers: software developers' privacy mindset. Empir. Softw. Eng. 23(1): 259-289 (2018) - [c29]Daricia Wilkinson, Moses Namara, Karla A. Badillo-Urquiola, Pamela J. Wisniewski, Bart P. Knijnenburg, Xinru Page, Eran Toch, Jen Romano-Bergstrom:
Moving Beyond a "one-size fits all": Exploring Individual Differences in Privacy. CHI Extended Abstracts 2018 - [c28]Karla A. Badillo-Urquiola, Yaxing Yao, Oshrat Ayalon, Bart P. Knijnenburg, Xinru Page, Eran Toch, Yang Wang, Pamela J. Wisniewski:
Privacy in Context: Critically Engaging with Theory to Guide Privacy Research and Design. CSCW Companion 2018: 425-431 - [c27]Oshrat Ayalon, Eran Toch:
Crowdsourcing Privacy Design Critique: An Empirical Evaluation of Framing Effects. HICSS 2018: 1-10 - [c26]Eran Toch, Yoni Birman:
Towards Behavioral Privacy: How to Understand AI's Privacy Threats in Ubiquitous Computing. UbiComp/ISWC Adjunct 2018: 931-936 - [c25]Irit Hadar, Tomer Hasson, Oshrat Ayalon, Eran Toch, Michael Birnhack, Sofia Sherman, Arod Balissa:
Privacy by designers: software developers' privacy mindset. ICSE 2018: 396 - [c24]Eran Toch, Netta Rager, Tal Florentin, Dan Linenberg, Daya Sellman, Noam Shomron:
Augmented-Genomics: Protecting Privacy for Clinical Genomics with Inferential Interfaces. IUI Companion 2018: 18:1-18:2 - 2017
- [j12]Oshrat Ayalon, Eran Toch:
Not Even Past: Information Aging and Temporal Privacy in Online Social Networks. Hum. Comput. Interact. 32(2): 73-102 (2017) - [j11]Ron S. Hirschprung, Eran Toch, Hadas Schwartz-Chassidim, Tamir Mendel, Oded Maimon:
Analyzing and Optimizing Access Control Choice Architectures in Online Social Networks. ACM Trans. Intell. Syst. Technol. 8(4): 57:1-57:22 (2017) - [c23]Oshrat Ayalon, Eran Toch, Irit Hadar, Michael Birnhack:
How Developers Make Design Decisions about Users' Privacy: The Place of Professional Communities and Organizational Climate. CSCW Companion 2017: 135-138 - [c22]Tamir Mendel, Eran Toch:
Susceptibility to Social Influence of Privacy Behaviors: Peer versus Authoritative Sources. CSCW 2017: 581-593 - [c21]Maija Poikela, Eran Toch:
Understanding the Valuation of Location Privacy: a Crowdsourcing-Based Approach. HICSS 2017: 1-10 - 2016
- [j10]Ron S. Hirschprung, Eran Toch, Frank John Bolton, Oded Maimon:
A methodology for estimating the value of privacy in information disclosure systems. Comput. Hum. Behav. 61: 443-453 (2016) - [j9]Omer Barak, Gabriella Cohen, Eran Toch:
Anonymizing mobility data using semantic cloaking. Pervasive Mob. Comput. 28: 102-112 (2016) - 2015
- [j8]Ron S. Hirschprung, Eran Toch, Oded Maimon:
Simplifying Data Disclosure Configurations in a Cloud Computing Environment. ACM Trans. Intell. Syst. Technol. 6(3): 32:1-32:26 (2015) - [c20]Jeremy P. Birnholtz, Irina Shklovski, Mark Handel, Eran Toch:
Let's Talk About Sex (Apps), CSCW. CSCW Companion 2015: 283-288 - 2014
- [j7]Eran Toch:
Crowdsourcing privacy preferences in context-aware applications. Pers. Ubiquitous Comput. 18(1): 129-141 (2014) - 2013
- [c19]Eran Toch, Inbal Levi:
Locality and privacy in people-nearby applications. UbiComp 2013: 539-548 - [c18]Omer Barak, Gabriella Cohen, Alla Gazit, Eran Toch:
The price is right?: economic value of location sharing. UbiComp (Adjunct Publication) 2013: 891-900 - [c17]Oshrat Ayalon, Eran Toch:
Retrospective privacy: managing longitudinal privacy in online social networks. SOUPS 2013: 4:1-4:13 - 2012
- [j6]Eran Toch, Yang Wang, Lorrie Faith Cranor:
Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems. User Model. User Adapt. Interact. 22(1-2): 203-220 (2012) - [c16]Eran Toch, Inbal Levi:
What can 'people-nearby' applications teach us about meeting new people? UbiComp 2012: 802-803 - [p1]Eran Toch:
OPOSSUM: Indexing Techniques for an Order-of-Magnitude Improvement of Service Matchmaking Times. Semantic Web Services, Advancement through Evaluation 2012: 49-62 - 2011
- [j5]Eran Toch, Iris Reinhartz-Berger, Dov Dori:
Humans, semantic services and similarity: A user study of semantic Web services matching and composition. J. Web Semant. 9(1): 16-28 (2011) - [c15]Eran Toch:
Super-Ego: a framework for privacy-sensitive bounded context-awareness. CASEMANS@Ubicomp 2011: 24-32 - [c14]Vassilis Kostakos, Jayant Venkatanathan, Bernardo Reynolds, Norman M. Sadeh, Eran Toch, Siraj A. Shaikh, Simon L. Jones:
Who's your best friend?: targeted privacy attacks In location-sharing social networks. UbiComp 2011: 177-186 - [c13]Jayant Venkatanathan, Denzil Ferreira, Michael Benisch, Jialiu Lin, Evangelos Karapanos, Vassilis Kostakos, Norman M. Sadeh, Eran Toch:
Improving Users' Consistency When Recalling Location Sharing Preferences. INTERACT (1) 2011: 380-387 - [c12]Shahriyar Amini, Janne Lindqvist, Jason I. Hong, Jialiu Lin, Eran Toch, Norman M. Sadeh:
Caché: caching location-enhanced content to improve user privacy. MobiSys 2011: 197-210 - 2010
- [j4]Shahriyar Amini, Janne Lindqvist, Jason I. Hong, Maladau Mou, Rahul Raheja, Jialiu Lin, Norman M. Sadeh, Eran Toch:
Caché: caching location-enhanced content to improve user privacy. ACM SIGMOBILE Mob. Comput. Commun. Rev. 14(3): 19-21 (2010) - [c11]Eran Toch, Norman M. Sadeh, Jason I. Hong:
Generating default privacy policies for online social networks. CHI Extended Abstracts 2010: 4243-4248 - [c10]Justin Cranshaw, Eran Toch, Jason I. Hong, Aniket Kittur, Norman M. Sadeh:
Bridging the gap between physical location and online social networks. UbiComp 2010: 119-128 - [c9]Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, Janice Y. Tsai, Patrick Gage Kelley, James Springfield, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh:
Empirical models of privacy in location sharing. UbiComp 2010: 129-138 - [c8]Eran Toch, Justin Cranshaw, Paul Hankes Drielsma, Jay Springfield, Patrick Gage Kelley, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh:
Locaccino: a privacy-centric location sharing application. UbiComp (Adjunct Papers) 2010: 381-382
2000 – 2009
- 2009
- [j3]Aviv Segev, Eran Toch:
Context-Based Matching and Ranking of Web Services for Composition. IEEE Trans. Serv. Comput. 2(3): 210-222 (2009) - [c7]Eran Toch, Ramprasad Ravichandran, Lorrie Faith Cranor, Paul Hankes Drielsma, Jason I. Hong, Patrick Gage Kelley, Norman M. Sadeh, Janice Y. Tsai:
Analyzing use of privacy policy attributes in a location sharing application. SOUPS 2009 - 2008
- [c6]Eran Toch, Iris Reinhartz-Berger, Avigdor Gal, Dov Dori:
Generating and Optimizing Graphical User Interfaces for Semantic Service Compositions. ER 2008: 528-529 - 2007
- [j2]Eran Toch, Avigdor Gal, Iris Reinhartz-Berger, Dov Dori:
A semantic approach to approximate service retrieval. ACM Trans. Internet Techn. 8(1): 2 (2007) - [c5]Mati Golani, Avigdor Gal, Eran Toch:
Modeling Alternatives in Exception Executions. Business Process Management Workshops 2007: 54-65 - 2006
- [c4]Eran Toch, Iris Reinhartz-Berger, Avigdor Gal, Dov Dori:
OPOSSUM: Bridging the Gap Between Web Services and the Semantic Web. NGITS 2006: 357-358 - 2005
- [c3]Eran Toch, Avigdor Gal, Dov Dori:
Automatically Grounding Semantically-Enriched Conceptual Models to Concrete Web Services. ER 2005: 304-319 - 2004
- [j1]Sheizaf Rafaeli, Miri Barak, Yuval Dan-Gur, Eran Toch:
QSIA - a Web-based environment for learning, assessing and knowledge sharing in communities. Comput. Educ. 43(3): 273-289 (2004) - [c2]Dov Dori, Dizza Beimel, Eran Toch:
OPCATeam - Collaborative Business Process Modeling with OPM. Business Process Management 2004: 66-81 - [c1]Dov Dori, Eran Toch, Iris Reinhartz-Berger:
Modeling Semantic Web Services with OPM/S A Human and Machine-Interpretable Language. WebDyn@WWW 2004: 86-95
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint