Mohammad Tahaei, Ph.D.

San Francisco Bay Area Contact Info
2K followers 500+ connections

Join to view profile

About

I am a Responsible AI Research Lead with a proven track record of leading and executing…

Experience & Education

  • eBay

View Mohammad’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Volunteer Experience

  • ACM, Association for Computing Machinery Graphic

    Committee Member

    ACM, Association for Computing Machinery

    - 8 months

    Science and Technology

    Recruited 14 external reviewers, reviewed 14 papers, and made final decisions for 7 papers. Serving on the committee of the ACM CHI conference on Human Factors in Computing Systems, which is the premier international conference of Human-Computer Interaction.

  • Program Committee/Editorial Board

    Privacy Enhancing Technologies Symposium

    - Present 1 year 6 months

    Science and Technology

    Reviewing 3-4 papers related to privacy, security, and human factors per quarter/cycle.

  • DataKirk Graphic

    Volunteer

    DataKirk

    - 1 year

    Education

    STEM Ambassador: designed a course for middle school students to improve their digital literacy in privacy.

  • Volunteer

    Nature Cleaners

    - 1 year

    Environment

    Attended 10 sessions of volunteer work to clean up the nature!

Publications

  • Embedding Privacy Into Design Through Software Developers: Challenges & Solutions

    IEEE Security & Privacy: Special Issue on Usable Security for Security Workers

    To make privacy a first-class citizen in software, we argue for equipping developers with usable tools as well as providing support from organizations, educators, and regulators. We discuss challenges and propose solutions for stakeholders to help developers perform privacy-related tasks.

    See publication
  • Stuck in the Permissions With You: Developer & End-User Perspectives on App Permissions & Their Privacy Ramifications

    The ACM Conference on Human Factors in Computing Systems (CHI)

    While the literature on permissions from the end-user perspective is rich, there is a lack of empirical research on why developers request permissions, their conceptualization of permissions, and how their perspectives compare with end-users' perspectives. Our study aims to address these gaps using a mixed-methods approach.

    Through interviews with 19 app developers and a survey of 309 Android and iOS end-users, we found that both groups shared similar concerns about unnecessary…

    While the literature on permissions from the end-user perspective is rich, there is a lack of empirical research on why developers request permissions, their conceptualization of permissions, and how their perspectives compare with end-users' perspectives. Our study aims to address these gaps using a mixed-methods approach.

    Through interviews with 19 app developers and a survey of 309 Android and iOS end-users, we found that both groups shared similar concerns about unnecessary permissions breaking trust, damaging the app’s reputation, and potentially allowing access to sensitive data. We also found that developer participants sometimes requested multiple permissions due to confusion about the scope of certain permissions or third-party library requirements. Additionally, most end-user participants believed they were responsible for granting a permission request, and it was their choice to do so, a belief shared by many developer participants. Our findings have implications for improving the permission ecosystem for both developers and end-users.

    See publication
  • Privacy, Permissions, and the Health App Ecosystem: A Stack Overflow Exploration

    European Symposium on Usable Security (EuroUSEC)

    Health data is considered to be sensitive and personal; both governments and software platforms have enacted specific measures to protect it. Consumer apps that collect health data are becoming more popular, but raise new privacy concerns as they collect unnecessary data, share it with third parties, and track users. However, developers of these apps are not necessarily knowingly endangering users’ privacy; some may simply face challenges working with health features.

    To scope these…

    Health data is considered to be sensitive and personal; both governments and software platforms have enacted specific measures to protect it. Consumer apps that collect health data are becoming more popular, but raise new privacy concerns as they collect unnecessary data, share it with third parties, and track users. However, developers of these apps are not necessarily knowingly endangering users’ privacy; some may simply face challenges working with health features.

    To scope these challenges, we qualitatively analyzed 269 privacy-related posts on Stack Overflow by developers of health apps for Android- and iOS-based systems. We found that health-specific access control structures (e.g., enhanced requirements for permissions and authentication) underlie several privacy-related challenges developers face. The specific nature of problems often differed between the platforms, for example additional verification steps for Android developers, or confusing feedback about incorrectly formulated permission scopes for iOS. Developers also face problems introduced by third-party libraries. Official documentation plays a key part in understanding privacy requirements, but in some cases, may itself cause confusion.

    We discuss implications of our findings and propose ways to improve developers’ experience of working with health-related features—and consequently to improve the privacy of their apps’ end users.

    See publication
  • Charting App Developers’ Journey Through Privacy Regulation Features in Ad Networks

    Privacy Enhancing Technologies Symposium (PETS)

    Mobile apps enable ad networks to collect and track users. App developers are given “configurations” on these platforms to limit data collection and adhere to privacy regulations; however, the prevalence of apps that violate privacy regulations because of third parties, including ad networks, begs the question of how developers work through these configurations and how easy they are to utilize. We study privacy regulations-related interfaces on three widely used ad networks using two empirical…

    Mobile apps enable ad networks to collect and track users. App developers are given “configurations” on these platforms to limit data collection and adhere to privacy regulations; however, the prevalence of apps that violate privacy regulations because of third parties, including ad networks, begs the question of how developers work through these configurations and how easy they are to utilize. We study privacy regulations-related interfaces on three widely used ad networks using two empirical studies, a systematic review and think-aloud sessions with eleven developers, to shed light on how ad networks present privacy regulations and how usable the provided configurations are for developers.

    We find that information about privacy regulations is scattered in several pages, buried under multiple layers, and uses terms and language developers do not understand. While ad networks put the burden of complying with the regulations on developers, our participants, on the other hand, see ad networks responsible for ensuring compliance with regulations. To assist developers in building privacy regulations-compliant apps, we suggest dedicating a section to privacy, offering easily accessible configurations (both in graphical and code level), building testing systems for privacy regulations, and creating multimedia materials such as videos to promote privacy values in the ad networks' documentation.

    See publication
  • Understanding Privacy-Related Advice on Stack Overflow

    Privacy Enhancing Technologies Symposium (PETS)

    Privacy tasks can be challenging for developers, resulting in privacy frameworks and guidelines from the research community which are designed to assist developers in considering privacy features and applying privacy enhancing technologies in early stages of software development. However, how developers engage with privacy design strategies is not yet well understood. In this work, we look at the types of privacy-related advice developers give each other and how that advice maps to Hoepman’s…

    Privacy tasks can be challenging for developers, resulting in privacy frameworks and guidelines from the research community which are designed to assist developers in considering privacy features and applying privacy enhancing technologies in early stages of software development. However, how developers engage with privacy design strategies is not yet well understood. In this work, we look at the types of privacy-related advice developers give each other and how that advice maps to Hoepman’s privacy design strategies.

    We qualitatively analyzed 119 privacy-related accepted answers on Stack Overflow from the past five years and extracted 148 pieces of advice from these answers. We find that the advice is mostly around compliance with regulations and ensuring confidentiality with a focus on the inform, hide, control, and minimize of the Hoepman’s privacy design strategies. Other strategies, abstract, separate, enforce, and demonstrate, are rarely advised. Answers often include links to official documentation and online articles, highlighting the value of both official documentation and other informal materials such as blog posts. We make recommendations for promoting the under-stated strategies through tools, and detail the importance of providing better developer support to handle third-party data practices.

    See publication
  • Recruiting Participants With Programming Skills: A Comparison of Four Crowdsourcing Platforms and a CS Student Mailing List

    The ACM Conference on Human Factors in Computing Systems (CHI). 🏆 Best Paper Honorable Mention Award (top 5% of submissions)

    Reliably recruiting participants with programming skills is an ongoing challenge for empirical studies involving software development technologies, often leading to the use of crowdsourcing platforms and computer science (CS) students.

    In this work, we use five existing survey instruments to explore the programming skills, privacy and security attitudes, and secure development self-efficacy of participants from a CS student mailing list and four crowdsourcing platforms (Appen…

    Reliably recruiting participants with programming skills is an ongoing challenge for empirical studies involving software development technologies, often leading to the use of crowdsourcing platforms and computer science (CS) students.

    In this work, we use five existing survey instruments to explore the programming skills, privacy and security attitudes, and secure development self-efficacy of participants from a CS student mailing list and four crowdsourcing platforms (Appen, Clickworker, MTurk, and Prolific). We recruited 613 participants who claimed to have programming skills and assessed recruitment channels regarding costs, quality, programming skills, as well as privacy and security attitudes.

    See publication
  • Deciding on Personalized Ads: Nudging Developers About User Privacy

    The Seventeenth Symposium on Usable Privacy and Security (SOUPS)

    Mobile advertising networks present personalized advertisements to developers as a way to increase revenue, these types of ads use data about users to select potentially more relevant content, but the choice framing also impacts developers' decisions which in turn impacts their users' privacy. Currently, ad networks provide choices in developer-facing dashboards that control the types of information collected by the ad network as well as how users will be asked for consent. Framing and nudging…

    Mobile advertising networks present personalized advertisements to developers as a way to increase revenue, these types of ads use data about users to select potentially more relevant content, but the choice framing also impacts developers' decisions which in turn impacts their users' privacy. Currently, ad networks provide choices in developer-facing dashboards that control the types of information collected by the ad network as well as how users will be asked for consent. Framing and nudging have been shown to impact users' choices about privacy, we anticipate that they have a similar impact on choices made by developers. We conducted a survey-based online experiment with 400 participants with experience in mobile app development.

    Across six conditions, we varied the choice framing of options around ad personalisation. Participants in the condition where privacy consequences of ads personalisation are highlighted in the options are significantly (11.06 times) more likely to choose non-personalized ads compared to participants in the Control condition with no information about privacy. Participants' choices of an ad type are driven by impact on revenue, user privacy, and relevance to users. Our findings suggest that developers are impacted by interfaces and need transparent options.

    See publication
  • “Developers Are Responsible”: What Ad Networks Tell Developers About Privacy

    The ACM Conference on Human Factors in Computing Systems (CHI) Extended Abstracts

    Advertising networks enable developers to create revenue, but using them potentially impacts user privacy and requires developers to make legal decisions. To understand what privacy information ad networks give developers, we did a walkthrough of four popular ad network guidance pages with a senior Android developer by looking at the privacy-related information presented to developers.

    We found that information is focused on complying with legal regulations, and puts the responsibility…

    Advertising networks enable developers to create revenue, but using them potentially impacts user privacy and requires developers to make legal decisions. To understand what privacy information ad networks give developers, we did a walkthrough of four popular ad network guidance pages with a senior Android developer by looking at the privacy-related information presented to developers.

    We found that information is focused on complying with legal regulations, and puts the responsibility for such decisions on the developer. Also, sample code and settings often have privacy-unfriendly defaults laced with dark patterns to nudge developers' decisions towards privacy-unfriendly options such as sharing sensitive data to increase revenue. We conclude by discussing future research around empowering developers and minimising the negative impacts of dark patterns.

    See publication
  • Privacy Champions in Software Teams: Understanding Their Motivations, Strategies, and Challenges

    The ACM Conference on Human Factors in Computing Systems (CHI)

    Software development teams are responsible for making and implementing software design decisions that directly impact end-user privacy, a challenging task to do well. Privacy Champions—people who strongly care about advocating privacy—play a useful role in supporting privacy-respecting development cultures. To understand their motivations, challenges, and strategies for protecting end-user privacy, we conducted 12 interviews with Privacy Champions in software development teams.

    We find…

    Software development teams are responsible for making and implementing software design decisions that directly impact end-user privacy, a challenging task to do well. Privacy Champions—people who strongly care about advocating privacy—play a useful role in supporting privacy-respecting development cultures. To understand their motivations, challenges, and strategies for protecting end-user privacy, we conducted 12 interviews with Privacy Champions in software development teams.

    We find that common barriers to implementing privacy in software design include: negative privacy culture, internal prioritisation tensions, limited tool support, unclear evaluation metrics, and technical complexity. To promote privacy, Privacy Champions regularly use informal discussions, management support, communication among stakeholders, and documentation and guidelines. They perceive code reviews and practical training as more instructive than general privacy awareness and on-boarding training. Our study is a first step towards understanding how Privacy Champions work to improve their organisation’s privacy approaches and improve the privacy of end- user products.

    See publication
  • Security Notifications in Static Analysis Tools: Developersʼ Attitudes, Comprehension, and Ability to Act on Them

    Static analysis tools (SATs) have the potential to assist developers in finding and fixing vulnerabilities in the early stages of software development requiring them to be able to understand and act on tools’ notifications. To understand how helpful such SAT guidance is to developers, we ran an online experiment (N=132) where participants were shown four vulnerable code samples (SQL injection, hard-coded credentials, encryption, and logging sensitive data) along with SAT guidance, and asked to…

    Static analysis tools (SATs) have the potential to assist developers in finding and fixing vulnerabilities in the early stages of software development requiring them to be able to understand and act on tools’ notifications. To understand how helpful such SAT guidance is to developers, we ran an online experiment (N=132) where participants were shown four vulnerable code samples (SQL injection, hard-coded credentials, encryption, and logging sensitive data) along with SAT guidance, and asked to indicate the appropriate fix.

    Participants had a positive attitude towards both SAT notifications and particularly liked the example solutions and vulnerable code. Seeing SAT notifications also led to more detailed open-ended answers and slightly improved code correction answers. Still, most SAT (SpotBugs 67%, SonarQube 86%) and Control (96%) participants answered at least one code-correction question incorrectly. Prior software development experience, perceived vulnerability severity, and answer confidence all positively impacted answer accuracy.

    See publication
  • Understanding Privacy-Related Questions on Stack Overflow

    The ACM Conference on Human Factors in Computing Systems (CHI)

    We analyse Stack Overflow (SO) to understand challenges and confusions developers face while dealing with privacy-related topics. We apply topic modelling techniques to 1,733 privacy-related questions to identify topics and then qualitatively analyse a random sample of 315 privacy-related questions. Identified topics include privacy policies, privacy concerns, access control, and version changes. Results show that developers do ask SO for support on privacy-related issues. We also find that…

    We analyse Stack Overflow (SO) to understand challenges and confusions developers face while dealing with privacy-related topics. We apply topic modelling techniques to 1,733 privacy-related questions to identify topics and then qualitatively analyse a random sample of 315 privacy-related questions. Identified topics include privacy policies, privacy concerns, access control, and version changes. Results show that developers do ask SO for support on privacy-related issues. We also find that platforms such as Apple and Google are defining privacy requirements for developers by specifying what "sensitive" information is and what types of information developers need to communicate to users (e.g. privacy policies). We also examine the accepted answers in our sample and find that 28% of them link to official documentation and more than half are answered by SO users without references to any external resources.

    See publication
  • “I Donʼt Know Too Much About It”: On the Security Mindsets of Computer Science Students

    Socio-Technical Aspects in Security and Trust (STAST)

    The security attitudes and approaches of software developers have a large impact on the software they produce, yet we know very little about how and when these views are constructed. This paper investigates the security and privacy (S&P) perceptions, experiences, and practices of current Computer Science students at the graduate and undergraduate level using semi-structured interviews.

    We find that the attitudes of students already match many of those that have been observed in…

    The security attitudes and approaches of software developers have a large impact on the software they produce, yet we know very little about how and when these views are constructed. This paper investigates the security and privacy (S&P) perceptions, experiences, and practices of current Computer Science students at the graduate and undergraduate level using semi-structured interviews.

    We find that the attitudes of students already match many of those that have been observed in professional level developers. Students have a range of hacker and attack mindsets, lack of experience with security APIs, a mixed view of who is in charge of S&P in the software life cycle, and a tendency to trust other peoples' code as a convenient approach to rapidly build software. We discuss the impact of our results on both curriculum development and support for professional developers.

    See publication
  • A Survey on Developer-Centred Security

    The IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)

    Software developers are key players in the security ecosystem as they produce code that runs on millions of devices. Yet we continue to see insecure code being developed and deployed on a regular basis despite the existence of support infrastructures, tools, and research into common errors. This work provides a systematised overview of the relatively new field of Developer-Centred Security which aims to understand the context in which developers produce security-relevant code as well as provide…

    Software developers are key players in the security ecosystem as they produce code that runs on millions of devices. Yet we continue to see insecure code being developed and deployed on a regular basis despite the existence of support infrastructures, tools, and research into common errors. This work provides a systematised overview of the relatively new field of Developer-Centred Security which aims to understand the context in which developers produce security-relevant code as well as provide tools and processes that that better support both developers and secure code production. We report here on a systematic literature review of 49 publications on security studies with software developer participants. We provide an overview of both the types of methodologies currently being used as well as the current research in the area. Finally, we also provide recommendations for future work in Developer-Centred Security.

    See publication

Projects

  • ResponsibleX

    -

    Enabled consideration of AI ethical values through integration of a new toolkit into AI developer workflows.

    Other creators
  • Privacy by Design in Software Development

    -

    Constructed research-driven evidence to empower developers in effectively navigating privacy features through responsible design.

    Lead researcher
    Mixed methods: Interviews, API documentation analysis, survey, experimental design

    Other creators
  • Developer-Centered Privacy and Security

    -

    I empirically researched several privacy and security interfaces directed at software developers which resulted in several research publications and talks in top-tier conferences.

    Other creators
    See project
  • Melkade

    -

    Melkade is a cross platform real estate application which covers all 22 districts of Tehran. The database is updated on a daily basis with estates for sale, rent and forward sale. Melkade is available on three platforms: web, Android and iOS.

    Other creators
    See project
  • Hyperoffice

    -

    Founded in 1998, HyperOffice is a recognized leader in the white-hot online communication and collaboration solutions industry for small to mid sized businesses. Our mission is to empower growing organizations with technology traditionally available only to large enterprises, and help them achieve business growth, competitive advantage and success. Having spent more than ten years offering online collaboration solutions, HyperOffice was one of the first companies to offer software-as-a-service…

    Founded in 1998, HyperOffice is a recognized leader in the white-hot online communication and collaboration solutions industry for small to mid sized businesses. Our mission is to empower growing organizations with technology traditionally available only to large enterprises, and help them achieve business growth, competitive advantage and success. Having spent more than ten years offering online collaboration solutions, HyperOffice was one of the first companies to offer software-as-a-service - the buzzword in information technology today, and widely hailed as the future of corporate software. Since its inception, more than 300,000 users worldwide have harnessed the power of HyperOffice.

    Other creators
    See project
  • Hepatitis B risk predication

    -

    A web application to help people anonymously test their risk of hepatitis B, based on master thesis work. Reducing feature vector from 130 feature to only 16 feature using symbiotic genetic algorithms & Naive Bayes, finally extracting rules from the feature set. Many methods used to make a reasonable model, at first the best result was 75% (AUC) but with data cleansing, feature selection and rule extraction the result improved to 92% (AUC).

    See project
  • Kori

    -

    Kori is a free messaging service specially designed for 2014 FIFA World Cup Brazil that allows you to connect, get social, and have fun with your friends. Kori is available in mobile platforms (Android & iOS)

    Other creators
    See project
  • Classmate

    -

    Class management system, in order to have a computer-assisted learning environment. Master can control and communicate with his students using advantages of multimedia systems.

    Other creators
    See project

Honors & Awards

  • Research Grant (£1.2m)

    UK Research and Innovation

    Part of a research grant issued by UKRI

  • Best Paper Honorable Mention

    Association for Computing Machinery; The ACM CHI Conference on Human Factors in Computing Systems

  • Ph.D. Scholarship (£114,000)

    Microsoft Research and University of Edinburgh

  • TU Berlin Summer University

    TU Berlin

    The President’s Scholarship for TU Berlin Summer University, CanSat: Hands-on Satellite Design.

  • Trivago Yearly Hackathon

    Trivago

    Winner of Trivago yearly Hackathons, "How to make the world a better place to travel?"​
    Travelling to foreign countries, where you don't know exactly the destination is always a problem. Finding your way from airport or train station to your hotel or finding good places to visit is frustrating. So why not using a social platform finding local welcomers/guides, whom can welcome you at the entry point and show you around. "Welcome Me" will connect students, locals or anyone who is interested…

    Winner of Trivago yearly Hackathons, "How to make the world a better place to travel?"​
    Travelling to foreign countries, where you don't know exactly the destination is always a problem. Finding your way from airport or train station to your hotel or finding good places to visit is frustrating. So why not using a social platform finding local welcomers/guides, whom can welcome you at the entry point and show you around. "Welcome Me" will connect students, locals or anyone who is interested in touring with travellers.
    @Düsseldorf

  • innovate.healthcare Hackathon

    http://innovate.healthcare/

    How to make life better for Parkinson patients? Using iPhone, we can develop an application to help these people live better.

  • Graduate Studies Scholarship (among top 0.2% applicants, nationwide)

    Iran ministry of science research and technology

    Ranked 50th among 40,000 participants in the Nationwide Computer Engineering Entrance Exam for Graduate Studies
    Two year scholarship

Test Scores

  • TOEFL iBT

    Score: 108

Languages

  • English

    Full professional proficiency

  • Persian

    Native or bilingual proficiency

Recommendations received

8 people have recommended Mohammad

Join now to view

View Mohammad’s full profile

  • See who you know in common
  • Get introduced
  • Contact Mohammad directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses