Jason I. Hong

According to our database1, Jason I. Hong authored at least 137 papers between 1997 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
MessageOnTap: A Suggestive Interface to Facilitate Messaging-related Tasks.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Coconut: An IDE Plugin for Developing Privacy-Friendly Apps.
IMWUT, 2018

Why Are They Collecting My Data?: Inferring the Purposes of Network Traffic in Mobile Apps.
IMWUT, 2018

Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

WiSh: Towards a Wireless Shape-aware World using Passive RFIDs.
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018

RF-Wear: Towards Wearable Everyday Skeleton Tracking Using Passive RFIDs.
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018

Panel: Voice Assistants, UX Design and Research.
Proceedings of the Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Breaking! A Typology of Security and Privacy News and How It's Shared.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Automated Extraction of Personal Knowledge from Smartphone Push Notifications.
Proceedings of the IEEE International Conference on Big Data, 2018

"Hey Alexa, What's Up?": A Mixed-Methods Studies of In-Home Conversational Agent Usage.
Proceedings of the 2018 on Designing Interactive Systems Conference 2018, 2018

2017
Understanding the Purpose of Permission Use in Mobile Apps.
ACM Trans. Inf. Syst., 2017

PrivacyStreams: Enabling Transparency in Personal Data Processing for Mobile Apps.
IMWUT, 2017

Towards Wearable Everyday Body-Frame Tracking using Passive RFIDs.
IMWUT, 2017

Does this App Really Need My Location?: Context-Aware Privacy Management for Smartphones.
IMWUT, 2017

Evolving the Ecosystem of Personal Behavioral Data.
Human-Computer Interaction, 2017

An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective.
Proceedings of the 26th International Conference on World Wide Web, 2017

State of the Geotags: Motivations and Recent Changes.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

Thumprint: Socially-Inclusive Local Group Authentication Through Shared Secret Knocks.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Identifying and Analyzing the Privacy of Apps for Kids.
Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, 2016

Examining Visual-Spatial Paths for Mobile Authentication.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

Epistenet: facilitating programmatic access & processing of semantically related mobile personal data.
Proceedings of the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2016

Our House, in the Middle of Our Tweets.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

Generating Neighborhood Guides from Social Media.
Proceedings of the CitiLab, Papers from the 2016 ICWSM Workshop, 2016

2015
Styx: Privacy risk communication for the Android smartphone platform based on apps' data-access behavior patterns.
Computers & Security, 2015

Using text mining to infer the purpose of permission use in mobile apps.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015

Knock x knock: the design and evaluation of a unified authentication management system.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015

"You Never Call, You Never Write": Call and SMS Logs Do Not Always Indicate Tie Strength.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

The Role of Social Influence in Security Feature Adoption.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

2014
Check-ins in "Blau Space": Applying Blau's Macrosociological Theory to Foursquare Check-ins from New York City.
ACM TIST, 2014

QuiltView: a crowd-sourced video response system.
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, 2014

Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

The Effect of Social Influence on Security Sensitivity.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Styx: Design and Evaluation of a New Privacy Risk Communication Method for Smartphones.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Challenges and opportunities in data mining contact lists for inferring relationships.
Proceedings of the 2014 ACM Conference on Ubiquitous Computing, UbiComp '14, Seattle, WA, 2014

Toss 'n' turn: smartphone as sleep and sleep quality detector.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Wave to me: user identification using body lengths and natural gestures.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Detection of Behavior Change in People with Depression.
Proceedings of the Modern Artificial Intelligence for Health Analytics, 2014

2013
A comparative study of location-sharing privacy preferences in the United States and China.
Personal and Ubiquitous Computing, 2013

CASA: context-aware scalable authentication.
Proceedings of the Symposium On Usable Privacy and Security, 2013

Investigating collaborative mobile search behaviors.
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013

Why people hate your app: making sense of user feedback in a mobile app store.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

Exploring capturable everyday memory for autobiographical authentication.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication.
Proceedings of the Financial Cryptography and Data Security, 2013

Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference.
Proceedings of the Financial Cryptography and Data Security, 2013

Mining smartphone data to classify life-facets of social relationships.
Proceedings of the Computer Supported Cooperative Work, 2013

2012
A Supervised Approach to Predict Company Acquisition with Factual and Topic Features Using Profiles and News Articles on TechCrunch.
Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012

The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a City.
Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012

Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

Detecting offensive tweets via topical feature discovery over a large scale twitter corpus.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

The implications of offering more disclosure choices for social location sharing.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

WebTicket: account management using printable tokens.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

OTO: online trust oracle for user-centric trust establishment.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites.
ACM Trans. Inf. Syst. Secur., 2011

Undistracted driving: a mobile phone that doesn't distract.
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

Smartening the crowds: computational techniques for improving human verification to fight phishing scams.
Proceedings of the Symposium On Usable Privacy and Security, 2011

Caché: caching location-enhanced content to improve user privacy.
Proceedings of the 9th International Conference on Mobile Systems, 2011

Apolo: interactive large graph sensemaking by combining machine learning and visualization.
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2011

Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share.
Proceedings of the UbiComp 2011: Ubiquitous Computing, 13th International Conference, 2011

Understanding how visual representations of location feeds affect end-user privacy concerns.
Proceedings of the UbiComp 2011: Ubiquitous Computing, 13th International Conference, 2011

I'm the mayor of my house: examining why people use foursquare - a social-driven location sharing application.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

A diary study of password usage in daily life.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Apolo: making sense of large network data by combining rich user interaction and machine learning.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
Teaching Johnny not to fall for phish.
ACM Trans. Internet Techn., 2010

Caché: caching location-enhanced content to improve user privacy.
Mobile Computing and Communications Review, 2010

Empirical models of privacy in location sharing.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Locaccino: a privacy-centric location sharing application.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Modeling people's place naming preferences in location sharing.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Bridging the gap between physical location and online social networks.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection.
Proceedings of the Computer Security, 2010

Generating default privacy policies for online social networks.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
Understanding and capturing people's privacy policies in a mobile social networking application.
Personal and Ubiquitous Computing, 2009

A hybrid phish detection approach by identity discovery and keywords retrieval.
Proceedings of the 18th International Conference on World Wide Web, 2009

Who's viewed you?: the impact of feedback in a mobile location-sharing application.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Analyzing use of privacy policy attributes in a location sharing application.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

School of phish: a real-word evaluation of anti-phishing training.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Educated guess on graphical authentication schemes: vulnerabilities and countermeasures.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

A framework of energy efficient mobile sensing for automatic user state recognition.
Proceedings of the 7th International Conference on Mobile Systems, 2009

mFerio: the design and evaluation of a peer-to-peer mobile payment system.
Proceedings of the 7th International Conference on Mobile Systems, 2009

Improving phishing countermeasures: An analysis of expert interviews.
Proceedings of the 2009 eCrime Researchers Summit, 2009

Contextual web history: using visual and contextual cues to improve web browser history.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

Who's viewed you?: the impact of feedback in a mobile location-sharing application.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

SHIFTR: a user-directed, link-based system for ad hoc sensemaking of large heterogeneous data collections.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

2008
GRAPHITE: A Visual Query System for Large Graphs.
Proceedings of the Workshops Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008

Lessons from a real world evaluation of anti-phishing training.
Proceedings of the 2008 eCrime Researchers Summit, 2008

You've been warned: an empirical study of the effectiveness of web browser phishing warnings.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

2007
Design Challenges and Principles for Wizard of Oz Testing of Location-Enhanced Applications.
IEEE Pervasive Computing, 2007

Guest Editors' Introduction: Security & Privacy.
IEEE Pervasive Computing, 2007

End-User Privacy in Human-Computer Interaction.
Foundations and Trends in Human-Computer Interaction, 2007

Cantina: a content-based approach to detecting phishing web sites.
Proceedings of the 16th International Conference on World Wide Web, 2007

User-Controllable Security and Privacy for Pervasive Computing.
Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications, 2007

Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

SATIN: a toolkit for informal ink-based applications.
Proceedings of the 34. International Conference on Computer Graphics and Interactive Techniques, 2007

Phinding Phish: An Evaluation of Anti-Phishing Toolbars.
Proceedings of the Network and Distributed System Security Symposium, 2007

Memory karaoke: using a location-aware mobile reminiscence tool to support aging in place.
Proceedings of the 9th Conference on Human-Computer Interaction with Mobile Devices and Services, 2007

Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Contextual IM.
Proceedings of the UbiComp 2007: Ubiquitous Computing, 9th International Conference, 2007

Getting users to pay attention to anti-phishing education: evaluation of retention and transfer.
Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, 2007

Making mashups with marmite: towards end-user programming for the web.
Proceedings of the 2007 Conference on Human Factors in Computing Systems, 2007

Design and evaluation of 3d models for electronic dental records.
Proceedings of the Extended Abstracts Proceedings of the 2007 Conference on Human Factors in Computing Systems, 2007

Protecting people from phishing: the design and evaluation of an embedded training email system.
Proceedings of the 2007 Conference on Human Factors in Computing Systems, 2007

The Design of Sites - Patterns for Creating Winning Web Sites (2. ed.).
Prentice Hall, ISBN: 978-0-13-134555-3, 2007

2006
Bustle: Using Hitchhiking to Monitor Meaningful Locations.
Proceedings of the Seventh IEEE Workshop on Mobile Computing Systems & Applications, 2006

SATIN: a toolkit for informal ink-based applications.
Proceedings of the 33. International Conference on Computer Graphics and Interactive Techniques, 2006

Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications.
Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006

Whisper: analysis and design for a community event service.
Proceedings of the Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006

Marmite: end-user programming for the web.
Proceedings of the Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006

2005
Minimizing Security Risks in Ubicomp Systems.
IEEE Computer, 2005

2004
Personal privacy through understanding and action: five pitfalls for designers.
Personal and Ubiquitous Computing, 2004

Topiary: a tool for prototyping location-enhanced applications.
Proceedings of the 17th Annual ACM Symposium on User Interface Software and Technology, 2004

Siren: Context-aware Computing for Firefighting.
Proceedings of the Pervasive Computing, 2004

An Architecture for Privacy-Sensitive Ubiquitous Computing.
Proceedings of the Second International Conference on Mobile Systems, 2004

Ubiquitous computing for firefighters: field studies and prototypes of large displays for incident command.
Proceedings of the 2004 Conference on Human Factors in Computing Systems, 2004

Privacy risk models for designing privacy-sensitive ubiquitous computing systems.
Proceedings of the Conference on Designing Interactive Systems: Processes, 2004

Development and evaluation of emerging design patterns for ubiquitous computing.
Proceedings of the Conference on Designing Interactive Systems: Processes, 2004

2003
DENIM: An Informal Web Site Design Tool Inspired by Observations of Practice.
Human-Computer Interaction, 2003

Wireless Location Privacy Protection.
IEEE Computer, 2003

Challenge: ubiquitous location-aware computing and the "place lab" initiative.
Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2003

liquid: Context-Aware Distributed Queries.
Proceedings of the UbiComp 2003: Ubiquitous Computing, 2003

You're getting warmer!: how proximity information affects search behavior in physical spaces.
Proceedings of the Extended abstracts of the 2003 Conference on Human Factors in Computing Systems, 2003

2002
Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing.
Proceedings of the UbiComp 2002: Ubiquitous Computing, 4th International Conference, Göteborg, Sweden, September 29, 2002

The context fabric: an infrastructure for context-aware computing.
Proceedings of the Extended abstracts of the 2002 Conference on Human Factors in Computing Systems, 2002

What did they do? understanding clickstreams with the WebQuilt visualization system.
Proceedings of the Working Conference on Advanced Visual Interfaces, 2002

Designing for serendipity: supporting end-user configuration of ubiquitous computing environments.
Proceedings of the 4th Conference on Designing Interactive Systems: Processes, 2002

2001
WebQuilt: A proxy-based approach to remote web usability testing.
ACM Trans. Inf. Syst., 2001

A Context/Communication Information Agent.
Personal and Ubiquitous Computing, 2001

An Infrastructure Approach to Context-Aware Computing.
Human-Computer Interaction, 2001

WebQuilt: a framework for capturing and visualizing the web experience.
Proceedings of the Tenth International World Wide Web Conference, 2001

DENIM: an informal tool for early stage web site design.
Proceedings of the CHI '01 Extended Abstracts on Human Factors in Computing Systems, 2001

End-user perceptions of formal and informal representations of web sites.
Proceedings of the CHI '01 Extended Abstracts on Human Factors in Computing Systems, 2001

2000
SATIN: a toolkit for informal ink-based applications.
Proceedings of the 13th Annual ACM Symposium on User Interface Software and Technology, 2000

SWAMI: a framework for collaborative filtering algorithm development and evaluation.
Proceedings of the SIGIR 2000: Proceedings of the 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2000

DENIM: finding a tighter fit between tools and practice for Web site design.
Proceedings of the CHI 2000 Conference on Human factors in computing systems, 2000

1999
Cha-Cha: A System for Organizing Intranet Search Results.
Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems, 1999

Printertainment: printing with interactive cover sheets.
Proceedings of the CHI '99 Extended Abstracts on Human Factors in Computing Systems, 1999

1997
Cyberguide: A mobile context-aware tour guide.
Wireless Networks, 1997


  Loading...