Jason I. Hong

Orcid: 0000-0002-9856-9654

Affiliations:
  • Carnegie Mellon University, Pittsburgh, USA


According to our database1, Jason I. Hong authored at least 225 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Matcha: An IDE Plugin for Creating Accurate Privacy Nutrition Labels.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., March, 2024

2023
Teaching the FATE Community about Privacy.
Commun. ACM, August, 2023

Improving Human-AI Collaboration With Descriptions of AI Behavior.
Proc. ACM Hum. Comput. Interact., April, 2023

Participation and Division of Labor in User-Driven Algorithm Audits: How Do Everyday Users Work together to Surface Algorithmic Harms?
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Understanding Frontline Workers' and Unhoused Individuals' Perspectives on AI Used in Homeless Services.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Zeno: An Interactive Framework for Behavioral Evaluation of Machine Learning.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Alert Now or Never: Understanding and Predicting Notification Preferences of Smartphone Users.
ACM Trans. Comput. Hum. Interact., 2022

Charting App Developers' Journey Through Privacy Regulation Features in Ad Networks.
Proc. Priv. Enhancing Technol., 2022

'It's Problematic but I'm not Concerned': University Perspectives on Account Sharing.
Proc. ACM Hum. Comput. Interact., 2022

"Give Everybody [..] a Little Bit More Equity": Content Creator Perspectives and Responses to the Algorithmic Demonetization of Content Associated with Disadvantaged Groups.
Proc. ACM Hum. Comput. Interact., 2022

The Security & Privacy Acceptance Framework (SPAF).
Found. Trends Priv. Secur., 2022

Experimental Evidence for Using a TTM Stages of Change Model in Boosting Progress Toward 2FA Adoption.
CoRR, 2022

"Public(s)-in-the-Loop": Facilitating Deliberation of Algorithmic Decisions in Contentious Public Policy Domains.
CoRR, 2022

Peekaboo: A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes (Extended Technical Report).
CoRR, 2022

Do They Accept or Resist Cybersecurity Measures? Development and Validation of the 13-Item Security Attitude Inventory (SA-13).
CoRR, 2022

Peekaboo: A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Understanding Challenges for Developers to Create Accurate Privacy Nutrition Labels.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

Understanding iOS Privacy Nutrition Labels: An Exploratory Large-Scale Analysis of App Store Data.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

To Self-Persuade or be Persuaded: Examining Interventions for Users' Privacy Setting Selection.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

Exploring the Needs of Users for Supporting Privacy-Protective Behaviors in Smart Homes.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
Lean Privacy Review: Collecting Users' Privacy Concerns of Data Practices at a Low Cost.
ACM Trans. Comput. Hum. Interact., 2021

What makes people install a COVID-19 contact-tracing app? Understanding the influence of app design and individual difference on contact-tracing app adoption intention.
Pervasive Mob. Comput., 2021

"It's our mutual responsibility to share": The Evolution of Account Sharing in Romantic Couples.
Proc. ACM Hum. Comput. Interact., 2021

Discovering and Validating AI Errors With Crowdsourced Failure Reports.
Proc. ACM Hum. Comput. Interact., 2021

Honeysuckle: Annotation-Guided Code Generation of In-App Privacy Notices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Analysis of Longitudinal Changes in Privacy Behavior of Android Applications.
CoRR, 2021

Travel Guides for Creative Tourists, Powered by Geotagged Social Media.
CoRR, 2021

Sensor as a Company: On Self-Sustaining IoT Commons.
CoRR, 2021

Identifying Terms and Conditions Important to Consumers using Crowdsourcing.
CoRR, 2021

The Design of the User Interfaces for Privacy Enhancements for Android.
CoRR, 2021

Speech Recognition Using RFID Tattoos (Extended Abstract).
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Predicting Well-being Using Short Ecological Momentary Audio Recordings.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2020
Designing Alternative Representations of Confusion Matrices to Support Non-Expert Public Understanding of Algorithm Performance.
Proc. ACM Hum. Comput. Interact., 2020

'I Can't Even Buy Apples If I Don't Use Mobile Pay?': When Mobile Payments Become Infrastructural in China.
Proc. ACM Hum. Comput. Interact., 2020

How Developers Talk About Personal Data and What It Means for User Privacy: A Case Study of a Developer Forum on Reddit.
Proc. ACM Hum. Comput. Interact., 2020

Decentralized is not risk-free: Understanding public perceptions of privacy-utility trade-offs in COVID-19 contact-tracing apps.
CoRR, 2020

Providing architectural support for building privacy-sensitive smart home applications.
Proceedings of the UbiComp/ISWC '20: 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and 2020 ACM International Symposium on Wearable Computers, 2020

"Did You Just Purchase a Butt Head on Amazon".
Proceedings of the Companion Publication of the 2020 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2020

I'm All Eyes and Ears: Exploring Effective Locators for Privacy Awareness in IoT Scenarios.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
Software-Defined Cooking Using a Microwave Oven.
GetMobile Mob. Comput. Commun., 2019

Normal and Easy: Account Sharing Practices in the Workplace.
Proc. ACM Hum. Comput. Interact., 2019

RFID Tattoo: A Wireless Platform for Speech Recognition.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

Enhancing Email Functionality using Late Bound Content.
CoRR, 2019

The Memory Palace: Exploring Visual-Spatial Paths for Strong, Memorable, Infrequent Authentication.
Proceedings of the 32nd Annual ACM Symposium on User Interface Software and Technology, 2019

A Self-Report Measure of End-User Security Attitudes (SA-6).
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

A Typology of Perceived Triggers for End-User Security and Privacy Behaviors.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

Software-Defined Cooking (SDC) using a Microwave Oven.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

Personal bits: mining interaction traces for personalized task intelligence.
Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019

MessageOnTap: A Suggestive Interface to Facilitate Messaging-related Tasks.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Using Online Geotagged and Crowdsourced Data to Understand Human Offline Behavior in the City: An Economic Perspective.
ACM Trans. Intell. Syst. Technol., 2018

Accessibility.
IEEE Pervasive Comput., 2018

Coconut: An IDE Plugin for Developing Privacy-Friendly Apps.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Why Are They Collecting My Data?: Inferring the Purposes of Network Traffic in Mobile Apps.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Helping developers with privacy (Invited Keynote).
Proceedings of the 2018 IEEE Symposium on Visual Languages and Human-Centric Computing, 2018

Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

WiSh: Towards a Wireless Shape-aware World using Passive RFIDs.
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018

RF-Wear: Towards Wearable Everyday Skeleton Tracking Using Passive RFIDs.
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018

Panel: Voice Assistants, UX Design and Research.
Proceedings of the Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Breaking! A Typology of Security and Privacy News and How It's Shared.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Automated Extraction of Personal Knowledge from Smartphone Push Notifications.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

"Hey Alexa, What's Up?": A Mixed-Methods Studies of In-Home Conversational Agent Usage.
Proceedings of the 2018 on Designing Interactive Systems Conference 2018, 2018

2017
Understanding the Purpose of Permission Use in Mobile Apps.
ACM Trans. Inf. Syst., 2017

The Privacy Landscape of Pervasive Computing.
IEEE Pervasive Comput., 2017

PrivacyStreams: Enabling Transparency in Personal Data Processing for Mobile Apps.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

Towards Wearable Everyday Body-Frame Tracking using Passive RFIDs.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

Does this App Really Need My Location?: Context-Aware Privacy Management for Smartphones.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

Evolving the Ecosystem of Personal Behavioral Data.
Hum. Comput. Interact., 2017

PrivacyProxy: Leveraging Crowdsourcing and In Situ Traffic Analysis to Detect and Mitigate Information Leakage.
CoRR, 2017

An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective.
Proceedings of the 26th International Conference on World Wide Web, 2017

State of the Geotags: Motivations and Recent Changes.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

Thumprint: Socially-Inclusive Local Group Authentication Through Shared Secret Knocks.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Pervasive Computing Moves In.
IEEE Pervasive Comput., 2016

Inside the great wall.
Commun. ACM, 2016

Understanding User Economic Behavior in the City Using Large-scale Geotagged and Crowdsourced Data.
Proceedings of the 25th International Conference on World Wide Web, 2016

Identifying and Analyzing the Privacy of Apps for Kids.
Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, 2016

Examining Visual-Spatial Paths for Mobile Authentication.
Proceedings of the Who Are You?! Adventures in Authentication, 2016

Recommender Systems with Personality.
Proceedings of the 10th ACM Conference on Recommender Systems, 2016

Epistenet: facilitating programmatic access & processing of semantically related mobile personal data.
Proceedings of the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2016

Dissecting developer policy violating apps: characterization and detection.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

Our House, in the Middle of Our Tweets.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

Generating Neighborhood Guides from Social Media.
Proceedings of the CitiLab, Papers from the 2016 ICWSM Workshop, 2016

Privacy, Ethics and Big Data.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

2015
User Expectations for Media Sharing Practices in Open Display Networks.
Sensors, 2015

Privacy and Security [Guest editors' introduction].
IEEE Pervasive Comput., 2015

Styx: Privacy risk communication for the Android smartphone platform based on apps' data-access behavior patterns.
Comput. Secur., 2015

MindMiner: Quantifying Entity Similarity via Interactive Distance Metric Learning.
Proceedings of the 20th International Conference on Intelligent User Interfaces Companion, 2015

MindMiner: A Mixed-Initiative Interface for Interactive Distance Metric Learning.
Proceedings of the Human-Computer Interaction - INTERACT 2015, 2015

Using text mining to infer the purpose of permission use in mobile apps.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015

Knock x knock: the design and evaluation of a unified authentication management system.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015

"You Never Call, You Never Write": Call and SMS Logs Do Not Always Indicate Tie Strength.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

The Role of Social Influence in Security Feature Adoption.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

2014
Check-ins in "Blau Space": Applying Blau's Macrosociological Theory to Foursquare Check-ins from New York City.
ACM Trans. Intell. Syst. Technol., 2014

Smartphones, Teddy Bears, and Toys.
IEEE Pervasive Comput., 2014

Wearable Computing.
IEEE Pervasive Comput., 2014

3D Printing, Smart Cities, Robots, and More.
IEEE Pervasive Comput., 2014

Wearable Computing from Jewels to Joules [Guest editors' introduction].
IEEE Pervasive Comput., 2014

QuiltView: a crowd-sourced video response system.
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, 2014

Media Sharing across Public Display Networks.
Proceedings of the Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services, 2014

Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

The Effect of Social Influence on Security Sensitivity.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Styx: Design and Evaluation of a New Privacy Risk Communication Method for Smartphones.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Detecting Camouflaged Applications on Mobile Application Markets.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

Challenges and opportunities in data mining contact lists for inferring relationships.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

Toss 'n' turn: smartphone as sleep and sleep quality detector.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Wave to me: user identification using body lengths and natural gestures.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Detection of Behavior Change in People with Depression.
Proceedings of the Modern Artificial Intelligence for Health Analytics, 2014

2013
A comparative study of location-sharing privacy preferences in the United States and China.
Pers. Ubiquitous Comput., 2013

From GPS Shoes to Instrumented Cities: Food for Thought.
IEEE Pervasive Comput., 2013

New Kinds of Gadgets, Interactions, and Ubicomp Visions.
IEEE Pervasive Comput., 2013

Interaction Platforms, Energy Conservation, Behavior Change Research, and More.
IEEE Pervasive Comput., 2013

What's New in the Ubicomp Community?
IEEE Pervasive Comput., 2013

Computer security needs refocus, and be nice about it.
Commun. ACM, 2013

Passwords getting painful, computing still blissful.
Commun. ACM, 2013

Considering privacy issues in the context of Google glass.
Commun. ACM, 2013

Ph.D. students must break away from undergraduate mentality.
Commun. ACM, 2013

CASA: context-aware scalable authentication.
Proceedings of the Symposium On Usable Privacy and Security, 2013

Investigating collaborative mobile search behaviors.
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013

Why people hate your app: making sense of user feedback in a mobile app store.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

Exploring capturable everyday memory for autobiographical authentication.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication.
Proceedings of the Financial Cryptography and Data Security, 2013

Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference.
Proceedings of the Financial Cryptography and Data Security, 2013

Mining smartphone data to classify life-facets of social relationships.
Proceedings of the Computer Supported Cooperative Work, 2013

2012
Researchers' big data crisis; understanding design and functionality.
Commun. ACM, 2012

Protecting against data breaches; living with mistakes.
Commun. ACM, 2012

The state of phishing attacks.
Commun. ACM, 2012

A Supervised Approach to Predict Company Acquisition with Factual and Topic Features Using Profiles and News Articles on TechCrunch.
Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012

The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a City.
Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012

The preface of the 4<sup>th</sup> International Workshop on Location-Based Social Networks.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

Detecting offensive tweets via topical feature discovery over a large scale twitter corpus.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

The implications of offering more disclosure choices for social location sharing.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

Sketch it, make it: sketching precise drawings for laser cutting.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

WebTicket: account management using printable tokens.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

OTO: online trust oracle for user-centric trust establishment.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites.
ACM Trans. Inf. Syst. Secur., 2011

Matters of design, part II.
Commun. ACM, 2011

Matters of design.
Commun. ACM, 2011

Undistracted driving: a mobile phone that doesn't distract.
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

Smartening the crowds: computational techniques for improving human verification to fight phishing scams.
Proceedings of the Symposium On Usable Privacy and Security, 2011

Caché: caching location-enhanced content to improve user privacy.
Proceedings of the 9th International Conference on Mobile Systems, 2011

Apolo: interactive large graph sensemaking by combining machine learning and visualization.
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2011

Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share.
Proceedings of the UbiComp 2011: Ubiquitous Computing, 13th International Conference, 2011

Understanding how visual representations of location feeds affect end-user privacy concerns.
Proceedings of the UbiComp 2011: Ubiquitous Computing, 13th International Conference, 2011

I'm the mayor of my house: examining why people use foursquare - a social-driven location sharing application.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

A diary study of password usage in daily life.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Apolo: making sense of large network data by combining rich user interaction and machine learning.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
Teaching Johnny not to fall for phish.
ACM Trans. Internet Techn., 2010

Caché: caching location-enhanced content to improve user privacy.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010

Guest Editors' Introduction: Connected Youth.
IEEE Pervasive Comput., 2010

Software engineering, smartphones and health systems, and security warnings.
Commun. ACM, 2010

Security advice; malvertisements; and CS education in Qatar.
Commun. ACM, 2010

GurunGo: coupling personal computers and mobile devices through mobile data types.
Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications, 2010

Empirical models of privacy in location sharing.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Locaccino: a privacy-centric location sharing application.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Modeling people's place naming preferences in location sharing.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Bridging the gap between physical location and online social networks.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection.
Proceedings of the Computer Security, 2010

Generating default privacy policies for online social networks.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
Understanding and capturing people's privacy policies in a mobile social networking application.
Pers. Ubiquitous Comput., 2009

Computational Support for Sketching in Design: A Review.
Found. Trends Hum. Comput. Interact., 2009

Saying good-bye to DBMSs, designing effective interfaces.
Commun. ACM, 2009

A hybrid phish detection approach by identity discovery and keywords retrieval.
Proceedings of the 18th International Conference on World Wide Web, 2009

Analyzing use of privacy policy attributes in a location sharing application.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

School of phish: a real-word evaluation of anti-phishing training.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Educated guess on graphical authentication schemes: vulnerabilities and countermeasures.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

A framework of energy efficient mobile sensing for automatic user state recognition.
Proceedings of the 7th International Conference on Mobile Systems, 2009

mFerio: the design and evaluation of a peer-to-peer mobile payment system.
Proceedings of the 7th International Conference on Mobile Systems, 2009

Improving phishing countermeasures: An analysis of expert interviews.
Proceedings of the 2009 eCrime Researchers Summit, 2009

Contextual web history: using visual and contextual cues to improve web browser history.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

Who's viewed you?: the impact of feedback in a mobile location-sharing application.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

SHIFTR: a user-directed, link-based system for ad hoc sensemaking of large heterogeneous data collections.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009

2008
What do we "mashup" when we make mashups?
Proceedings of the 4th international workshop on End-user software engineering, 2008

GRAPHITE: A Visual Query System for Large Graphs.
Proceedings of the Workshops Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008

Lessons from a real world evaluation of anti-phishing training.
Proceedings of the 2008 eCrime Researchers Summit, 2008

You've been warned: an empirical study of the effectiveness of web browser phishing warnings.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008

2007
Design Challenges and Principles for Wizard of Oz Testing of Location-Enhanced Applications.
IEEE Pervasive Comput., 2007

Guest Editors' Introduction: Security & Privacy.
IEEE Pervasive Comput., 2007

End-User Privacy in Human-Computer Interaction.
Found. Trends Hum. Comput. Interact., 2007

Cantina: a content-based approach to detecting phishing web sites.
Proceedings of the 16th International Conference on World Wide Web, 2007

User-Controllable Security and Privacy for Pervasive Computing.
Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications, 2007

Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

Phinding Phish: An Evaluation of Anti-Phishing Toolbars.
Proceedings of the Network and Distributed System Security Symposium, 2007

Memory karaoke: using a location-aware mobile reminiscence tool to support aging in place.
Proceedings of the 9th Conference on Human-Computer Interaction with Mobile Devices and Services, 2007

Field Deployment of <i>IMBuddy</i> : A Study of Privacy Control and Feedback Mechanisms for Contextual IM.
Proceedings of the UbiComp 2007: Ubiquitous Computing, 9th International Conference, 2007

Getting users to pay attention to anti-phishing education: evaluation of retention and transfer.
Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, 2007

Making mashups with marmite: towards end-user programming for the web.
Proceedings of the 2007 Conference on Human Factors in Computing Systems, 2007

Design and evaluation of 3d models for electronic dental records.
Proceedings of the Extended Abstracts Proceedings of the 2007 Conference on Human Factors in Computing Systems, 2007

Protecting people from phishing: the design and evaluation of an embedded training email system.
Proceedings of the 2007 Conference on Human Factors in Computing Systems, 2007

The Design of Sites - Patterns for Creating Winning Web Sites (2. ed.).
Prentice Hall, ISBN: 978-0-13-134555-3, 2007

2006
Bustle: Using Hitchhiking to Monitor Meaningful Locations.
Proceedings of the Seventh IEEE Workshop on Mobile Computing Systems & Applications, 2006

Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications.
Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006

Whisper: analysis and design for a community event service.
Proceedings of the Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006

Marmite: end-user programming for the web.
Proceedings of the Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006

2005
Minimizing Security Risks in Ubicomp Systems.
Computer, 2005

2004
Personal privacy through understanding and action: five pitfalls for designers.
Pers. Ubiquitous Comput., 2004

Topiary: a tool for prototyping location-enhanced applications.
Proceedings of the 17th Annual ACM Symposium on User Interface Software and Technology, 2004

Siren: Context-aware Computing for Firefighting.
Proceedings of the Pervasive Computing, 2004

An Architecture for Privacy-Sensitive Ubiquitous Computing.
Proceedings of the Second International Conference on Mobile Systems, 2004

Ubiquitous computing for firefighters: field studies and prototypes of large displays for incident command.
Proceedings of the 2004 Conference on Human Factors in Computing Systems, 2004

Privacy risk models for designing privacy-sensitive ubiquitous computing systems.
Proceedings of the Conference on Designing Interactive Systems: Processes, 2004

Development and evaluation of emerging design patterns for ubiquitous computing.
Proceedings of the Conference on Designing Interactive Systems: Processes, 2004

2003
DENIM: An Informal Web Site Design Tool Inspired by Observations of Practice.
Hum. Comput. Interact., 2003

Wireless Location Privacy Protection.
Computer, 2003

Challenge: ubiquitous location-aware computing and the "place lab" initiative.
Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2003

liquid: Context-Aware Distributed Queries.
Proceedings of the UbiComp 2003: Ubiquitous Computing, 2003

You're getting warmer!: how proximity information affects search behavior in physical spaces.
Proceedings of the Extended abstracts of the 2003 Conference on Human Factors in Computing Systems, 2003

2002
Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing.
Proceedings of the UbiComp 2002: Ubiquitous Computing, 4th International Conference, Göteborg, Sweden, September 29, 2002

The context fabric: an infrastructure for context-aware computing.
Proceedings of the Extended abstracts of the 2002 Conference on Human Factors in Computing Systems, 2002

What did they do? understanding clickstreams with the WebQuilt visualization system.
Proceedings of the Working Conference on Advanced Visual Interfaces, 2002

Designing for serendipity: supporting end-user configuration of ubiquitous computing environments.
Proceedings of the 4th Conference on Designing Interactive Systems: Processes, 2002

2001
WebQuilt: A proxy-based approach to remote web usability testing.
ACM Trans. Inf. Syst., 2001

A Context/Communication Information Agent.
Pers. Ubiquitous Comput., 2001

An Infrastructure Approach to Context-Aware Computing.
Hum. Comput. Interact., 2001

WebQuilt: a framework for capturing and visualizing the web experience.
Proceedings of the Tenth International World Wide Web Conference, 2001

DENIM: an informal tool for early stage web site design.
Proceedings of the CHI 2001 Extended Abstracts on Human Factors in Computing Systems, 2001

End-user perceptions of formal and informal representations of web sites.
Proceedings of the CHI 2001 Extended Abstracts on Human Factors in Computing Systems, 2001

2000
SATIN: a toolkit for informal ink-based applications.
Proceedings of the 13th Annual ACM Symposium on User Interface Software and Technology, 2000

SWAMI: a framework for collaborative filtering algorithm development and evaluation.
Proceedings of the SIGIR 2000: Proceedings of the 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2000

DENIM: finding a tighter fit between tools and practice for Web site design.
Proceedings of the CHI 2000 Conference on Human factors in computing systems, 2000

1999
Cha-Cha: A System for Organizing Intranet Search Results.
Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems, 1999

Printertainment: printing with interactive cover sheets.
Proceedings of the CHI '99 Extended Abstracts on Human Factors in Computing Systems, 1999

1997
Cyberguide: A mobile context-aware tour guide.
Wirel. Networks, 1997


  Loading...