2009 | ||
---|---|---|
49 | Sungjoon Steve Won, Jing Jin, Jason I. Hong: Contextual web history: using visual and contextual cues to improve web browser history. CHI 2009: 1457-1466 | |
48 | Janice Y. Tsai, Patrick Gage Kelley, Paul Hankes Drielsma, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh: Who's viewed you?: the impact of feedback in a mobile location-sharing application. CHI 2009: 2003-2012 | |
47 | Duen Horng Chau, Aniket Kittur, Christos Faloutsos, Jason I. Hong: SHIFTR: a user-directed, link-based system for ad hoc sensemaking of large heterogeneous data collections. CHI Extended Abstracts 2009: 3535-3536 | |
46 | Yi Wang, Jialiu Lin, Murali Annavaram, Quinn Jacobson, Jason I. Hong, Bhaskar Krishnamachari, Norman M. Sadeh: A framework of energy efficient mobile sensing for automatic user state recognition. MobiSys 2009: 179-192 | |
45 | Eran Toch, Ramprasad Ravichandran, Lorrie Faith Cranor, Paul Hankes Drielsma, Jason I. Hong, Patrick Gage Kelley, Norman M. Sadeh, Janice Y. Tsai: Analyzing use of privacy policy attributes in a location sharing application. SOUPS 2009 | |
44 | Ponnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Mary Ann Blair, Theodore Pham: School of phish: a real-word evaluation of anti-phishing training. SOUPS 2009 | |
43 | Janice Y. Tsai, Patrick Gage Kelley, Paul Hankes Drielsma, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh: Who's viewed you?: the impact of feedback in a mobile location-sharing application. SOUPS 2009 | |
42 | Guang Xiang, Jason I. Hong: A hybrid phish detection approach by identity discovery and keywords retrieval. WWW 2009: 571-580 | |
41 | Norman M. Sadeh, Jason I. Hong, Lorrie Faith Cranor, Ian Fette, Patrick Gage Kelley, Madhu K. Prabaker, Jinghai Rao: Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing 13(6): 401-412 (2009) | |
2008 | ||
40 | Serge Egelman, Lorrie Faith Cranor, Jason I. Hong: You've been warned: an empirical study of the effectiveness of web browser phishing warnings. CHI 2008: 1065-1074 | |
39 | Duen Horng Chau, Christos Faloutsos, Hanghang Tong, Jason I. Hong, Brian Gallagher, Tina Eliassi-Rad: GRAPHITE: A Visual Query System for Large Graphs. ICDM Workshops 2008: 963-966 | |
2007 | ||
38 | Jeffrey Wong, Jason I. Hong: Making mashups with marmite: towards end-user programming for the web. CHI 2007: 1435-1444 | |
37 | Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge: Protecting people from phishing: the design and evaluation of an embedded training email system. CHI 2007: 905-914 | |
36 | Michael F. Marotta, Purin Phanichphant, Patrick Malatack, Tej Shah, Greg Price, Thankam Thyvalikakath, Titus Schleyer, Jason I. Hong: Design and evaluation of 3d models for electronic dental records. CHI Extended Abstracts 2007: 2567-2572 | |
35 | Karen P. Tang, Jason I. Hong, Ian E. Smith, Annie Ha, Lalatendu Satpathy: Memory karaoke: using a location-aware mobile reminiscence tool to support aging in place. Mobile HCI 2007: 305-312 | |
34 | Lorrie Faith Cranor, Serge Egelman, Jason I. Hong, Yue Zhang: Phinding Phish: An Evaluation of Anti-Phishing Toolbars. NDSS 2007 | |
33 | Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge: Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. SOUPS 2007: 88-99 | |
32 | Gary Hsieh, Karen P. Tang, Wai Yong Low, Jason I. Hong: Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Contextual IM. Ubicomp 2007: 91-108 | |
31 | Yue Zhang, Jason I. Hong, Lorrie Faith Cranor: Cantina: a content-based approach to detecting phishing web sites. WWW 2007: 639-648 | |
30 | Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sharique Hasan, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong: Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. eCrime Researchers Summit 2007: 70-81 | |
29 | Giovanni Iachello, Jason I. Hong: End-User Privacy in Human-Computer Interaction. Foundations and Trends in Human-Computer Interaction 1(1): 1-137 (2007) | |
28 | Yang Li, Jason I. Hong, James A. Landay: Design Challenges and Principles for Wizard of Oz Testing of Location-Enhanced Applications. IEEE Pervasive Computing 6(2): 70-75 (2007) | |
27 | Jason I. Hong, Mahadev Satyanarayanan, George Cybenko: Guest Editors' Introduction: Security & Privacy. IEEE Pervasive Computing 6(4): 15-17 (2007) | |
2006 | ||
26 | Karen P. Tang, Pedram Keyani, James Fogarty, Jason I. Hong: Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications. CHI 2006: 93-102 | |
25 | Jennifer Ng, Jonathan Terleski, Jason I. Hong: Whisper: analysis and design for a community event service. CHI Extended Abstracts 2006: 1151-1156 | |
24 | Jason I. Hong, Jeffrey Wong: Marmite: end-user programming for the web. CHI Extended Abstracts 2006: 1541-1546 | |
2005 | ||
23 | Jason I. Hong: Minimizing Security Risks in Ubicomp Systems. IEEE Computer 38(12): 118-119 (2005) | |
2004 | ||
22 | Xiaodong Jiang, Jason I. Hong, Leila Takayama, James A. Landay: Ubiquitous computing for firefighters: field studies and prototypes of large displays for incident command. CHI 2004: 679-686 | |
21 | Eric S. Chung, Jason I. Hong, James Lin, Madhu K. Prabaker, James A. Landay, Alan L. Liu: Development and evaluation of emerging design patterns for ubiquitous computing. Conference on Designing Interactive Systems 2004: 233-242 | |
20 | Jason I. Hong, Jennifer D. Ng, Scott Lederer, James A. Landay: Privacy risk models for designing privacy-sensitive ubiquitous computing systems. Conference on Designing Interactive Systems 2004: 91-100 | |
19 | Jason I. Hong, James A. Landay: An Architecture for Privacy-Sensitive Ubiquitous Computing. MobiSys 2004 | |
18 | Xiaodong Jiang, Nicholas Y. Chen, Jason I. Hong, Kevin Wang, Leila Takayama, James A. Landay: Siren: Context-aware Computing for Firefighting. Pervasive 2004: 87-105 | |
17 | Yang Li, Jason I. Hong, James A. Landay: Topiary: a tool for prototyping location-enhanced applications. UIST 2004: 217-226 | |
16 | Scott Lederer, Jason I. Hong, Anind K. Dey, James A. Landay: Personal privacy through understanding and action: five pitfalls for designers. Personal and Ubiquitous Computing 8(6): 440-454 (2004) | |
2003 | ||
15 | Leila Takayama, Lawrence Leung, Xiaodong Jiang, Jason I. Hong: You're getting warmer!: how proximity information affects search behavior in physical spaces. CHI Extended Abstracts 2003: 1028-1029 | |
14 | Jeffrey Heer, Alan Newberger, Chris Beckmann, Jason I. Hong: liquid: Context-Aware Distributed Queries. Ubicomp 2003: 140-148 | |
13 | Bill N. Schilit, Anthony LaMarca, Gaetano Borriello, William G. Griswold, David W. McDonald, Edward D. Lazowska, Anand Balachandran, Jason I. Hong, Vaughn Iverson: Challenge: ubiquitous location-aware computing and the "place lab" initiative. WMASH 2003: 29-35 | |
12 | Bill N. Schilit, Jason I. Hong, Marco Gruteser: Wireless Location Privacy Protection. IEEE Computer 36(12): 135-137 (2003) | |
2002 | ||
11 | Jason I. Hong: The context fabric: an infrastructure for context-aware computing. CHI Extended Abstracts 2002: 554-555 | |
10 | Mark W. Newman, Jana Z. Sedivy, Christine Neuwirth, W. Keith Edwards, Jason I. Hong, Shahram Izadi, Karen Marcelo, Trevor F. Smith: Designing for serendipity: supporting end-user configuration of ubiquitous computing environments. Symposium on Designing Interactive Systems 2002: 147-156 | |
9 | Xiaodong Jiang, Jason I. Hong, James A. Landay: Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing. Ubicomp 2002: 176-193 | |
2001 | ||
8 | Jason I. Hong, James A. Landay: WebQuilt: a framework for capturing and visualizing the web experience. WWW 2001: 717-724 | |
7 | Jason I. Hong, Jeffrey Heer, Sarah Waterson, James A. Landay: WebQuilt: A proxy-based approach to remote web usability testing. ACM Trans. Inf. Syst. 19(3): 263-285 (2001) | |
6 | Jason I. Hong, James A. Landay: A Context/Communication Information Agent. Personal and Ubiquitous Computing 5(1): 78-81 (2001) | |
2000 | ||
5 | James Lin, Mark W. Newman, Jason I. Hong, James A. Landay: DENIM: finding a tighter fit between tools and practice for Web site design. CHI 2000: 510-517 | |
4 | Danyel Fisher, Kris Hildrum, Jason I. Hong, Mark W. Newman, Megan Thomas, Rich Vuduc: SWAMI: a framework for collaborative filtering algorithm development and evaluation. SIGIR 2000: 366-368 | |
3 | Jason I. Hong, James A. Landay: SATIN: a toolkit for informal ink-based applications. UIST 2000: 63-72 | |
1999 | ||
2 | Michael Chen, Marti A. Hearst, Jason I. Hong, James Lin: Cha-Cha: A System for Organizing Intranet Search Results. USENIX Symposium on Internet Technologies and Systems 1999 | |
1997 | ||
1 | Gregory D. Abowd, Christopher G. Atkeson, Jason I. Hong, Sue Long, Rob Kooper, Mike Pinkerton: Cyberguide: A mobile context-aware tour guide. Wireless Networks 3(5): 421-433 (1997) |