![]() | 2009 | |
---|---|---|
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Sungjoon Steve Won, Jing Jin, Jason I. Hong: Contextual web history: using visual and contextual cues to improve web browser history. CHI 2009: 1457-1466 |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Janice Y. Tsai, Patrick Gage Kelley, Paul Hankes Drielsma, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh: Who's viewed you?: the impact of feedback in a mobile location-sharing application. CHI 2009: 2003-2012 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Duen Horng Chau, Aniket Kittur, Christos Faloutsos, Jason I. Hong: SHIFTR: a user-directed, link-based system for ad hoc sensemaking of large heterogeneous data collections. CHI Extended Abstracts 2009: 3535-3536 |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Yi Wang, Jialiu Lin, Murali Annavaram, Quinn Jacobson, Jason I. Hong, Bhaskar Krishnamachari, Norman M. Sadeh: A framework of energy efficient mobile sensing for automatic user state recognition. MobiSys 2009: 179-192 |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Eran Toch, Ramprasad Ravichandran, Lorrie Faith Cranor, Paul Hankes Drielsma, Jason I. Hong, Patrick Gage Kelley, Norman M. Sadeh, Janice Y. Tsai: Analyzing use of privacy policy attributes in a location sharing application. SOUPS 2009 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Ponnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Mary Ann Blair, Theodore Pham: School of phish: a real-word evaluation of anti-phishing training. SOUPS 2009 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Janice Y. Tsai, Patrick Gage Kelley, Paul Hankes Drielsma, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh: Who's viewed you?: the impact of feedback in a mobile location-sharing application. SOUPS 2009 |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Guang Xiang, Jason I. Hong: A hybrid phish detection approach by identity discovery and keywords retrieval. WWW 2009: 571-580 |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Norman M. Sadeh, Jason I. Hong, Lorrie Faith Cranor, Ian Fette, Patrick Gage Kelley, Madhu K. Prabaker, Jinghai Rao: Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing 13(6): 401-412 (2009) |
2008 | ||
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Serge Egelman, Lorrie Faith Cranor, Jason I. Hong: You've been warned: an empirical study of the effectiveness of web browser phishing warnings. CHI 2008: 1065-1074 |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Duen Horng Chau, Christos Faloutsos, Hanghang Tong, Jason I. Hong, Brian Gallagher, Tina Eliassi-Rad: GRAPHITE: A Visual Query System for Large Graphs. ICDM Workshops 2008: 963-966 |
2007 | ||
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Jeffrey Wong, Jason I. Hong: Making mashups with marmite: towards end-user programming for the web. CHI 2007: 1435-1444 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge: Protecting people from phishing: the design and evaluation of an embedded training email system. CHI 2007: 905-914 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael F. Marotta, Purin Phanichphant, Patrick Malatack, Tej Shah, Greg Price, Thankam Thyvalikakath, Titus Schleyer, Jason I. Hong: Design and evaluation of 3d models for electronic dental records. CHI Extended Abstracts 2007: 2567-2572 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Karen P. Tang, Jason I. Hong, Ian E. Smith, Annie Ha, Lalatendu Satpathy: Memory karaoke: using a location-aware mobile reminiscence tool to support aging in place. Mobile HCI 2007: 305-312 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Lorrie Faith Cranor, Serge Egelman, Jason I. Hong, Yue Zhang: Phinding Phish: An Evaluation of Anti-Phishing Toolbars. NDSS 2007 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge: Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. SOUPS 2007: 88-99 |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Gary Hsieh, Karen P. Tang, Wai Yong Low, Jason I. Hong: Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Contextual IM. Ubicomp 2007: 91-108 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Yue Zhang, Jason I. Hong, Lorrie Faith Cranor: Cantina: a content-based approach to detecting phishing web sites. WWW 2007: 639-648 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sharique Hasan, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong: Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. eCrime Researchers Summit 2007: 70-81 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Giovanni Iachello, Jason I. Hong: End-User Privacy in Human-Computer Interaction. Foundations and Trends in Human-Computer Interaction 1(1): 1-137 (2007) |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Yang Li, Jason I. Hong, James A. Landay: Design Challenges and Principles for Wizard of Oz Testing of Location-Enhanced Applications. IEEE Pervasive Computing 6(2): 70-75 (2007) |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Jason I. Hong, Mahadev Satyanarayanan, George Cybenko: Guest Editors' Introduction: Security & Privacy. IEEE Pervasive Computing 6(4): 15-17 (2007) |
2006 | ||
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Karen P. Tang, Pedram Keyani, James Fogarty, Jason I. Hong: Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications. CHI 2006: 93-102 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Jennifer Ng, Jonathan Terleski, Jason I. Hong: Whisper: analysis and design for a community event service. CHI Extended Abstracts 2006: 1151-1156 |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Jason I. Hong, Jeffrey Wong: Marmite: end-user programming for the web. CHI Extended Abstracts 2006: 1541-1546 |
2005 | ||
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Jason I. Hong: Minimizing Security Risks in Ubicomp Systems. IEEE Computer 38(12): 118-119 (2005) |
2004 | ||
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaodong Jiang, Jason I. Hong, Leila Takayama, James A. Landay: Ubiquitous computing for firefighters: field studies and prototypes of large displays for incident command. CHI 2004: 679-686 |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Eric S. Chung, Jason I. Hong, James Lin, Madhu K. Prabaker, James A. Landay, Alan L. Liu: Development and evaluation of emerging design patterns for ubiquitous computing. Conference on Designing Interactive Systems 2004: 233-242 |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Jason I. Hong, Jennifer D. Ng, Scott Lederer, James A. Landay: Privacy risk models for designing privacy-sensitive ubiquitous computing systems. Conference on Designing Interactive Systems 2004: 91-100 |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Jason I. Hong, James A. Landay: An Architecture for Privacy-Sensitive Ubiquitous Computing. MobiSys 2004 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaodong Jiang, Nicholas Y. Chen, Jason I. Hong, Kevin Wang, Leila Takayama, James A. Landay: Siren: Context-aware Computing for Firefighting. Pervasive 2004: 87-105 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Yang Li, Jason I. Hong, James A. Landay: Topiary: a tool for prototyping location-enhanced applications. UIST 2004: 217-226 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Scott Lederer, Jason I. Hong, Anind K. Dey, James A. Landay: Personal privacy through understanding and action: five pitfalls for designers. Personal and Ubiquitous Computing 8(6): 440-454 (2004) |
2003 | ||
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Leila Takayama, Lawrence Leung, Xiaodong Jiang, Jason I. Hong: You're getting warmer!: how proximity information affects search behavior in physical spaces. CHI Extended Abstracts 2003: 1028-1029 |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Jeffrey Heer, Alan Newberger, Chris Beckmann, Jason I. Hong: liquid: Context-Aware Distributed Queries. Ubicomp 2003: 140-148 |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Bill N. Schilit, Anthony LaMarca, Gaetano Borriello, William G. Griswold, David W. McDonald, Edward D. Lazowska, Anand Balachandran, Jason I. Hong, Vaughn Iverson: Challenge: ubiquitous location-aware computing and the "place lab" initiative. WMASH 2003: 29-35 |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Bill N. Schilit, Jason I. Hong, Marco Gruteser: Wireless Location Privacy Protection. IEEE Computer 36(12): 135-137 (2003) |
2002 | ||
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Jason I. Hong: The context fabric: an infrastructure for context-aware computing. CHI Extended Abstracts 2002: 554-555 |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Mark W. Newman, Jana Z. Sedivy, Christine Neuwirth, W. Keith Edwards, Jason I. Hong, Shahram Izadi, Karen Marcelo, Trevor F. Smith: Designing for serendipity: supporting end-user configuration of ubiquitous computing environments. Symposium on Designing Interactive Systems 2002: 147-156 |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaodong Jiang, Jason I. Hong, James A. Landay: Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing. Ubicomp 2002: 176-193 |
2001 | ||
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Jason I. Hong, James A. Landay: WebQuilt: a framework for capturing and visualizing the web experience. WWW 2001: 717-724 |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Jason I. Hong, Jeffrey Heer, Sarah Waterson, James A. Landay: WebQuilt: A proxy-based approach to remote web usability testing. ACM Trans. Inf. Syst. 19(3): 263-285 (2001) |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Jason I. Hong, James A. Landay: A Context/Communication Information Agent. Personal and Ubiquitous Computing 5(1): 78-81 (2001) |
2000 | ||
5 | ![]() ![]() ![]() ![]() ![]() ![]() | James Lin, Mark W. Newman, Jason I. Hong, James A. Landay: DENIM: finding a tighter fit between tools and practice for Web site design. CHI 2000: 510-517 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Danyel Fisher, Kris Hildrum, Jason I. Hong, Mark W. Newman, Megan Thomas, Rich Vuduc: SWAMI: a framework for collaborative filtering algorithm development and evaluation. SIGIR 2000: 366-368 |
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Jason I. Hong, James A. Landay: SATIN: a toolkit for informal ink-based applications. UIST 2000: 63-72 |
1999 | ||
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Chen, Marti A. Hearst, Jason I. Hong, James Lin: Cha-Cha: A System for Organizing Intranet Search Results. USENIX Symposium on Internet Technologies and Systems 1999 |
1997 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Gregory D. Abowd, Christopher G. Atkeson, Jason I. Hong, Sue Long, Rob Kooper, Mike Pinkerton: Cyberguide: A mobile context-aware tour guide. Wireless Networks 3(5): 421-433 (1997) |