Author: Jason Hong
Publication Overview
Publication period start: 2012
Number of co-authors: 39
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Iachello,
Giovanni,
Hong,
Jason
(2007):
End-User Privacy in Human-Computer Interaction.
In
Foundations and Trends in Human-Computer Interaction,
1
(1)
pp. 1-137.
https://dx.doi.org/10.1561/1100000004
Kumaraguru,
Ponnurangam,
Rhee,
Yong,
Acquisti,
Alessandro,
Cranor,
Lorrie Faith,
Hong,
Jason,
Nunge,
Elizabeth
(2007):
Protecting people from phishing: the design and evaluation of an embedded training email s.
In:
Proceedings of ACM CHI 2007 Conference on Human Factors in Computing Systems
,
2007,
.
pp. 905-914.
https://doi.acm.org/10.1145/1240624.1240760
Fisher,
Danyel,
Hildrum,
Kris,
Hong,
Jason,
Newman,
Mark,
Thomas,
Megan,
Vuduc,
Rich
(2000):
SWAMI: A Framework for Collaborative Filtering Algorithm Development and Evaluation.
In:
Proceedings of the 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval
,
2000,
.
pp. 366-368.
https://www.acm.org/pubs/articles/proceedings/ir/345508/p366-fisher/p366-fisher.pdf
Kumaraguru,
Ponnurangam,
Rhee,
Yong,
Sheng,
Steve,
Hasan,
Sharique,
Acquisti,
Alessandro,
Cranor,
Lorrie Faith,
Hong,
Jason
(2007):
Getting users to pay attention to anti-phishing education: evaluation of retention and tra.
In:
Proceedings of the 2007 Anti-Phishing Working Groups eCrime Researchers Summit
,
2007,
.
pp. 70-81.
https://doi.acm.org/10.1145/1299015.1299022
Egelman,
Serge,
Cranor,
Lorrie Faith,
Hong,
Jason
(2008):
You\'ve been warned: an empirical study of the effectiveness of web browser phishing warni.
In:
Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems
April 5-10,
2008,
.
pp. 1065-1074.
https://doi.acm.org/10.1145/1357054.1357219
Iachello,
Giovanni,
Hong,
Jason
(0):
End-User Privacy in Human-Computer Interaction.
In
Foundations and Trends in Human-Computer Interaction,
1
(1)
pp. 1-137.
https://http:/dx.doi.org/10.1561/1100000004
Sheng,
Steve,
Magnien,
Bryant,
Kumaraguru,
Ponnurangam,
Acquisti,
Alessandro,
Cranor,
Lorrie Faith,
Hong,
Jason,
Nunge,
Elizabeth
(2007):
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall fo.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 88-99.
https://cups.cs.cmu.edu/soups/2007/proceedings/p88_sheng.pdf
Tsai,
Janice Y.,
Kelley,
Patrick,
Drielsma,
Paul,
Cranor,
Lorrie Faith,
Hong,
Jason,
Sadeh,
Norman
(2009):
Who\'s viewed you?: the impact of feedback in a mobile location-sharing application.
In:
Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems
,
2009,
.
pp. 2003-2012.
https://doi.acm.org/10.1145/1518701.1519005
Kumaraguru,
Ponnurangam,
Cranshaw,
Justin,
Acquisti,
Alessandro,
Cranor,
Lorrie,
Hong,
Jason,
Blair,
Mary Ann,
Pham,
Theodore
(2009):
School of phish: a real-word evaluation of anti-phishing training.
In:
Proceedings of the 2009 Symposium on Usable Privacy and Security
,
2009,
.
pp. 3.
https://doi.acm.org/10.1145/1572532.1572536
Hayashi,
Eiji,
Hong,
Jason,
Christin,
Nicolas
(2009):
Educated guess on graphical authentication schemes: vulnerabilities and countermeasures.
In:
Proceedings of the 2009 Symposium on Usable Privacy and Security
,
2009,
.
pp. 25.
https://doi.acm.org/10.1145/1572532.1572564
Toch,
Eran,
Ravichandran,
Ramprasad,
Cranor,
Lorrie,
Drielsma,
Paul,
Hong,
Jason,
Kelley,
Patrick,
Sadeh,
Norman,
Tsai,
Janice
(2009):
Analyzing use of privacy policy attributes in a location sharing application.
In:
Proceedings of the 2009 Symposium on Usable Privacy and Security
,
2009,
.
pp. 32.
https://doi.acm.org/10.1145/1572532.1572571
Tsai,
Janice,
Kelley,
Patrick,
Drielsma,
Paul Hankes,
Cranor,
Lorrie,
Hong,
Jason,
Sadeh,
Norman
(2009):
Who\'s viewed you?: the impact of feedback in a mobile location-sharing application.
In:
Proceedings of the 2009 Symposium on Usable Privacy and Security
,
2009,
.
pp. 43.
https://doi.acm.org/10.1145/1572532.1572583
Cranshaw,
Justin,
Toch,
Eran,
Hong,
Jason,
Kittur,
Aniket,
Sadeh,
Norman
(2010):
Bridging the gap between physical location and online social networks.
In:
Proceedings of the 2010 International Conference on Uniquitous Computing
,
2010,
.
pp. 119-128.
https://doi.acm.org/10.1145/1864349.1864380
Toch,
Eran,
Cranshaw,
Justin,
Drielsma,
Paul Hankes,
Tsai,
Janice Y.,
Kelley,
Patrick Gage,
Springfield,
James,
Cranor,
Lorrie,
Hong,
Jason,
Sadeh,
Norman
(2010):
Empirical models of privacy in location sharing.
In:
Proceedings of the 2010 International Conference on Uniquitous Computing
,
2010,
.
pp. 129-138.
https://doi.acm.org/10.1145/1864349.1864364
Toch,
Eran,
Cranshaw,
Justin,
Hankes-Drielsma,
Paul,
Springfield,
Jay,
Kelley,
Patrick Gage,
Cranor,
Lorrie,
Hong,
Jason,
Sadeh,
Norman
(2010):
Locaccino: a privacy-centric location sharing application.
In:
Proceedings of the 2010 International Conference on Uniquitous Computing
,
2010,
.
pp. 381-382.
https://doi.acm.org/10.1145/1864431.1864446
Toch,
Eran,
Sadeh,
Norman M.,
Hong,
Jason
(2010):
Generating default privacy policies for online social networks.
In:
Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems
,
2010,
.
pp. 4243-4248.
https://doi.acm.org/10.1145/1753846.1754133
Hayashi,
Eiji,
Hong,
Jason,
Christin,
Nicolas
(2011):
Security through a different kind of obscurity: evaluating distortion in graphical authent.
In:
Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems
,
2011,
.
pp. 2055-2064.
https://dx.doi.org/10.1145/1978942.1979242
Lindqvist,
Janne,
Cranshaw,
Justin,
Wiese,
Jason,
Hong,
Jason,
Zimmerman,
John
(2011):
I'm the mayor of my house: examining why people use foursquare -- a social-driven location.
In:
Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems
,
2011,
.
pp. 2409-2418.
https://dx.doi.org/10.1145/1978942.1979295
Hayashi,
Eiji,
Hong,
Jason
(2011):
A diary study of password usage in daily life.
In:
Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems
,
2011,
.
pp. 2627-2630.
https://dx.doi.org/10.1145/1978942.1979326
Zheng,
Yu,
Hong,
Jason
(2012):
The preface of the 4<sup>th</sup> International Workshop on Location-Based Social Networks.
In:
Proceedings of the 2012 International Conference on Uniquitous Computing
,
2012,
.
pp. 894-896.