Author: Jason I. Hong
Publication Overview
Publication period start: 2012
Number of co-authors: 64
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Li,
Yang,
Hong,
Jason I.,
Landay,
James A.
(2007):
Design Challenges and Principles for Wizard of Oz Testing of Location-Enhanced Application.
In
IEEE Pervasive Computing,
6
(2)
pp. 70-75.
https://doi.ieeecomputersociety.org/10.1109/MPRV.2007.28
Hong,
Jason I.,
Satyanarayanan,
Mahadev,
Cybenko,
George
(2007):
Guest Editors\' Introduction: Security & Privacy.
In
IEEE Pervasive Computing,
6
(4)
pp. 15-17.
https://doi.ieeecomputersociety.org/10.1109/MPRV.2007.74
Hong,
Jason I.
(2005):
Minimizing Security Risks in Ubicomp Systems.
In
IEEE Computer,
38
(12)
pp. 118-119.
Jiang,
Xiaodong,
Hong,
Jason I.,
Takayama,
Leila A.,
Landay,
James A.
(2004):
Ubiquitous computing for firefighters: field studies and prototypes of large displays for .
In:
Dykstra-Erickson,
Elizabeth,
Tscheligi,
Manfred
(eds.)
Proceedings of ACM CHI 2004 Conference on Human Factors in Computing Systems
April 24-29,
2004,
Vienna, Austria.
pp. 679-686.
https://doi.acm.org/10.1145/985692.985778
Lederer,
Scott,
Hong,
Jason I.,
Dey,
Anind K.,
Landay,
James A.
(2004):
Personal privacy through understanding and action: five pitfalls for designers.
In
Personal and Ubiquitous Computing,
8
(6)
pp. 440-454.
https://dx.doi.org/10.1007/s00779-004-0304-9
Newman,
Mark W.,
Lin,
James J. W.,
Hong,
Jason I.,
Landay,
James A.
(2003):
DENIM: An Informal Web Site Design Tool Inspired by Observations of Practice.
In
Human-Computer Interaction,
18
(3)
pp. 259-324.
Schilit,
Bill N.,
Hong,
Jason I.,
Gruteser,
Marco
(2003):
Wireless Location Privacy Protection.
In
IEEE Computer,
36
(12)
pp. 135-137.
https://csdl.computer.org/comp/mags/co/2003/12/rz135abs.htm
Hong,
Jason I.,
Landay,
James A.
(2001):
An Infrastructure Approach to Context-Aware Computing.
In
Human-Computer Interaction,
16
(2)
pp. 287-303.
Hong,
Jason I.,
Heer,
Jeffrey,
Waterson,
Sarah,
Landay,
James A.
(2001):
WebQuilt: A proxy-based approach to remote web usability testing.
In
ACM Transactions on Information Systems,
19
(3)
pp. 263-285.
https://dl.acm.org/doi/10.1145/502115.502118
Hong,
Jason I.,
Landay,
James A.
(2001):
A Context/Communication Information Agent.
In
Personal and Ubiquitous Computing,
5
(1)
pp. 78-81.
https://springerlink.metapress.com/openurl.asp?genre=article&issn=1617-4917&volume=5&issue=1&spage=78
Lin,
James,
Newman,
Mark W.,
Hong,
Jason I.,
Landay,
James A.
(2000):
DENIM: Finding a Tighter Fit between Tools and Practice for Web Site Design.
In:
Turner,
Thea,
Szwillus,
Gerd,
Czerwinski,
Mary,
Paterno,
Fabio,
Pemberton,
Steven
(eds.)
Proceedings of the ACM CHI 2000 Human Factors in Computing Systems Conference
April 1-6,
2000,
The Hague, The Netherlands.
pp. 510-517.
https://www.acm.org/pubs/articles/proceedings/chi/332040/p510-lin/p510-lin.pdf
Hong,
Jason I.,
Landay,
James A.
(2000):
SATIN: A Toolkit for Informal Ink-Based Applications.
In:
Ackerman,
Mark S.,
Edwards,
Keith
(eds.)
Proceedings of the 13th annual ACM symposium on User interface software and technology
November 06 - 08,
2000,
San Diego, California, United States.
pp. 63-72.
https://acm.org/pubs/articles/proceedings/uist/354401/p63-hong/p63-hong.pdf
Li,
Yang,
Hong,
Jason I.,
Landay,
James A.
(2004):
Topiary: a tool for prototyping location-enhanced applications.
In:
Proceedings of the 2004 ACM Symposium on User Interface Software and Technology
,
2004,
.
pp. 217-226.
https://doi.acm.org/10.1145/1029632.1029671
Tang,
Karen P.,
Keyani,
Pedram,
Fogarty,
James,
Hong,
Jason I.
(2006):
Putting people in their place: an anonymous and privacy-sensitive approach to collecting s.
In:
Proceedings of ACM CHI 2006 Conference on Human Factors in Computing Systems
,
2006,
.
pp. 93-102.
https://doi.acm.org/10.1145/1124772.1124788
Wong,
Jeffrey,
Hong,
Jason I.
(2007):
Making mashups with marmite: towards end-user programming for the web.
In:
Proceedings of ACM CHI 2007 Conference on Human Factors in Computing Systems
,
2007,
.
pp. 1435-1444.
https://doi.acm.org/10.1145/1240624.1240842
Newman,
Mark W.,
Sedivy,
Jana Z.,
Neuwirth,
Christine,
Edwards,
W. Keith,
Hong,
Jason I.,
Izadi,
Shahram,
Marcelo,
Karen,
Smith,
Trevor F.,
Sedivy,
Jana,
Newman,
Mark
(2002):
Designing for serendipity: supporting end-user configuration of ubiquitous computing envir.
In:
Proceedings of DIS02: Designing Interactive Systems: Processes, Practices, Methods, & Techniques
,
2002,
.
pp. 147-156.
https://doi.acm.org/10.1145/778712.778736
Hong,
Jason I.,
Ng,
Jennifer D.,
Lederer,
Scott,
Landay,
James A.
(2004):
Privacy risk models for designing privacy-sensitive ubiquitous computing systems.
In:
Proceedings of DIS04: Designing Interactive Systems: Processes, Practices, Methods, & Techniques
,
2004,
.
pp. 91-100.
https://doi.acm.org/10.1145/1013115.1013129
Chung,
Eric S.,
Hong,
Jason I.,
Lin,
James,
Prabaker,
Madhu K.,
Landay,
James A.,
Liu,
Alan L.
(2004):
Development and evaluation of emerging design patterns for ubiquitous computing.
In:
Proceedings of DIS04: Designing Interactive Systems: Processes, Practices, Methods, & Techniques
,
2004,
.
pp. 233-242.
https://doi.acm.org/10.1145/1013115.1013148
Zhang,
Yue,
Hong,
Jason I.,
Cranor,
Lorrie F.
(2007):
Cantina: a content-based approach to detecting phishing web sites.
In:
Proceedings of the 2007 International Conference on the World Wide Web
,
2007,
.
pp. 639-648.
https://doi.acm.org/10.1145/1242572.1242659
Won,
Sungjoon Steve,
Jin,
Jing,
Hong,
Jason I.
(2009):
Contextual web history: using visual and contextual cues to improve web browser history.
In:
Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems
,
2009,
.
pp. 1457-1466.
https://doi.acm.org/10.1145/1518701.1518922
Chau,
Duen Horng,
Kittur,
Aniket,
Faloutsos,
Christos,
Hong,
Jason I.
(2009):
SHIFTR: a user-directed, link-based system for ad hoc sensemaking of large heterogeneous d.
In:
Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems
,
2009,
.
pp. 3535-3536.
https://doi.acm.org/10.1145/1520340.1520529
Tang,
Karen P.,
Hong,
Jason I.,
Smith,
Ian E.,
Ha,
Annie,
Satpathy,
Lalatendu
(2007):
Memory karaoke: using a location-aware mobile reminiscence tool to support aging in place.
In:
Cheok,
Adrian David,
Chittaro,
Luca
(eds.)
Proceedings of the 9th Conference on Human-Computer Interaction with Mobile Devices and Services - Mobile HCI 2007
September 9-12,
2007,
Singapore.
pp. 305-312.
https://doi.acm.org/10.1145/1377999.1378023
Heer,
Jeffrey,
Newberger,
Alan,
Beckmann,
Chris,
Hong,
Jason I.
(2003):
liquid: Context-Aware Distributed Queries.
In:
Dey,
Anind K.,
Schmidt,
Albrecht,
McCarthy,
Joseph F.
(eds.)
UbiComp 2003 Ubiquitous Computing - 5th International Conference
October 12-15,
2003,
Seattle, WA, USA.
pp. 140-148.
https://link.springer.de/link/service/series/0558/bibs/2864/28640140.htm
Jiang,
Xiaodong,
Hong,
Jason I.,
Landay,
James A.
(2002):
Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing.
In:
Borriello,
Gaetano,
Holmquist,
Lars Erik
(eds.)
UbiComp 2002 Ubiquitous Computing - 4th International Conference
September 29 - October 1,
2002,
Göteborg, Sweden.
pp. 176-193.
https://link.springer.de/link/service/series/0558/bibs/2498/24980176.htm
Hsieh,
Gary,
Tang,
Karen P.,
Low,
Wai Yong,
Hong,
Jason I.
(2007):
Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Conte.
In:
Krumm,
John,
Abowd,
Gregory D.,
Seneviratne,
Aruna,
Strang,
Thomas
(eds.)
UbiComp 2007 Ubiquitous Computing - 9th International Conference
September 16-19,
2007,
Innsbruck, Austria.
pp. 91-108.
https://dx.doi.org/10.1007/978-3-540-74853-3_6
Hong,
Jason I.,
Landay,
James A.
(2001):
WebQuilt: a framework for capturing and visualizing the web experience.
In:
Proceedings of the 2001 International Conference on the World Wide Web
,
2001,
.
pp. 717-724.
https://doi.acm.org/10.1145/371920.372188
Xiang,
Guang,
Hong,
Jason I.
(2009):
A hybrid phish detection approach by identity discovery and keywords retrieval.
In:
Proceedings of the 2009 International Conference on the World Wide Web
,
2009,
.
pp. 571-580.
https://doi.acm.org/10.1145/1526709.1526786
Jiang,
Xiaodong,
Chen,
Nicholas Y.,
Hong,
Jason I.,
Wang,
Kevin,
Takayama,
Leila,
Landay,
James A.
(2004):
Siren: Context-aware Computing for Firefighting.
In:
Ferscha,
Alois,
Mattern,
Friedemann
(eds.)
PERVASIVE 2004 - Pervasive Computing, Second International Conference
April 21-23,
2004,
Vienna, Austria.
pp. 87-105.
https://link.springer.de/link/service/series/0558/bibs/3001/30010087.htm
Lin,
Jialiu,
Xiang,
Guang,
Hong,
Jason I.,
Sadeh,
Norman
(2010):
Modeling people's place naming preferences in location sharing.
In:
Proceedings of the 2010 International Conference on Uniquitous Computing
,
2010,
.
pp. 75-84.
https://doi.acm.org/10.1145/1864349.1864362
Tang,
Karen P.,
Lin,
Jialiu,
Hong,
Jason I.,
Siewiorek,
Daniel P.,
Sadeh,
Norman
(2010):
Rethinking location sharing: exploring the implications of social-driven vs. purpose-drive.
In:
Proceedings of the 2010 International Conference on Uniquitous Computing
,
2010,
.
pp. 85-94.
https://doi.acm.org/10.1145/1864349.1864363
Chau,
Duen Horng,
Kittur,
Aniket,
Hong,
Jason I.,
Faloutsos,
Christos
(2011):
Apolo: making sense of large network data by combining rich user interaction and machine l.
In:
Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems
,
2011,
.
pp. 167-176.
https://dx.doi.org/10.1145/1978942.1978967
Liu,
Gang,
Xiang,
Guang,
Pendleton,
Bryan A.,
Hong,
Jason I.,
Liu,
Wenyin
(2011):
Smartening the crowds: computational techniques for improving human verification to fight .
In:
Proceedings of the 2011 Symposium on Usable Privacy and Security
,
2011,
.
pp. 8.
https://dx.doi.org/10.1145/2078827.2078838
Wiese,
Jason,
Kelley,
Patrick Gage,
Cranor,
Lorrie Faith,
Dabbish,
Laura,
Hong,
Jason I.,
Zimmerman,
John
(2011):
Are you close with me? are you nearby?: investigating social groups, closeness, and willin.
In:
Proceedings of the 2011 International Conference on Uniquitous Computing
,
2011,
.
pp. 197-206.
https://dx.doi.org/10.1145/2030112.2030140
Tang,
Karen P.,
Hong,
Jason I.,
Siewiorek,
Daniel P.
(2011):
Understanding how visual representations of location feeds affect end-user privacy concern.
In:
Proceedings of the 2011 International Conference on Uniquitous Computing
,
2011,
.
pp. 207-216.
https://dx.doi.org/10.1145/2030112.2030141
Lin,
Jialiu,
Sadeh,
Norman,
Amini,
Shahriyar,
Lindqvist,
Janne,
Hong,
Jason I.,
Zhang,
Joy
(2012):
Expectation and purpose: understanding users' mental models of mobile app privacy through .
In:
Proceedings of the 2012 International Conference on Uniquitous Computing
,
2012,
.
pp. 501-510.
https://dx.doi.org/10.1145/2370216.2370290