Jason Hong
TitleCited byYear
Cyberguide: A mobile context-aware tour guide
GD Abowd, CG Atkeson, J Hong, S Long, R Kooper, M Pinkerton
Wireless networks 3 (5), 421-433, 1997
21191997
The design of sites: patterns, principles, and processes for crafting a customer-centered Web experience
DKV Duyne, J Landay, JI Hong
Addison-Wesley Longman Publishing Co., Inc., 2002
817*2002
An Architecture for Privacy-Sensitive Ubiquitous Computing
JI Hong, JA Landay
Proceedings of the 2nd international conference on Mobile systems …, 2004
7522004
Cantina: a content-based approach to detecting phishing web sites
Y Zhang, JI Hong, LF Cranor
Proceedings of the 16th international conference on World Wide Web, 639-648, 2007
7212007
The livehoods project: Utilizing social media to understand the dynamics of a city
J Cranshaw, R Schwartz, JI Hong, N Sadeh
Sixth International AAAI Conference on Weblogs and Social Media, 2012
5962012
SATIN: a toolkit for informal ink-based applications
JI Hong, JA Landay
ACM Symposium on User Interface Software and Technology, 12, 2000
583*2000
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
S Egelman, LF Cranor, JI Hong
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
5692008
A framework of energy efficient mobile sensing for automatic user state recognition
Y Wang, J Lin, M Annavaram, QA Jacobson, JI Hong, B Krishnamachari, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
5392009
An infrastructure approach to context-aware computing
JI Hong, JA Landay
Human–computer interaction 16 (2-4), 287-303, 2001
5212001
Bridging the gap between physical location and online social networks
J Cranshaw, E Toch, JI Hong, A Kittur, N Sadeh
Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010
4882010
I'm the mayor of my house: examining why people use foursquare-a social-driven location sharing application
J Lindqvist, J Cranshaw, J Wiese, JI Hong, J Zimmerman
Proceedings of the SIGCHI conference on human factors in computing systems …, 2011
4682011
Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish
S Sheng, B Magnien, P Kumaraguru, A Acquisti, LF Cranor, JI Hong, ...
Proceedings of the 3rd symposium on Usable privacy and security, 88-99, 2007
4292007
DENIM: finding a tighter fit between tools and practice for Web site design
J Lin, MW Newman, JI Hong, JA Landay
Proceedings of the SIGCHI conference on Human Factors in Computing Systems …, 2000
4252000
Making mashups with marmite: towards end-user programming for the web
J Wong, JI Hong
Proceedings of the SIGCHI conference on Human factors in computing systems …, 2007
4032007
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing
J Lin, S Amini, JI Hong, N Sadeh, J Lindqvist, J Zhang
Proceedings of the 2012 ACM conference on ubiquitous computing, 501-510, 2012
4002012
The state of phishing attacks
JI Hong
Commun. ACM 55 (1), 74-81, 2012
376*2012
Understanding and capturing people's privacy policies in a mobile social networking application
N Sadeh, JI Hong, L Cranor, I Fette, P Kelley, M Prabaker, J Rao
Personal and Ubiquitous Computing 13 (6), 401-412, 2009
3682009
Phinding phish: Evaluating anti-phishing tools
Y Zhang, S Egelman, L Cranor, JI Hong
Network and Distributed System Security Symposium (NDSS), 2006
3422006
Personal privacy through understanding and action: five pitfalls for designers
S Lederer, JI Hong, AK Dey, JA Landay
Personal and ubiquitous computing 8 (6), 440-454, 2004
3362004
Protecting people from phishing: the design and evaluation of an embedded training email system
P Kumaraguru, Y Rhee, A Acquisti, LF Cranor, JI Hong, E Nunge
Proceedings of the SIGCHI conference on Human factors in computing systems …, 2007
3102007
The system can't perform the operation now. Try again later.
Articles 1–20