Jason Hong
Title
Cited by
Cited by
Year
Cyberguide: A mobile context‐aware tour guide
GD Abowd, CG Atkeson, J Hong, S Long, R Kooper, M Pinkerton
Wireless networks 3 (5), 421-433, 1997
22151997
Cantina: a content-based approach to detecting phishing web sites
Y Zhang, JI Hong, LF Cranor
Proceedings of the 16th international conference on World Wide Web, 639-648, 2007
8772007
The design of sites: patterns, principles, and processes for crafting a customer-centered Web experience
JA Landay, JI Hong
Addison-Wesley Professional, 2003
875*2003
An Architecture for Privacy-Sensitive Ubiquitous Computing
JI Hong, JA Landay
Proceedings of the 2nd international conference on Mobile systems …, 2004
7862004
The livehoods project: Utilizing social media to understand the dynamics of a city
J Cranshaw, R Schwartz, JI Hong, N Sadeh
Sixth International AAAI Conference on Weblogs and Social Media, 2012
6862012
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
S Egelman, LF Cranor, JI Hong
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
6732008
DENIM: finding a tighter fit between tools and practice for Web site design
J Lin, MW Newman, JI Hong, JA Landay
Proceedings of the SIGCHI conference on Human Factors in Computing Systems …, 2000
668*2000
SATIN: a toolkit for informal ink-based applications
JI Hong, JA Landay
ACM Symposium on User Interface Software and Technology, 12, 2000
600*2000
A framework of energy efficient mobile sensing for automatic user state recognition
Y Wang, J Lin, M Annavaram, QA Jacobson, JI Hong, B Krishnamachari, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
5842009
Bridging the gap between physical location and online social networks
J Cranshaw, E Toch, JI Hong, A Kittur, N Sadeh
Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010
5502010
An infrastructure approach to context-aware computing
JI Hong, JA Landay
Human–computer interaction 16 (2-4), 287-303, 2001
5442001
Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish
S Sheng, B Magnien, P Kumaraguru, A Acquisti, LF Cranor, JI Hong, ...
Proceedings of the 3rd symposium on Usable privacy and security, 88-99, 2007
5162007
I'm the mayor of my house: examining why people use foursquare-a social-driven location sharing application
J Lindqvist, J Cranshaw, J Wiese, JI Hong, J Zimmerman
Proceedings of the SIGCHI conference on human factors in computing systems …, 2011
5092011
The state of phishing attacks
JI Hong
Commun. ACM 55 (1), 74-81, 2012
4862012
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing
J Lin, S Amini, JI Hong, N Sadeh, J Lindqvist, J Zhang
Proceedings of the 2012 ACM conference on ubiquitous computing, 501-510, 2012
4672012
Making mashups with marmite: towards end-user programming for the web
J Wong, JI Hong
Proceedings of the SIGCHI conference on Human factors in computing systems …, 2007
4332007
Understanding and capturing people's privacy policies in a mobile social networking application
N Sadeh, JI Hong, L Cranor, I Fette, P Kelley, M Prabaker, J Rao
Personal and Ubiquitous Computing 13 (6), 401-412, 2009
4132009
Cantina+ a feature-rich machine learning framework for detecting phishing web sites
G Xiang, J Hong, CP Rose, L Cranor
ACM Transactions on Information and System Security (TISSEC) 14 (2), 1-28, 2011
3842011
Why people hate your app: Making sense of user feedback in a mobile app store
B Fu, J Lin, L Li, C Faloutsos, J Hong, N Sadeh
Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013
3772013
An empirical analysis of phishing blacklists
S Sheng, B Wardman, G Warner, L Cranor, J Hong, C Zhang
Carnegie Mellon University, 2009
3622009
The system can't perform the operation now. Try again later.
Articles 1–20