Jason I. Hong

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

44EESungjoon Steve Won, Jing Jin, Jason I. Hong: Contextual web history: using visual and contextual cues to improve web browser history. CHI 2009: 1457-1466
43EEJanice Y. Tsai, Patrick Gage Kelley, Paul Hankes Drielsma, Lorrie Faith Cranor, Jason I. Hong, Norman M. Sadeh: Who's viewed you?: the impact of feedback in a mobile location-sharing application. CHI 2009: 2003-2012
42EEDuen Horng Chau, Aniket Kittur, Christos Faloutsos, Jason I. Hong: SHIFTR: a user-directed, link-based system for ad hoc sensemaking of large heterogeneous data collections. CHI Extended Abstracts 2009: 3535-3536
41EEGuang Xiang, Jason I. Hong: A hybrid phish detection approach by identity discovery and keywords retrieval. WWW 2009: 571-580
40EESerge Egelman, Lorrie Faith Cranor, Jason I. Hong: You've been warned: an empirical study of the effectiveness of web browser phishing warnings. CHI 2008: 1065-1074
39EEDuen Horng Chau, Christos Faloutsos, Hanghang Tong, Jason I. Hong, Brian Gallagher, Tina Eliassi-Rad: GRAPHITE: A Visual Query System for Large Graphs. ICDM Workshops 2008: 963-966
38EEJeffrey Wong, Jason I. Hong: Making mashups with marmite: towards end-user programming for the web. CHI 2007: 1435-1444
37EEPonnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge: Protecting people from phishing: the design and evaluation of an embedded training email system. CHI 2007: 905-914
36EEMichael F. Marotta, Purin Phanichphant, Patrick Malatack, Tej Shah, Greg Price, Thankam Thyvalikakath, Titus Schleyer, Jason I. Hong: Design and evaluation of 3d models for electronic dental records. CHI Extended Abstracts 2007: 2567-2572
35EEKaren P. Tang, Jason I. Hong, Ian E. Smith, Annie Ha, Lalatendu Satpathy: Memory karaoke: using a location-aware mobile reminiscence tool to support aging in place. Mobile HCI 2007: 305-312
34EELorrie Faith Cranor, Serge Egelman, Jason I. Hong, Yue Zhang: Phinding Phish: An Evaluation of Anti-Phishing Toolbars. NDSS 2007
33EESteve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge: Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. SOUPS 2007: 88-99
32EEGary Hsieh, Karen P. Tang, Wai Yong Low, Jason I. Hong: Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Contextual IM. Ubicomp 2007: 91-108
31EEYue Zhang, Jason I. Hong, Lorrie Faith Cranor: Cantina: a content-based approach to detecting phishing web sites. WWW 2007: 639-648
30EEPonnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sharique Hasan, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong: Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. eCrime Researchers Summit 2007: 70-81
29EEGiovanni Iachello, Jason I. Hong: End-User Privacy in Human-Computer Interaction. Foundations and Trends in Human-Computer Interaction 1(1): 1-137 (2007)
28EEYang Li, Jason I. Hong, James A. Landay: Design Challenges and Principles for Wizard of Oz Testing of Location-Enhanced Applications. IEEE Pervasive Computing 6(2): 70-75 (2007)
27EEJason I. Hong, Mahadev Satyanarayanan, George Cybenko: Guest Editors' Introduction: Security & Privacy. IEEE Pervasive Computing 6(4): 15-17 (2007)
26EEKaren P. Tang, Pedram Keyani, James Fogarty, Jason I. Hong: Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications. CHI 2006: 93-102
25EEJennifer Ng, Jonathan Terleski, Jason I. Hong: Whisper: analysis and design for a community event service. CHI Extended Abstracts 2006: 1151-1156
24EEJason I. Hong, Jeffrey Wong: Marmite: end-user programming for the web. CHI Extended Abstracts 2006: 1541-1546
23 Jason I. Hong: Minimizing Security Risks in Ubicomp Systems. IEEE Computer 38(12): 118-119 (2005)
22EEXiaodong Jiang, Jason I. Hong, Leila Takayama, James A. Landay: Ubiquitous computing for firefighters: field studies and prototypes of large displays for incident command. CHI 2004: 679-686
21EEEric S. Chung, Jason I. Hong, James Lin, Madhu K. Prabaker, James A. Landay, Alan L. Liu: Development and evaluation of emerging design patterns for ubiquitous computing. Conference on Designing Interactive Systems 2004: 233-242
20EEJason I. Hong, Jennifer D. Ng, Scott Lederer, James A. Landay: Privacy risk models for designing privacy-sensitive ubiquitous computing systems. Conference on Designing Interactive Systems 2004: 91-100
19 Jason I. Hong, James A. Landay: An Architecture for Privacy-Sensitive Ubiquitous Computing. MobiSys 2004
18EEXiaodong Jiang, Nicholas Y. Chen, Jason I. Hong, Kevin Wang, Leila Takayama, James A. Landay: Siren: Context-aware Computing for Firefighting. Pervasive 2004: 87-105
17EEYang Li, Jason I. Hong, James A. Landay: Topiary: a tool for prototyping location-enhanced applications. UIST 2004: 217-226
16EEScott Lederer, Jason I. Hong, Anind K. Dey, James A. Landay: Personal privacy through understanding and action: five pitfalls for designers. Personal and Ubiquitous Computing 8(6): 440-454 (2004)
15EELeila Takayama, Lawrence Leung, Xiaodong Jiang, Jason I. Hong: You're getting warmer!: how proximity information affects search behavior in physical spaces. CHI Extended Abstracts 2003: 1028-1029
14EEJeffrey Heer, Alan Newberger, Chris Beckmann, Jason I. Hong: liquid: Context-Aware Distributed Queries. Ubicomp 2003: 140-148
13EEBill N. Schilit, Anthony LaMarca, Gaetano Borriello, William G. Griswold, David W. McDonald, Edward D. Lazowska, Anand Balachandran, Jason I. Hong, Vaughn Iverson: Challenge: ubiquitous location-aware computing and the "place lab" initiative. WMASH 2003: 29-35
12EEBill N. Schilit, Jason I. Hong, Marco Gruteser: Wireless Location Privacy Protection. IEEE Computer 36(12): 135-137 (2003)
11EEJason I. Hong: The context fabric: an infrastructure for context-aware computing. CHI Extended Abstracts 2002: 554-555
10EEMark W. Newman, Jana Z. Sedivy, Christine Neuwirth, W. Keith Edwards, Jason I. Hong, Shahram Izadi, Karen Marcelo, Trevor F. Smith: Designing for serendipity: supporting end-user configuration of ubiquitous computing environments. Symposium on Designing Interactive Systems 2002: 147-156
9EEXiaodong Jiang, Jason I. Hong, James A. Landay: Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing. Ubicomp 2002: 176-193
8EEJason I. Hong, James A. Landay: WebQuilt: a framework for capturing and visualizing the web experience. WWW 2001: 717-724
7EEJason I. Hong, Jeffrey Heer, Sarah Waterson, James A. Landay: WebQuilt: A proxy-based approach to remote web usability testing. ACM Trans. Inf. Syst. 19(3): 263-285 (2001)
6EEJason I. Hong, James A. Landay: A Context/Communication Information Agent. Personal and Ubiquitous Computing 5(1): 78-81 (2001)
5EEJames Lin, Mark W. Newman, Jason I. Hong, James A. Landay: DENIM: finding a tighter fit between tools and practice for Web site design. CHI 2000: 510-517
4EEDanyel Fisher, Kris Hildrum, Jason I. Hong, Mark W. Newman, Megan Thomas, Rich Vuduc: SWAMI: a framework for collaborative filtering algorithm development and evaluation. SIGIR 2000: 366-368
3EEJason I. Hong, James A. Landay: SATIN: a toolkit for informal ink-based applications. UIST 2000: 63-72
2EEMichael Chen, Marti A. Hearst, Jason I. Hong, James Lin: Cha-Cha: A System for Organizing Intranet Search Results. USENIX Symposium on Internet Technologies and Systems 1999
1EEGregory D. Abowd, Christopher G. Atkeson, Jason I. Hong, Sue Long, Rob Kooper, Mike Pinkerton: Cyberguide: A mobile context-aware tour guide. Wireless Networks 3(5): 421-433 (1997)

Coauthor Index

1Gregory D. Abowd [1]
2Alessandro Acquisti [30] [33] [37]
3Christopher G. Atkeson [1]
4Anand Balachandran [13]
5Chris Beckmann [14]
6Gaetano Borriello [13]
7Duen Horng Chau [39] [42]
8Michael Chen [2]
9Nicholas Y. Chen [18]
10Eric S. Chung [21]
11Lorrie Faith Cranor [30] [31] [33] [34] [37] [40] [43]
12George Cybenko [27]
13Anind K. Dey [16]
14Paul Hankes Drielsma [43]
15W. Keith Edwards [10]
16Serge Egelman [34] [40]
17Tina Eliassi-Rad [39]
18Christos Faloutsos [39] [42]
19Danyel Fisher [4]
20James Fogarty [26]
21Brian Gallagher [39]
22William G. Griswold [13]
23Marco Gruteser [12]
24Annie Ha [35]
25Sharique Hasan [30]
26Marti A. Hearst [2]
27Jeffrey Heer [7] [14]
28Kirsten Hildrum (Kris Hildrum) [4]
29Gary Hsieh [32]
30Giovanni Iachello [29]
31Vaughn Iverson [13]
32Shahram Izadi [10]
33Xiaodong Jiang [9] [15] [18] [22]
34Jing Jin [44]
35Patrick Gage Kelley [43]
36Pedram Keyani [26]
37Aniket Kittur [42]
38Rob Kooper [1]
39Ponnurangam Kumaraguru [30] [33] [37]
40Anthony LaMarca [13]
41James A. Landay [3] [5] [6] [7] [8] [9] [16] [17] [18] [19] [20] [21] [22] [28]
42Edward D. Lazowska [13]
43Scott Lederer [16] [20]
44Lawrence Leung [15]
45Yang Li [17] [28]
46James Lin [2] [5] [21]
47Alan L. Liu [21]
48Sue Long [1]
49Wai Yong Low [32]
50Bryant Magnien [33]
51Patrick Malatack [36]
52Karen Marcelo [10]
53Michael F. Marotta [36]
54David W. McDonald [13]
55Christine Neuwirth [10]
56Alan Newberger [14]
57Mark W. Newman [4] [5] [10]
58Jennifer Ng [25]
59Jennifer D. Ng [20]
60Elizabeth Nunge [33] [37]
61Purin Phanichphant [36]
62Mike Pinkerton [1]
63Madhu K. Prabaker [21]
64Greg Price [36]
65Yong Rhee [30] [37]
66Norman M. Sadeh [43]
67Lalatendu Satpathy [35]
68Mahadev Satyanarayanan (M. Satyanarayanan) [27]
69Bill N. Schilit [12] [13]
70Titus Schleyer [36]
71Jana Z. Sedivy [10]
72Tej Shah [36]
73Steve Sheng [30] [33]
74Ian E. Smith [35]
75Trevor F. Smith [10]
76Leila Takayama [15] [18] [22]
77Karen P. Tang [26] [32] [35]
78Jonathan Terleski [25]
79Megan Thomas [4]
80Thankam Thyvalikakath [36]
81Hanghang Tong [39]
82Janice Y. Tsai [43]
83Richard W. Vuduc (Rich Vuduc) [4]
84Kevin Wang [18]
85Sarah Waterson [7]
86Sungjoon Steve Won [44]
87Jeffrey Wong [24] [38]
88Guang Xiang [41]
89Yue Zhang [31] [34]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)