2009 |
44 | EE | Sungjoon Steve Won,
Jing Jin,
Jason I. Hong:
Contextual web history: using visual and contextual cues to improve web browser history.
CHI 2009: 1457-1466 |
43 | EE | Janice Y. Tsai,
Patrick Gage Kelley,
Paul Hankes Drielsma,
Lorrie Faith Cranor,
Jason I. Hong,
Norman M. Sadeh:
Who's viewed you?: the impact of feedback in a mobile location-sharing application.
CHI 2009: 2003-2012 |
42 | EE | Duen Horng Chau,
Aniket Kittur,
Christos Faloutsos,
Jason I. Hong:
SHIFTR: a user-directed, link-based system for ad hoc sensemaking of large heterogeneous data collections.
CHI Extended Abstracts 2009: 3535-3536 |
41 | EE | Guang Xiang,
Jason I. Hong:
A hybrid phish detection approach by identity discovery and keywords retrieval.
WWW 2009: 571-580 |
2008 |
40 | EE | Serge Egelman,
Lorrie Faith Cranor,
Jason I. Hong:
You've been warned: an empirical study of the effectiveness of web browser phishing warnings.
CHI 2008: 1065-1074 |
39 | EE | Duen Horng Chau,
Christos Faloutsos,
Hanghang Tong,
Jason I. Hong,
Brian Gallagher,
Tina Eliassi-Rad:
GRAPHITE: A Visual Query System for Large Graphs.
ICDM Workshops 2008: 963-966 |
2007 |
38 | EE | Jeffrey Wong,
Jason I. Hong:
Making mashups with marmite: towards end-user programming for the web.
CHI 2007: 1435-1444 |
37 | EE | Ponnurangam Kumaraguru,
Yong Rhee,
Alessandro Acquisti,
Lorrie Faith Cranor,
Jason I. Hong,
Elizabeth Nunge:
Protecting people from phishing: the design and evaluation of an embedded training email system.
CHI 2007: 905-914 |
36 | EE | Michael F. Marotta,
Purin Phanichphant,
Patrick Malatack,
Tej Shah,
Greg Price,
Thankam Thyvalikakath,
Titus Schleyer,
Jason I. Hong:
Design and evaluation of 3d models for electronic dental records.
CHI Extended Abstracts 2007: 2567-2572 |
35 | EE | Karen P. Tang,
Jason I. Hong,
Ian E. Smith,
Annie Ha,
Lalatendu Satpathy:
Memory karaoke: using a location-aware mobile reminiscence tool to support aging in place.
Mobile HCI 2007: 305-312 |
34 | EE | Lorrie Faith Cranor,
Serge Egelman,
Jason I. Hong,
Yue Zhang:
Phinding Phish: An Evaluation of Anti-Phishing Toolbars.
NDSS 2007 |
33 | EE | Steve Sheng,
Bryant Magnien,
Ponnurangam Kumaraguru,
Alessandro Acquisti,
Lorrie Faith Cranor,
Jason I. Hong,
Elizabeth Nunge:
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish.
SOUPS 2007: 88-99 |
32 | EE | Gary Hsieh,
Karen P. Tang,
Wai Yong Low,
Jason I. Hong:
Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Contextual IM.
Ubicomp 2007: 91-108 |
31 | EE | Yue Zhang,
Jason I. Hong,
Lorrie Faith Cranor:
Cantina: a content-based approach to detecting phishing web sites.
WWW 2007: 639-648 |
30 | EE | Ponnurangam Kumaraguru,
Yong Rhee,
Steve Sheng,
Sharique Hasan,
Alessandro Acquisti,
Lorrie Faith Cranor,
Jason I. Hong:
Getting users to pay attention to anti-phishing education: evaluation of retention and transfer.
eCrime Researchers Summit 2007: 70-81 |
29 | EE | Giovanni Iachello,
Jason I. Hong:
End-User Privacy in Human-Computer Interaction.
Foundations and Trends in Human-Computer Interaction 1(1): 1-137 (2007) |
28 | EE | Yang Li,
Jason I. Hong,
James A. Landay:
Design Challenges and Principles for Wizard of Oz Testing of Location-Enhanced Applications.
IEEE Pervasive Computing 6(2): 70-75 (2007) |
27 | EE | Jason I. Hong,
Mahadev Satyanarayanan,
George Cybenko:
Guest Editors' Introduction: Security & Privacy.
IEEE Pervasive Computing 6(4): 15-17 (2007) |
2006 |
26 | EE | Karen P. Tang,
Pedram Keyani,
James Fogarty,
Jason I. Hong:
Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications.
CHI 2006: 93-102 |
25 | EE | Jennifer Ng,
Jonathan Terleski,
Jason I. Hong:
Whisper: analysis and design for a community event service.
CHI Extended Abstracts 2006: 1151-1156 |
24 | EE | Jason I. Hong,
Jeffrey Wong:
Marmite: end-user programming for the web.
CHI Extended Abstracts 2006: 1541-1546 |
2005 |
23 | | Jason I. Hong:
Minimizing Security Risks in Ubicomp Systems.
IEEE Computer 38(12): 118-119 (2005) |
2004 |
22 | EE | Xiaodong Jiang,
Jason I. Hong,
Leila Takayama,
James A. Landay:
Ubiquitous computing for firefighters: field studies and prototypes of large displays for incident command.
CHI 2004: 679-686 |
21 | EE | Eric S. Chung,
Jason I. Hong,
James Lin,
Madhu K. Prabaker,
James A. Landay,
Alan L. Liu:
Development and evaluation of emerging design patterns for ubiquitous computing.
Conference on Designing Interactive Systems 2004: 233-242 |
20 | EE | Jason I. Hong,
Jennifer D. Ng,
Scott Lederer,
James A. Landay:
Privacy risk models for designing privacy-sensitive ubiquitous computing systems.
Conference on Designing Interactive Systems 2004: 91-100 |
19 | | Jason I. Hong,
James A. Landay:
An Architecture for Privacy-Sensitive Ubiquitous Computing.
MobiSys 2004 |
18 | EE | Xiaodong Jiang,
Nicholas Y. Chen,
Jason I. Hong,
Kevin Wang,
Leila Takayama,
James A. Landay:
Siren: Context-aware Computing for Firefighting.
Pervasive 2004: 87-105 |
17 | EE | Yang Li,
Jason I. Hong,
James A. Landay:
Topiary: a tool for prototyping location-enhanced applications.
UIST 2004: 217-226 |
16 | EE | Scott Lederer,
Jason I. Hong,
Anind K. Dey,
James A. Landay:
Personal privacy through understanding and action: five pitfalls for designers.
Personal and Ubiquitous Computing 8(6): 440-454 (2004) |
2003 |
15 | EE | Leila Takayama,
Lawrence Leung,
Xiaodong Jiang,
Jason I. Hong:
You're getting warmer!: how proximity information affects search behavior in physical spaces.
CHI Extended Abstracts 2003: 1028-1029 |
14 | EE | Jeffrey Heer,
Alan Newberger,
Chris Beckmann,
Jason I. Hong:
liquid: Context-Aware Distributed Queries.
Ubicomp 2003: 140-148 |
13 | EE | Bill N. Schilit,
Anthony LaMarca,
Gaetano Borriello,
William G. Griswold,
David W. McDonald,
Edward D. Lazowska,
Anand Balachandran,
Jason I. Hong,
Vaughn Iverson:
Challenge: ubiquitous location-aware computing and the "place lab" initiative.
WMASH 2003: 29-35 |
12 | EE | Bill N. Schilit,
Jason I. Hong,
Marco Gruteser:
Wireless Location Privacy Protection.
IEEE Computer 36(12): 135-137 (2003) |
2002 |
11 | EE | Jason I. Hong:
The context fabric: an infrastructure for context-aware computing.
CHI Extended Abstracts 2002: 554-555 |
10 | EE | Mark W. Newman,
Jana Z. Sedivy,
Christine Neuwirth,
W. Keith Edwards,
Jason I. Hong,
Shahram Izadi,
Karen Marcelo,
Trevor F. Smith:
Designing for serendipity: supporting end-user configuration of ubiquitous computing environments.
Symposium on Designing Interactive Systems 2002: 147-156 |
9 | EE | Xiaodong Jiang,
Jason I. Hong,
James A. Landay:
Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing.
Ubicomp 2002: 176-193 |
2001 |
8 | EE | Jason I. Hong,
James A. Landay:
WebQuilt: a framework for capturing and visualizing the web experience.
WWW 2001: 717-724 |
7 | EE | Jason I. Hong,
Jeffrey Heer,
Sarah Waterson,
James A. Landay:
WebQuilt: A proxy-based approach to remote web usability testing.
ACM Trans. Inf. Syst. 19(3): 263-285 (2001) |
6 | EE | Jason I. Hong,
James A. Landay:
A Context/Communication Information Agent.
Personal and Ubiquitous Computing 5(1): 78-81 (2001) |
2000 |
5 | EE | James Lin,
Mark W. Newman,
Jason I. Hong,
James A. Landay:
DENIM: finding a tighter fit between tools and practice for Web site design.
CHI 2000: 510-517 |
4 | EE | Danyel Fisher,
Kris Hildrum,
Jason I. Hong,
Mark W. Newman,
Megan Thomas,
Rich Vuduc:
SWAMI: a framework for collaborative filtering algorithm development and evaluation.
SIGIR 2000: 366-368 |
3 | EE | Jason I. Hong,
James A. Landay:
SATIN: a toolkit for informal ink-based applications.
UIST 2000: 63-72 |
1999 |
2 | EE | Michael Chen,
Marti A. Hearst,
Jason I. Hong,
James Lin:
Cha-Cha: A System for Organizing Intranet Search Results.
USENIX Symposium on Internet Technologies and Systems 1999 |
1997 |
1 | EE | Gregory D. Abowd,
Christopher G. Atkeson,
Jason I. Hong,
Sue Long,
Rob Kooper,
Mike Pinkerton:
Cyberguide: A mobile context-aware tour guide.
Wireless Networks 3(5): 421-433 (1997) |