Author: Jason I. Hong

Publication Overview

Publication period start: 2012
Number of co-authors: 64

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Li, Yang, Hong, Jason I., Landay, James A. (2007): Design Challenges and Principles for Wizard of Oz Testing of Location-Enhanced Application. In IEEE Pervasive Computing, 6 (2) pp. 70-75. https://doi.ieeecomputersociety.org/10.1109/MPRV.2007.28
Hong, Jason I., Satyanarayanan, Mahadev, Cybenko, George (2007): Guest Editors\' Introduction: Security & Privacy. In IEEE Pervasive Computing, 6 (4) pp. 15-17. https://doi.ieeecomputersociety.org/10.1109/MPRV.2007.74
Hong, Jason I. (2005): Minimizing Security Risks in Ubicomp Systems. In IEEE Computer, 38 (12) pp. 118-119.
Jiang, Xiaodong, Hong, Jason I., Takayama, Leila A., Landay, James A. (2004): Ubiquitous computing for firefighters: field studies and prototypes of large displays for . In: Dykstra-Erickson, Elizabeth, Tscheligi, Manfred (eds.) Proceedings of ACM CHI 2004 Conference on Human Factors in Computing Systems April 24-29, 2004, Vienna, Austria. pp. 679-686. https://doi.acm.org/10.1145/985692.985778
Lederer, Scott, Hong, Jason I., Dey, Anind K., Landay, James A. (2004): Personal privacy through understanding and action: five pitfalls for designers. In Personal and Ubiquitous Computing, 8 (6) pp. 440-454. https://dx.doi.org/10.1007/s00779-004-0304-9
Newman, Mark W., Lin, James J. W., Hong, Jason I., Landay, James A. (2003): DENIM: An Informal Web Site Design Tool Inspired by Observations of Practice. In Human-Computer Interaction, 18 (3) pp. 259-324.
Schilit, Bill N., Hong, Jason I., Gruteser, Marco (2003): Wireless Location Privacy Protection. In IEEE Computer, 36 (12) pp. 135-137. https://csdl.computer.org/comp/mags/co/2003/12/rz135abs.htm
Hong, Jason I., Landay, James A. (2001): An Infrastructure Approach to Context-Aware Computing. In Human-Computer Interaction, 16 (2) pp. 287-303.
Hong, Jason I., Heer, Jeffrey, Waterson, Sarah, Landay, James A. (2001): WebQuilt: A proxy-based approach to remote web usability testing. In ACM Transactions on Information Systems, 19 (3) pp. 263-285. https://dl.acm.org/doi/10.1145/502115.502118
Hong, Jason I., Landay, James A. (2001): A Context/Communication Information Agent. In Personal and Ubiquitous Computing, 5 (1) pp. 78-81. https://springerlink.metapress.com/openurl.asp?genre=article&issn=1617-4917&volume=5&issue=1&spage=78
Lin, James, Newman, Mark W., Hong, Jason I., Landay, James A. (2000): DENIM: Finding a Tighter Fit between Tools and Practice for Web Site Design. In: Turner, Thea, Szwillus, Gerd, Czerwinski, Mary, Paterno, Fabio, Pemberton, Steven (eds.) Proceedings of the ACM CHI 2000 Human Factors in Computing Systems Conference April 1-6, 2000, The Hague, The Netherlands. pp. 510-517. https://www.acm.org/pubs/articles/proceedings/chi/332040/p510-lin/p510-lin.pdf
Hong, Jason I., Landay, James A. (2000): SATIN: A Toolkit for Informal Ink-Based Applications. In: Ackerman, Mark S., Edwards, Keith (eds.) Proceedings of the 13th annual ACM symposium on User interface software and technology November 06 - 08, 2000, San Diego, California, United States. pp. 63-72. https://acm.org/pubs/articles/proceedings/uist/354401/p63-hong/p63-hong.pdf
Li, Yang, Hong, Jason I., Landay, James A. (2004): Topiary: a tool for prototyping location-enhanced applications. In: Proceedings of the 2004 ACM Symposium on User Interface Software and Technology , 2004, . pp. 217-226. https://doi.acm.org/10.1145/1029632.1029671
Tang, Karen P., Keyani, Pedram, Fogarty, James, Hong, Jason I. (2006): Putting people in their place: an anonymous and privacy-sensitive approach to collecting s. In: Proceedings of ACM CHI 2006 Conference on Human Factors in Computing Systems , 2006, . pp. 93-102. https://doi.acm.org/10.1145/1124772.1124788
Wong, Jeffrey, Hong, Jason I. (2007): Making mashups with marmite: towards end-user programming for the web. In: Proceedings of ACM CHI 2007 Conference on Human Factors in Computing Systems , 2007, . pp. 1435-1444. https://doi.acm.org/10.1145/1240624.1240842
Newman, Mark W., Sedivy, Jana Z., Neuwirth, Christine, Edwards, W. Keith, Hong, Jason I., Izadi, Shahram, Marcelo, Karen, Smith, Trevor F., Sedivy, Jana, Newman, Mark (2002): Designing for serendipity: supporting end-user configuration of ubiquitous computing envir. In: Proceedings of DIS02: Designing Interactive Systems: Processes, Practices, Methods, & Techniques , 2002, . pp. 147-156. https://doi.acm.org/10.1145/778712.778736
Hong, Jason I., Ng, Jennifer D., Lederer, Scott, Landay, James A. (2004): Privacy risk models for designing privacy-sensitive ubiquitous computing systems. In: Proceedings of DIS04: Designing Interactive Systems: Processes, Practices, Methods, & Techniques , 2004, . pp. 91-100. https://doi.acm.org/10.1145/1013115.1013129
Chung, Eric S., Hong, Jason I., Lin, James, Prabaker, Madhu K., Landay, James A., Liu, Alan L. (2004): Development and evaluation of emerging design patterns for ubiquitous computing. In: Proceedings of DIS04: Designing Interactive Systems: Processes, Practices, Methods, & Techniques , 2004, . pp. 233-242. https://doi.acm.org/10.1145/1013115.1013148
Zhang, Yue, Hong, Jason I., Cranor, Lorrie F. (2007): Cantina: a content-based approach to detecting phishing web sites. In: Proceedings of the 2007 International Conference on the World Wide Web , 2007, . pp. 639-648. https://doi.acm.org/10.1145/1242572.1242659
Won, Sungjoon Steve, Jin, Jing, Hong, Jason I. (2009): Contextual web history: using visual and contextual cues to improve web browser history. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 1457-1466. https://doi.acm.org/10.1145/1518701.1518922
Chau, Duen Horng, Kittur, Aniket, Faloutsos, Christos, Hong, Jason I. (2009): SHIFTR: a user-directed, link-based system for ad hoc sensemaking of large heterogeneous d. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 3535-3536. https://doi.acm.org/10.1145/1520340.1520529
Tang, Karen P., Hong, Jason I., Smith, Ian E., Ha, Annie, Satpathy, Lalatendu (2007): Memory karaoke: using a location-aware mobile reminiscence tool to support aging in place. In: Cheok, Adrian David, Chittaro, Luca (eds.) Proceedings of the 9th Conference on Human-Computer Interaction with Mobile Devices and Services - Mobile HCI 2007 September 9-12, 2007, Singapore. pp. 305-312. https://doi.acm.org/10.1145/1377999.1378023
Heer, Jeffrey, Newberger, Alan, Beckmann, Chris, Hong, Jason I. (2003): liquid: Context-Aware Distributed Queries. In: Dey, Anind K., Schmidt, Albrecht, McCarthy, Joseph F. (eds.) UbiComp 2003 Ubiquitous Computing - 5th International Conference October 12-15, 2003, Seattle, WA, USA. pp. 140-148. https://link.springer.de/link/service/series/0558/bibs/2864/28640140.htm
Jiang, Xiaodong, Hong, Jason I., Landay, James A. (2002): Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing. In: Borriello, Gaetano, Holmquist, Lars Erik (eds.) UbiComp 2002 Ubiquitous Computing - 4th International Conference September 29 - October 1, 2002, Göteborg, Sweden. pp. 176-193. https://link.springer.de/link/service/series/0558/bibs/2498/24980176.htm
Hsieh, Gary, Tang, Karen P., Low, Wai Yong, Hong, Jason I. (2007): Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Conte. In: Krumm, John, Abowd, Gregory D., Seneviratne, Aruna, Strang, Thomas (eds.) UbiComp 2007 Ubiquitous Computing - 9th International Conference September 16-19, 2007, Innsbruck, Austria. pp. 91-108. https://dx.doi.org/10.1007/978-3-540-74853-3_6
Hong, Jason I., Landay, James A. (2001): WebQuilt: a framework for capturing and visualizing the web experience. In: Proceedings of the 2001 International Conference on the World Wide Web , 2001, . pp. 717-724. https://doi.acm.org/10.1145/371920.372188
Xiang, Guang, Hong, Jason I. (2009): A hybrid phish detection approach by identity discovery and keywords retrieval. In: Proceedings of the 2009 International Conference on the World Wide Web , 2009, . pp. 571-580. https://doi.acm.org/10.1145/1526709.1526786
Jiang, Xiaodong, Chen, Nicholas Y., Hong, Jason I., Wang, Kevin, Takayama, Leila, Landay, James A. (2004): Siren: Context-aware Computing for Firefighting. In: Ferscha, Alois, Mattern, Friedemann (eds.) PERVASIVE 2004 - Pervasive Computing, Second International Conference April 21-23, 2004, Vienna, Austria. pp. 87-105. https://link.springer.de/link/service/series/0558/bibs/3001/30010087.htm
Lin, Jialiu, Xiang, Guang, Hong, Jason I., Sadeh, Norman (2010): Modeling people's place naming preferences in location sharing. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 75-84. https://doi.acm.org/10.1145/1864349.1864362
Tang, Karen P., Lin, Jialiu, Hong, Jason I., Siewiorek, Daniel P., Sadeh, Norman (2010): Rethinking location sharing: exploring the implications of social-driven vs. purpose-drive. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 85-94. https://doi.acm.org/10.1145/1864349.1864363
Chau, Duen Horng, Kittur, Aniket, Hong, Jason I., Faloutsos, Christos (2011): Apolo: making sense of large network data by combining rich user interaction and machine l. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 167-176. https://dx.doi.org/10.1145/1978942.1978967
Liu, Gang, Xiang, Guang, Pendleton, Bryan A., Hong, Jason I., Liu, Wenyin (2011): Smartening the crowds: computational techniques for improving human verification to fight . In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 8. https://dx.doi.org/10.1145/2078827.2078838
Wiese, Jason, Kelley, Patrick Gage, Cranor, Lorrie Faith, Dabbish, Laura, Hong, Jason I., Zimmerman, John (2011): Are you close with me? are you nearby?: investigating social groups, closeness, and willin. In: Proceedings of the 2011 International Conference on Uniquitous Computing , 2011, . pp. 197-206. https://dx.doi.org/10.1145/2030112.2030140
Tang, Karen P., Hong, Jason I., Siewiorek, Daniel P. (2011): Understanding how visual representations of location feeds affect end-user privacy concern. In: Proceedings of the 2011 International Conference on Uniquitous Computing , 2011, . pp. 207-216. https://dx.doi.org/10.1145/2030112.2030141
Lin, Jialiu, Sadeh, Norman, Amini, Shahriyar, Lindqvist, Janne, Hong, Jason I., Zhang, Joy (2012): Expectation and purpose: understanding users' mental models of mobile app privacy through . In: Proceedings of the 2012 International Conference on Uniquitous Computing , 2012, . pp. 501-510. https://dx.doi.org/10.1145/2370216.2370290
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel stuck? Want Freedom?

Get one powerful email each week, like 326,012 others.

Learn to design a life you love.

Next email in:
5
days
20
hrs
55
mins
55
secs