Follow
Jason Hong
Title
Cited by
Cited by
Year
Cyberguide: A mobile context‐aware tour guide
GD Abowd, CG Atkeson, J Hong, S Long, R Kooper, M Pinkerton
Wireless networks 3, 421-433, 1997
23491997
Cantina: a content-based approach to detecting phishing web sites
Y Zhang, JI Hong, LF Cranor
Proceedings of the 16th international conference on World Wide Web, 639-648, 2007
11982007
The design of sites: patterns, principles, and processes for crafting a customer-centered Web experience
D van Duyne, JA Landay, JI Hong
Addison-Wesley Professional, 2003
969*2003
An Architecture for Privacy-Sensitive Ubiquitous Computing
JI Hong, JA Landay
Proceedings of the 2nd international conference on Mobile systems …, 2004
8802004
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
S Egelman, LF Cranor, JI Hong
🎖 Proceedings of the SIGCHI Conference on Human Factors in Computing …, 2008
8602008
The livehoods project: Utilizing social media to understand the dynamics of a city
J Cranshaw, R Schwartz, JI Hong, N Sadeh
🏆 Sixth International AAAI Conference on Weblogs and Social Media - Best …, 2012
8152012
The state of phishing attacks
J Hong
Communications of the ACM 55 (1), 74-81, 2012
7802012
Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish
S Sheng, B Magnien, P Kumaraguru, A Acquisti, LF Cranor, JI Hong, ...
Proceedings of the 3rd symposium on Usable privacy and security, 88-99, 2007
7632007
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing
J Lin, S Amini, JI Hong, N Sadeh, J Lindqvist, J Zhang
🎖 Proceedings of the 2012 ACM conference on ubiquitous computing - Best …, 2012
6452012
SATIN: a toolkit for informal ink-based applications
JI Hong, JA Landay
ACM Symposium on User Interface Software and Technology, 12, 2000
633*2000
A framework of energy efficient mobile sensing for automatic user state recognition
Y Wang, J Lin, M Annavaram, QA Jacobson, JI Hong, B Krishnamachari, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
6302009
Bridging the gap between physical location and online social networks
J Cranshaw, E Toch, JI Hong, A Kittur, N Sadeh
Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010
6292010
I'm the mayor of my house: examining why people use foursquare-a social-driven location sharing application
J Lindqvist, J Cranshaw, J Wiese, JI Hong, J Zimmerman
Proceedings of the SIGCHI conference on human factors in computing systems …, 2011
6092011
Cantina+ a feature-rich machine learning framework for detecting phishing web sites
G Xiang, J Hong, CP Rose, L Cranor
ACM Transactions on Information and System Security (TISSEC) 14 (2), 1-28, 2011
6022011
An infrastructure approach to context-aware computing
JI Hong, JA Landay
Human–computer interaction 16 (2-4), 287-303, 2001
5812001
Why people hate your app: Making sense of user feedback in a mobile app store
B Fu, J Lin, L Li, C Faloutsos, J Hong, N Sadeh
Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013
5542013
Teaching Johnny not to fall for phish
P Kumaraguru, S Sheng, A Acquisti, LF Cranor, J Hong
ACM Transactions on Internet Technology (TOIT) 10 (2), 1-31, 2010
5252010
An empirical analysis of phishing blacklists
S Sheng, B Wardman, G Warner, L Cranor, J Hong, C Zhang
Carnegie Mellon University, 2009
5162009
DENIM: Finding a tighter fit between tools and practice for web site design
J Lin, MW Newman, JI Hong, JA Landay
Proceedings of the SIGCHI conference on Human factors in computing systems …, 2000
4782000
Making mashups with marmite: towards end-user programming for the web
J Wong, JI Hong
Proceedings of the SIGCHI conference on Human factors in computing systems …, 2007
4742007
The system can't perform the operation now. Try again later.
Articles 1–20