Author: Jason Hong

Publications

Publication period start: 2012
Number of co-authors: 39

Co-authors

Number of publications with favourite co-authors
Lorrie Cranor
5
Eran Toch
5
Norman Sadeh
6

Productive Colleagues

Most productive colleagues in number of publications
Aniket Kittur
27
Lorrie Faith Cranor
44
John Zimmerman
51

Publications

Iachello, Giovanni, Hong, Jason (2007): End-User Privacy in Human-Computer Interaction. In Foundations and Trends in Human-Computer Interaction, 1 (1) pp. 1-137. https://dx.doi.org/10.1561/1100000004

Kumaraguru, Ponnurangam, Rhee, Yong, Acquisti, Alessandro, Cranor, Lorrie Faith, Hong, Jason, Nunge, Elizabeth (2007): Protecting people from phishing: the design and evaluation of an embedded training email s. In: Proceedings of ACM CHI 2007 Conference on Human Factors in Computing Systems , 2007, . pp. 905-914. https://doi.acm.org/10.1145/1240624.1240760

Fisher, Danyel, Hildrum, Kris, Hong, Jason, Newman, Mark, Thomas, Megan, Vuduc, Rich (2000): SWAMI: A Framework for Collaborative Filtering Algorithm Development and Evaluation. In: Proceedings of the 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval , 2000, . pp. 366-368. https://www.acm.org/pubs/articles/proceedings/ir/345508/p366-fisher/p366-fisher.pdf

Kumaraguru, Ponnurangam, Rhee, Yong, Sheng, Steve, Hasan, Sharique, Acquisti, Alessandro, Cranor, Lorrie Faith, Hong, Jason (2007): Getting users to pay attention to anti-phishing education: evaluation of retention and tra. In: Proceedings of the 2007 Anti-Phishing Working Groups eCrime Researchers Summit , 2007, . pp. 70-81. https://doi.acm.org/10.1145/1299015.1299022

Egelman, Serge, Cranor, Lorrie Faith, Hong, Jason (2008): You\'ve been warned: an empirical study of the effectiveness of web browser phishing warni. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008, . pp. 1065-1074. https://doi.acm.org/10.1145/1357054.1357219

Iachello, Giovanni, Hong, Jason (0): End-User Privacy in Human-Computer Interaction. In Foundations and Trends in Human-Computer Interaction, 1 (1) pp. 1-137. https://http:/dx.doi.org/10.1561/1100000004

Sheng, Steve, Magnien, Bryant, Kumaraguru, Ponnurangam, Acquisti, Alessandro, Cranor, Lorrie Faith, Hong, Jason, Nunge, Elizabeth (2007): Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall fo. In: Proceedings of the 2007 Symposium on Usable Privacy and Security , 2007, . pp. 88-99. https://cups.cs.cmu.edu/soups/2007/proceedings/p88_sheng.pdf

Tsai, Janice Y., Kelley, Patrick, Drielsma, Paul, Cranor, Lorrie Faith, Hong, Jason, Sadeh, Norman (2009): Who\'s viewed you?: the impact of feedback in a mobile location-sharing application. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 2003-2012. https://doi.acm.org/10.1145/1518701.1519005

Kumaraguru, Ponnurangam, Cranshaw, Justin, Acquisti, Alessandro, Cranor, Lorrie, Hong, Jason, Blair, Mary Ann, Pham, Theodore (2009): School of phish: a real-word evaluation of anti-phishing training. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 3. https://doi.acm.org/10.1145/1572532.1572536

Hayashi, Eiji, Hong, Jason, Christin, Nicolas (2009): Educated guess on graphical authentication schemes: vulnerabilities and countermeasures. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 25. https://doi.acm.org/10.1145/1572532.1572564

Toch, Eran, Ravichandran, Ramprasad, Cranor, Lorrie, Drielsma, Paul, Hong, Jason, Kelley, Patrick, Sadeh, Norman, Tsai, Janice (2009): Analyzing use of privacy policy attributes in a location sharing application. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 32. https://doi.acm.org/10.1145/1572532.1572571

Tsai, Janice, Kelley, Patrick, Drielsma, Paul Hankes, Cranor, Lorrie, Hong, Jason, Sadeh, Norman (2009): Who\'s viewed you?: the impact of feedback in a mobile location-sharing application. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 43. https://doi.acm.org/10.1145/1572532.1572583

Cranshaw, Justin, Toch, Eran, Hong, Jason, Kittur, Aniket, Sadeh, Norman (2010): Bridging the gap between physical location and online social networks. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 119-128. https://doi.acm.org/10.1145/1864349.1864380

Toch, Eran, Cranshaw, Justin, Drielsma, Paul Hankes, Tsai, Janice Y., Kelley, Patrick Gage, Springfield, James, Cranor, Lorrie, Hong, Jason, Sadeh, Norman (2010): Empirical models of privacy in location sharing. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 129-138. https://doi.acm.org/10.1145/1864349.1864364

Toch, Eran, Cranshaw, Justin, Hankes-Drielsma, Paul, Springfield, Jay, Kelley, Patrick Gage, Cranor, Lorrie, Hong, Jason, Sadeh, Norman (2010): Locaccino: a privacy-centric location sharing application. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 381-382. https://doi.acm.org/10.1145/1864431.1864446

Toch, Eran, Sadeh, Norman M., Hong, Jason (2010): Generating default privacy policies for online social networks. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems , 2010, . pp. 4243-4248. https://doi.acm.org/10.1145/1753846.1754133

Hayashi, Eiji, Hong, Jason, Christin, Nicolas (2011): Security through a different kind of obscurity: evaluating distortion in graphical authent. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2055-2064. https://dx.doi.org/10.1145/1978942.1979242

Lindqvist, Janne, Cranshaw, Justin, Wiese, Jason, Hong, Jason, Zimmerman, John (2011): I'm the mayor of my house: examining why people use foursquare -- a social-driven location. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2409-2418. https://dx.doi.org/10.1145/1978942.1979295

Hayashi, Eiji, Hong, Jason (2011): A diary study of password usage in daily life. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 2627-2630. https://dx.doi.org/10.1145/1978942.1979326

Zheng, Yu, Hong, Jason (2012): The preface of the 4<sup>th</sup> International Workshop on Location-Based Social Networks. In: Proceedings of the 2012 International Conference on Uniquitous Computing , 2012, . pp. 894-896.

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
314,867 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
314,867 designers enjoy our newsletter—sure you don’t want to receive it?