Publications
Co-authors
Productive Colleagues
- W. Keith Edwards
- Anind K. Dey
- James A. Landay
- 62
- 71
- 91
Publications
Li, Yang, Hong, Jason I., Landay, James A. (2007): Design Challenges and Principles for Wizard of Oz Testing of Location-Enhanced Application. In IEEE Pervasive Computing, 6 (2) pp. 70-75. https://doi.ieeecomputersociety.org/10.1109/MPRV.2007.28
Hong, Jason I., Satyanarayanan, Mahadev, Cybenko, George (2007): Guest Editors\' Introduction: Security & Privacy. In IEEE Pervasive Computing, 6 (4) pp. 15-17. https://doi.ieeecomputersociety.org/10.1109/MPRV.2007.74
Hong, Jason I. (2005): Minimizing Security Risks in Ubicomp Systems. In IEEE Computer, 38 (12) pp. 118-119.
Jiang, Xiaodong, Hong, Jason I., Takayama, Leila A., Landay, James A. (2004): Ubiquitous computing for firefighters: field studies and prototypes of large displays for . In: Dykstra-Erickson, Elizabeth, Tscheligi, Manfred (eds.) Proceedings of ACM CHI 2004 Conference on Human Factors in Computing Systems April 24-29, 2004, Vienna, Austria. pp. 679-686. https://doi.acm.org/10.1145/985692.985778
Lederer, Scott, Hong, Jason I., Dey, Anind K., Landay, James A. (2004): Personal privacy through understanding and action: five pitfalls for designers. In Personal and Ubiquitous Computing, 8 (6) pp. 440-454. https://dx.doi.org/10.1007/s00779-004-0304-9
Newman, Mark W., Lin, James J. W., Hong, Jason I., Landay, James A. (2003): DENIM: An Informal Web Site Design Tool Inspired by Observations of Practice. In Human-Computer Interaction, 18 (3) pp. 259-324.
Schilit, Bill N., Hong, Jason I., Gruteser, Marco (2003): Wireless Location Privacy Protection. In IEEE Computer, 36 (12) pp. 135-137. https://csdl.computer.org/comp/mags/co/2003/12/rz135abs.htm
Hong, Jason I., Landay, James A. (2001): An Infrastructure Approach to Context-Aware Computing. In Human-Computer Interaction, 16 (2) pp. 287-303.
Hong, Jason I., Heer, Jeffrey, Waterson, Sarah, Landay, James A. (2001): WebQuilt: A proxy-based approach to remote web usability testing. In ACM Transactions on Information Systems, 19 (3) pp. 263-285. https://dl.acm.org/doi/10.1145/502115.502118
Hong, Jason I., Landay, James A. (2001): A Context/Communication Information Agent. In Personal and Ubiquitous Computing, 5 (1) pp. 78-81. https://springerlink.metapress.com/openurl.asp?genre=article&issn=1617-4917&volume=5&issue=1&spage=78
Lin, James, Newman, Mark W., Hong, Jason I., Landay, James A. (2000): DENIM: Finding a Tighter Fit between Tools and Practice for Web Site Design. In: Turner, Thea, Szwillus, Gerd, Czerwinski, Mary, Peterno, Fabio, Pemberton, Steven (eds.) Proceedings of the ACM CHI 2000 Human Factors in Computing Systems Conference April 1-6, 2000, The Hague, The Netherlands. pp. 510-517. https://www.acm.org/pubs/articles/proceedings/chi/332040/p510-lin/p510-lin.pdf
Hong, Jason I., Landay, James A. (2000): SATIN: A Toolkit for Informal Ink-Based Applications. In: Ackerman, Mark S., Edwards, Keith (eds.) Proceedings of the 13th annual ACM symposium on User interface software and technology November 06 - 08, 2000, San Diego, California, United States. pp. 63-72. https://acm.org/pubs/articles/proceedings/uist/354401/p63-hong/p63-hong.pdf
Li, Yang, Hong, Jason I., Landay, James A. (2004): Topiary: a tool for prototyping location-enhanced applications. In: Proceedings of the 2004 ACM Symposium on User Interface Software and Technology , 2004, . pp. 217-226. https://doi.acm.org/10.1145/1029632.1029671
Tang, Karen P., Keyani, Pedram, Fogarty, James, Hong, Jason I. (2006): Putting people in their place: an anonymous and privacy-sensitive approach to collecting s. In: Proceedings of ACM CHI 2006 Conference on Human Factors in Computing Systems , 2006, . pp. 93-102. https://doi.acm.org/10.1145/1124772.1124788
Wong, Jeffrey, Hong, Jason I. (2007): Making mashups with marmite: towards end-user programming for the web. In: Proceedings of ACM CHI 2007 Conference on Human Factors in Computing Systems , 2007, . pp. 1435-1444. https://doi.acm.org/10.1145/1240624.1240842
Newman, Mark W., Sedivy, Jana Z., Neuwirth, Christine, Edwards, W. Keith, Hong, Jason I., Izadi, Shahram, Marcelo, Karen, Smith, Trevor F., Sedivy, Jana, Newman, Mark (2002): Designing for serendipity: supporting end-user configuration of ubiquitous computing envir. In: Proceedings of DIS02: Designing Interactive Systems: Processes, Practices, Methods, & Techniques , 2002, . pp. 147-156. https://doi.acm.org/10.1145/778712.778736
Hong, Jason I., Ng, Jennifer D., Lederer, Scott, Landay, James A. (2004): Privacy risk models for designing privacy-sensitive ubiquitous computing systems. In: Proceedings of DIS04: Designing Interactive Systems: Processes, Practices, Methods, & Techniques , 2004, . pp. 91-100. https://doi.acm.org/10.1145/1013115.1013129
Chung, Eric S., Hong, Jason I., Lin, James, Prabaker, Madhu K., Landay, James A., Liu, Alan L. (2004): Development and evaluation of emerging design patterns for ubiquitous computing. In: Proceedings of DIS04: Designing Interactive Systems: Processes, Practices, Methods, & Techniques , 2004, . pp. 233-242. https://doi.acm.org/10.1145/1013115.1013148
Zhang, Yue, Hong, Jason I., Cranor, Lorrie F. (2007): Cantina: a content-based approach to detecting phishing web sites. In: Proceedings of the 2007 International Conference on the World Wide Web , 2007, . pp. 639-648. https://doi.acm.org/10.1145/1242572.1242659
Won, Sungjoon Steve, Jin, Jing, Hong, Jason I. (2009): Contextual web history: using visual and contextual cues to improve web browser history. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 1457-1466. https://doi.acm.org/10.1145/1518701.1518922
Chau, Duen Horng, Kittur, Aniket, Faloutsos, Christos, Hong, Jason I. (2009): SHIFTR: a user-directed, link-based system for ad hoc sensemaking of large heterogeneous d. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 3535-3536. https://doi.acm.org/10.1145/1520340.1520529
Tang, Karen P., Hong, Jason I., Smith, Ian E., Ha, Annie, Satpathy, Lalatendu (2007): Memory karaoke: using a location-aware mobile reminiscence tool to support aging in place. In: Cheok, Adrian David, Chittaro, Luca (eds.) Proceedings of the 9th Conference on Human-Computer Interaction with Mobile Devices and Services - Mobile HCI 2007 September 9-12, 2007, Singapore. pp. 305-312. https://doi.acm.org/10.1145/1377999.1378023
Heer, Jeffrey, Newberger, Alan, Beckmann, Chris, Hong, Jason I. (2003): liquid: Context-Aware Distributed Queries. In: Dey, Anind K., Schmidt, Albrecht, McCarthy, Joseph F. (eds.) UbiComp 2003 Ubiquitous Computing - 5th International Conference October 12-15, 2003, Seattle, WA, USA. pp. 140-148. https://link.springer.de/link/service/series/0558/bibs/2864/28640140.htm
Jiang, Xiaodong, Hong, Jason I., Landay, James A. (2002): Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing. In: Borriello, Gaetano, Holmquist, Lars Erik (eds.) UbiComp 2002 Ubiquitous Computing - 4th International Conference September 29 - October 1, 2002, Göteborg, Sweden. pp. 176-193. https://link.springer.de/link/service/series/0558/bibs/2498/24980176.htm
Hsieh, Gary, Tang, Karen P., Low, Wai Yong, Hong, Jason I. (2007): Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Conte. In: Krumm, John, Abowd, Gregory D., Seneviratne, Aruna, Strang, Thomas (eds.) UbiComp 2007 Ubiquitous Computing - 9th International Conference September 16-19, 2007, Innsbruck, Austria. pp. 91-108. https://dx.doi.org/10.1007/978-3-540-74853-3_6
Hong, Jason I., Landay, James A. (2001): WebQuilt: a framework for capturing and visualizing the web experience. In: Proceedings of the 2001 International Conference on the World Wide Web , 2001, . pp. 717-724. https://doi.acm.org/10.1145/371920.372188
Xiang, Guang, Hong, Jason I. (2009): A hybrid phish detection approach by identity discovery and keywords retrieval. In: Proceedings of the 2009 International Conference on the World Wide Web , 2009, . pp. 571-580. https://doi.acm.org/10.1145/1526709.1526786
Jiang, Xiaodong, Chen, Nicholas Y., Hong, Jason I., Wang, Kevin, Takayama, Leila, Landay, James A. (2004): Siren: Context-aware Computing for Firefighting. In: Ferscha, Alois, Mattern, Friedemann (eds.) PERVASIVE 2004 - Pervasive Computing, Second International Conference April 21-23, 2004, Vienna, Austria. pp. 87-105. https://link.springer.de/link/service/series/0558/bibs/3001/30010087.htm
Lin, Jialiu, Xiang, Guang, Hong, Jason I., Sadeh, Norman (2010): Modeling people's place naming preferences in location sharing. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 75-84. https://doi.acm.org/10.1145/1864349.1864362
Tang, Karen P., Lin, Jialiu, Hong, Jason I., Siewiorek, Daniel P., Sadeh, Norman (2010): Rethinking location sharing: exploring the implications of social-driven vs. purpose-drive. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 85-94. https://doi.acm.org/10.1145/1864349.1864363
Chau, Duen Horng, Kittur, Aniket, Hong, Jason I., Faloutsos, Christos (2011): Apolo: making sense of large network data by combining rich user interaction and machine l. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 167-176. https://dx.doi.org/10.1145/1978942.1978967
Liu, Gang, Xiang, Guang, Pendleton, Bryan A., Hong, Jason I., Liu, Wenyin (2011): Smartening the crowds: computational techniques for improving human verification to fight . In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 8. https://dx.doi.org/10.1145/2078827.2078838
Wiese, Jason, Kelley, Patrick Gage, Cranor, Lorrie Faith, Dabbish, Laura, Hong, Jason I., Zimmerman, John (2011): Are you close with me? are you nearby?: investigating social groups, closeness, and willin. In: Proceedings of the 2011 International Conference on Uniquitous Computing , 2011, . pp. 197-206. https://dx.doi.org/10.1145/2030112.2030140
Tang, Karen P., Hong, Jason I., Siewiorek, Daniel P. (2011): Understanding how visual representations of location feeds affect end-user privacy concern. In: Proceedings of the 2011 International Conference on Uniquitous Computing , 2011, . pp. 207-216. https://dx.doi.org/10.1145/2030112.2030141
Lin, Jialiu, Sadeh, Norman, Amini, Shahriyar, Lindqvist, Janne, Hong, Jason I., Zhang, Joy (2012): Expectation and purpose: understanding users' mental models of mobile app privacy through . In: Proceedings of the 2012 International Conference on Uniquitous Computing , 2012, . pp. 501-510. https://dx.doi.org/10.1145/2370216.2370290