Jason I. Hong

Author: Jason I. Hong

Publications

Publication period start: 2012
Number of co-authors: 64

Co-authors

Number of publications with favourite co-authors
Norman Sadeh
3
Karen P. Tang
5
James A. Landay
16

Productive Colleagues

Most productive colleagues in number of publications
W. Keith Edwards
62
Anind K. Dey
71
James A. Landay
91

Publications

Li, Yang, Hong, Jason I., Landay, James A. (2007): Design Challenges and Principles for Wizard of Oz Testing of Location-Enhanced Application. In IEEE Pervasive Computing, 6 (2) pp. 70-75. https://doi.ieeecomputersociety.org/10.1109/MPRV.2007.28

Hong, Jason I., Satyanarayanan, Mahadev, Cybenko, George (2007): Guest Editors\' Introduction: Security & Privacy. In IEEE Pervasive Computing, 6 (4) pp. 15-17. https://doi.ieeecomputersociety.org/10.1109/MPRV.2007.74

Hong, Jason I. (2005): Minimizing Security Risks in Ubicomp Systems. In IEEE Computer, 38 (12) pp. 118-119.

Jiang, Xiaodong, Hong, Jason I., Takayama, Leila A., Landay, James A. (2004): Ubiquitous computing for firefighters: field studies and prototypes of large displays for . In: Dykstra-Erickson, Elizabeth, Tscheligi, Manfred (eds.) Proceedings of ACM CHI 2004 Conference on Human Factors in Computing Systems April 24-29, 2004, Vienna, Austria. pp. 679-686. https://doi.acm.org/10.1145/985692.985778

Lederer, Scott, Hong, Jason I., Dey, Anind K., Landay, James A. (2004): Personal privacy through understanding and action: five pitfalls for designers. In Personal and Ubiquitous Computing, 8 (6) pp. 440-454. https://dx.doi.org/10.1007/s00779-004-0304-9

Newman, Mark W., Lin, James J. W., Hong, Jason I., Landay, James A. (2003): DENIM: An Informal Web Site Design Tool Inspired by Observations of Practice. In Human-Computer Interaction, 18 (3) pp. 259-324.

Schilit, Bill N., Hong, Jason I., Gruteser, Marco (2003): Wireless Location Privacy Protection. In IEEE Computer, 36 (12) pp. 135-137. https://csdl.computer.org/comp/mags/co/2003/12/rz135abs.htm

Hong, Jason I., Landay, James A. (2001): An Infrastructure Approach to Context-Aware Computing. In Human-Computer Interaction, 16 (2) pp. 287-303.

Hong, Jason I., Heer, Jeffrey, Waterson, Sarah, Landay, James A. (2001): WebQuilt: A proxy-based approach to remote web usability testing. In ACM Transactions on Information Systems, 19 (3) pp. 263-285. https://dl.acm.org/doi/10.1145/502115.502118

Hong, Jason I., Landay, James A. (2001): A Context/Communication Information Agent. In Personal and Ubiquitous Computing, 5 (1) pp. 78-81. https://springerlink.metapress.com/openurl.asp?genre=article&issn=1617-4917&volume=5&issue=1&spage=78

Lin, James, Newman, Mark W., Hong, Jason I., Landay, James A. (2000): DENIM: Finding a Tighter Fit between Tools and Practice for Web Site Design. In: Turner, Thea, Szwillus, Gerd, Czerwinski, Mary, Peterno, Fabio, Pemberton, Steven (eds.) Proceedings of the ACM CHI 2000 Human Factors in Computing Systems Conference April 1-6, 2000, The Hague, The Netherlands. pp. 510-517. https://www.acm.org/pubs/articles/proceedings/chi/332040/p510-lin/p510-lin.pdf

Hong, Jason I., Landay, James A. (2000): SATIN: A Toolkit for Informal Ink-Based Applications. In: Ackerman, Mark S., Edwards, Keith (eds.) Proceedings of the 13th annual ACM symposium on User interface software and technology November 06 - 08, 2000, San Diego, California, United States. pp. 63-72. https://acm.org/pubs/articles/proceedings/uist/354401/p63-hong/p63-hong.pdf

Li, Yang, Hong, Jason I., Landay, James A. (2004): Topiary: a tool for prototyping location-enhanced applications. In: Proceedings of the 2004 ACM Symposium on User Interface Software and Technology , 2004, . pp. 217-226. https://doi.acm.org/10.1145/1029632.1029671

Tang, Karen P., Keyani, Pedram, Fogarty, James, Hong, Jason I. (2006): Putting people in their place: an anonymous and privacy-sensitive approach to collecting s. In: Proceedings of ACM CHI 2006 Conference on Human Factors in Computing Systems , 2006, . pp. 93-102. https://doi.acm.org/10.1145/1124772.1124788

Wong, Jeffrey, Hong, Jason I. (2007): Making mashups with marmite: towards end-user programming for the web. In: Proceedings of ACM CHI 2007 Conference on Human Factors in Computing Systems , 2007, . pp. 1435-1444. https://doi.acm.org/10.1145/1240624.1240842

Newman, Mark W., Sedivy, Jana Z., Neuwirth, Christine, Edwards, W. Keith, Hong, Jason I., Izadi, Shahram, Marcelo, Karen, Smith, Trevor F., Sedivy, Jana, Newman, Mark (2002): Designing for serendipity: supporting end-user configuration of ubiquitous computing envir. In: Proceedings of DIS02: Designing Interactive Systems: Processes, Practices, Methods, & Techniques , 2002, . pp. 147-156. https://doi.acm.org/10.1145/778712.778736

Hong, Jason I., Ng, Jennifer D., Lederer, Scott, Landay, James A. (2004): Privacy risk models for designing privacy-sensitive ubiquitous computing systems. In: Proceedings of DIS04: Designing Interactive Systems: Processes, Practices, Methods, & Techniques , 2004, . pp. 91-100. https://doi.acm.org/10.1145/1013115.1013129

Chung, Eric S., Hong, Jason I., Lin, James, Prabaker, Madhu K., Landay, James A., Liu, Alan L. (2004): Development and evaluation of emerging design patterns for ubiquitous computing. In: Proceedings of DIS04: Designing Interactive Systems: Processes, Practices, Methods, & Techniques , 2004, . pp. 233-242. https://doi.acm.org/10.1145/1013115.1013148

Zhang, Yue, Hong, Jason I., Cranor, Lorrie F. (2007): Cantina: a content-based approach to detecting phishing web sites. In: Proceedings of the 2007 International Conference on the World Wide Web , 2007, . pp. 639-648. https://doi.acm.org/10.1145/1242572.1242659

Won, Sungjoon Steve, Jin, Jing, Hong, Jason I. (2009): Contextual web history: using visual and contextual cues to improve web browser history. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 1457-1466. https://doi.acm.org/10.1145/1518701.1518922

Chau, Duen Horng, Kittur, Aniket, Faloutsos, Christos, Hong, Jason I. (2009): SHIFTR: a user-directed, link-based system for ad hoc sensemaking of large heterogeneous d. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems , 2009, . pp. 3535-3536. https://doi.acm.org/10.1145/1520340.1520529

Tang, Karen P., Hong, Jason I., Smith, Ian E., Ha, Annie, Satpathy, Lalatendu (2007): Memory karaoke: using a location-aware mobile reminiscence tool to support aging in place. In: Cheok, Adrian David, Chittaro, Luca (eds.) Proceedings of the 9th Conference on Human-Computer Interaction with Mobile Devices and Services - Mobile HCI 2007 September 9-12, 2007, Singapore. pp. 305-312. https://doi.acm.org/10.1145/1377999.1378023

Heer, Jeffrey, Newberger, Alan, Beckmann, Chris, Hong, Jason I. (2003): liquid: Context-Aware Distributed Queries. In: Dey, Anind K., Schmidt, Albrecht, McCarthy, Joseph F. (eds.) UbiComp 2003 Ubiquitous Computing - 5th International Conference October 12-15, 2003, Seattle, WA, USA. pp. 140-148. https://link.springer.de/link/service/series/0558/bibs/2864/28640140.htm

Jiang, Xiaodong, Hong, Jason I., Landay, James A. (2002): Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing. In: Borriello, Gaetano, Holmquist, Lars Erik (eds.) UbiComp 2002 Ubiquitous Computing - 4th International Conference September 29 - October 1, 2002, Göteborg, Sweden. pp. 176-193. https://link.springer.de/link/service/series/0558/bibs/2498/24980176.htm

Hsieh, Gary, Tang, Karen P., Low, Wai Yong, Hong, Jason I. (2007): Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Conte. In: Krumm, John, Abowd, Gregory D., Seneviratne, Aruna, Strang, Thomas (eds.) UbiComp 2007 Ubiquitous Computing - 9th International Conference September 16-19, 2007, Innsbruck, Austria. pp. 91-108. https://dx.doi.org/10.1007/978-3-540-74853-3_6

Hong, Jason I., Landay, James A. (2001): WebQuilt: a framework for capturing and visualizing the web experience. In: Proceedings of the 2001 International Conference on the World Wide Web , 2001, . pp. 717-724. https://doi.acm.org/10.1145/371920.372188

Xiang, Guang, Hong, Jason I. (2009): A hybrid phish detection approach by identity discovery and keywords retrieval. In: Proceedings of the 2009 International Conference on the World Wide Web , 2009, . pp. 571-580. https://doi.acm.org/10.1145/1526709.1526786

Jiang, Xiaodong, Chen, Nicholas Y., Hong, Jason I., Wang, Kevin, Takayama, Leila, Landay, James A. (2004): Siren: Context-aware Computing for Firefighting. In: Ferscha, Alois, Mattern, Friedemann (eds.) PERVASIVE 2004 - Pervasive Computing, Second International Conference April 21-23, 2004, Vienna, Austria. pp. 87-105. https://link.springer.de/link/service/series/0558/bibs/3001/30010087.htm

Lin, Jialiu, Xiang, Guang, Hong, Jason I., Sadeh, Norman (2010): Modeling people's place naming preferences in location sharing. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 75-84. https://doi.acm.org/10.1145/1864349.1864362

Tang, Karen P., Lin, Jialiu, Hong, Jason I., Siewiorek, Daniel P., Sadeh, Norman (2010): Rethinking location sharing: exploring the implications of social-driven vs. purpose-drive. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 85-94. https://doi.acm.org/10.1145/1864349.1864363

Chau, Duen Horng, Kittur, Aniket, Hong, Jason I., Faloutsos, Christos (2011): Apolo: making sense of large network data by combining rich user interaction and machine l. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems , 2011, . pp. 167-176. https://dx.doi.org/10.1145/1978942.1978967

Liu, Gang, Xiang, Guang, Pendleton, Bryan A., Hong, Jason I., Liu, Wenyin (2011): Smartening the crowds: computational techniques for improving human verification to fight . In: Proceedings of the 2011 Symposium on Usable Privacy and Security , 2011, . pp. 8. https://dx.doi.org/10.1145/2078827.2078838

Wiese, Jason, Kelley, Patrick Gage, Cranor, Lorrie Faith, Dabbish, Laura, Hong, Jason I., Zimmerman, John (2011): Are you close with me? are you nearby?: investigating social groups, closeness, and willin. In: Proceedings of the 2011 International Conference on Uniquitous Computing , 2011, . pp. 197-206. https://dx.doi.org/10.1145/2030112.2030140

Tang, Karen P., Hong, Jason I., Siewiorek, Daniel P. (2011): Understanding how visual representations of location feeds affect end-user privacy concern. In: Proceedings of the 2011 International Conference on Uniquitous Computing , 2011, . pp. 207-216. https://dx.doi.org/10.1145/2030112.2030141

Lin, Jialiu, Sadeh, Norman, Amini, Shahriyar, Lindqvist, Janne, Hong, Jason I., Zhang, Joy (2012): Expectation and purpose: understanding users' mental models of mobile app privacy through . In: Proceedings of the 2012 International Conference on Uniquitous Computing , 2012, . pp. 501-510. https://dx.doi.org/10.1145/2370216.2370290

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
316,665 designers enjoy our newsletter—sure you don’t want to receive it?

New to UX Design? We're Giving You a Free eBook!

The Basics of User Experience Design

Download our free ebook “The Basics of User Experience Design” to learn about core concepts of UX design.

In 9 chapters, we’ll cover: conducting user interviews, design thinking, interaction design, mobile UX design, usability, UX research, and many more!

A valid email address is required.
316,665 designers enjoy our newsletter—sure you don’t want to receive it?