Jason Hong
Título
Citado por
Citado por
Año
Cyberguide: A mobile context‐aware tour guide
GD Abowd, CG Atkeson, J Hong, S Long, R Kooper, M Pinkerton
Wireless networks 3 (5), 421-433, 1997
22291997
Cantina: a content-based approach to detecting phishing web sites
Y Zhang, JI Hong, LF Cranor
Proceedings of the 16th international conference on World Wide Web, 639-648, 2007
9102007
The design of sites: patterns, principles, and processes for crafting a customer-centered Web experience
JA Landay, JI Hong
Addison-Wesley Professional, 2003
879*2003
An Architecture for Privacy-Sensitive Ubiquitous Computing
JI Hong, JA Landay
Proceedings of the 2nd international conference on Mobile systems …, 2004
8172004
The livehoods project: Utilizing social media to understand the dynamics of a city
J Cranshaw, R Schwartz, JI Hong, N Sadeh
Sixth International AAAI Conference on Weblogs and Social Media, 2012
6992012
DENIM: Finding a tighter fit between tools and practice for web site design
J Lin, MW Newman, JI Hong, JA Landay
Proceedings of the SIGCHI conference on Human factors in computing systems …, 2000
681*2000
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
S Egelman, LF Cranor, JI Hong
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2008
6732008
SATIN: a toolkit for informal ink-based applications
JI Hong, JA Landay
ACM Symposium on User Interface Software and Technology, 12, 2000
605*2000
A framework of energy efficient mobile sensing for automatic user state recognition
Y Wang, J Lin, M Annavaram, QA Jacobson, JI Hong, B Krishnamachari, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
5902009
Bridging the gap between physical location and online social networks
J Cranshaw, E Toch, JI Hong, A Kittur, N Sadeh
Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010
5662010
An infrastructure approach to context-aware computing
JI Hong, JA Landay
Human–computer interaction 16 (2-4), 287-303, 2001
5592001
I'm the mayor of my house: examining why people use foursquare-a social-driven location sharing application
J Lindqvist, J Cranshaw, J Wiese, JI Hong, J Zimmerman
Proceedings of the SIGCHI conference on human factors in computing systems …, 2011
5212011
Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish
S Sheng, B Magnien, P Kumaraguru, A Acquisti, LF Cranor, JI Hong, ...
Proceedings of the 3rd symposium on Usable privacy and security, 88-99, 2007
5172007
The state of phishing attacks
JI Hong
Commun. ACM 55 (1), 74-81, 2012
5062012
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing
J Lin, S Amini, JI Hong, N Sadeh, J Lindqvist, J Zhang
Proceedings of the 2012 ACM conference on ubiquitous computing, 501-510, 2012
4812012
Making mashups with marmite: towards end-user programming for the web
J Wong, JI Hong
Proceedings of the SIGCHI conference on Human factors in computing systems …, 2007
4442007
Understanding and capturing people's privacy policies in a mobile social networking application
N Sadeh, JI Hong, L Cranor, I Fette, P Kelley, M Prabaker, J Rao
Personal and Ubiquitous Computing 13 (6), 401-412, 2009
4272009
Cantina+ a feature-rich machine learning framework for detecting phishing web sites
G Xiang, J Hong, CP Rose, L Cranor
ACM Transactions on Information and System Security (TISSEC) 14 (2), 1-28, 2011
4022011
Phinding phish: Evaluating anti-phishing tools
Y Zhang, S Egelman, L Cranor, JI Hong
Network and Distributed System Security Symposium (NDSS), 2006
3932006
Why people hate your app: Making sense of user feedback in a mobile app store
B Fu, J Lin, L Li, C Faloutsos, J Hong, N Sadeh
Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013
3842013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20