Jason I. Hong
Orcid: 0000-0002-9856-9654Affiliations:
- Carnegie Mellon University, Pittsburgh, USA
According to our database1,
Jason I. Hong
authored at least 227 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
-
on cs.cmu.edu
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., March, 2024
C.A.L.Y.P.S.O.: Designing Gameplay Features for Improving Player's Cybersecurity Self-Efficacy.
Proceedings of the Companion Proceedings of the 2024 Annual Symposium on Computer-Human Interaction in Play, 2024
Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems, 2024
2023
Proc. ACM Hum. Comput. Interact., April, 2023
Participation and Division of Labor in User-Driven Algorithm Audits: How Do Everyday Users Work together to Surface Algorithmic Harms?
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
Understanding Frontline Workers' and Unhoused Individuals' Perspectives on AI Used in Homeless Services.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
2022
Alert Now or Never: Understanding and Predicting Notification Preferences of Smartphone Users.
ACM Trans. Comput. Hum. Interact., 2022
Proc. Priv. Enhancing Technol., 2022
'It's Problematic but I'm not Concerned': University Perspectives on Account Sharing.
Proc. ACM Hum. Comput. Interact., 2022
"Give Everybody [..] a Little Bit More Equity": Content Creator Perspectives and Responses to the Algorithmic Demonetization of Content Associated with Disadvantaged Groups.
Proc. ACM Hum. Comput. Interact., 2022
Experimental Evidence for Using a TTM Stages of Change Model in Boosting Progress Toward 2FA Adoption.
CoRR, 2022
"Public(s)-in-the-Loop": Facilitating Deliberation of Algorithmic Decisions in Contentious Public Policy Domains.
CoRR, 2022
Peekaboo: A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes (Extended Technical Report).
CoRR, 2022
Do They Accept or Resist Cybersecurity Measures? Development and Validation of the 13-Item Security Attitude Inventory (SA-13).
CoRR, 2022
Peekaboo: A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
Understanding iOS Privacy Nutrition Labels: An Exploratory Large-Scale Analysis of App Store Data.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
To Self-Persuade or be Persuaded: Examining Interventions for Users' Privacy Setting Selection.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
Exploring the Needs of Users for Supporting Privacy-Protective Behaviors in Smart Homes.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
2021
Lean Privacy Review: Collecting Users' Privacy Concerns of Data Practices at a Low Cost.
ACM Trans. Comput. Hum. Interact., 2021
What makes people install a COVID-19 contact-tracing app? Understanding the influence of app design and individual difference on contact-tracing app adoption intention.
Pervasive Mob. Comput., 2021
"It's our mutual responsibility to share": The Evolution of Account Sharing in Romantic Couples.
Proc. ACM Hum. Comput. Interact., 2021
Proc. ACM Hum. Comput. Interact., 2021
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021
CoRR, 2021
CoRR, 2021
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021
2020
Designing Alternative Representations of Confusion Matrices to Support Non-Expert Public Understanding of Algorithm Performance.
Proc. ACM Hum. Comput. Interact., 2020
'I Can't Even Buy Apples If I Don't Use Mobile Pay?': When Mobile Payments Become Infrastructural in China.
Proc. ACM Hum. Comput. Interact., 2020
How Developers Talk About Personal Data and What It Means for User Privacy: A Case Study of a Developer Forum on Reddit.
Proc. ACM Hum. Comput. Interact., 2020
Decentralized is not risk-free: Understanding public perceptions of privacy-utility trade-offs in COVID-19 contact-tracing apps.
CoRR, 2020
Providing architectural support for building privacy-sensitive smart home applications.
Proceedings of the UbiComp/ISWC '20: 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and 2020 ACM International Symposium on Wearable Computers, 2020
Proceedings of the Companion Publication of the 2020 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2020
I'm All Eyes and Ears: Exploring Effective Locators for Privacy Awareness in IoT Scenarios.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020
2019
Proc. ACM Hum. Comput. Interact., 2019
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019
The Memory Palace: Exploring Visual-Spatial Paths for Strong, Memorable, Infrequent Authentication.
Proceedings of the 32nd Annual ACM Symposium on User Interface Software and Technology, 2019
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019
Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
Using Online Geotagged and Crowdsourced Data to Understand Human Offline Behavior in the City: An Economic Perspective.
ACM Trans. Intell. Syst. Technol., 2018
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018
Why Are They Collecting My Data?: Inferring the Purposes of Network Traffic in Mobile Apps.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018
Proceedings of the 2018 IEEE Symposium on Visual Languages and Human-Centric Computing, 2018
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018
Proceedings of the Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
"Hey Alexa, What's Up?": A Mixed-Methods Studies of In-Home Conversational Agent Usage.
Proceedings of the 2018 on Designing Interactive Systems Conference 2018, 2018
2017
ACM Trans. Inf. Syst., 2017
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017
Does this App Really Need My Location?: Context-Aware Privacy Management for Smartphones.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017
PrivacyProxy: Leveraging Crowdsourcing and In Situ Traffic Analysis to Detect and Mitigate Information Leakage.
CoRR, 2017
Proceedings of the 26th International Conference on World Wide Web, 2017
Proceedings of the Eleventh International Conference on Web and Social Media, 2017
Thumprint: Socially-Inclusive Local Group Authentication Through Shared Secret Knocks.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
2016
Understanding User Economic Behavior in the City Using Large-scale Geotagged and Crowdsourced Data.
Proceedings of the 25th International Conference on World Wide Web, 2016
Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, 2016
Proceedings of the Who Are You?! Adventures in Authentication, 2016
Proceedings of the 10th ACM Conference on Recommender Systems, 2016
Epistenet: facilitating programmatic access & processing of semantically related mobile personal data.
Proceedings of the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2016
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016
Proceedings of the Tenth International Conference on Web and Social Media, 2016
Proceedings of the CitiLab, Papers from the 2016 ICWSM Workshop, 2016
Privacy, Ethics and Big Data.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
2015
Sensors, 2015
Styx: Privacy risk communication for the Android smartphone platform based on apps' data-access behavior patterns.
Comput. Secur., 2015
Proceedings of the 20th International Conference on Intelligent User Interfaces Companion, 2015
Proceedings of the Human-Computer Interaction - INTERACT 2015, 2015
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015
Knock x knock: the design and evaluation of a unified authentication management system.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015
"You Never Call, You Never Write": Call and SMS Logs Do Not Always Indicate Tie Strength.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015
2014
Check-ins in "Blau Space": Applying Blau's Macrosociological Theory to Foursquare Check-ins from New York City.
ACM Trans. Intell. Syst. Technol., 2014
IEEE Pervasive Comput., 2014
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, 2014
Proceedings of the Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services, 2014
Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014
The Effect of Social Influence on Security Sensitivity.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014
Styx: Design and Evaluation of a New Privacy Risk Communication Method for Smartphones.
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
Challenges and opportunities in data mining contact lists for inferring relationships.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014
Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the Modern Artificial Intelligence for Health Analytics, 2014
2013
A comparative study of location-sharing privacy preferences in the United States and China.
Pers. Ubiquitous Comput., 2013
IEEE Pervasive Comput., 2013
IEEE Pervasive Comput., 2013
IEEE Pervasive Comput., 2013
Proceedings of the Symposium On Usable Privacy and Security, 2013
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication.
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the Computer Supported Cooperative Work, 2013
2012
Commun. ACM, 2012
A Supervised Approach to Predict Company Acquisition with Factual and Topic Features Using Profiles and News Articles on TechCrunch.
Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012
Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012
The preface of the 4<sup>th</sup> International Workshop on Location-Based Social Networks.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012
Detecting offensive tweets via topical feature discovery over a large scale twitter corpus.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites.
ACM Trans. Inf. Syst. Secur., 2011
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011
Smartening the crowds: computational techniques for improving human verification to fight phishing scams.
Proceedings of the Symposium On Usable Privacy and Security, 2011
Proceedings of the 9th International Conference on Mobile Systems, 2011
Apolo: interactive large graph sensemaking by combining machine learning and visualization.
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2011
Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share.
Proceedings of the UbiComp 2011: Ubiquitous Computing, 13th International Conference, 2011
Understanding how visual representations of location feeds affect end-user privacy concerns.
Proceedings of the UbiComp 2011: Ubiquitous Computing, 13th International Conference, 2011
I'm the mayor of my house: examining why people use foursquare - a social-driven location sharing application.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
Apolo: making sense of large network data by combining rich user interaction and machine learning.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
2010
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010
Commun. ACM, 2010
Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications, 2010
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010
Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010
Proceedings of the Computer Security, 2010
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
2009
Understanding and capturing people's privacy policies in a mobile social networking application.
Pers. Ubiquitous Comput., 2009
Found. Trends Hum. Comput. Interact., 2009
Proceedings of the 18th International Conference on World Wide Web, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Educated guess on graphical authentication schemes: vulnerabilities and countermeasures.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 7th International Conference on Mobile Systems, 2009
Proceedings of the 7th International Conference on Mobile Systems, 2009
Proceedings of the 2009 eCrime Researchers Summit, 2009
Contextual web history: using visual and contextual cues to improve web browser history.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009
SHIFTR: a user-directed, link-based system for ad hoc sensemaking of large heterogeneous data collections.
Proceedings of the 27th International Conference on Human Factors in Computing Systems, 2009
2008
Proceedings of the 4th international workshop on End-user software engineering, 2008
Proceedings of the Workshops Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008
Proceedings of the 2008 eCrime Researchers Summit, 2008
You've been warned: an empirical study of the effectiveness of web browser phishing warnings.
Proceedings of the 2008 Conference on Human Factors in Computing Systems, 2008
2007
Design Challenges and Principles for Wizard of Oz Testing of Location-Enhanced Applications.
IEEE Pervasive Comput., 2007
Found. Trends Hum. Comput. Interact., 2007
Proceedings of the 16th International Conference on World Wide Web, 2007
Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications, 2007
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007
Proceedings of the Network and Distributed System Security Symposium, 2007
Memory karaoke: using a location-aware mobile reminiscence tool to support aging in place.
Proceedings of the 9th Conference on Human-Computer Interaction with Mobile Devices and Services, 2007
Field Deployment of <i>IMBuddy</i> : A Study of Privacy Control and Feedback Mechanisms for Contextual IM.
Proceedings of the UbiComp 2007: Ubiquitous Computing, 9th International Conference, 2007
Getting users to pay attention to anti-phishing education: evaluation of retention and transfer.
Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, 2007
Proceedings of the 2007 Conference on Human Factors in Computing Systems, 2007
Proceedings of the Extended Abstracts Proceedings of the 2007 Conference on Human Factors in Computing Systems, 2007
Protecting people from phishing: the design and evaluation of an embedded training email system.
Proceedings of the 2007 Conference on Human Factors in Computing Systems, 2007
Prentice Hall, ISBN: 978-0-13-134555-3, 2007
2006
Proceedings of the Seventh IEEE Workshop on Mobile Computing Systems & Applications, 2006
Proceedings of the International Conference on Computer Graphics and Interactive Techniques, 2006
Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications.
Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006
Proceedings of the Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006
Proceedings of the Extended Abstracts Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006
2005
2004
Pers. Ubiquitous Comput., 2004
Proceedings of the 17th Annual ACM Symposium on User Interface Software and Technology, 2004
Proceedings of the Pervasive Computing, 2004
Proceedings of the Second International Conference on Mobile Systems, 2004
Ubiquitous computing for firefighters: field studies and prototypes of large displays for incident command.
Proceedings of the 2004 Conference on Human Factors in Computing Systems, 2004
Proceedings of the Conference on Designing Interactive Systems: Processes, 2004
Proceedings of the Conference on Designing Interactive Systems: Processes, 2004
2003
Hum. Comput. Interact., 2003
Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2003
Proceedings of the UbiComp 2003: Ubiquitous Computing, 2003
You're getting warmer!: how proximity information affects search behavior in physical spaces.
Proceedings of the Extended abstracts of the 2003 Conference on Human Factors in Computing Systems, 2003
2002
Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing.
Proceedings of the UbiComp 2002: Ubiquitous Computing, 4th International Conference, Göteborg, Sweden, September 29, 2002
Proceedings of the Extended abstracts of the 2002 Conference on Human Factors in Computing Systems, 2002
Proceedings of the Working Conference on Advanced Visual Interfaces, 2002
Designing for serendipity: supporting end-user configuration of ubiquitous computing environments.
Proceedings of the 4th Conference on Designing Interactive Systems: Processes, 2002
2001
ACM Trans. Inf. Syst., 2001
Proceedings of the Tenth International World Wide Web Conference, 2001
Proceedings of the CHI 2001 Extended Abstracts on Human Factors in Computing Systems, 2001
Proceedings of the CHI 2001 Extended Abstracts on Human Factors in Computing Systems, 2001
2000
Proceedings of the SIGIR 2000: Proceedings of the 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2000
Proceedings of the CHI 2000 Conference on Human factors in computing systems, 2000
1999
Proceedings of the 2nd USENIX Symposium on Internet Technologies and Systems, 1999
Proceedings of the CHI '99 Extended Abstracts on Human Factors in Computing Systems, 1999
1997