Seguir
Jason Hong
Título
Citado por
Citado por
Año
Cyberguide: A mobile context‐aware tour guide
GD Abowd, CG Atkeson, J Hong, S Long, R Kooper, M Pinkerton
Wireless networks 3, 421-433, 1997
23521997
Cantina: a content-based approach to detecting phishing web sites
Y Zhang, JI Hong, LF Cranor
Proceedings of the 16th international conference on World Wide Web, 639-648, 2007
12062007
The design of sites: patterns, principles, and processes for crafting a customer-centered Web experience
D van Duyne, JA Landay, JI Hong
Addison-Wesley Professional, 2003
971*2003
An Architecture for Privacy-Sensitive Ubiquitous Computing
JI Hong, JA Landay
Proceedings of the 2nd international conference on Mobile systems …, 2004
8802004
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
S Egelman, LF Cranor, JI Hong
🎖️ Proceedings of the SIGCHI Conference on Human Factors in Computing …, 2008
8632008
The livehoods project: Utilizing social media to understand the dynamics of a city
J Cranshaw, R Schwartz, JI Hong, N Sadeh
🏆 Sixth International AAAI Conference on Weblogs and Social Media - Best …, 2012
8192012
The state of phishing attacks
J Hong
Communications of the ACM 55 (1), 74-81, 2012
7812012
Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish
S Sheng, B Magnien, P Kumaraguru, A Acquisti, LF Cranor, JI Hong, ...
Proceedings of the 3rd symposium on Usable privacy and security, 88-99, 2007
7662007
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing
J Lin, S Amini, JI Hong, N Sadeh, J Lindqvist, J Zhang
🎖️ Proceedings of the 2012 ACM conference on ubiquitous computing - Best …, 2012
6472012
SATIN: a toolkit for informal ink-based applications
JI Hong, JA Landay
ACM Symposium on User Interface Software and Technology, 12, 2000
635*2000
A framework of energy efficient mobile sensing for automatic user state recognition
Y Wang, J Lin, M Annavaram, QA Jacobson, JI Hong, B Krishnamachari, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
6332009
Bridging the gap between physical location and online social networks
J Cranshaw, E Toch, JI Hong, A Kittur, N Sadeh
Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010
6302010
Cantina+ a feature-rich machine learning framework for detecting phishing web sites
G Xiang, J Hong, CP Rose, L Cranor
ACM Transactions on Information and System Security (TISSEC) 14 (2), 1-28, 2011
6152011
I'm the mayor of my house: examining why people use foursquare-a social-driven location sharing application
J Lindqvist, J Cranshaw, J Wiese, JI Hong, J Zimmerman
Proceedings of the SIGCHI conference on human factors in computing systems …, 2011
6112011
An infrastructure approach to context-aware computing
JI Hong, JA Landay
Human–computer interaction 16 (2-4), 287-303, 2001
5812001
Why people hate your app: Making sense of user feedback in a mobile app store
B Fu, J Lin, L Li, C Faloutsos, J Hong, N Sadeh
Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013
5592013
Teaching Johnny not to fall for phish
P Kumaraguru, S Sheng, A Acquisti, LF Cranor, J Hong
ACM Transactions on Internet Technology (TOIT) 10 (2), 1-31, 2010
5312010
An empirical analysis of phishing blacklists
S Sheng, B Wardman, G Warner, L Cranor, J Hong, C Zhang
Carnegie Mellon University, 2009
5272009
DENIM: Finding a tighter fit between tools and practice for web site design
J Lin, MW Newman, JI Hong, JA Landay
Proceedings of the SIGCHI conference on Human factors in computing systems …, 2000
4772000
Making mashups with marmite: towards end-user programming for the web
J Wong, JI Hong
Proceedings of the SIGCHI conference on Human factors in computing systems …, 2007
4742007
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20