Seguir
Jason Hong
Título
Citado por
Citado por
Año
Cyberguide: A mobile context‐aware tour guide
GD Abowd, CG Atkeson, J Hong, S Long, R Kooper, M Pinkerton
Wireless networks 3, 421-433, 1997
23781997
Cantina: a content-based approach to detecting phishing web sites
Y Zhang, JI Hong, LF Cranor
Proceedings of the 16th international conference on World Wide Web, 639-648, 2007
12922007
The design of sites: patterns, principles, and processes for crafting a customer-centered Web experience
D van Duyne, JA Landay, JI Hong
Addison-Wesley Professional, 2003
984*2003
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
S Egelman, LF Cranor, JI Hong
🎖 Proceedings of the SIGCHI Conference on Human Factors in Computing …, 2008
9212008
An Architecture for Privacy-Sensitive Ubiquitous Computing
JI Hong, JA Landay
Proceedings of the 2nd international conference on Mobile systems …, 2004
8892004
The livehoods project: Utilizing social media to understand the dynamics of a city
J Cranshaw, R Schwartz, JI Hong, N Sadeh
🏆 Sixth International AAAI Conference on Weblogs and Social Media - Best …, 2012
8402012
The state of phishing attacks
J Hong
Communications of the ACM 55 (1), 74-81, 2012
8392012
Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish
S Sheng, B Magnien, P Kumaraguru, A Acquisti, LF Cranor, JI Hong, ...
Proceedings of the 3rd symposium on Usable privacy and security, 88-99, 2007
8342007
Five pitfalls in the design for privacy
S Lederer, JI Hong, AK Dey, JA Landay
Security and Usability, 421-445, 2005
709*2005
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing
J Lin, S Amini, JI Hong, N Sadeh, J Lindqvist, J Zhang
🎖 Proceedings of the 2012 ACM conference on ubiquitous computing - Best …, 2012
6922012
Cantina+ a feature-rich machine learning framework for detecting phishing web sites
G Xiang, J Hong, CP Rose, L Cranor
ACM Transactions on Information and System Security (TISSEC) 14 (2), 1-28, 2011
6722011
Bridging the gap between physical location and online social networks
J Cranshaw, E Toch, JI Hong, A Kittur, N Sadeh
Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010
6442010
SATIN: a toolkit for informal ink-based applications
JI Hong, JA Landay
ACM Symposium on User Interface Software and Technology, 12, 2000
640*2000
A framework of energy efficient mobile sensing for automatic user state recognition
Y Wang, J Lin, M Annavaram, QA Jacobson, JI Hong, B Krishnamachari, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
6372009
I'm the mayor of my house: examining why people use foursquare-a social-driven location sharing application
J Lindqvist, J Cranshaw, J Wiese, JI Hong, J Zimmerman
Proceedings of the SIGCHI conference on human factors in computing systems …, 2011
6202011
Teaching Johnny not to fall for phish
P Kumaraguru, S Sheng, A Acquisti, LF Cranor, J Hong
ACM Transactions on Internet Technology (TOIT) 10 (2), 1-31, 2010
5992010
Why people hate your app: Making sense of user feedback in a mobile app store
B Fu, J Lin, L Li, C Faloutsos, J Hong, N Sadeh
Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013
5982013
An infrastructure approach to context-aware computing
JI Hong, JA Landay
Human–computer interaction 16 (2-4), 287-303, 2001
5812001
An empirical analysis of phishing blacklists
S Sheng, B Wardman, G Warner, L Cranor, J Hong, C Zhang
Carnegie Mellon University, 2009
5712009
Protecting people from phishing: the design and evaluation of an embedded training email system
P Kumaraguru, Y Rhee, A Acquisti, LF Cranor, JI Hong, E Nunge
Proceedings of the SIGCHI conference on Human factors in computing systems …, 2007
5112007
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20