Portrait 2013b small

Jason Hong

Faculty, jasonh [at] cs [dot] cmu [dot] edu, http://www.cs.cmu.edu/~jasonh/

Research interests:

  • Usable privacy and security
  • Mobile and ubiquitous computing

Current projects:

  • Augmented social graph, building a richer and more comprehensive social graph
  • Casual authentication, simplifying and strengthening authentication for everyday users
  • Android App Scanner, finding privacy problems in smartphone apps

A Self-Report Measure of End-User Security Attitudes (SA-6)

Cori Faklaris, Laura Dabbish, and Jason I. Hong

Symposium On Usable Privacy and Security (SOUPS), 2019

A Typology of Perceived Triggers for End-User Security and Privacy Behaviors

Sauvik Das, Laura Dabbish, and Jason I. Hong

Symposium On Usable Privacy and Security (SOUPS), 2019

MessageOnTap: A Suggestive Interface to Facilitate Messaging-related Tasks

Fanglin Chen, Kewei Xia, Karan Dhabalia, and Jason I. Hong

ACM Conference on Human Factors in Computing Systems (CHI), 2019

Coconut: An IDE Plugin for Developing Privacy-Friendly Apps

Tianshi Li, Yuvraj Agarwal, and Jason I Hong

Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2019

"Why Are They Collecting My Data?": Inferring the Purposes of Network Traffic in Mobile Apps

Haojian Jin, Minyi Liu, Kevan Dodhia, Yuanchun Li, Gaurav Srivastava, Matthew Fredrikson, Yuvraj Agarwal, and Jason I. Hong

Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2019

Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships

Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, and Jason I. Hong

Symposium On Usable Privacy and Security (SOUPS), 2018

“Hey Alexa, What’s Up?”: Studies of In-Home Conversational Agent Usage

Alex Sciuto, Arnita Saini, Jodi Forlizzi, and Jason I. Hong

Designing Interactive Systems (DIS), 2018

WiSh: Towards a Wireless Shape-aware World using Passive RFIDs

Haojian Jin, Jingxian Wang, Zhijian Yang, Swarun Kumar, and Jason I. Hong

Mobile Systems, Applications, and Services (Mobisys), 2018

Breaking! A Typology of Security and Privacy News and How It's Shared

Sauvik Das, Das, Joanne Lo, Laura Dabbish, and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI), 2018

Towards Wearable Everyday Body-Frame Tracking using Passive RFIDs

Haojian Jin, Zhijian Yang, Swarun Kumar, and Jason I. Hong

Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2017

PrivacyStreams: Enabling Transparency in Personal Data Processing for Mobile Apps

Yuanchun Li, Fanglin Chen, Toby Jia-Jun Li, Yao Guo, Gang Huang, Matthew Fredrikson, Yuvraj Agarwal, and Jason I Hong

Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2017

Does this App Really Need My Location? Context-Aware Privacy Management for Smartphones

Saksham Chitkara, Nishad Gothoskar, Suhas Harish, Jason I. Hong, and Yuvraj Agarwal

Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2017

Understanding the Purpose of Permission Use in Mobile Apps

Haoyu Wang, Yuanchun Li, Yao Guo, Yuvraj Agarwal, and Jason I. Hong

ACM Transactions on Information Systems (ACM TOIS), 2017

State of the Geotags: Motivations and Recent Changes

Dan Tasse, Zichen Liu, Alex Sciuto, and Jason I Hong

International AAAI Conference on Weblogs and Social Media (ICWSM), 2017

State of the Geotags: Motivations and Recent Changes

Dan Tasse, Zichen Liu, Alex Sciuto, and Jason I. Hong

International AAAI Conference on Weblogs and Social Media (ICWSM), 2017

Thumprint: Socially-Inclusive Local Group Authentication Through Shared Secret Knocks

Sauvik Das, Gierad Laput, Chris Harrison, and Jason I. Hong

ACM Conference on Human Factors in Computing Systems (CHI), 2017

Evolving the Ecosystem of Personal Behavioral Data

Jason Wiese, Sauvik Das, Jason I. Hong, and John Zimmerman

Human-Computer Interaction, 2017

An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective

Haoyu Wang, Zhe Liu, Yao Guo, Xiangqun Chen, Miao Zhang, Guoai Xu, and Jason Hong

International Conference on World Wide Web (WWW), 2017

Recommender Systems with Personality

Amos Azaria and Jason I. Hong

ACM Conference on Recommender Systems, 2016

Epistenet: Facilitating Programmatic Access & Processing of Semantically Related Mobile Personal Data

Sauvik Das, Jason Wiese, and Jason I. Hong

International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI), 2016

Examining Visual-Spatial Paths for Mobile Authentication

David Lu, Taehoon Lee, Sauvik Das, and Jason Hong

Symposium On Usable Privacy and Security (SOUPS), 2016

Generating Neighborhood Guides from Social Media

Dan Tasse, Jennifer T. Chou, and Jason I. Hong

International AAAI Conference on Weblogs and Social Media (ICWSM), 2016

Understanding User Economic Behavior in the City Using Large-scale Geotagged and Crowdsourced Data

Yingjie Zhang, Beibei Li, and Jason I. Hong

International Conference on World Wide Web (WWW), 2016

Testing Computer-Aided Mnemonics and Feedback for Fast Memorization of High-Value Secrets

Sauvik Das, Jason Hong, and Stuart Schechter

NDSS Workshop on Usable Security (USEC), 2016

Identifying and Analyzing the Privacy of Apps for Kids

Minxing Liu, Haoyu Wang, Yao Guo, and Jason Hong

Workshop on Mobile Computing Systems and Applications (HotMobile), 2016

MindMiner: A Mixed-Initiative Interface for Interactive Distance Metric Learning

Xiangmin Fan, Youming Liu, Nan Cao, Jason Hong, and Jingtao Wang

Interact, 2015

Knock x Knock: The Design and Evaluation of a Unified Authentication Management System

Eiji Hayashi and Jason I Hong

International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp), 2015

Using Text Mining to Infer the Purpose of Permission Use in Mobile App

Haoyu Wang, Jason Hong, and Yao Guo

International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp), 2015

Social Cybersecurity: Applying Social Psychology to Cybersecurity

Jason Hong, Sauvik Das, Tiffany Hyun-Jin Kim, and Laura Dabbish

Human Computer Interaction Consortium, 2015

The Role of Social Influence In Security Feature Adoption

Sauvik Das, Adam Kramer, Laura Dabbish, and Jason Hong

Computer Supported Cooperative Work (CSCW), 2015

Increasing Security Sensitivity With Social Proof: A Large Scale Experimental Confirmation

Sauvik Das, Adam Kramer, Laura Dabbish, and Jason I. Hong

ACM Conference on Computer and Communications Security (CCS), 2014

Research Issues for Privacy in a Ubiquitously Connected World

Jason Hong

NITRD National Research Strategy on Privacy, 2014

Challenges and Opportunities in Data Mining Contact Lists for Inferring Relationships

Jason Wiese, Jason Hong, and John Zimmerman

International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp), 2014

Check-ins in “Blau space”: Applying Blau's macrosociological theory to foursquare check-ins from New York City

Kenneth Joseph, Kathleen Carley, and Jason I Hong

ACM Transactions on Intelligent Systems and Technology (TIST), 2014

Using Social Media Data to Understand Cities

Dan Tasse and Jason I. Hong

Workshop on Big Data and Urban Informatics, 2014

Detection of behavior change in people with depression

Afsaneh Doryab, Jun Ki Min, Jason Wiese, John Zimmerman, and Jason Hong

AAAI Workshop on Modern Artificial Intelligence for Health Analytics (MAIHA), 2014

Sketch It, Make It: Freehand Drawing for Precise Rapid Fabrication

Gabriel G. Johnson, Ellen Yi-Luen Do, Mark D. Gross, and Jason I. Hong

Technical Report, 2014

The Effect of Social Influence on Security Sensitivity

Sauvik Das, Tiffany Hyun-Jin Kim, Laura Dabbish, and Jason Hong

Symposium On Usable Privacy and Security (SOUPS), 2014

Modeling Users’ Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings

Jialiu Lin, Bin Liu, Norman Sadeh, and Jason I. Hong

Symposium On Usable Privacy and Security (SOUPS), 2014

Styx: Design and Evaluation of a New Privacy Risk Communication Method for Smartphones

Gokhan Bal, Kai Rannenberg, and Jason Hong

International Information Security and Privacy Conference (SEC), 2014

Wave to Me: User Identification Using Body Lengths and Natural Gestures

Eiji Hayashi, Manuel Maas, and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI), 2014

Toss ‘N’ Turn: Smartphone as Sleep and Sleep Quality Detector

Jun-Ki Min, Afsaneh Doryab, Jason Wiese, Shahriyar Amini, John Zimmerman, and Jason I. Hong

ACM Conference on Human Factors in Computing Systems (CHI), 2014

QuiltView: a Crowd-Sourced Video Response System

Zhuo Chen, Wenlu Hu, Kiryong Ha, Jan Harkes, Benjamin Gilbert, Jason Hong, Asim Smailagic, Dan Siewiorek, and Mahadev Satyanarayanan

Workshop on Mobile Computing Systems and Applications (HotMobile), 2014

The Privacy and Security Behaviors of Smartphone App Developers

Rebecca Balebako, Abigail Marsh, Jialiu Lin, Jason Hong, and Lorrie Faith Cranor

Workshop on Usable Security (USEC), 2014

Exploring Capturable Everyday Memory for Autobiographical Authentication

Sauvik Das, Eiji Hayashi, and Jason I. Hong

International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp), 2013

Investigating Collaborative Mobile Search Behaviors

Shahriyar Amini, Vidya Setlur, Zhengxin Xi, Eiji Hayashi, and Jason I. Hong

International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI), 2013

Why People Hate Your App — Making Sense of User Feedback in a Mobile App Store

Bin Fu, Jialiu Lin, Lei Li, Christos Faloutsos, Jason Hong, and Norman Sadeh

Conference on Knowledge Discovery and Data Mining (KDD), 2013

RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication

Tiffany Hyun-Jin Kim, Akira Yamada, Virgil Gligor, Jason Hong, and Adrian Perrig

Financial Crypto, 2013

Mining Smartphone Data to Classify Life-Facets of Social Relationships

Jun-Ki Min, Jason Wiese, Jason I. Hong, and John Zimmerman

Computer Supported Cooperative Work (CSCW), 2013

Understanding the Implications of Offering More Disclosure Choices for Location Sharing

Karen Tang, Jason Hong, and Dan Siewiorek

ACM Conference on Human Factors in Computing Systems (CHI), 2012

WebTicket: Account Management Using Printable Tokens

Eiji Hayashi, Bryan Pendleton, Fatih Kursat Ozenc, and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI), 2012

A Supervised Approach to Predict Company Acquisition with Factual and Topic Features Using Profiles and News Articles on TechCrunch

Guang Xiang, Zeyu Zheng, Miaomiao Wen, Jason Hong, Carolyn Rose, and Chao Liu

International AAAI Conference on Weblogs and Social Media (ICWSM), 2012

Detecting Offensive Tweets via Topical Feature Discovery over a Large Scale Twitter Corpus

Guang Xiang, Bin Fan, Ling Wang, Jason Hong, and Carolyn P. Rose

Conference on Information and Knowledge Management (CIKM), 2012

OTO: Online Trust Oracle for User-Centric Trust Establishment

Tiffany Hyun-Jin Kim, Payas Gupta, Jun Han, Emmanuel Owusu, Jason Hong, Adrian Perrig, and Debin Gao

Conference on Computer and Communications Security (CCS), 2012

The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a City

Justin Cranshaw, Raz Schwartz, Jason Hong, and Norman Sadeh

International AAAI Conference on Weblogs and Social Media (ICWSM), 2012

The state of phishing attacks

Jason Hong

Communications of the ACM, 2012

A Diary Study of Password Usage in Daily Life

Eiji Hayashi and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI), 2011

Apolo: Interactive Large Graph Sense making by Combining Machine Learning and Visualization

Duen Horng (Polo) Chau, Aniket Kittur, Jason Hong, and Christos Faloutsos

ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2011

Are you close with me? Are you nearby? Investigating social groups, closeness, and willingness to share

Jason Wiese, Patrick Kelley, Lorrie Cranor, Laura Dabbish, Jason Hong, and John Zimmerman

International Conference on Ubiquitous Computing (Ubicomp), 2011

CANTINA+: A Feature-rich Machine Learning Framework for Detecting Phishing Web Sites

Guang Xiang, Jason Hong, Carolyn Rose, and Lorrie Cranor

ACM Transactions on Information Systems and Security (ACM TISSEC), 2011

Caché: Caching Location-Enhanced Content to Improve User Privacy

Shahriyar Amini, Janne Lindqvist, Jason Hong, Jialiu Lin, Eran Toch, and Norman Sadeh

Mobile Systems, Applications, and Services (Mobisys), 2011

I’m the Mayor of My House: Examining Why People Use foursquare - a Social-Driven Location Sharing Application

Janne Lindqvist, Justin Cranshaw, Jason Wiese, Jason Hong, and John Zimmerman

ACM Conference on Human Factors in Computing Systems (CHI), 2011

Making Sense of Large Network Data: Combining Rich User Interaction and Machine Learning

Duen Horng (Polo) Chau, Aniket Kittur, Jason Hong, and Christos Faloutsos

ACM Conference on Human Factors in Computing Systems (CHI), 2011

Understanding How Visual Representations of Location Feeds Affect End-User Privacy Concerns

Karen Tang, Jason Hong, and Dan Siewiorek.

International Conference on Ubiquitous Computing (Ubicomp), 2011

Undistracted Driving: A Mobile Phone that Doesn't Distract

Janne Lindqvist and Jason Hong

Workshop on Mobile Computing Systems and Applications (HotMobile), 2011

A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection

Guang Xiang, Carolyn Rose, Jason Hong, and Bryan Pendleton

European Symposium on Research in Computer Security (ESORICS), 2010

Bridging the Gap Between Physical Location and Online Social Networks

Justin Cranshaw, Eran Toch, Jason Hong, Aniket Kittur, and Norman Sadeh

International Conference on Ubiquitous Computing (Ubicomp), 2010

Empirical Models of Privacy in Location Sharing

Eran Toch, Justin Cranshaw, Paul Drielsma, Janice Tsai, Patrick Kelley, Lorrie Cranor, Jason Hong, and Norman Sadeh

International Conference on Ubiquitous Computing (Ubicomp), 2010

Generating Default Privacy Policies for Online Social Networks

Eran Toch, Norman Sadeh, and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI), 2010

GurunGo: Coupling Personal Computers and Mobile Devices through Mobile Data Types

Ivan González and Jason Hong

Workshop on Mobile Computing Systems and Applications (HotMobile), 2010

Locaccino: A Privacy-Centric Location Sharing Application

Eran Toch, Justin Cranshaw, Paul Drielsma, Jay Springfield, Lorrie Cranor, Jason Hong, and Norman Sadeh

International Conference on Ubiquitous Computing (Ubicomp), 2010

Modeling People’s Place Naming Preferences in Location Sharing

Jialiu Lin, Guang Xiang, Jason Hong, and Norman Sadeh

International Conference on Ubiquitous Computing (Ubicomp), 2010

Teaching Johnny Not to Fall for Phish

Ponnurangam Kumaraguru, Steve Sheng, Alessandro Acquisti, Lorrie Cranor, and Jason Hong

ACM Transactions on Internet Technologies (ACM TOIT), 2010

A Framework of Energy Efficient Mobile Sensing for Automatic Human State Recognition

Yi Wang, Jialiu Lin, Murali Annavaram, Quinn Jacobson, Jason Hong, Bhaskar Krishnamachari, and Norman Sadeh

Mobile Systems, Applications, and Services (Mobisys), 2009

An Empirical Analysis of Phishing Blacklists

Steve Sheng, Brad Wardman, Gary Warner, Lorrie Cranor, Jason Hong, and Chengshan Zhang

Conference on Email and Spam (CEAS), 2009

Computational Support for Sketching in Design: A Review

Gabriel Johnson, Mark Gross, Jason Hong, and Ellen Do

Foundations and Trends in HCI, 2009

Contextual Web History: Using Visual and Contextual Cues to Improve Web Browser History

Jing Jin, Sungjoon Wong, and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI), 2009

Improving Phishing Countermeasures: An Analysis of Expert Interviews

Steve Sheng, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Cranor, and Jason Hong

APWG eCrime Researcher’s Summit (eCrime), 2009

School of Phish: A Real-World Evaluation of Anti-Phishing Training

Ponnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie Cranor, Jason Hong, Mary Ann Blair, and Theodore Pham

Symposium on Usable Privacy and Security (SOUPS), 2009

Supporting Sensemaking Through Large Scale Graph Mining

Duen Horng (Polo) Chau, Aniket Kittur, Christos Faloutsos, and Jason Hong

Sensemaking Workshop at ACM Conference on Human Factors in Computing Systems (CHI), 2009

Usable Privacy and Security: A Grand Challenge for HCI

Jason Hong

Human Computer Interaction Consortium, 2009

Who's Viewed You? The Impact of Feedback on Mobile-location Sharing

Janice Tsai, Patrick Kelley, Paul Drielsma, Lorrie Cranor, Jason Hong, and Norman Sadeh

ACM Conference on Human Factors in Computing Systems (CHI), 2009

mFerio: The Design and Evaluation of a Peer-to-Peer Mobile Payment System

Rajesh Balan, Narayan Ramasubbu, Komsit Prakobphol, Nicolas Christin, and Jason Hong

Mobile Systems, Applications, and Services (Mobisys), 2009

Anti-Phishing Education

Ponnurangam Kumaraguru, Steve Sheng, Alessandro Acquisti, Lorrie Cranor, and Jason Hong

International Conference on E-Learning in the Workplace (ICELW), 2008

GRAPHITE: A Visual Query System for Large Graphs

Duen Horng (Polo) Chau Christos Faloutsos, Hanghang Tong, Jason Hong, Brian Gallagher, and Tina Eliassi-Rad

IEEE International Conference on Data Mining, 2008

Lessons From a Real World Evaluation of Anti-Phishing Training

Ponnurangam Kumaraguru, Steve Sheng, Alessandro Acquisti, Lorrie Cranor, and Jason Hong

APWG eCrime Researcher’s Summit (eCrime), 2008

Understanding and Capturing People’s Privacy Policies in a People Finder Application

Norman Sadeh, Jason Hong, Lorrie Cranor, Ian Fette, Patrick Kelley, Madhu Prabaker, and Jinghai Rao

Personal and Ubiquitous Computing, 2008

What do we "mashup" when we make mashups?

Jeffrey Wong and Jason Hong

International Workshop on End-user Software Engineering (WEUSE), 2008

You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings

Serge Egelman, Lorrie Cranor, and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI), 2008

Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People Not to Fall for Phish

Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Cranor, Jason Hong, and Elizabeth Nunge

Symposium on Usable Privacy and Security (SOUPS), 2007

CANTINA: A Content-Based Approach to Detecting Phishing Web Sites

Yue Zhang, Jason Hong, and Lorrie Cranor

International Conference on World Wide Web (WWW), 2007

Development and Initial Validation of a Three-Dimensional Dental Charting Interface

Titus Schleyer, Thankam Thyvalikakath, Pat Malatack, Michael Marotta, Shah Tej, Purin Phanichphant, Greg Price, and Jason Hong

The Journal of the American Dental Association, 2007

End-User Privacy in Human-Computer Interaction

Giovanni Iachello and Jason Hong

Foundations and Trends in HCI, 2007

Field Deployment of IMBuddy: A Study of Privacy Control and Feedback Mechanisms for Contextual Instant Messengers

Gary Hsieh, Karen Tang, Wai-yong Low, and Jason Hong

International Conference on Ubiquitous Computing (Ubicomp), 2007

Getting Users’ to Pay Attention to Anti-Phishing Education: Evaluation of Retention and Transfer

Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Alessandro Acquisti, Lorrie Cranor, and Jason Hong

APWG eCrime Researcher’s Summit (eCrime), 2007

Making Mashups with Marmite: Towards End-User Programming for the Web

Jeffrey Wong and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI), 2007

Memory Karaoke: Aiding Episodic Memory with Location-Enhanced Mobile Phones

Karen Tang, Ian Smith, Annie Ha, Lalatendu Satpathy, and Jason Hong

International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI), 2007

Phinding Phish: An Evaluation of Anti-Phishing Toolbars

Yue Zhang, Serge Egelman, Lorrie Cranor, and Jason Hong

Network & Distributed System Security Conference (NDSS), 2007

Protecting People from Phishing: The Design and Evaluation of an Embedded Training Email System

Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Cranor, Jason Hong, and Elizabeth Nunge

ACM Conference on Human Factors in Computing Systems (CHI), 2007

Understanding and Capturing People’s Privacy Policies in a People Finder Application

Madhu Prabaker, Jinghai Rao, Ian Fette, Patrick Kelley, Lorrie Cranor, Jason Hong, and Norman Sadeh

Workshop on Privacy, in International Conference on Ubiquitous Computing (Ubicomp), 2007

User-Controllable Security and Privacy for Pervasive Computing

Jason Cornwell, Ian Fette, Gary Hsieh, Madhu Prabaker, Jinghai Rao, Karen Tang, Kami Vaniea, Lujo Bauer, Lorrie Cranor, Jason Hong, Bruce McLaren, Mike Reiter, and Norman Sadeh

Workshop on Mobile Computing Systems and Applications (HotMobile), 2007

Anonymous and Privacy-Sensitive Collection of Sensed Data in Location-Based Applications

James Fogarty, Pedram Keyani, Karen Tang, and Jason Hong

Workshop on Mobile Social Software, in ACM Conference on Human Factors in Computing Systems (CHI), 2006

Marmite: End-User Programming for the Web

Jeffrey Wong and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI), 2006

Marmite: End-User Programming for the Web

Jeffrey Wong and Jason Hong

Workshop on Mashups and CSCW, in ACM Conference on Computer Supported Cooperative Work, 2006

Privacy Patterns for Online Interactions

Sasha Romanosky, Alessandro Acquisti, Jason Hong, Lorrie Cranor, and Batya Friedman

European Conference on Pattern Languages of Programs, 2006

The Design of Sites: Patterns for Creating Winning Web Sites

Doug van Duyne, James Landay, and Jason Hong

Addison-Wesley, 2006

Using current SMS and mobile IM practices to inform social mobile application design

Karen Tang and Jason Hong

Workshop on Mobile Social Software, in ACM Conference on Human Factors in Computing Systems (CHI), 2006

Whisper: analysis and design for a community event service

Jennifer Ng, Jonathan Terleski, and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI), 2006

Personal Privacy through Understanding and Action: Five Pitfalls for Designers

Scott Lederer, Jason Hong, Anind Dey, and James Landay

Security and Usability: Designing Secure Systems That People Can Use, 2005

Potential effects of Ubiquitous Computing on Civic Engagement

Pedram Keyani and Jason Hong

Workshop on Social Implications of Ubiquitous Computing, in ACM Conference on Human Factors in Computing Systems (CHI), 2005

An Architecture for Privacy-Sensitive Ubiquitous Computing

Jason Hong and James Landay

Mobile Systems, Applications, and Services (Mobisys), 2004

Development and Evaluation of Emerging Design Patterns for Ubiquitous Computing

Eric Chung, Jason Hong, James Lin, Madhu Prabaker, James Landay, and Alan Liu

Designing Interactive Systems (DIS), 2004

Personal Privacy through Understanding and Action: Five Pitfalls for Designers

Scott Lederer, Jason Hong, Anind Dey, and James Landay

Personal and Ubiquitous Computing, 2004

Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems

Jason Hong, Jennifer Ng, Scott Lederer, and James Landay

Designing Interactive Systems (DIS), 2004

Siren: Context-aware Computing for Firefighting

Xiaodong Jiang, Nicholas Chen, Jason Hong, Kevin Wang, Leila Takayama, and James Landay

International Conference on Pervasive Computing (Pervasive), 2004

Topiary: A Tool for Prototyping Location-Enhanced Applications

Yang Li, Jason Hong, and James Landay

ACM Symposium on User Interface Software and Technology (UIST), 2004

Ubiquitous Computing for Firefighters: Field Studies and Prototypes of Large Displays for Incident Command

Xiaodong Jiang, Jason Hong, Leila Takayama, and James Landay

ACM Conference on Human Factors in Computing Systems (CHI), 2004

Bootstrapping the Location-enhanced World Wide Web

Bill Schilit, Anthony LaMarca, David McDonald, Jason Tabert, Eithon Cadag, Gaetano Borriello, William Griswold, and Jason Hong

Workshop on Location-Aware Computing, in International Conference on Ubiquitous Computing (Ubicomp), 2003

Challenge: Ubiquitous Location-Aware Computing and the “Place Lab” Initiative

Bill Schilit, Anthony LaMarca, Gaetano Borriello, William Griswold, David McDonald, Edward Lazowska, Anand Balachandran, Jason Hong, and Vaughn Iverson

International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH), 2003

ContextMap: Modeling Scenes of the Real World for Context-Aware Computing

Yang Li, Jason Hong, and James Landay

International Conference on Ubiquitous Computing (Ubicomp), 2003

Privacy and Security in the Location-enhanced World Wide Web

Jason Hong, Gaetano Boriello, James Landay, David McDonald, Bill Schilit, and J. Doug Tygar

Workshop on Ubicomp Communities: Privacy as Boundary Negotiation, in International Conference on Ubiquitous Computing (Ubicomp), 2003

You're Getting Warmer! How Proximity Information Affects Search Behavior in Physical Spaces

Leila Takayama, Lawrence Leung, Xiaodong Jiang, and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI), 2003

liquid: Context-Aware Distributed Queries

Jeffrey Heer, Alan Newberger, Chris Beckmann, and Jason Hong

International Conference on Ubiquitous Computing (Ubicomp), 2003

Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing

Xiaodong Jiang, Jason Hong, and James Landay

International Conference on Ubiquitous Computing (Ubicomp), 2002

DENIM: An Informal Sketch-based Tool for Early Stage Web Design

James Lin, Mark Newman, Jason Hong, and James Landay

Sketch Understanding Workshop (AAAI 2002 Spring Symposium), 2002

DENIM: An Informal Tool for Early Stage Website Design

James Lin, Mark Newman, Jason Hong, and Jason Landay

ACM Conference on Human Factors in Computing Systems (CHI), 2002

DENIM: An Informal Web Site Design Tool Inspired by Observations of Practice

Mark Newman, James Lin, Jason Hong, and James Landay

Human Computer Interaction, 2002

Designing for Serendipity: Supporting End-User Configuration of Ubiquitous Computing Environments

Mark Newman, Jana Sedivy, Keith Edwards, Trevor Smith, Karen Marcelo, Chris Neuwirth, Jason Hong, and Shahram Izadi

Designing Interactive Systems (DIS), 2002

Informal PUIs: No Recognition Required

James Landay, Jason Hong, Scott Klemmer, James Lin, and Mark Newman

Sketch Understanding Workshop (AAAI 2002 Spring Symposium), 2002

Sketch Recognizers from the End-User's, the Designer's, and the Programmer's Perspective

Jason Hong, James Landay, A. Chris Long, and Jennifer Mankoff

Sketch Understanding Workshop (AAAI 2002 Spring Symposium), 2002

Speakeasy: A Platform for Interactive Public Displays

Julie Black, Jason Hong, Mark Newman, W. Keith Edwards, Shahram Izadi, Jana Sedivy, and Trevor Smith

Workshop on Public, Community, and Situated Displays: Design, use, and interaction around shared information displays, in ACM Conference on Computer Supported Cooperative Work, 2002

The Context Fabric: An Infrastructure for Context-Aware Computing

Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI), 2002

The Design of Sites

Doug van Duyne, James Landay, and Jason Hong

Workshop on Patterns in Practice: A Workshop for UI Designers, in ACM Conference on Human Factors in Computing Systems (CHI), 2002

Towards a Unified Interaction Framework for Ubicomp User Interfaces

Jason Hong, Scott Lederer, and Mark Newman

Workshop on Models for Ubiquitous Computing, in International Conference on Ubiquitous Computing (Ubicomp), 2002

WebQuilt: A Proxy-based Approach to Remote Web Usability Testing

Jason Hong, Jeffrey Heer, Sarah Waterson, and James Landay

ACM Transactions on Information Systems (ACM TOIS), 2002

What Did They Do? Understanding Clickstreams with the WebQuilt Visualization System

Sarah Waterson, Jason Hong, and James Landay

Advanced Visual Interfaces (AVI), 2002

An Infrastructure Approach to Context-Aware Computing

Jason Hong and James Landay

Human Computer Interaction, 2001

Context/Communication Information Agent

Jason Hong and James Landay

Personal and Ubiquitous Computing, 2001

End-User Perceptions of Formal and Informal Representations of Web Sites

Jason Hong, Francis Li, James Lin, and James Landay

ACM Conference on Human Factors in Computing Systems (CHI), 2001

Integrating Context Services Through Automatic Path Creation

Jason Hong and James Landay

Workshop on Building the User Experience in Ubiquitous Computing, in ACM Conference on Human Factors in Computing Systems (CHI), 2001

WebQuilt: A Framework for Capturing and Visualizing the Web Experience

Jason Hong and James Landay

International Conference on World Wide Web (WWW), 2001

A Context / Communication Information Agent

Jason Hong and James Landay

Workshop on Situated Interaction in Ubiquitous Computing, in ACM Conference on Human Factors in Computing Systems (CHI), 2000

DENIM: Finding a tighter fit between tools and practice for web site design

James Lin, Mark Newman, Jason Hong, and James Landay

ACM Conference on Human Factors in Computing Systems (CHI), 2000

SATIN: A Toolkit for Informal Ink-based Applications

Jason Hong and James Landay

ACM Symposium on User Interface Software and Technology (UIST), 2000

SWAMI: A Framework for Collaborative Filtering Algorithm Development and Evaluation

Danyel Fisher, Kris Hildrum, Jason Hong, Mark Newman, Megan Thomas, and Rich Vuduc

SIGIR, 2000

Web Design Patterns for eCommerce

Doug van Duyne, Jason Hong, and James Landay

Workshop on Pattern Languages for Interaction Design:Building Momentum, in ACM Conference on Human Factors in Computing Systems (CHI), 2000

Cha-Cha: A System for Organizing Intranet Search Results

Mike Chen, Marti Hearst, Jason Hong, and James Lin

USENIX Symposium on Internet Technologies and Systems (USITS), 1999

Printertainment: Printing with Interactive Cover Sheets

Jason Hong, Morgan Price, Bill Schilit, and Gene Golovchinsky

ACM Conference on Human Factors in Computing Systems (CHI), 1999

Shadow: A Personal Experience Capture System

Jason Hong, Mark Newman, and James Landay

DARPA Workshop on Smart Spaces, 1998

Cyberguide: A Mobile Context-Aware Tour Guide

Gregory Abowd, Chris Atkeson, Jason Hong, Sue Long, Rob Kooper, and Mike Pinkerton

ACM Wireless Networks, 1997

Trust me. I am working on many projects. I just haven't posted it here yet.