Publications

2019

Coconut: An IDE Plugin for Developing Privacy-Friendly Apps

Tianshi Li, Yuvraj Agarwal, and Jason I Hong

Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)

"Why Are They Collecting My Data?": Inferring the Purposes of Network Traffic in Mobile Apps

Haojian Jin, Minyi Liu, Kevan Dodhia, Yuanchun Li, Gaurav Srivastava, Matthew Fredrikson, Yuvraj Agarwal, and Jason I. Hong

Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)

2017

PrivacyStreams: Enabling Transparency in Personal Data Processing for Mobile Apps

Yuanchun Li, Fanglin Chen, Toby Jia-Jun Li, Yao Guo, Gang Huang, Matthew Fredrikson, Yuvraj Agarwal, and Jason I Hong

Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)

Does this App Really Need My Location? Context-Aware Privacy Management for Smartphones

Saksham Chitkara, Nishad Gothoskar, Suhas Harish, Jason I. Hong, and Yuvraj Agarwal

Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)

Understanding the Purpose of Permission Use in Mobile Apps

Haoyu Wang, Yuanchun Li, Yao Guo, Yuvraj Agarwal, and Jason I. Hong

ACM Transactions on Information Systems (ACM TOIS)

State of the Geotags: Motivations and Recent Changes

Dan Tasse, Zichen Liu, Alex Sciuto, and Jason I. Hong

International AAAI Conference on Weblogs and Social Media (ICWSM)

An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective

Haoyu Wang, Zhe Liu, Yao Guo, Xiangqun Chen, Miao Zhang, Guoai Xu, and Jason Hong

International Conference on World Wide Web (WWW)

2016

Identifying and Analyzing the Privacy of Apps for Kids

Minxing Liu, Haoyu Wang, Yao Guo, and Jason Hong

Workshop on Mobile Computing Systems and Applications (HotMobile)

2015

Using Text Mining to Infer the Purpose of Permission Use in Mobile App

Haoyu Wang, Jason Hong, and Yao Guo

International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp)

2014

Technical Report Adobe acrobat reader

analytics, big data, privacy, roadmap

Styx: Design and Evaluation of a New Privacy Risk Communication Method for Smartphones

Gokhan Bal, Kai Rannenberg, and Jason Hong

International Information Security and Privacy Conference (SEC)

The Privacy and Security Behaviors of Smartphone App Developers

Rebecca Balebako, Abigail Marsh, Jialiu Lin, Jason Hong, and Lorrie Faith Cranor

Workshop on Usable Security (USEC)

2013

The Post that Wasn’t: Exploring Self-Censorship on Facebook

Manya Sleeper, Rebecca Balebako, Sauvik Das, Amber Lynn McConahy, Jason Wiese, and Lorrie Faith Cranor

Computer Supported Cooperative Work (CSCW)

2012

2011

Caché: Caching Location-Enhanced Content to Improve User Privacy

Shahriyar Amini, Janne Lindqvist, Jason Hong, Jialiu Lin, Eran Toch, and Norman Sadeh

Mobile Systems, Applications, and Services (Mobisys)

2010

Generating Default Privacy Policies for Online Social Networks

Eran Toch, Norman Sadeh, and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI)

Work in Progress

privacy, social media

Empirical Models of Privacy in Location Sharing

Eran Toch, Justin Cranshaw, Paul Drielsma, Janice Tsai, Patrick Kelley, Lorrie Cranor, Jason Hong, and Norman Sadeh

International Conference on Ubiquitous Computing (Ubicomp)

2007

End-User Privacy in Human-Computer Interaction

Giovanni Iachello and Jason Hong

Foundations and Trends in HCI

Journal Article Adobe acrobat reader

privacy, roadmap, survey

2006

Privacy Patterns for Online Interactions

Sasha Romanosky, Alessandro Acquisti, Jason Hong, Lorrie Cranor, and Batya Friedman

European Conference on Pattern Languages of Programs

Full Paper Adobe acrobat reader

design tools, privacy

2005

2004

Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems

Jason Hong, Jennifer Ng, Scott Lederer, and James Landay

Designing Interactive Systems (DIS)

Personal Privacy through Understanding and Action: Five Pitfalls for Designers

Scott Lederer, Jason Hong, Anind Dey, and James Landay

Personal and Ubiquitous Computing

Journal Article Adobe acrobat reader

privacy, ubicomp privacy

2002

Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing

Xiaodong Jiang, Jason Hong, and James Landay

International Conference on Ubiquitous Computing (Ubicomp)

Full Paper Adobe acrobat reader

privacy, ubicomp privacy