Publications

2017

2015

Social Cybersecurity: Applying Social Psychology to Cybersecurity

Jason Hong, Sauvik Das, Tiffany Hyun-Jin Kim, and Laura Dabbish

Human Computer Interaction Consortium

2014

Styx: Design and Evaluation of a New Privacy Risk Communication Method for Smartphones

Gokhan Bal, Kai Rannenberg, and Jason Hong

International Information Security and Privacy Conference (SEC)

2013

Why People Hate Your App — Making Sense of User Feedback in a Mobile App Store

Bin Fu, Jialiu Lin, Lei Li, Christos Faloutsos, Jason Hong, and Norman Sadeh

Conference on Knowledge Discovery and Data Mining (KDD)

2012

WebTicket: Account Management Using Printable Tokens

Eiji Hayashi, Bryan Pendleton, Fatih Kursat Ozenc, and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI)

Goldilocks and the Two Mobile Devices: Going Beyond All-Or-Nothing Access to a Device's Applications

Eiji Hayashi, Oriana Riva, Karin Strauss, A.J. Bernheim Brush, and Stuart Schechter

Symposium On Usable Privacy and Security (SOUPS)

OTO: Online Trust Oracle for User-Centric Trust Establishment

Tiffany Hyun-Jin Kim, Payas Gupta, Jun Han, Emmanuel Owusu, Jason Hong, Adrian Perrig, and Debin Gao

Conference on Computer and Communications Security (CCS)

2011

A Diary Study of Password Usage in Daily Life

Eiji Hayashi and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI)

2010

Locaccino: A Privacy-Centric Location Sharing Application

Eran Toch, Justin Cranshaw, Paul Drielsma, Jay Springfield, Lorrie Cranor, Jason Hong, and Norman Sadeh

International Conference on Ubiquitous Computing (Ubicomp)

Teaching Johnny Not to Fall for Phish

Ponnurangam Kumaraguru, Steve Sheng, Alessandro Acquisti, Lorrie Cranor, and Jason Hong

ACM Transactions on Internet Technologies (ACM TOIT)

2009

An Empirical Analysis of Phishing Blacklists

Steve Sheng, Brad Wardman, Gary Warner, Lorrie Cranor, Jason Hong, and Chengshan Zhang

Conference on Email and Spam (CEAS)

Improving Phishing Countermeasures: An Analysis of Expert Interviews

Steve Sheng, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Cranor, and Jason Hong

APWG eCrime Researcher’s Summit (eCrime)

School of Phish: A Real-World Evaluation of Anti-Phishing Training

Ponnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie Cranor, Jason Hong, Mary Ann Blair, and Theodore Pham

Symposium on Usable Privacy and Security (SOUPS)

2008

Anti-Phishing Education

Ponnurangam Kumaraguru, Steve Sheng, Alessandro Acquisti, Lorrie Cranor, and Jason Hong

International Conference on E-Learning in the Workplace (ICELW)

Lessons From a Real World Evaluation of Anti-Phishing Training

Ponnurangam Kumaraguru, Steve Sheng, Alessandro Acquisti, Lorrie Cranor, and Jason Hong

APWG eCrime Researcher’s Summit (eCrime)

You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings

Serge Egelman, Lorrie Cranor, and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI)

2007

Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People Not to Fall for Phish

Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Cranor, Jason Hong, and Elizabeth Nunge

Symposium on Usable Privacy and Security (SOUPS)

CANTINA: A Content-Based Approach to Detecting Phishing Web Sites

Yue Zhang, Jason Hong, and Lorrie Cranor

International Conference on World Wide Web (WWW)

Getting Users’ to Pay Attention to Anti-Phishing Education: Evaluation of Retention and Transfer

Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Alessandro Acquisti, Lorrie Cranor, and Jason Hong

APWG eCrime Researcher’s Summit (eCrime)

Phinding Phish: An Evaluation of Anti-Phishing Toolbars

Yue Zhang, Serge Egelman, Lorrie Cranor, and Jason Hong

Network & Distributed System Security Conference (NDSS)

Protecting People from Phishing: The Design and Evaluation of an Embedded Training Email System

Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Cranor, Jason Hong, and Elizabeth Nunge

ACM Conference on Human Factors in Computing Systems (CHI)