BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Austria
1 × Greece
1 × Italy
1 × The Netherlands
4 × Canada
7 × USA
Collaborated with:
E.Hayashi J.Wiese J.Zimmerman J.Min C.Faloutsos L.F.Cranor K.P.Tang D.H.Chau A.Kittur J.Wong J.A.Landay M.W.Newman M.Maas N.M.Sadeh D.P.Siewiorek N.Christin S.S.Won J.Jin S.Egelman S.Das A.D.I.Kramer L.A.Dabbish B.A.Pendleton F.Ozenc P.Keyani J.Fogarty X.Jiang L.Takayama J.Lin G.Xiang B.Fan L.Wang C.P.Rosé J.Lindqvist J.Cranshaw A.Doryab S.Amini B.Fu J.Lin L.Li J.Y.Tsai P.G.Kelley P.H.Drielsma P.Kumaraguru Y.Rhee A.Acquisti E.Nunge D.Fisher K.Hildrum M.Thomas R.Vuduc
Talks about:
web (6) social (4) peopl (4) locat (4) user (4) larg (4) use (4) applic (3) studi (3) share (3)

Person: Jason I. Hong

DBLP DBLP: Hong:Jason_I=

Contributed to:

CSCW 20152015
CHI 20142014
CSCW 20132013
KDD 20132013
CHI 20122012
CIKM 20122012
CHI 20112011
KDD 20112011
CHI 20092009
CHI 20082008
CHI 20072007
CHI 20062006
CHI 20042004
CHI 20002000
SIGIR 20002000

Wrote 23 papers:

CSCW-2015-DasKDH #security #social
The Role of Social Influence in Security Feature Adoption (SD, ADIK, LAD, JIH), pp. 1416–1426.
CSCW-2015-WieseMHZ #quote
“You Never Call, You Never Write”: Call and SMS Logs Do Not Always Indicate Tie Strength (JW, JKM, JIH, JZ), pp. 765–774.
CHI-2014-HayashiMH #gesture #identification #using
Wave to me: user identification using body lengths and natural gestures (EH, MM, JIH), pp. 3453–3462.
CHI-2014-MinDWAZH #detection #named #quality #smarttech
Toss-n-turn: smartphone as sleep and sleep quality detector (JKM, AD, JW, SA, JZ, JIH), pp. 477–486.
CSCW-2013-MinWHZ #mining #smarttech #social
Mining smartphone data to classify life-facets of social relationships (JKM, JW, JIH, JZ), pp. 285–294.
KDD-2013-FuLLFHS #feedback #mobile #people #why
Why people hate your app: making sense of user feedback in a mobile app store (BF, JL, LL, CF, JIH, NMS), pp. 1276–1284.
CHI-2012-HayashiPOH #named #using
WebTicket: account management using printable tokens (EH, BAP, FO, JIH), pp. 997–1006.
CHI-2012-TangHS #social
The implications of offering more disclosure choices for social location sharing (KPT, JIH, DPS), pp. 391–394.
CIKM-2012-XiangFWHR #corpus #detection #scalability #topic #twitter
Detecting offensive tweets via topical feature discovery over a large scale twitter corpus (GX, BF, LW, JIH, CPR), pp. 1980–1984.
CHI-2011-ChauKHF #interactive #machine learning #named #network #scalability
Apolo: making sense of large network data by combining rich user interaction and machine learning (DHC, AK, JIH, CF), pp. 167–176.
CHI-2011-HayashiH
A diary study of password usage in daily life (EH, JIH), pp. 2627–2630.
CHI-2011-HayashiHC #authentication #security #visual notation
Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes (EH, JIH, NC), pp. 2055–2064.
CHI-2011-LindqvistCWHZ #people #why
I’m the mayor of my house: examining why people use foursquare — a social-driven location sharing application (JL, JC, JW, JIH, JZ), pp. 2409–2418.
KDD-2011-ChauKHF #graph #interactive #machine learning #named #scalability #visualisation
Apolo: interactive large graph sensemaking by combining machine learning and visualization (DHC, AK, JIH, CF), pp. 739–742.
CHI-2009-TsaiKDCHS #feedback #mobile
Who’s viewed you?: the impact of feedback in a mobile location-sharing application (JYT, PGK, PHD, LFC, JIH, NMS), pp. 2003–2012.
CHI-2009-WonJH #using #visual notation #web
Contextual web history: using visual and contextual cues to improve web browser history (SSW, JJ, JIH), pp. 1457–1466.
CHI-2008-EgelmanCH #effectiveness #empirical #web
You’ve been warned: an empirical study of the effectiveness of web browser phishing warnings (SE, LFC, JIH), pp. 1065–1074.
CHI-2007-KumaraguruRACHN #design #email #embedded #evaluation #people
Protecting people from phishing: the design and evaluation of an embedded training email system (PK, YR, AA, LFC, JIH, EN), pp. 905–914.
CHI-2007-WongH #programming #towards #web
Making mashups with marmite: towards end-user programming for the web (JW, JIH), pp. 1435–1444.
CHI-2006-TangKFH #approach #people #privacy
Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications (KPT, PK, JF, JIH), pp. 93–102.
CHI-2004-JiangHTL #prototype #scalability #ubiquitous
Ubiquitous computing for firefighters: field studies and prototypes of large displays for incident command (XJ, JIH, LT, JAL), pp. 679–686.
CHI-2000-LinNHL #design #named #tool support #web
DENIM: finding a tighter fit between tools and practice for Web site design (JL, MWN, JIH, JAL), pp. 510–517.
SIGIR-2000-FisherHHNTV #algorithm #collaboration #development #evaluation #framework #named
SWAMI: a framework for collaborative filtering algorithm development and evaluation (DF, KH, JIH, MWN, MT, RV), pp. 366–368.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.