Travelled to:
1 × Austria
1 × Greece
1 × Italy
1 × The Netherlands
4 × Canada
7 × USA
Collaborated with:
E.Hayashi J.Wiese J.Zimmerman J.Min C.Faloutsos L.F.Cranor K.P.Tang D.H.Chau A.Kittur J.Wong J.A.Landay M.W.Newman M.Maas N.M.Sadeh D.P.Siewiorek N.Christin S.S.Won J.Jin S.Egelman S.Das A.D.I.Kramer L.A.Dabbish B.A.Pendleton F.Ozenc P.Keyani J.Fogarty X.Jiang L.Takayama J.Lin G.Xiang B.Fan L.Wang C.P.Rosé J.Lindqvist J.Cranshaw A.Doryab S.Amini B.Fu J.Lin L.Li J.Y.Tsai P.G.Kelley P.H.Drielsma P.Kumaraguru Y.Rhee A.Acquisti E.Nunge D.Fisher K.Hildrum M.Thomas R.Vuduc
Talks about:
web (6) social (4) peopl (4) locat (4) user (4) larg (4) use (4) applic (3) studi (3) share (3)
Person: Jason I. Hong
DBLP: Hong:Jason_I=
Contributed to:
Wrote 23 papers:
- CSCW-2015-DasKDH #security #social
- The Role of Social Influence in Security Feature Adoption (SD, ADIK, LAD, JIH), pp. 1416–1426.
- CSCW-2015-WieseMHZ #quote
- “You Never Call, You Never Write”: Call and SMS Logs Do Not Always Indicate Tie Strength (JW, JKM, JIH, JZ), pp. 765–774.
- CHI-2014-HayashiMH #gesture #identification #using
- Wave to me: user identification using body lengths and natural gestures (EH, MM, JIH), pp. 3453–3462.
- CHI-2014-MinDWAZH #detection #named #quality #smarttech
- Toss-n-turn: smartphone as sleep and sleep quality detector (JKM, AD, JW, SA, JZ, JIH), pp. 477–486.
- CSCW-2013-MinWHZ #mining #smarttech #social
- Mining smartphone data to classify life-facets of social relationships (JKM, JW, JIH, JZ), pp. 285–294.
- KDD-2013-FuLLFHS #feedback #mobile #people #why
- Why people hate your app: making sense of user feedback in a mobile app store (BF, JL, LL, CF, JIH, NMS), pp. 1276–1284.
- CHI-2012-HayashiPOH #named #using
- WebTicket: account management using printable tokens (EH, BAP, FO, JIH), pp. 997–1006.
- CHI-2012-TangHS #social
- The implications of offering more disclosure choices for social location sharing (KPT, JIH, DPS), pp. 391–394.
- CIKM-2012-XiangFWHR #corpus #detection #scalability #topic #twitter
- Detecting offensive tweets via topical feature discovery over a large scale twitter corpus (GX, BF, LW, JIH, CPR), pp. 1980–1984.
- CHI-2011-ChauKHF #interactive #machine learning #named #network #scalability
- Apolo: making sense of large network data by combining rich user interaction and machine learning (DHC, AK, JIH, CF), pp. 167–176.
- CHI-2011-HayashiH
- A diary study of password usage in daily life (EH, JIH), pp. 2627–2630.
- CHI-2011-HayashiHC #authentication #security #visual notation
- Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes (EH, JIH, NC), pp. 2055–2064.
- CHI-2011-LindqvistCWHZ #people #why
- I’m the mayor of my house: examining why people use foursquare — a social-driven location sharing application (JL, JC, JW, JIH, JZ), pp. 2409–2418.
- KDD-2011-ChauKHF #graph #interactive #machine learning #named #scalability #visualisation
- Apolo: interactive large graph sensemaking by combining machine learning and visualization (DHC, AK, JIH, CF), pp. 739–742.
- CHI-2009-TsaiKDCHS #feedback #mobile
- Who’s viewed you?: the impact of feedback in a mobile location-sharing application (JYT, PGK, PHD, LFC, JIH, NMS), pp. 2003–2012.
- CHI-2009-WonJH #using #visual notation #web
- Contextual web history: using visual and contextual cues to improve web browser history (SSW, JJ, JIH), pp. 1457–1466.
- CHI-2008-EgelmanCH #effectiveness #empirical #web
- You’ve been warned: an empirical study of the effectiveness of web browser phishing warnings (SE, LFC, JIH), pp. 1065–1074.
- CHI-2007-KumaraguruRACHN #design #email #embedded #evaluation #people
- Protecting people from phishing: the design and evaluation of an embedded training email system (PK, YR, AA, LFC, JIH, EN), pp. 905–914.
- CHI-2007-WongH #programming #towards #web
- Making mashups with marmite: towards end-user programming for the web (JW, JIH), pp. 1435–1444.
- CHI-2006-TangKFH #approach #people #privacy
- Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications (KPT, PK, JF, JIH), pp. 93–102.
- CHI-2004-JiangHTL #prototype #scalability #ubiquitous
- Ubiquitous computing for firefighters: field studies and prototypes of large displays for incident command (XJ, JIH, LT, JAL), pp. 679–686.
- CHI-2000-LinNHL #design #named #tool support #web
- DENIM: finding a tighter fit between tools and practice for Web site design (JL, MWN, JIH, JAL), pp. 510–517.
- SIGIR-2000-FisherHHNTV #algorithm #collaboration #development #evaluation #framework #named
- SWAMI: a framework for collaborative filtering algorithm development and evaluation (DF, KH, JIH, MWN, MT, RV), pp. 366–368.