Követés
Jason Hong
Cím
Hivatkozott rá
Hivatkozott rá
Év
Cyberguide: A mobile context‐aware tour guide
GD Abowd, CG Atkeson, J Hong, S Long, R Kooper, M Pinkerton
Wireless networks 3, 421-433, 1997
22891997
Cantina: a content-based approach to detecting phishing web sites
Y Zhang, JI Hong, LF Cranor
Proceedings of the 16th international conference on World Wide Web, 639-648, 2007
12622007
The design of sites: patterns, principles, and processes for crafting a customer-centered Web experience
D van Duyne, JA Landay, JI Hong
Addison-Wesley Professional, 2003
971*2003
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
S Egelman, LF Cranor, JI Hong
🎖 Proceedings of the SIGCHI Conference on Human Factors in Computing …, 2008
8952008
An Architecture for Privacy-Sensitive Ubiquitous Computing
JI Hong, JA Landay
Proceedings of the 2nd international conference on Mobile systems …, 2004
8862004
The livehoods project: Utilizing social media to understand the dynamics of a city
J Cranshaw, R Schwartz, JI Hong, N Sadeh
🏆 Sixth International AAAI Conference on Weblogs and Social Media - Best …, 2012
8312012
The state of phishing attacks
J Hong
Communications of the ACM 55 (1), 74-81, 2012
8182012
Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish
S Sheng, B Magnien, P Kumaraguru, A Acquisti, LF Cranor, JI Hong, ...
Proceedings of the 3rd symposium on Usable privacy and security, 88-99, 2007
8052007
Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing
J Lin, S Amini, JI Hong, N Sadeh, J Lindqvist, J Zhang
🎖 Proceedings of the 2012 ACM conference on ubiquitous computing - Best …, 2012
6742012
Cantina+ a feature-rich machine learning framework for detecting phishing web sites
G Xiang, J Hong, CP Rose, L Cranor
ACM Transactions on Information and System Security (TISSEC) 14 (2), 1-28, 2011
6482011
A framework of energy efficient mobile sensing for automatic user state recognition
Y Wang, J Lin, M Annavaram, QA Jacobson, JI Hong, B Krishnamachari, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
6392009
SATIN: a toolkit for informal ink-based applications
JI Hong, JA Landay
ACM Symposium on User Interface Software and Technology, 12, 2000
638*2000
Bridging the gap between physical location and online social networks
J Cranshaw, E Toch, JI Hong, A Kittur, N Sadeh
Proceedings of the 12th ACM international conference on Ubiquitous computing …, 2010
6372010
I'm the mayor of my house: examining why people use foursquare-a social-driven location sharing application
J Lindqvist, J Cranshaw, J Wiese, JI Hong, J Zimmerman
Proceedings of the SIGCHI conference on human factors in computing systems …, 2011
6202011
An infrastructure approach to context-aware computing
JI Hong, JA Landay
Human–computer interaction 16 (2-4), 287-303, 2001
5812001
Why people hate your app: Making sense of user feedback in a mobile app store
B Fu, J Lin, L Li, C Faloutsos, J Hong, N Sadeh
Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013
5762013
Teaching Johnny not to fall for phish
P Kumaraguru, S Sheng, A Acquisti, LF Cranor, J Hong
ACM Transactions on Internet Technology (TOIT) 10 (2), 1-31, 2010
5722010
An empirical analysis of phishing blacklists
S Sheng, B Wardman, G Warner, L Cranor, J Hong, C Zhang
Carnegie Mellon University, 2009
5492009
Protecting people from phishing: the design and evaluation of an embedded training email system
P Kumaraguru, Y Rhee, A Acquisti, LF Cranor, JI Hong, E Nunge
Proceedings of the SIGCHI conference on Human factors in computing systems …, 2007
4982007
DENIM: Finding a tighter fit between tools and practice for web site design
J Lin, MW Newman, JI Hong, JA Landay
Proceedings of the SIGCHI conference on Human factors in computing systems …, 2000
4822000
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20