Publications

2014

Using Social Media Data to Understand Cities

Dan Tasse and Jason I. Hong

Workshop on Big Data and Urban Informatics

Sketch It, Make It: Freehand Drawing for Precise Rapid Fabrication

Gabriel G. Johnson, Ellen Yi-Luen Do, Mark D. Gross, and Jason I. Hong

Technical Report

Styx: Design and Evaluation of a New Privacy Risk Communication Method for Smartphones

Gokhan Bal, Kai Rannenberg, and Jason Hong

International Information Security and Privacy Conference (SEC)

Technical Report Adobe acrobat reader

Wave to Me: User Identification Using Body Lengths and Natural Gestures

Eiji Hayashi, Manuel Maas, and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI)

QuiltView: a Crowd-Sourced Video Response System

Zhuo Chen, Wenlu Hu, Kiryong Ha, Jan Harkes, Benjamin Gilbert, Jason Hong, Asim Smailagic, Dan Siewiorek, and Mahadev Satyanarayanan

Workshop on Mobile Computing Systems and Applications (HotMobile)

The Privacy and Security Behaviors of Smartphone App Developers

Rebecca Balebako, Abigail Marsh, Jialiu Lin, Jason Hong, and Lorrie Faith Cranor

Workshop on Usable Security (USEC)

2013

Investigating Collaborative Mobile Search Behaviors

Shahriyar Amini, Vidya Setlur, Zhengxin Xi, Eiji Hayashi, and Jason I. Hong

International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI)

Full Paper Adobe acrobat reader

mobile, search

Why People Hate Your App — Making Sense of User Feedback in a Mobile App Store

Bin Fu, Jialiu Lin, Lei Li, Christos Faloutsos, Jason Hong, and Norman Sadeh

Conference on Knowledge Discovery and Data Mining (KDD)

Self-Censorship on Facebook

Sauvik Das and Adam Kramer

International AAAI Conference on Weblogs and Social Media (ICWSM)

Full Paper Adobe acrobat reader

social media

Phoneprioception: Enabling Mobile Phones to Infer Where They Are Kept

Jason Wiese, T. Scott Saponas, and A.J. Bernheim Brush

ACM Conference on Human Factors in Computing Systems (CHI)

ZoomBoard: A Diminutive QWERTY Soft Keyboard Using Iterative Zooming for Ultra-Small Devices

Stephen Oney, Chris Harrison, Amy Ogan, and Jason Wiese

ACM Conference on Human Factors in Computing Systems (CHI)

The Post that Wasn’t: Exploring Self-Censorship on Facebook

Manya Sleeper, Rebecca Balebako, Sauvik Das, Amber Lynn McConahy, Jason Wiese, and Lorrie Faith Cranor

Computer Supported Cooperative Work (CSCW)

2012

TimeBlocks: "Mom, Can I Have Another Block of Time?"

Eiji Hayashi, Martina A Rau, Zhe Han Neo, Nastasha Tan, Sriram Ramasubramanian, and Eric Paulos

ACM Conference on Human Factors in Computing Systems (CHI)

Short Paper Adobe acrobat reader

Trajectory-Aware Mobile Search

Shahriyar Amini, A.J. Bernheim Brush, John Krumm, Jaime Teevan, and Amy Karlson

ACM Conference on Human Factors in Computing Systems (CHI)

WebTicket: Account Management Using Printable Tokens

Eiji Hayashi, Bryan Pendleton, Fatih Kursat Ozenc, and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI)

TimeBlocks: "Mom, Can I Have Another Block of Time?"

Eiji Hayashi, Martina A Rau, Zhe Han Neo, Nastasha Tan, Sriram Ramasubramanian, and Eric Paulos

ACM Conference on Human Factors in Computing Systems (CHI)

ACCessory: Password Inference using Accelerometers on Smartphones

Emmanuel Owusu, Jun Han, Sauvik Das, Adrian Perrig, and Joy Zhang

Workshop on Mobile Computing Systems and Applications (HotMobile)

A Supervised Approach to Predict Company Acquisition with Factual and Topic Features Using Profiles and News Articles on TechCrunch

Guang Xiang, Zeyu Zheng, Miaomiao Wen, Jason Hong, Carolyn Rose, and Chao Liu

International AAAI Conference on Weblogs and Social Media (ICWSM)

Work in Progress Adobe acrobat reader

Detecting Offensive Tweets via Topical Feature Discovery over a Large Scale Twitter Corpus

Guang Xiang, Bin Fan, Ling Wang, Jason Hong, and Carolyn P. Rose

Conference on Information and Knowledge Management (CIKM)

Goldilocks and the Two Mobile Devices: Going Beyond All-Or-Nothing Access to a Device's Applications

Eiji Hayashi, Oriana Riva, Karin Strauss, A.J. Bernheim Brush, and Stuart Schechter

Symposium On Usable Privacy and Security (SOUPS)

OTO: Online Trust Oracle for User-Centric Trust Establishment

Tiffany Hyun-Jin Kim, Payas Gupta, Jun Han, Emmanuel Owusu, Jason Hong, Adrian Perrig, and Debin Gao

Conference on Computer and Communications Security (CCS)

The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a City

Justin Cranshaw, Raz Schwartz, Jason Hong, and Norman Sadeh

International AAAI Conference on Weblogs and Social Media (ICWSM)

2011

Toward Supporting Stories with Procedurally Generated Game Worlds

Ken Hartsook, Alexander Zook, Sauvik Das, and Mark O. Riedl

IEEE Conference on Computational Intelligence and Games

A Diary Study of Password Usage in Daily Life

Eiji Hayashi and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI)

Apolo: Interactive Large Graph Sense making by Combining Machine Learning and Visualization

Duen Horng (Polo) Chau, Aniket Kittur, Jason Hong, and Christos Faloutsos

ACM SIGKDD Conference on Knowledge Discovery and Data Mining

Demo

Are you close with me? Are you nearby? Investigating social groups, closeness, and willingness to share

Jason Wiese, Patrick Kelley, Lorrie Cranor, Laura Dabbish, Jason Hong, and John Zimmerman

International Conference on Ubiquitous Computing (Ubicomp)

CANTINA+: A Feature-rich Machine Learning Framework for Detecting Phishing Web Sites

Guang Xiang, Jason Hong, Carolyn Rose, and Lorrie Cranor

ACM Transactions on Information Systems and Security (ACM TISSEC)

Journal Article Adobe acrobat reader

machine learning, phishing, web

Caché: Caching Location-Enhanced Content to Improve User Privacy

Shahriyar Amini, Janne Lindqvist, Jason Hong, Jialiu Lin, Eran Toch, and Norman Sadeh

Mobile Systems, Applications, and Services (Mobisys)

Full Paper Adobe acrobat reader

location, mobile, privacy

I’m the Mayor of My House: Examining Why People Use foursquare - a Social-Driven Location Sharing Application

Janne Lindqvist, Justin Cranshaw, Jason Wiese, Jason Hong, and John Zimmerman

ACM Conference on Human Factors in Computing Systems (CHI)

Full Paper Adobe acrobat reader

location, social media

Making Sense of Large Network Data: Combining Rich User Interaction and Machine Learning

Duen Horng (Polo) Chau, Aniket Kittur, Jason Hong, and Christos Faloutsos

ACM Conference on Human Factors in Computing Systems (CHI)

Undistracted Driving: A Mobile Phone that Doesn't Distract

Janne Lindqvist and Jason Hong

Workshop on Mobile Computing Systems and Applications (HotMobile)

2010

A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection

Guang Xiang, Carolyn Rose, Jason Hong, and Bryan Pendleton

European Symposium on Research in Computer Security (ESORICS)

Full Paper Adobe acrobat reader

Bridging the Gap Between Physical Location and Online Social Networks

Justin Cranshaw, Eran Toch, Jason Hong, Aniket Kittur, and Norman Sadeh

International Conference on Ubiquitous Computing (Ubicomp)

Full Paper Adobe acrobat reader

Empirical Models of Privacy in Location Sharing

Eran Toch, Justin Cranshaw, Paul Drielsma, Janice Tsai, Patrick Kelley, Lorrie Cranor, Jason Hong, and Norman Sadeh

International Conference on Ubiquitous Computing (Ubicomp)

Full Paper Adobe acrobat reader

Generating Default Privacy Policies for Online Social Networks

Eran Toch, Norman Sadeh, and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI)

Work in Progress

GurunGo: Coupling Personal Computers and Mobile Devices through Mobile Data Types

Ivan González and Jason Hong

Workshop on Mobile Computing Systems and Applications (HotMobile)

Short Paper Adobe acrobat reader

Locaccino: A Privacy-Centric Location Sharing Application

Eran Toch, Justin Cranshaw, Paul Drielsma, Jay Springfield, Lorrie Cranor, Jason Hong, and Norman Sadeh

International Conference on Ubiquitous Computing (Ubicomp)

Modeling People’s Place Naming Preferences in Location Sharing

Jialiu Lin, Guang Xiang, Jason Hong, and Norman Sadeh

International Conference on Ubiquitous Computing (Ubicomp)

Full Paper Adobe acrobat reader

Full Paper Adobe acrobat reader

Teaching Johnny Not to Fall for Phish

Ponnurangam Kumaraguru, Steve Sheng, Alessandro Acquisti, Lorrie Cranor, and Jason Hong

ACM Transactions on Internet Technologies (ACM TOIT)

2009

A Framework of Energy Efficient Mobile Sensing for Automatic Human State Recognition

Yi Wang, Jialiu Lin, Murali Annavaram, Quinn Jacobson, Jason Hong, Bhaskar Krishnamachari, and Norman Sadeh

Mobile Systems, Applications, and Services (Mobisys)

Full Paper Adobe acrobat reader

Full Paper Adobe acrobat reader

An Empirical Analysis of Phishing Blacklists

Steve Sheng, Brad Wardman, Gary Warner, Lorrie Cranor, Jason Hong, and Chengshan Zhang

Conference on Email and Spam (CEAS)

Computational Support for Sketching in Design: A Review

Gabriel Johnson, Mark Gross, Jason Hong, and Ellen Do

Foundations and Trends in HCI

Journal Article Adobe acrobat reader

Contextual Web History: Using Visual and Contextual Cues to Improve Web Browser History

Jing Jin, Sungjoon Wong, and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI)

Full Paper

Improving Phishing Countermeasures: An Analysis of Expert Interviews

Steve Sheng, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Cranor, and Jason Hong

APWG eCrime Researcher’s Summit (eCrime)

School of Phish: A Real-World Evaluation of Anti-Phishing Training

Ponnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie Cranor, Jason Hong, Mary Ann Blair, and Theodore Pham

Symposium on Usable Privacy and Security (SOUPS)

Supporting Sensemaking Through Large Scale Graph Mining

Duen Horng (Polo) Chau, Aniket Kittur, Christos Faloutsos, and Jason Hong

Sensemaking Workshop at ACM Conference on Human Factors in Computing Systems (CHI)

Workshop Paper

Who's Viewed You? The Impact of Feedback on Mobile-location Sharing

Janice Tsai, Patrick Kelley, Paul Drielsma, Lorrie Cranor, Jason Hong, and Norman Sadeh

ACM Conference on Human Factors in Computing Systems (CHI)

mFerio: The Design and Evaluation of a Peer-to-Peer Mobile Payment System

Rajesh Balan, Narayan Ramasubbu, Komsit Prakobphol, Nicolas Christin, and Jason Hong

Mobile Systems, Applications, and Services (Mobisys)

Full Paper Adobe acrobat reader

2008

Anti-Phishing Education

Ponnurangam Kumaraguru, Steve Sheng, Alessandro Acquisti, Lorrie Cranor, and Jason Hong

International Conference on E-Learning in the Workplace (ICELW)

GRAPHITE: A Visual Query System for Large Graphs

Duen Horng (Polo) Chau Christos Faloutsos, Hanghang Tong, Jason Hong, Brian Gallagher, and Tina Eliassi-Rad

IEEE International Conference on Data Mining

Demo Adobe acrobat reader

Lessons From a Real World Evaluation of Anti-Phishing Training

Ponnurangam Kumaraguru, Steve Sheng, Alessandro Acquisti, Lorrie Cranor, and Jason Hong

APWG eCrime Researcher’s Summit (eCrime)

Undercover: Authentication Usable in Front of Prying Eyes

Hirokazu Sasamoto, Nicolas Christine, and Eiji Hayashi

Sensemaking Workshop at ACM Conference on Human Factors in Computing Systems (CHI)

Full Paper Adobe acrobat reader

Understanding and Capturing People’s Privacy Policies in a People Finder Application

Norman Sadeh, Jason Hong, Lorrie Cranor, Ian Fette, Patrick Kelley, Madhu Prabaker, and Jinghai Rao

Personal and Ubiquitous Computing

Journal Article Adobe acrobat reader

Use Your Illusion: Secure Authentication Usable Anywhere

Eiji Hayashi, Nicolas Christine, Rachna Dhamija, and Adrian Perrig

Symposium on Usable Privacy and Security (SOUPS)

Full Paper Adobe acrobat reader

What do we "mashup" when we make mashups?

Jeffrey Wong and Jason Hong

International Workshop on End-user Software Engineering (WEUSE)

Workshop Paper

You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings

Serge Egelman, Lorrie Cranor, and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI)

2007

Anti-Phishing Phil: The Design and Evaluation of a Game That Teaches People Not to Fall for Phish

Steve Sheng, Bryant Magnien, Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Cranor, Jason Hong, and Elizabeth Nunge

Symposium on Usable Privacy and Security (SOUPS)

CANTINA: A Content-Based Approach to Detecting Phishing Web Sites

Yue Zhang, Jason Hong, and Lorrie Cranor

International Conference on World Wide Web (WWW)

Clever Clustering vs. Simple Speed-up for Summarizing Rushes

Alexander G. Hauptmann, Michael G. Christel, Wei-Hao Lin, Bryan Maher, Jun Yang, Robert V. Baron, and Guang Xiang

International workshop on TRECVID video summarization

Full Paper

Design and Evaluation of 3D Models for Electronic Dental Records

Michael Marotta, Purin Phanichphant Patrick Malatack, Tej Shah, Gregory Price, Thankam Thyvalikakath, Titus Schleyer, and Jason Hong.

ACM Conference on Human Factors in Computing Systems (CHI)

Short Paper Adobe acrobat reader

Development and Initial Validation of a Three-Dimensional Dental Charting Interface

Titus Schleyer, Thankam Thyvalikakath, Pat Malatack, Michael Marotta, Shah Tej, Purin Phanichphant, Greg Price, and Jason Hong

The Journal of the American Dental Association

Journal Article Adobe acrobat reader

End-User Privacy in Human-Computer Interaction

Giovanni Iachello and Jason Hong

Foundations and Trends in HCI

Journal Article Adobe acrobat reader

Field Deployment of IMBuddy: A Study of Privacy Control and Feedback Mechanisms for Contextual Instant Messengers

Gary Hsieh, Karen Tang, Wai-yong Low, and Jason Hong

International Conference on Ubiquitous Computing (Ubicomp)

Full Paper Adobe acrobat reader

Getting Users’ to Pay Attention to Anti-Phishing Education: Evaluation of Retention and Transfer

Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Alessandro Acquisti, Lorrie Cranor, and Jason Hong

APWG eCrime Researcher’s Summit (eCrime)

Making Mashups with Marmite: Towards End-User Programming for the Web

Jeffrey Wong and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI)

Full Paper Adobe acrobat reader

Memory Karaoke: Aiding Episodic Memory with Location-Enhanced Mobile Phones

Karen Tang, Ian Smith, Annie Ha, Lalatendu Satpathy, and Jason Hong

International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI)

Full Paper

Phinding Phish: An Evaluation of Anti-Phishing Toolbars

Yue Zhang, Serge Egelman, Lorrie Cranor, and Jason Hong

Network & Distributed System Security Conference (NDSS)

Protecting People from Phishing: The Design and Evaluation of an Embedded Training Email System

Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Cranor, Jason Hong, and Elizabeth Nunge

ACM Conference on Human Factors in Computing Systems (CHI)

Understanding and Capturing People’s Privacy Policies in a People Finder Application

Madhu Prabaker, Jinghai Rao, Ian Fette, Patrick Kelley, Lorrie Cranor, Jason Hong, and Norman Sadeh

Workshop on Privacy, in International Conference on Ubiquitous Computing (Ubicomp)

Workshop Paper Adobe acrobat reader

User-Controllable Security and Privacy for Pervasive Computing

Jason Cornwell, Ian Fette, Gary Hsieh, Madhu Prabaker, Jinghai Rao, Karen Tang, Kami Vaniea, Lujo Bauer, Lorrie Cranor, Jason Hong, Bruce McLaren, Mike Reiter, and Norman Sadeh

Workshop on Mobile Computing Systems and Applications (HotMobile)

Short Paper Adobe acrobat reader

2006

Anonymous and Privacy-Sensitive Collection of Sensed Data in Location-Based Applications

James Fogarty, Pedram Keyani, Karen Tang, and Jason Hong

Workshop on Mobile Social Software, in ACM Conference on Human Factors in Computing Systems (CHI)

Workshop Paper Adobe acrobat reader

Journal Article Adobe acrobat reader

Marmite: End-User Programming for the Web

Jeffrey Wong and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI)

Work in Progress Adobe acrobat reader

Marmite: End-User Programming for the Web

Jeffrey Wong and Jason Hong

Workshop on Mashups and CSCW, in ACM Conference on Computer Supported Cooperative Work

Workshop Paper Adobe acrobat reader

Privacy Patterns for Online Interactions

Sasha Romanosky, Alessandro Acquisti, Jason Hong, Lorrie Cranor, and Batya Friedman

European Conference on Pattern Languages of Programs

Full Paper Adobe acrobat reader

The Design of Sites: Patterns for Creating Winning Web Sites

Doug van Duyne, James Landay, and Jason Hong

Addison-Wesley

Book

Using current SMS and mobile IM practices to inform social mobile application design

Karen Tang and Jason Hong

Workshop on Mobile Social Software, in ACM Conference on Human Factors in Computing Systems (CHI)

Workshop Paper Adobe acrobat reader

Whisper: analysis and design for a community event service

Jennifer Ng, Jonathan Terleski, and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI)

Work in Progress Adobe acrobat reader

2005

Personal Privacy through Understanding and Action: Five Pitfalls for Designers

Scott Lederer, Jason Hong, Anind Dey, and James Landay

Security and Usability: Designing Secure Systems That People Can Use

Book Chapter

Potential effects of Ubiquitous Computing on Civic Engagement

Pedram Keyani and Jason Hong

Workshop on Social Implications of Ubiquitous Computing, in ACM Conference on Human Factors in Computing Systems (CHI)

Workshop Paper Adobe acrobat reader

2004

An Architecture for Privacy-Sensitive Ubiquitous Computing

Jason Hong and James Landay

Mobile Systems, Applications, and Services (Mobisys)

Full Paper Adobe acrobat reader

Development and Evaluation of Emerging Design Patterns for Ubiquitous Computing

Eric Chung, Jason, James Lin, Madhu Prabaker, James Landay, and Alan Liu

Designing Interactive Systems (DIS)

Full Paper Adobe acrobat reader

Personal Privacy through Understanding and Action: Five Pitfalls for Designers

Scott Lederer, Jason Hong, Anind Dey, and James Landay

Personal and Ubiquitous Computing

Journal Article Adobe acrobat reader

Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems

Jason Hong, Jennifer Ng, Scott Lederer, and James Landay

Designing Interactive Systems (DIS)

Full Paper Adobe acrobat reader

Siren: Context-aware Computing for Firefighting

Xiaodong Jiang, Nicholas Chen, Jason Hong, Kevin Wang, Leila Takayama, and James Landay

International Conference on Pervasive Computing (Pervasive)

Full Paper Adobe acrobat reader

Topiary: A Tool for Prototyping Location-Enhanced Applications

Yang Li, Jason Hong, and James Landay

ACM Symposium on User Interface Software and Technology (UIST)

Full Paper Adobe acrobat reader

Ubiquitous Computing for Firefighters: Field Studies and Prototypes of Large Displays for Incident Command

Xiaodong Jiang, Jason Hong, Leila Takayama, and James Landay

ACM Conference on Human Factors in Computing Systems (CHI)

Full Paper Adobe acrobat reader

2003

Bootstrapping the Location-enhanced World Wide Web

Bill Schilit, Anthony LaMarca, David McDonald, Jason Tabert, Eithon Cadag, Gaetano Borriello, William Griswold, and Jason Hong

Workshop on Location-Aware Computing, in International Conference on Ubiquitous Computing (Ubicomp)

Workshop Paper Adobe acrobat reader

Challenge: Ubiquitous Location-Aware Computing and the “Place Lab” Initiative

Bill Schilit, Anthony LaMarca, Gaetano Borriello, William Griswold, David McDonald, Edward Lazowska, Anand Balachandran, Jason Hong, and Vaughn Iverson

International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH)

Full Paper Adobe acrobat reader

ContextMap: Modeling Scenes of the Real World for Context-Aware Computing

Yang Li, Jason Hong, and James Landay

International Conference on Ubiquitous Computing (Ubicomp)

Poster Adobe acrobat reader

Privacy and Security in the Location-enhanced World Wide Web

Jason Hong, Gaetano Boriello, James Landay, David McDonald, Bill Schilit, and J. Doug Tygar

Workshop on Ubicomp Communities: Privacy as Boundary Negotiation, in International Conference on Ubiquitous Computing (Ubicomp)

Workshop Paper Adobe acrobat reader

You're Getting Warmer! How Proximity Information Affects Search Behavior in Physical Spaces

Leila Takayama, Lawrence Leung, Xiaodong Jiang, and Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI)

Poster Adobe acrobat reader

liquid: Context-Aware Distributed Queries

Jeffrey Heer, Alan Newberger, Chris Beckmann, and Jason Hong

International Conference on Ubiquitous Computing (Ubicomp)

Full Paper Adobe acrobat reader

2002

Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing

Xiaodong Jiang, Jason Hong, and James Landay

International Conference on Ubiquitous Computing (Ubicomp)

Full Paper Adobe acrobat reader

DENIM: An Informal Sketch-based Tool for Early Stage Web Design

James Lin, Mark Newman, Jason Hong, and James Landay

Sketch Understanding Workshop (AAAI 2002 Spring Symposium)

Demo Adobe acrobat reader

DENIM: An Informal Tool for Early Stage Website Design

James Lin, Mark Newman, Jason Hong, and Jason Landay

ACM Conference on Human Factors in Computing Systems (CHI)

Video

DENIM: An Informal Web Site Design Tool Inspired by Observations of Practice

Mark Newman, James Lin, Jason Hong, and James Landay

Human Computer Interaction

Journal Article Adobe acrobat reader

Designing for Serendipity: Supporting End-User Configuration of Ubiquitous Computing Environments

Mark Newman, Jana Sedivy, Keith Edwards, Trevor Smith, Karen Marcelo, Chris Neuwirth, Jason Hong, and Shahram Izadi

Designing Interactive Systems (DIS)

Full Paper Adobe acrobat reader

Informal PUIs: No Recognition Required

James Landay, Jason Hong, Scott Klemmer, James Lin, and Mark Newman

Sketch Understanding Workshop (AAAI 2002 Spring Symposium)

Sketch Recognizers from the End-User's, the Designer's, and the Programmer's Perspective

Jason Hong, James Landay, A. Chris Long, and Jennifer Mankoff

Sketch Understanding Workshop (AAAI 2002 Spring Symposium)

Speakeasy: A Platform for Interactive Public Displays

Julie Black, Jason Hong, Mark Newman, W. Keith Edwards, Shahram Izadi, Jana Sedivy, and Trevor Smith

Workshop on Public, Community, and Situated Displays: Design, use, and interaction around shared information displays, in ACM Conference on Computer Supported Cooperative Work

Workshop Paper Adobe acrobat reader

The Context Fabric: An Infrastructure for Context-Aware Computing

Jason Hong

ACM Conference on Human Factors in Computing Systems (CHI)

Doctoral Consortium Adobe acrobat reader

The Design of Sites

Doug van Duyne, James Landay, and Jason Hong

Workshop on Patterns in Practice: A Workshop for UI Designers, in ACM Conference on Human Factors in Computing Systems (CHI)

Workshop Paper Adobe acrobat reader

design pattern, web design

Towards a Unified Interaction Framework for Ubicomp User Interfaces

Jason Hong, Scott Lederer, and Mark Newman

Workshop on Models for Ubiquitous Computing, in International Conference on Ubiquitous Computing (Ubicomp)

Workshop Paper Adobe acrobat reader

WebQuilt: A Proxy-based Approach to Remote Web Usability Testing

Jason Hong, Jeffrey Heer, Sarah Waterson, and James Landay

ACM Transactions on Information Systems (ACM TOIS)

What Were They Doing? Visual Analysis of Web Usability Log Data

Sarah Waterson, Jason Hong, and James Landay

Advanced Visual Interfaces (AVI)

Full Paper Adobe acrobat reader

2001

An Infrastructure Approach to Context-Aware Computing

Jason Hong and James Landay

Human Computer Interaction

Journal Article Adobe acrobat reader

context-aware computing

Context/Communication Information Agent

Jason Hong and James Landay

Personal and Ubiquitous Computing

Journal Article Adobe acrobat reader

context-aware computing

End-User Perceptions of Formal and Informal Representations of Web Sites

Jason Hong, Francis Li, James Lin, and James Landay

ACM Conference on Human Factors in Computing Systems (CHI)

Integrating Context Services Through Automatic Path Creation

Jason Hong and James Landay

Workshop on Building the User Experience in Ubiquitous Computing, in ACM Conference on Human Factors in Computing Systems (CHI)

Workshop Paper Adobe acrobat reader

WebQuilt: A Framework for Capturing and Visualizing the Web Experience

Jason Hong and James Landay

International Conference on World Wide Web (WWW)

2000

A Context / Communication Information Agent

Jason Hong and James Landay

Workshop on Situated Interaction in Ubiquitous Computing, in ACM Conference on Human Factors in Computing Systems (CHI)

Workshop Paper Adobe acrobat reader

DENIM: Finding a tighter fit between tools and practice for web site design

James Lin, Mark Newman, Jason Hong, and James Landay

ACM Conference on Human Factors in Computing Systems (CHI)

SATIN: A Toolkit for Informal Ink-based Applications

Jason Hong and James Landay

ACM Symposium on User Interface Software and Technology (UIST)

SWAMI: A Framework for Collaborative Filtering Algorithm Development and Evaluation

Danyel Fisher, Kris Hildrum, Jason Hong, Mark Newman, Megan Thomas, and Rich Vuduc

SIGIR

Poster Adobe acrobat reader

Web Design Patterns for eCommerce

Doug van Duyne, Jason Hong, and James Landay

Workshop on Pattern Languages for Interaction Design:Building Momentum, in ACM Conference on Human Factors in Computing Systems (CHI)

Workshop Paper Adobe acrobat reader

design, design pattern, web design

1999

Cha-Cha: A System for Organizing Intranet Search Results

Mike Chen, Marti Hearst, Jason Hong, and James Lin

USENIX Symposium on Internet Technologies and Systems (USITS)

Full Paper Adobe acrobat reader

search, user interface

Printertainment: Printing with Interactive Cover Sheets

Jason Hong, Morgan Price, Bill Schilit, and Gene Golovchinsky

ACM Conference on Human Factors in Computing Systems (CHI)

Short Paper Adobe acrobat reader

ubiquitous computing

1998

Shadow: A Personal Experience Capture System

Jason Hong, Mark Newman, and James Landay

DARPA Workshop on Smart Spaces

Workshop Paper Adobe acrobat reader

ubiquitous computing

1997

Cyberguide: A Mobile Context-Aware Tour Guide

Gregory Abowd, Chris Atkeson, Jason Hong, Sue Long, Rob Kooper, and Mike Pinkerton

ACM Wireless Networks