Identifying and Analyzing the Privacy of Apps for Kids

Minxing Liu, Haoyu Wang, Yao Guo, and Jason Hong

Workshop on Mobile Computing Systems and Applications (HotMobile)


Using Text Mining to Infer the Purpose of Permission Use in Mobile App

Haoyu Wang, Jason Hong, and Yao Guo

International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp)


Technical Report Adobe acrobat reader

analytics, big data, privacy

Styx: Design and Evaluation of a New Privacy Risk Communication Method for Smartphones

Gokhan Bal, Kai Rannenberg, and Jason Hong

International Information Security and Privacy Conference (SEC)

The Privacy and Security Behaviors of Smartphone App Developers

Rebecca Balebako, Abigail Marsh, Jialiu Lin, Jason Hong, and Lorrie Faith Cranor

Workshop on Usable Security (USEC)


The Post that Wasn’t: Exploring Self-Censorship on Facebook

Manya Sleeper, Rebecca Balebako, Sauvik Das, Amber Lynn McConahy, Jason Wiese, and Lorrie Faith Cranor

Computer Supported Cooperative Work (CSCW)



Are you close with me? Are you nearby? Investigating social groups, closeness, and willingness to share

Jason Wiese, Patrick Kelley, Lorrie Cranor, Laura Dabbish, Jason Hong, and John Zimmerman

International Conference on Ubiquitous Computing (Ubicomp)

Caché: Caching Location-Enhanced Content to Improve User Privacy

Shahriyar Amini, Janne Lindqvist, Jason Hong, Jialiu Lin, Eran Toch, and Norman Sadeh

Mobile Systems, Applications, and Services (Mobisys)

Full Paper Adobe acrobat reader

location, mobile, privacy