D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 76 Citations 26,596 269 World Ranking 789 National Ranking 472

Research.com Recognitions

Awards & Achievements

2010 - Fellow of Alfred P. Sloan Foundation

Overview

What is he best known for?

The fields of study he is best known for:

  • The Internet
  • Operating system
  • Artificial intelligence

Jason Hong mostly deals with World Wide Web, Internet privacy, Phishing, Computer security and Ubiquitous computing. His study in Web service, Social computing, Social network, Web development and Web design is carried out as part of his studies in World Wide Web. He has researched Internet privacy in several fields, including User interface, Mobile computing and Mobile apps.

The various areas that he examines in his Mobile computing study include Information flow, Variety, Key and Spatial contextual awareness. In his research on the topic of Phishing, Exploit is strongly related with Web browser. His Ubiquitous computing study results in a more complete grasp of Human–computer interaction.

His most cited work include:

  • Cyberguide: a mobile context-aware tour guide (1432 citations)
  • Cantina: a content-based approach to detecting phishing web sites (594 citations)
  • An architecture for privacy-sensitive ubiquitous computing (557 citations)

What are the main themes of his work throughout his whole career to date?

The scientist’s investigation covers issues in Internet privacy, World Wide Web, Computer security, Human–computer interaction and Ubiquitous computing. His research combines Mobile computing and Internet privacy. His study in World Wide Web is interdisciplinary in nature, drawing from both Android and Usability.

The Computer security study which covers Phishing that intersects with False positive paradox. His Human–computer interaction study combines topics in areas such as Field, Design education, End user and Multimedia. His study in User interface extends to Ubiquitous computing with its themes.

He most often published in these fields:

  • Internet privacy (32.86%)
  • World Wide Web (32.86%)
  • Computer security (17.50%)

What were the highlights of his more recent work (between 2016-2021)?

  • Internet privacy (32.86%)
  • World Wide Web (32.86%)
  • Android (6.79%)

In recent papers he was focusing on the following fields of study:

His main research concerns Internet privacy, World Wide Web, Android, Computer security and Mobile apps. The study incorporates disciplines such as Password, Key and Information sharing in addition to Internet privacy. His studies deal with areas such as Plug-in, Data access, Privacy policy and App store as well as Android.

His Shoulder surfing, Authentication and Authentication study in the realm of Computer security interacts with subjects such as Training needs. His Mobile apps research incorporates themes from Functional programming, Inference, Human–computer interaction and Data processing. His Human–computer interaction research is multidisciplinary, incorporating perspectives in Schedule, Word and Rank.

Between 2016 and 2021, his most popular works were:

  • "Hey Alexa, What's Up?": A Mixed-Methods Studies of In-Home Conversational Agent Usage (102 citations)
  • Context-aware cybersecurity training systems, apparatuses, and methods (41 citations)
  • Does this App Really Need My Location?: Context-Aware Privacy Management for Smartphones (30 citations)

In his most recent research, the most cited papers focused on:

  • The Internet
  • Operating system
  • Artificial intelligence

His primary scientific interests are in Internet privacy, World Wide Web, Computer security, Mobile apps and Android. His research on Internet privacy frequently connects to adjacent areas such as Identity. His work on Personalization as part of general World Wide Web study is frequently connected to Consumption, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them.

His study on Shared secret, Authentication, Authentication and Password is often connected to Training needs as part of broader study in Computer security. He works mostly in the field of Mobile apps, limiting it down to topics relating to Inference and, in certain cases, Android app, Information retrieval and Bootstrapping, as a part of the same area of interest. His research in Android focuses on subjects like Data access, which are connected to Privacy management, Contextual information, Human–computer interaction and Access control.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Cyberguide: a mobile context-aware tour guide

Gregory D. Abowd;Christopher G. Atkeson;Jason Hong;Sue Long.
Wireless Networks (1997)

2326 Citations

Cantina: a content-based approach to detecting phishing web sites

Yue Zhang;Jason I. Hong;Lorrie F. Cranor.
the web conference (2007)

1035 Citations

An architecture for privacy-sensitive ubiquitous computing

Jason I. Hong;James A. Landay.
international conference on mobile systems, applications, and services (2004)

867 Citations

The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a City

Justin Cranshaw;Raz Schwartz;Jason I. Hong;Norman M. Sadeh.
international conference on weblogs and social media (2012)

770 Citations

You've been warned: an empirical study of the effectiveness of web browser phishing warnings

Serge Egelman;Lorrie Faith Cranor;Jason Hong.
human factors in computing systems (2008)

753 Citations

The Design of Sites: Patterns, Principles, and Processes for Crafting a Customer-Centered Web Experience

Douglas K. Van Duyne;James Landay;Jason I. Hong.
(2002)

703 Citations

Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish

Steve Sheng;Bryant Magnien;Ponnurangam Kumaraguru;Alessandro Acquisti.
symposium on usable privacy and security (2007)

622 Citations

A framework of energy efficient mobile sensing for automatic user state recognition

Yi Wang;Jialiu Lin;Murali Annavaram;Quinn A. Jacobson.
international conference on mobile systems, applications, and services (2009)

616 Citations

The state of phishing attacks

Jason Hong.
Communications of The ACM (2012)

606 Citations

Bridging the gap between physical location and online social networks

Justin Cranshaw;Eran Toch;Jason Hong;Aniket Kittur.
ubiquitous computing (2010)

605 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Jason Hong

Gregory G. Raleigh

Gregory G. Raleigh

New Enterprise Associates

Publications: 72

Lorrie Faith Cranor

Lorrie Faith Cranor

Carnegie Mellon University

Publications: 58

Norman Sadeh

Norman Sadeh

Carnegie Mellon University

Publications: 45

James A. Landay

James A. Landay

Stanford University

Publications: 42

Anind K. Dey

Anind K. Dey

University of Washington

Publications: 40

Gregory D. Abowd

Gregory D. Abowd

Northeastern University

Publications: 33

Cecilia Mascolo

Cecilia Mascolo

University of Cambridge

Publications: 32

Xing Xie

Xing Xie

Microsoft Research Asia (China)

Publications: 31

Konstantin Beznosov

Konstantin Beznosov

University of British Columbia

Publications: 30

Serge Egelman

Serge Egelman

International Computer Science Institute

Publications: 29

Jean Vanderdonckt

Jean Vanderdonckt

Université Catholique de Louvain

Publications: 28

Florian Schaub

Florian Schaub

University of Michigan–Ann Arbor

Publications: 26

Alfred Kobsa

Alfred Kobsa

University of California, Irvine

Publications: 26

David Wagner

David Wagner

University of California, Berkeley

Publications: 24

Daqing Zhang

Daqing Zhang

Télécom SudParis

Publications: 24

Yu Zheng

Yu Zheng

Jingdong (China)

Publications: 24

Trending Scientists

Robert M. Haralick

Robert M. Haralick

City University of New York

Myra Spiliopoulou

Myra Spiliopoulou

Otto-von-Guericke University Magdeburg

Xiangping Zhang

Xiangping Zhang

Chinese Academy of Sciences

Jyh-Horng Sheu

Jyh-Horng Sheu

National Sun Yat-sen University

Mingyuan Gao

Mingyuan Gao

Chinese Academy of Sciences

Gilbert A. Schultz

Gilbert A. Schultz

University of Calgary

Catherine Jeandel

Catherine Jeandel

Centre national de la recherche scientifique, CNRS

Lanying Du

Lanying Du

Georgia State University

Donald M. Taylor

Donald M. Taylor

McGill University

Judith G. Chipperfield

Judith G. Chipperfield

University of Manitoba

Johan Askling

Johan Askling

Karolinska Institute

Thoralf M. Sundt

Thoralf M. Sundt

Harvard University

Robert A. Soslow

Robert A. Soslow

Memorial Sloan Kettering Cancer Center

Donald D. Deshler

Donald D. Deshler

University of Kansas

Scott M. Ransom

Scott M. Ransom

National Radio Astronomy Observatory

Something went wrong. Please try again later.