H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 74 Citations 26,938 217 World Ranking 629 National Ranking 388

Research.com Recognitions

Awards & Achievements

2010 - Fellow of Alfred P. Sloan Foundation

Overview

What is he best known for?

The fields of study he is best known for:

  • The Internet
  • Operating system
  • Artificial intelligence

Jason Hong mostly deals with World Wide Web, Internet privacy, Phishing, Computer security and Ubiquitous computing. His study in Web service, Social computing, Social network, Web development and Web design is carried out as part of his studies in World Wide Web. He has researched Internet privacy in several fields, including User interface, Mobile computing and Mobile apps.

The various areas that he examines in his Mobile computing study include Information flow, Variety, Key and Spatial contextual awareness. In his research on the topic of Phishing, Exploit is strongly related with Web browser. His Ubiquitous computing study results in a more complete grasp of Human–computer interaction.

His most cited work include:

  • Cyberguide: a mobile context-aware tour guide (1432 citations)
  • Cantina: a content-based approach to detecting phishing web sites (594 citations)
  • An architecture for privacy-sensitive ubiquitous computing (557 citations)

What are the main themes of his work throughout his whole career to date?

The scientist’s investigation covers issues in Internet privacy, World Wide Web, Computer security, Human–computer interaction and Ubiquitous computing. His research combines Mobile computing and Internet privacy. His study in World Wide Web is interdisciplinary in nature, drawing from both Android and Usability.

The Computer security study which covers Phishing that intersects with False positive paradox. His Human–computer interaction study combines topics in areas such as Field, Design education, End user and Multimedia. His study in User interface extends to Ubiquitous computing with its themes.

He most often published in these fields:

  • Internet privacy (32.86%)
  • World Wide Web (32.86%)
  • Computer security (17.50%)

What were the highlights of his more recent work (between 2016-2021)?

  • Internet privacy (32.86%)
  • World Wide Web (32.86%)
  • Android (6.79%)

In recent papers he was focusing on the following fields of study:

His main research concerns Internet privacy, World Wide Web, Android, Computer security and Mobile apps. The study incorporates disciplines such as Password, Key and Information sharing in addition to Internet privacy. His studies deal with areas such as Plug-in, Data access, Privacy policy and App store as well as Android.

His Shoulder surfing, Authentication and Authentication study in the realm of Computer security interacts with subjects such as Training needs. His Mobile apps research incorporates themes from Functional programming, Inference, Human–computer interaction and Data processing. His Human–computer interaction research is multidisciplinary, incorporating perspectives in Schedule, Word and Rank.

Between 2016 and 2021, his most popular works were:

  • "Hey Alexa, What's Up?": A Mixed-Methods Studies of In-Home Conversational Agent Usage (102 citations)
  • Context-aware cybersecurity training systems, apparatuses, and methods (41 citations)
  • Does this App Really Need My Location?: Context-Aware Privacy Management for Smartphones (30 citations)

In his most recent research, the most cited papers focused on:

  • The Internet
  • Operating system
  • Artificial intelligence

His primary scientific interests are in Internet privacy, World Wide Web, Computer security, Mobile apps and Android. His research on Internet privacy frequently connects to adjacent areas such as Identity. His work on Personalization as part of general World Wide Web study is frequently connected to Consumption, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them.

His study on Shared secret, Authentication, Authentication and Password is often connected to Training needs as part of broader study in Computer security. He works mostly in the field of Mobile apps, limiting it down to topics relating to Inference and, in certain cases, Android app, Information retrieval and Bootstrapping, as a part of the same area of interest. His research in Android focuses on subjects like Data access, which are connected to Privacy management, Contextual information, Human–computer interaction and Access control.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Cyberguide: a mobile context-aware tour guide

Gregory D. Abowd;Christopher G. Atkeson;Jason Hong;Sue Long.
Wireless Networks (1997)

2244 Citations

Cantina: a content-based approach to detecting phishing web sites

Yue Zhang;Jason I. Hong;Lorrie F. Cranor.
the web conference (2007)

859 Citations

An architecture for privacy-sensitive ubiquitous computing

Jason I. Hong;James A. Landay.
international conference on mobile systems, applications, and services (2004)

795 Citations

The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a City

Justin Cranshaw;Raz Schwartz;Jason I. Hong;Norman M. Sadeh.
Social Science Research Network (2012)

731 Citations

The Design of Sites: Patterns, Principles, and Processes for Crafting a Customer-Centered Web Experience

Douglas K. Van Duyne;James Landay;Jason I. Hong.
(2002)

701 Citations

You've been warned: an empirical study of the effectiveness of web browser phishing warnings

Serge Egelman;Lorrie Faith Cranor;Jason Hong.
human factors in computing systems (2008)

667 Citations

A framework of energy efficient mobile sensing for automatic user state recognition

Yi Wang;Jialiu Lin;Murali Annavaram;Quinn A. Jacobson.
international conference on mobile systems, applications, and services (2009)

590 Citations

Bridging the gap between physical location and online social networks

Justin Cranshaw;Eran Toch;Jason Hong;Aniket Kittur.
ubiquitous computing (2010)

583 Citations

An infrastructure approach to context-aware computing

Jason I. Hong;James A. Landay.
Human-Computer Interaction (2001)

551 Citations

The state of phishing attacks

Jason Hong.
Communications of The ACM (2012)

547 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Jason Hong

Gregory G. Raleigh

Gregory G. Raleigh

Cisco Systems (China)

Publications: 72

Lorrie Faith Cranor

Lorrie Faith Cranor

Carnegie Mellon University

Publications: 58

Norman Sadeh

Norman Sadeh

Carnegie Mellon University

Publications: 45

James A. Landay

James A. Landay

Stanford University

Publications: 42

Anind K. Dey

Anind K. Dey

University of Washington

Publications: 40

Gregory D. Abowd

Gregory D. Abowd

Northeastern University

Publications: 33

Cecilia Mascolo

Cecilia Mascolo

University of Cambridge

Publications: 32

Xing Xie

Xing Xie

Microsoft (United States)

Publications: 31

Konstantin Beznosov

Konstantin Beznosov

University of British Columbia

Publications: 30

Serge Egelman

Serge Egelman

International Computer Science Institute

Publications: 29

Jean Vanderdonckt

Jean Vanderdonckt

Université Catholique de Louvain

Publications: 28

Alfred Kobsa

Alfred Kobsa

University of California, Irvine

Publications: 26

Florian Schaub

Florian Schaub

University of Michigan–Ann Arbor

Publications: 26

David Wagner

David Wagner

University of California, Berkeley

Publications: 24

Daqing Zhang

Daqing Zhang

Télécom SudParis

Publications: 24

Something went wrong. Please try again later.