2010 - Fellow of Alfred P. Sloan Foundation
Jason Hong mostly deals with World Wide Web, Internet privacy, Phishing, Computer security and Ubiquitous computing. His study in Web service, Social computing, Social network, Web development and Web design is carried out as part of his studies in World Wide Web. He has researched Internet privacy in several fields, including User interface, Mobile computing and Mobile apps.
The various areas that he examines in his Mobile computing study include Information flow, Variety, Key and Spatial contextual awareness. In his research on the topic of Phishing, Exploit is strongly related with Web browser. His Ubiquitous computing study results in a more complete grasp of Human–computer interaction.
The scientist’s investigation covers issues in Internet privacy, World Wide Web, Computer security, Human–computer interaction and Ubiquitous computing. His research combines Mobile computing and Internet privacy. His study in World Wide Web is interdisciplinary in nature, drawing from both Android and Usability.
The Computer security study which covers Phishing that intersects with False positive paradox. His Human–computer interaction study combines topics in areas such as Field, Design education, End user and Multimedia. His study in User interface extends to Ubiquitous computing with its themes.
His Shoulder surfing, Authentication and Authentication study in the realm of Computer security interacts with subjects such as Training needs. His Mobile apps research incorporates themes from Functional programming, Inference, Human–computer interaction and Data processing. His Human–computer interaction research is multidisciplinary, incorporating perspectives in Schedule, Word and Rank.
His primary scientific interests are in Internet privacy, World Wide Web, Computer security, Mobile apps and Android. His research on Internet privacy frequently connects to adjacent areas such as Identity. His work on Personalization as part of general World Wide Web study is frequently connected to Consumption, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them.
His study on Shared secret, Authentication, Authentication and Password is often connected to Training needs as part of broader study in Computer security. He works mostly in the field of Mobile apps, limiting it down to topics relating to Inference and, in certain cases, Android app, Information retrieval and Bootstrapping, as a part of the same area of interest. His research in Android focuses on subjects like Data access, which are connected to Privacy management, Contextual information, Human–computer interaction and Access control.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Cyberguide: a mobile context-aware tour guide
Gregory D. Abowd;Christopher G. Atkeson;Jason Hong;Sue Long.
Wireless Networks (1997)
Cantina: a content-based approach to detecting phishing web sites
Yue Zhang;Jason I. Hong;Lorrie F. Cranor.
the web conference (2007)
An architecture for privacy-sensitive ubiquitous computing
Jason I. Hong;James A. Landay.
international conference on mobile systems, applications, and services (2004)
The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a City
Justin Cranshaw;Raz Schwartz;Jason I. Hong;Norman M. Sadeh.
international conference on weblogs and social media (2012)
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
Serge Egelman;Lorrie Faith Cranor;Jason Hong.
human factors in computing systems (2008)
The Design of Sites: Patterns, Principles, and Processes for Crafting a Customer-Centered Web Experience
Douglas K. Van Duyne;James Landay;Jason I. Hong.
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish
Steve Sheng;Bryant Magnien;Ponnurangam Kumaraguru;Alessandro Acquisti.
symposium on usable privacy and security (2007)
A framework of energy efficient mobile sensing for automatic user state recognition
Yi Wang;Jialiu Lin;Murali Annavaram;Quinn A. Jacobson.
international conference on mobile systems, applications, and services (2009)
The state of phishing attacks
Communications of The ACM (2012)
Bridging the gap between physical location and online social networks
Justin Cranshaw;Eran Toch;Jason Hong;Aniket Kittur.
ubiquitous computing (2010)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: