Jason Hong
#136,461
Most Influential Person Now
Jason Hong's AcademicInfluence.com Rankings
Jason Hongcomputer-science Degrees
Computer Science
#6286
World Rank
#6630
Historical Rank
Database
#3389
World Rank
#3530
Historical Rank

Download Badge
Computer Science
Jason Hong's Degrees
- PhD Computer Science University of California, Berkeley
- Masters Computer Science University of California, Berkeley
- Bachelors Computer Science Stanford University
Similar Degrees You Can Earn
Why Is Jason Hong Influential?
(Suggest an Edit or Addition)Jason Hong's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Cyberguide: A mobile context‐aware tour guide (1997) (1732)
- Cantina: a content-based approach to detecting phishing web sites (2007) (774)
- An architecture for privacy-sensitive ubiquitous computing (2004) (681)
- The Livehoods Project: Utilizing Social Media to Understand the Dynamics of a City (2012) (643)
- You've been warned: an empirical study of the effectiveness of web browser phishing warnings (2008) (621)
- Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish (2007) (524)
- A framework of energy efficient mobile sensing for automatic user state recognition (2009) (517)
- Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing (2012) (499)
- Bridging the gap between physical location and online social networks (2010) (497)
- CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites (2011) (452)
- An Infrastructure Approach to Context-Aware Computing (2001) (447)
- I'm the mayor of my house: examining why people use foursquare - a social-driven location sharing application (2011) (446)
- The state of phishing attacks (2012) (436)
- Why people hate your app: making sense of user feedback in a mobile app store (2013) (388)
- An Empirical Analysis of Phishing Blacklists (2009) (382)
- DENIM: finding a tighter fit between tools and practice for Web site design (2000) (376)
- The Design of Sites: Patterns, Principles, and Processes for Crafting a Customer-Centered Web Experience (2002) (368)
- Understanding and capturing people’s privacy policies in a mobile social networking application (2009) (352)
- Teaching Johnny not to fall for phish (2010) (347)
- Personal privacy through understanding and action: five pitfalls for designers (2004) (341)
- Protecting people from phishing: the design and evaluation of an embedded training email system (2007) (306)
- Phinding Phish: Evaluating Anti-Phishing Tools (2006) (305)
- Privacy risk models for designing privacy-sensitive ubiquitous computing systems (2004) (290)
- "Hey Alexa, What's Up?": A Mixed-Methods Studies of In-Home Conversational Agent Usage (2018) (266)
- School of phish: a real-world evaluation of anti-phishing training (2009) (260)
- Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings (2014) (251)
- Detecting offensive tweets via topical feature discovery over a large scale twitter corpus (2012) (244)
- DENIM: An Informal Web Site Design Tool Inspired by Observations of Practice (2003) (217)
- SATIN: a toolkit for informal ink-based applications (2000) (210)
- Who's viewed you?: the impact of feedback in a mobile location-sharing application (2009) (209)
- Apolo: making sense of large network data by combining rich user interaction and machine learning (2011) (199)
- Development and evaluation of emerging design patterns for ubiquitous computing (2004) (197)
- Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing (2002) (197)
- Challenge: ubiquitous location-aware computing and the "place lab" initiative (2003) (196)
- Toss 'n' turn: smartphone as sleep and sleep quality detector (2014) (193)
- Empirical models of privacy in location sharing (2010) (184)
- Topiary: a tool for prototyping location-enhanced applications (2004) (182)
- Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share (2011) (180)
- The Privacy and Security Behaviors of Smartphone App Developers (2014) (178)
- Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing (2010) (176)
- Siren: Context-aware Computing for Firefighting (2004) (172)
- Getting users to pay attention to anti-phishing education: evaluation of retention and transfer (2007) (161)
- WebQuilt: A proxy-based approach to remote web usability testing (2001) (157)
- Wireless Location Privacy Protection (2003) (150)
- CASA: context-aware scalable authentication (2013) (150)
- End-User Privacy in Human-Computer Interaction (2007) (148)
- Computational Support for Sketching in Design: A Review (2009) (146)
- Designing for serendipity: supporting end-user configuration of ubiquitous computing environments (2002) (145)
- A hybrid phish detection approach by identity discovery and keywords retrieval (2009) (137)
- What do we (2008) (136)
- A diary study of password usage in daily life (2011) (131)
- Ubiquitous computing for firefighters: field studies and prototypes of large displays for incident command (2004) (126)
- Lessons from a real world evaluation of anti-phishing training (2008) (118)
- Phinding Phish: An Evaluation of Anti-Phishing Toolbars (2007) (116)
- WebQuilt: a framework for capturing and visualizing the web experience (2001) (108)
- The Effect of Social Influence on Security Sensitivity (2014) (105)
- Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications (2006) (99)
- Caché: caching location-enhanced content to improve user privacy (2010) (86)
- The context fabric: an infrastructure for context-aware computing (2002) (84)
- Mining smartphone data to classify life-facets of social relationships (2013) (79)
- Considering privacy issues in the context of Google glass (2013) (78)
- User-Controllable Security and Privacy for Pervasive Computing (2007) (77)
- Privacy patterns for online interactions (2006) (77)
- The Role of Social Influence in Security Feature Adoption (2015) (72)
- Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation (2014) (71)
- Modeling people's place naming preferences in location sharing (2010) (71)
- Does this App Really Need My Location? (2017) (70)
- Cha-Cha: A System for Organizing Intranet Search Results (1999) (69)
- Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Contextual IM (2007) (66)
- "You Never Call, You Never Write": Call and SMS Logs Do Not Always Indicate Tie Strength (2015) (65)
- Using text mining to infer the purpose of permission use in mobile apps (2015) (64)
- The Design of Sites: Patterns for Creating Winning Web Sites (2nd Edition) (2006) (63)
- Contextual web history: using visual and contextual cues to improve web browser history (2009) (62)
- mFerio: the design and evaluation of a peer-to-peer mobile payment system (2009) (61)
- What makes people install a COVID-19 contact-tracing app? Understanding the influence of app design and individual difference on contact-tracing app adoption intention (2020) (60)
- Detection of Behavior Change in People with Depression (2014) (60)
- Towards Wearable Everyday Body-Frame Tracking using Passive RFIDs (2018) (58)
- The Design of Sites - Patterns for Creating Winning Web Sites (2. ed.) (2007) (58)
- Locaccino: a privacy-centric location sharing application (2010) (56)
- Decentralized is not risk-free: Understanding public perceptions of privacy-utility trade-offs in COVID-19 contact-tracing apps (2020) (54)
- Coconut (2018) (53)
- GRAPHITE: A Visual Query System for Large Graphs (2008) (53)
- An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective (2017) (51)
- A Supervised Approach to Predict Company Acquisition with Factual and Topic Features Using Profiles and News Articles on TechCrunch (2012) (50)
- What did they do? understanding clickstreams with the WebQuilt visualization system (2002) (49)
- State of the Geotags: Motivations and Recent Changes (2017) (48)
- liquid: Context-Aware Distributed Queries (2003) (47)
- Undistracted driving: a mobile phone that doesn't distract (2011) (47)
- Design Challenges and Principles for Wizard of Oz Testing of Location-Enhanced Applications (2007) (45)
- Privacy and Security in the Location-enhanced World Wide Web (2003) (45)
- Exploring capturable everyday memory for autobiographical authentication (2013) (43)
- SWAMI: a framework for collaborative filtering algorithm development and evaluation. (2000) (42)
- Understanding the Purpose of Permission Use in Mobile Apps (2017) (40)
- A comparative study of location-sharing privacy preferences in the United States and China (2013) (40)
- WiSh: Towards a Wireless Shape-aware World using Passive RFIDs (2018) (39)
- Understanding and Capturing People’s Privacy Policies in a People Finder Application (2008) (39)
- Why Are They Collecting My Data? (2018) (38)
- Using Social Media Data to Understand Cities (2014) (38)
- Identifying and Analyzing the Privacy of Apps for Kids (2016) (38)
- Sketch it, make it: sketching precise drawings for laser cutting (2012) (37)
- PrivacyStreams: Enabling Transparency in Personal Data Processing for Mobile Apps (2017) (37)
- Wave to me: user identification using body lengths and natural gestures (2014) (36)
- The implications of offering more disclosure choices for social location sharing (2012) (35)
- Generating default privacy policies for online social networks (2010) (35)
- Marmite: end-user programming for the web (2006) (34)
- Improving phishing countermeasures: An analysis of expert interviews (2009) (33)
- Smartening the crowds: computational techniques for improving human verification to fight phishing scams (2011) (33)
- A Typology of Perceived Triggers for End-User Security and Privacy Behaviors (2019) (32)
- A Context/Communication Information Agent (2001) (32)
- DENIM: an informal tool for early stage web site design (2001) (32)
- Researchers' big data crisis; understanding design and functionality (2012) (31)
- Sketch Recognizers from the End-User's, the Designer's, and the Programmer's Perspective (2002) (31)
- Breaking! A Typology of Security and Privacy News and How It's Shared (2018) (31)
- Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes (2011) (30)
- Coconut: An IDE Plugin for Developing Privacy-Friendly Apps (2018) (30)
- Recommender Systems with Personality (2016) (30)
- Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships (2018) (30)
- Thumprint: Socially-Inclusive Local Group Authentication Through Shared Secret Knocks (2017) (30)
- A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection (2010) (29)
- SWAMI (poster session): a framework for collaborative filtering algorithm development and evaluation (2000) (29)
- A Self-Report Measure of End-User Security Attitudes (SA-6) (2019) (28)
- I'm All Eyes and Ears: Exploring Effective Locators for Privacy Awareness in IoT Scenarios (2020) (26)
- The Privacy Landscape of Pervasive Computing (2017) (25)
- End-user perceptions of formal and informal representations of web sites (2001) (25)
- Understanding how visual representations of location feeds affect end-user privacy concerns (2011) (25)
- Understanding and capturing people's mobile app privacy preferences (2013) (25)
- How Developers Talk About Personal Data and What It Means for User Privacy (2021) (23)
- Towards Everyday Privacy for Ubiquitous Computing (2003) (23)
- Evolving the Ecosystem of Personal Behavioral Data (2017) (22)
- Apolo: interactive large graph sensemaking by combining machine learning and visualization (2011) (21)
- Styx: Privacy risk communication for the Android smartphone platform based on apps' data-access behavior patterns (2015) (21)
- Discovering and Validating AI Errors With Crowdsourced Failure Reports (2021) (20)
- Panel: Voice Assistants, UX Design and Research (2018) (20)
- Informal PUIs: No Recognition Required (2002) (19)
- Towards Scalable Evaluation of Mobile Applications through Crowdsourcing and Automation (CMU-CyLab-12-006) (2012) (19)
- Detecting Camouflaged Applications on Mobile Application Markets (2014) (19)
- Mobile Application Evaluation Using Automation and Crowdsourcing (2013) (19)
- Who's Viewed You? The Impact of Feedback in a mobile location Sharing System (2009) (18)
- PrivacyProxy: Leveraging Crowdsourcing and In Situ Traffic Analysis to Detect and Mitigate Information Leakage (2017) (18)
- Using User-Generated Content to Understand Cities (2017) (17)
- RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication (2013) (17)
- Saying good-bye to DBMSs, designing effective interfaces (2009) (16)
- WebTicket: account management using printable tokens (2012) (16)
- QuiltView: a crowd-sourced video response system (2014) (15)
- SATIN: a toolkit for informal ink-based applications (2006) (15)
- I’m the Mayor of My House: Examining Why People Use a Social-Driven Location Sharing Application (2011) (15)
- 'I Can't Even Buy Apples If I Don't Use Mobile Pay?' (2020) (14)
- RF-Wear: Towards Wearable Everyday Skeleton Tracking Using Passive RFIDs (2018) (14)
- Understanding User Economic Behavior in the City Using Large-scale Geotagged and Crowdsourced Data (2016) (14)
- RFID Tattoo (2019) (14)
- OTO: online trust oracle for user-centric trust establishment (2012) (13)
- “ Hey Alexa , What ’ s Up ? ” : Studies of In-Home Conversational Agent Usage (2018) (13)
- Styx: Design and Evaluation of a New Privacy Risk Communication Method for Smartphones (2014) (13)
- Making Sense of Large Network Data : Combining Rich User Interaction and Machine Learning (2011) (13)
- Assessing Call and SMS Logs as an Indication of Tie Strength (2014) (13)
- MessageOnTap: A Suggestive Interface to Facilitate Messaging-related Tasks (2019) (13)
- School of Phish: A Real-Word Evaluation of Anti-Phishing Training (CMU-CyLab-09-002) (2009) (12)
- Check-ins in “Blau Space”: Applying Blau’s Macrosociological Theory to Foursquare Check-ins from New York City (2014) (12)
- The use of Java as an introductory programming language (1998) (12)
- Understanding Challenges for Developers to Create Accurate Privacy Nutrition Labels (2022) (11)
- 1 CASA : A Framework for Context-Aware Scalable Authentication (2013) (11)
- Wearable Computing from Jewels to Joules [Guest editors' introduction] (2014) (11)
- Matters of design (2011) (10)
- Challenges and opportunities in data mining contact lists for inferring relationships (2014) (10)
- The feasibility of a three-dimensional charting interface for general dentistry. (2007) (10)
- Exploring the Needs of Users for Supporting Privacy-Protective Behaviors in Smart Homes (2022) (10)
- Context Fabric: Infrastructure Support for Context-Aware Systems (2001) (9)
- Our House, in the Middle of Our Tweets (2021) (8)
- Knock x knock: the design and evaluation of a unified authentication management system (2015) (8)
- Who's viewed you?: the impact of feedback in a mobile location-sharing application (2009) (8)
- Passwords getting painful, computing still blissful (2013) (8)
- PrivacyStreams (2017) (8)
- ContextMap: Modeling Scenes of the Real World for Context-Aware Computing (2003) (8)
- Data Mining Meets HCI: Making Sense of Large Graphs (2012) (8)
- Guest Editors' Introduction: Security & Privacy (2007) (8)
- Normal and Easy (2019) (7)
- 3D Printing, Smart Cities, Robots, and More (2014) (7)
- Putting people in their place (2006) (7)
- Honeysuckle: Annotation-Guided Code Generation of In-App Privacy Notices (2021) (7)
- Investigating collaborative mobile search behaviors (2013) (6)
- Pervasive Computing Moves In (2016) (6)
- Modeling Content from Human-Verified Blacklists for Accurate Zero-Hour Phish Detection (2009) (6)
- Epistenet: facilitating programmatic access & processing of semantically related mobile personal data (2016) (6)
- Software-Defined Cooking using a Microwave Oven (2019) (6)
- Protecting against data breaches; living with mistakes (2012) (5)
- Analyzing use of privacy policy attributes in a location sharing application (2009) (5)
- sometimes less is more: multi-perspective exploration of disclosure abstractions in location-aware social mobile applications (2010) (5)
- To Self-Persuade or be Persuaded: Examining Interventions for Users’ Privacy Setting Selection (2022) (5)
- You're getting warmer!: how proximity information affects search behavior in physical spaces (2003) (5)
- Whisper: analysis and design for a community event service (2006) (5)
- The Memory Palace: Exploring Visual-Spatial Paths for Strong, Memorable, Infrequent Authentication (2019) (5)
- Design and evaluation of 3d models for electronic dental records (2007) (5)
- Minimizing Security Risks in Ubicomp Systems (2005) (5)
- Charting App Developers' Journey Through Privacy Regulation Features in Ad Networks (2022) (5)
- DENIM : An Informal Sketch-based Tool for Early Stage Web Design (2002) (4)
- Dissecting developer policy violating apps: characterization and detection (2016) (4)
- "It's our mutual responsibility to share" (2021) (4)
- MindMiner: A Mixed-Initiative Interface for Interactive Distance Metric Learning (2015) (4)
- Printertainment: printing with interactive cover sheets (1999) (4)
- RelationGrams: Tie-Strength Visualization for User-Controlled Online Identity Authentication (CMU-CyLab-11-014) (2011) (4)
- Automated Extraction of Personal Knowledge from Smartphone Push Notifications (2018) (4)
- Examining Visual-Spatial Paths for Mobile Authentication (2016) (4)
- Research Issues for Privacy in a Ubiquitously Connected World (2014) (4)
- Understanding iOS Privacy Nutrition Labels: An Exploratory Large-Scale Analysis of App Store Data (2022) (4)
- Generating Neighborhood Guides from Social Media (2021) (4)
- MessageOnTap (2019) (3)
- Interaction Platforms, Energy Conservation, Behavior Change Research, and More (2013) (3)
- Building a dynamic and computational understanding of personal social networks (2012) (3)
- Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference (2013) (3)
- Supporting End-User Configuration of Ubiquitous Computing Environments (2002) (3)
- 1 “ It ’ s Hidden in My Computer ” : Exploring Account Management Tools and Behaviors (2013) (3)
- Using Online Geotagged and Crowdsourced Data to Understand Human Offline Behavior in the City (2017) (3)
- "It’s Hidden in My Computer": Exploring Account Management Tools and Behaviors (CMU-CyLab-13-007) (2013) (3)
- Security advice; malvertisements; and CS education in Qatar (2010) (3)
- The preface of the 4th International Workshop on Location-Based Social Networks (2012) (3)
- GurunGo: coupling personal computers and mobile devices through mobile data types (2010) (3)
- Memory karaoke: using a location-aware mobile reminiscence tool to support aging in place (2007) (3)
- A Comparative Study of Location-sharing Privacy Preferences in the U.S. and China (CMU-CyLab-12-003) (2012) (3)
- Evaluating the Use of Autobiographical Memory for Authentication (2012) (2)
- Wearable Computing (2014) (2)
- Providing architectural support for building privacy-sensitive smart home applications (2020) (2)
- Alert Now or Never: Understanding and Predicting Notification Preferences of Smartphone Users (2022) (2)
- What's New in the Ubicomp Community? (2013) (2)
- SHIFTR: a user-directed, link-based system for ad hoc sensemaking of large heterogeneous data collections (2009) (2)
- Educated guess on graphical authentication schemes: vulnerabilities and countermeasures (2009) (2)
- MindMiner: Quantifying Entity Similarity via Interactive Distance Metric Learning (2015) (2)
- Social Cybersecurity : Applying Social Psychology to Cybersecurity (2015) (2)
- A comparative study of location-sharing privacy preferences in the United States and China (2012) (2)
- Smartphones, Teddy Bears, and Toys (2014) (2)
- "Did You Just Purchase a Butt Head on Amazon" (2020) (2)
- Predicting Well-being Using Short Ecological Momentary Audio Recordings (2021) (2)
- SATIN: a toolkit for informal ink-based applications (2007) (2)
- Software engineering, smartphones and health systems, and security warnings (2010) (2)
- Computer security needs refocus, and be nice about it (2013) (2)
- Usable Privacy and Security: A Grand Challenge for HCI (2009) (2)
- Lean Privacy Review: Collecting Users’ Privacy Concerns of Data Practices at a Low Cost (2021) (2)
- Proceeding of the 4th International Workshop on Location-Based Social Networks (LBSN 2012) (2012) (1)
- Matters of design, part II (2011) (1)
- Software-Defined Cooking (SDC) using a Microwave Oven (2019) (1)
- From GPS Shoes to Instrumented Cities: Food for Thought (2013) (1)
- Software-Defined Cooking Using a Microwave Oven (2020) (1)
- "Give Everybody [..] a Little Bit More Equity": Content Creator Perspectives and Responses to the Algorithmic Demonetization of Content Associated with Disadvantaged Groups (2022) (1)
- The trouble with Facebook (2022) (1)
- Understanding People's Place Naming Preferences in Location Sharing (2009) (1)
- Privacy and Security [Guest editors' introduction] (2015) (1)
- 'It's Problematic but I'm not Concerned': University Perspectives on Account Sharing (2022) (1)
- Towards a Unified Interaction Framework for Ubicomp User Interfaces (2002) (1)
- Four Technological Challenges in Ubiquitous Computing and their Influence on Interaction Design (2002) (1)
- Using Electronic Tools in the Iterative Design of a Context-Aware Tour Guide : A Case Study (2005) (1)
- Testing Computer-Aided Mnemonics and Feedback for Fast Memorization of High-Value Secrets (2016) (1)
- Field deployment of IMBuddy (2007) (1)
- Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services (2015) (1)
- Testing PhishGuru in the Real World (2008) (1)
- Modern tech can't shield your secret identity (2022) (1)
- Sketch It, Make It: Freehand Drawing for Precise Rapid Fabrication (2014) (1)
- Honeysuckle (2021) (1)
- The Security & Privacy Acceptance Framework (SPAF) (2022) (1)
- Do They Accept or Resist Cybersecurity Measures? Development and Validation of the 13-Item Security Attitude Inventory (SA-13) (2022) (1)
- Inside the great wall (2016) (0)
- Personal bits: mining interaction traces for personalized task intelligence (2019) (0)
- 2007 Reviewers (2007) (0)
- Smartphone Data at Scale: Small Devices, Big Opportunities, Bigger Risk (2013) (0)
- Analysis of Longitudinal Changes in Privacy Behavior of Android Applications (2021) (0)
- Guest Editors' Introduction: Connected Youth (2010) (0)
- Media Sharing across Public Display Networks (2014) (0)
- Jason I. Hong Statement of Research (2003) (0)
- The Design of the User Interfaces for Privacy Enhancements for Android (2021) (0)
- The Under-Appreciated Dimension of Time in Location-Based Systems (2011) (0)
- SHIFTR : A Fast and Scalable System for Ad Hoc Sensemaking of Large Graphs (2011) (0)
- Cohesion and community: the effects of space, place and time on foursquare check-ins in New York City (2013) (0)
- Chapter 5 Anti-Phishing Phil : A Case study in User education (2009) (0)
- Privacy and Client-based Discovery of Location (2003) (0)
- The Shadow : A Personal Experience Capture System Smart Spaces , Information Visualization (2012) (0)
- Privacy, Ethics and Big Data (2016) (0)
- - 1-CASA : Context-Aware Scalable Authentication (2015) (0)
- Ph.D. students must break away from undergraduate mentality (2013) (0)
- WhisperMobile : The Design and Evaluation of a Mobile Social Event Service (2007) (0)
- 7-2013 Mobile Application Evaluation Using Automation and Crowdsourcing (2015) (0)
- User Expectations for Media Sharing Practices in Open Display Networks (2015) (0)
- Bustle: Using Hitchhiking to Monitor Meaningful Locations (2006) (0)
- Security & Privacy in Pervasive Computing (2007) (0)
- New Kinds of Gadgets, Interactions, and Ubicomp Visions (2013) (0)
- Potential Effects of Ubiquitous Computing on Civic Engagement (2005) (0)
- Experimental Evidence for Using a TTM Stages of Change Model in Boosting Progress Toward 2FA Adoption (2022) (0)
- Identifying Terms and Conditions Important to Consumers using Crowdsourcing (2021) (0)
- A Context-Based Information Assistant Human-Centered Computing Course , Fall 1999 (1999) (0)
- Enhancing Email Functionality using Late Bound Content (2019) (0)
- "Am I Overwhelmed with this Information?": A Diary Study of Couples' Everyday Account Sharing (2020) (0)
- Travel Guides for Creative Tourists, Powered by Geotagged Social Media (2021) (0)
- Sensor as a Company: On Self-Sustaining IoT Commons (2021) (0)
- Inspiring Others : Related Work (2017) (0)
- Speech Recognition Using RFID Tattoos (Extended Abstract) (2021) (0)
- Finding a City’s Activity Bubbles in Geotagged Social Media (2014) (0)
- Graphite : A Tool for Visually Querying Large Social Networks (2008) (0)
- Longitudinal associations of social support, everyday social interactions, and mental health during the COVID-19 pandemic (2022) (0)
- Session details: Privacy 1 (2005) (0)
- Helping developers with privacy (Invited Keynote) (2018) (0)
- Improving the Human Element : Usable Privacy and Sec urity (2009) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Jason Hong?
Jason Hong is affiliated with the following schools: