Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jason I. Hong is active.

Publication


Featured researches published by Jason I. Hong.


Wireless Networks | 1997

Cyberguide: a mobile context-aware tour guide

Gregory D. Abowd; Christopher G. Atkeson; Jason I. Hong; Sue Long; Rob Kooper; Michael David Pinkerton

Future computing environments will free the user from the constraints of the desktop. Applications for a mobile environment should take advantage of contextual information, such as position, to offer greater services to the user. In this paper, we present the Cyberguide project, in which we are building prototypes of a mobile context‐aware tour guide. Knowledge of the users current location, as well as a history of past locations, are used to provide more of the kind of services that we come to expect from a real tour guide. We describe the architecture and features of a variety of Cyberguide prototypes developed for indoor and outdoor use on a number of different hand‐held platforms. We also discuss the general research issues that have emerged in our context‐aware applications development in a mobile environment.


international conference on mobile systems, applications, and services | 2004

An architecture for privacy-sensitive ubiquitous computing

Jason I. Hong; James A. Landay

Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in designing software architectures and in creating interactions that are effective in helping end-users manage their privacy. To address this problem, we present Confab, a toolkit for facilitating the development of privacy-sensitive ubiquitous computing applications. The requirements for Confab were gathered through an analysis of privacy needs for both end-users and application developers. Confab provides basic support for building ubiquitous computing applications, providing a framework as well as several customizable privacy mechanisms. Confab also comes with extensions for managing location privacy. Combined, these features allow application developers and end-users to support a spectrum of trust levels and privacy needs.


international world wide web conferences | 2007

Cantina: a content-based approach to detecting phishing web sites

Yue Zhang; Jason I. Hong; Lorrie Faith Cranor

Phishing is a significant problem involving fraudulent email and web sites that trick unsuspecting users into revealing private information. In this paper, we present the design, implementation, and evaluation of CANTINA, a novel, content-based approach to detecting phishing web sites, based on the TF-IDF information retrieval algorithm. We also discuss the design and evaluation of several heuristics we developed to reduce false positives. Our experiments show that CANTINA is good at detecting phishing sites, correctly labeling approximately 95% of phishing sites.


human factors in computing systems | 2008

You've been warned: an empirical study of the effectiveness of web browser phishing warnings

Serge Egelman; Lorrie Faith Cranor; Jason I. Hong

Many popular web browsers are now including active phishing warnings after previous research has shown that passive warnings are often ignored. In this laboratory study we examine the effectiveness of these warnings and examine if, how, and why they fail users. We simulated a spear phishing attack to expose users to browser warnings. We found that 97% of our sixty participants fell for at least one of the phishing messages that we sent them. However, we also found that when presented with the active warnings, 79% of participants heeded them, which was not the case for the passive warning that we tested---where only one participant heeded the warnings. Using a model from the warning sciences we analyzed how users perceive warning messages and offer suggestions for creating more effective warning messages within the phishing context.


Human-Computer Interaction | 2001

An infrastructure approach to context-aware computing

Jason I. Hong; James A. Landay

The Context Toolkit (Dey, Abowd, and Salber, 2001 [this special issue]) is only one of many possible architectures for supporting context-aware applications. In this essay, we look at the tradeoffs involved with a service infrastructure approach to context-aware computing. We describe the advantages that a service infrastructure for context awareness has over other approaches, outline some of the core technical challenges that must be addressed before such an infrastructure can be built, and point out promising research directions for overcoming these challenges.


ubiquitous computing | 2009

Understanding and capturing people's privacy policies in a mobile social networking application

Norman M. Sadeh; Jason I. Hong; Lorrie Faith Cranor; Ian Fette; Patrick Gage Kelley; Madhu K. Prabaker; Jinghai Rao

A number of mobile applications have emerged that allow users to locate one another. However, people have expressed concerns about the privacy implications associated with this class of software, suggesting that broad adoption may only happen to the extent that these concerns are adequately addressed. In this article, we report on our work on PeopleFinder, an application that enables cell phone and laptop users to selectively share their locations with others (e.g. friends, family, and colleagues). The objective of our work has been to better understand people’s attitudes and behaviors towards privacy as they interact with such an application, and to explore technologies that empower users to more effectively and efficiently specify their privacy preferences (or “policies”). These technologies include user interfaces for specifying rules and auditing disclosures, as well as machine learning techniques to refine user policies based on their feedback. We present evaluations of these technologies in the context of one laboratory study and three field studies.


human factors in computing systems | 2011

I'm the mayor of my house: examining why people use foursquare - a social-driven location sharing application

Janne Lindqvist; Justin Cranshaw; Jason Wiese; Jason I. Hong; John Zimmerman

There have been many location sharing systems developed over the past two decades, and only recently have they started to be adopted by consumers. In this paper, we present the results of three studies focusing on the foursquare check-in system. We conducted interviews and two surveys to understand, both qualitatively and quantitatively, how and why people use location sharing applications, as well as how they manage their privacy. We also document surprising uses of foursquare, and discuss implications for design of mobile social services.


human factors in computing systems | 2000

DENIM: finding a tighter fit between tools and practice for Web site design

James Lin; Mark W. Newman; Jason I. Hong; James A. Landay

Through a study of web site design practice, we observed that web site designers design sites at different levels of refinement—site map, storyboard, and individual page—and that designers sketch at all levels during the early stages of design. However, existing web design tools do not support these tasks very well. Informed by these observations, we created DENIM, a system that helps web site designers in the early stages of design. DENIM supports sketching input, allows design at different refinement levels, and unifies the levels through zooming. We performed an informal evaluation with seven professional designers and found that they reacted positively to the concept and were interested in using such a system in their work.


ubiquitous computing | 2004

Personal privacy through understanding and action: five pitfalls for designers

Scott Lederer; Jason I. Hong; Anind K. Dey; James A. Landay

To participate in meaningful privacy practice in the context of technical systems, people require opportunities to understand the extent of the systems’ alignment with relevant practice and to conduct discernible social action through intuitive or sensible engagement with the system. It is a significant challenge to design for such understanding and action through the feedback and control mechanisms of today’s devices. To help designers meet this challenge, we describe five pitfalls to beware when designing interactive systems—on or off the desktop—with personal privacy implications. These pitfalls are: (1) obscuring potential information flow, (2) obscuring actual information flow, (3) emphasizing configuration over action, (4) lacking coarse-grained control, and (5) inhibiting existing practice. They are based on a review of the literature, on analyses of existing privacy-affecting systems, and on our own experiences in designing a prototypical user interface for managing privacy in ubiquitous computing. We illustrate how some existing research and commercial systems—our prototype included—fall into these pitfalls and how some avoid them. We suggest that privacy-affecting systems that heed these pitfalls can help users appropriate and engage them in alignment with relevant privacy practice.


symposium on usable privacy and security | 2007

Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish

Steve Sheng; Bryant Magnien; Ponnurangam Kumaraguru; Alessandro Acquisti; Lorrie Faith Cranor; Jason I. Hong; Elizabeth Nunge

In this paper we describe the design and evaluation of Anti-Phishing Phil, an online game that teaches users good habits to help them avoid phishing attacks. We used learning science principles to design and iteratively refine the game. We evaluated the game through a user study: participants were tested on their ability to identify fraudulent web sites before and after spending 15 minutes engaged in one of three anti-phishing training activities (playing the game, reading an anti-phishing tutorial we created based on the game, or reading existing online training materials). We found that the participants who played the game were better able to identify fraudulent web sites compared to the participants in other conditions. We attribute these effects to both the content of the training messages presented in the game as well as the presentation of these materials in an interactive game format. Our results confirm that games can be an effective way of educating people about phishing and other security attacks.

Collaboration


Dive into the Jason I. Hong's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Norman M. Sadeh

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Jialiu Lin

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Eiji Hayashi

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Karen P. Tang

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Jason Wiese

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Sauvik Das

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Shahram Izadi

University of Nottingham

View shared research outputs
Top Co-Authors

Avatar

John Zimmerman

Carnegie Mellon University

View shared research outputs
Researchain Logo
Decentralizing Knowledge