Jason Hong | Carnegie Mellon University (original) (raw)

Jason Hong

Uploads

Papers by Jason Hong

Research paper thumbnail of Article User Expectations for Media Sharing Practices in Open Display Networks

Bookmarks Related papers MentionsView impact

Research paper thumbnail of State of the Geotags: Motivations and Recent Changes

The widespread adoption of smartphones has made it possible for large numbers of people to geotag... more The widespread adoption of smartphones has made it possible for large numbers of people to geotag their social media posts. Past work has studied the reasons people tag their location and the ways they do so on location-based social networks like Foursquare. But it is unclear how well these findings generalize to other social media not centered on location, such as Twitter or Flickr. Through an analysis of public data and two surveys, we investigate why people geotag their photos, tweets, and other non-location-based social media. We found that their reasons are similar to those in location-based social networks. We also found several surprises due to the different nature of these platforms and the changes since location-based social networks were introduced. For example, people usually consciously geotag, though a significant portion geotags unintentionally; coordinate geotagging is changing to placetagging; and job-posting bots constitute a growing portion of

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Improving the Human Element : Usable Privacy and Sec urity

Information and communication technologies are perv asive in all aspects of every day life, inclu... more Information and communication technologies are perv asive in all aspects of every day life, including transportation, manufacturing, utilities, finance, and entertainment. It would not be an understatement to say that we depend on these syste ms being highly reliable for modern society to function. However, we have been witnessing an in creasing number of privacy and security failures in these systems. What is interesting is t hat many of these failures happen not because of breakdowns in algorithms, software, or hardware, bu t because of failures in the user interface.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of I Can't Even Buy Apples If I Don't Use Mobile Pay?

Proceedings of the ACM on Human-Computer Interaction, 2020

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective

Proceedings of the 26th International Conference on World Wide Web, 2017

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Evolving the Ecosystem of Personal Behavioral Data

Human–Computer Interaction, 2017

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A hybrid phish detection approach by identity discovery and keywords retrieval

Proceedings of the 18th international conference on World wide web - WWW '09, 2009

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An architecture for privacy-sensitive ubiquitous computing

Proceedings of the 2nd international conference on Mobile systems, applications, and services - MobiSYS '04, 2004

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Building a dynamic and computational understanding of personal social networks

Proceedings of the 1st ACM workshop on Mobile systems for computational social science - MCSS '12, 2012

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Detecting Camouflaged Applications on Mobile Application Markets

Lecture Notes in Computer Science, 2015

Bookmarks Related papers MentionsView impact

Research paper thumbnail of I'm the mayor of my house

Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2011

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Cantina

Proceedings of the 16th international conference on World Wide Web - WWW '07, 2007

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Privacy patterns for online interactions

Proceedings of the 2006 conference on Pattern languages of programs - PLoP '06, 2006

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Lessons from a real world evaluation of anti-phishing training

2008 eCrime Researchers Summit, 2008

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Improving phishing countermeasures: An analysis of expert interviews

2009 eCrime Researchers Summit, 2009

Bookmarks Related papers MentionsView impact

Research paper thumbnail of WebTicket

Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems - CHI '12, 2012

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Getting users to pay attention to anti-phishing education

Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit on - eCrime '07, 2007

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Privacy risk models for designing privacy-sensitive ubiquitous computing systems

Proceedings of the 2004 conference on Designing interactive systems processes, practices, methods, and techniques - DIS '04, 2004

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Who's viewed you?

Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2009

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Protecting people from phishing

Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2007

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Article User Expectations for Media Sharing Practices in Open Display Networks

Bookmarks Related papers MentionsView impact

Research paper thumbnail of State of the Geotags: Motivations and Recent Changes

The widespread adoption of smartphones has made it possible for large numbers of people to geotag... more The widespread adoption of smartphones has made it possible for large numbers of people to geotag their social media posts. Past work has studied the reasons people tag their location and the ways they do so on location-based social networks like Foursquare. But it is unclear how well these findings generalize to other social media not centered on location, such as Twitter or Flickr. Through an analysis of public data and two surveys, we investigate why people geotag their photos, tweets, and other non-location-based social media. We found that their reasons are similar to those in location-based social networks. We also found several surprises due to the different nature of these platforms and the changes since location-based social networks were introduced. For example, people usually consciously geotag, though a significant portion geotags unintentionally; coordinate geotagging is changing to placetagging; and job-posting bots constitute a growing portion of

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Improving the Human Element : Usable Privacy and Sec urity

Information and communication technologies are perv asive in all aspects of every day life, inclu... more Information and communication technologies are perv asive in all aspects of every day life, including transportation, manufacturing, utilities, finance, and entertainment. It would not be an understatement to say that we depend on these syste ms being highly reliable for modern society to function. However, we have been witnessing an in creasing number of privacy and security failures in these systems. What is interesting is t hat many of these failures happen not because of breakdowns in algorithms, software, or hardware, bu t because of failures in the user interface.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of I Can't Even Buy Apples If I Don't Use Mobile Pay?

Proceedings of the ACM on Human-Computer Interaction, 2020

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective

Proceedings of the 26th International Conference on World Wide Web, 2017

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Evolving the Ecosystem of Personal Behavioral Data

Human–Computer Interaction, 2017

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A hybrid phish detection approach by identity discovery and keywords retrieval

Proceedings of the 18th international conference on World wide web - WWW '09, 2009

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An architecture for privacy-sensitive ubiquitous computing

Proceedings of the 2nd international conference on Mobile systems, applications, and services - MobiSYS '04, 2004

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Building a dynamic and computational understanding of personal social networks

Proceedings of the 1st ACM workshop on Mobile systems for computational social science - MCSS '12, 2012

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Detecting Camouflaged Applications on Mobile Application Markets

Lecture Notes in Computer Science, 2015

Bookmarks Related papers MentionsView impact

Research paper thumbnail of I'm the mayor of my house

Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2011

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Cantina

Proceedings of the 16th international conference on World Wide Web - WWW '07, 2007

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Privacy patterns for online interactions

Proceedings of the 2006 conference on Pattern languages of programs - PLoP '06, 2006

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Lessons from a real world evaluation of anti-phishing training

2008 eCrime Researchers Summit, 2008

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Improving phishing countermeasures: An analysis of expert interviews

2009 eCrime Researchers Summit, 2009

Bookmarks Related papers MentionsView impact

Research paper thumbnail of WebTicket

Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems - CHI '12, 2012

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Getting users to pay attention to anti-phishing education

Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit on - eCrime '07, 2007

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Privacy risk models for designing privacy-sensitive ubiquitous computing systems

Proceedings of the 2004 conference on Designing interactive systems processes, practices, methods, and techniques - DIS '04, 2004

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Who's viewed you?

Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2009

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Protecting people from phishing

Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2007

Bookmarks Related papers MentionsView impact

Log In