DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Technology Why People Hate Your App: Making Sense of User Feedback in a Mobile App Store, at KDD 2013

1. Why People Hate Your App Making Sense of User Feedback in a Mobile App Store Bin Fu, Jialiu Lin, Lei Li, Jason Hong, Christos Faloutsos, Norman Sadeh Carnegie Mellon University,…

Technology Exploring Capturable Everyday Memory for Autobiographical Authentication, at Ubicomp 2013

1. Exploring Capturable Everyday Memory for Autobiographical Authentication Sauvik Das, Eiji Hayashi, Jason Hong 1 {sauvikda, ehayashi, jasonh}@cs.cmu.edu 2. Mobile Authentication…

Technology Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010

1. Copyright © Wombat Security Technologies, Inc. 2008-2010 Jason Hong, PhD Assoc. Prof, Carnegie Mellon University CTO, Wombat Security Technologies Protecting Organizations…

Technology OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012

1. OTO: Online Trust Oracle for User-Centric Trust Establishment Tiffany Hyun-Jin Kim, Jun Han, Emmanuel Owusu, Jason Hong, Adrian Perrig Carnegie Mellon University Payas…

Technology Empirical Models of Privacy in Location Sharing, at Ubicomp2010

1. Empirical Models of Privacy in Location Sharing Eran Toch, Justin Cranshaw, Paul Hankes-Drielsma, Janice Y. Tsai, Patrick Gage Kelley, James Springfield, Lorrie Cranor,…

Technology Modeling People’s Place Naming Preferences in Location Sharing, at Ubicomp2010

1. Jialiu Lin, Guang Xiang, Jason Hong, Norman Sadeh School of Computer Science Carnegie Mellon University 2. We seldom say … • Hey mom, I am still at 55.66 north, 12.59…

Technology Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. Purpose-Driven Location...

1. Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. Purpose-Driven Location Sharing Karen P. Tang Jialiu Lin, Jason Hong, Dan Siewiorek, Norman…

Technology Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010

1. Jason Hong, PhD Carnegie Mellon University Wombat Security Technologies Teaching Johnny Not to Fall for Phish 2. Everyday Privacy and Security Problem 3. This entire process…

Technology Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011

1. Jason Hong, PhD Carnegie Mellon University Wombat Security Technologies Teaching Johnny Not to Fall for Phish 2. Everyday Privacy and Security Problem 3. This entire process…

Technology Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011

1. Jason Hong, PhD Carnegie Mellon University Wombat Security Technologies Achieving Behavioral Change 2. Usable Privacy and Security • We have done extensive research…