Search
for Author
All Reviews
Hong, Jason
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
4
of
4
reviews
Identifying and analyzing the privacy of apps for kids
Liu M., Wang H., Guo Y., Hong J. HotMobile 2016 (Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, St. Augustine, FL, Feb 23-24, 2016) 105-110, 2016. Type: Proceedings
This short paper describes “a machine learning model for predicting whether a mobile app is designed for children.” This can help enforce the Children’s Online Privacy Protection Act (COPPA)....
...
Apr 13 2016
The state of phishing attacks
Hong J. Communications of the ACM 55(1): 74-81, 2012. Type: Article
Phishing is a social-engineering attack utilizing spoofed email messages to trick recipients into sharing sensitive information or installing malware on their computers. “Whaling” involves sophisticated attacks agai...
...
Mar 5 2012
School of phish: a real-world evaluation of anti-phishing training
Kumaraguru P., Cranshaw J., Acquisti A., Cranor L., Hong J., Blair M., Pham T. SOUPS 2009 (Proceedings of the 5th Symposium on Usable Privacy and Security, Mountain View, CA, Jul 15-17, 2009) 1-12, 2009. Type: Proceedings
The well-designed “school of phish” experiment compares to what extent three groups, of about 170 participants each, fall for phishing scams. The control group received no training, one group was trained once, and t...
...
Jan 19 2010
WebQuilt: A proxy-based approach to remote web usability testing
Hong J., Heer J., Waterson S., Landay J. ACM Transactions on Information Systems 19(3): 263-285, 2001. Type: Article
Web browsing has become a significant activity throughout the developed world. It is an activity that underpins modern e-commerce, as well as facilitating access to the vast store of communal knowledge held in the World Wide Web. Resea...
...
Jun 11 2002
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy