Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Hong, Jason Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 4 of 4 reviews    
  Identifying and analyzing the privacy of apps for kids
Liu M., Wang H., Guo Y., Hong J.  HotMobile 2016 (Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, St. Augustine, FL, Feb 23-24, 2016) 105-110, 2016.  Type: Proceedings

This short paper describes “a machine learning model for predicting whether a mobile app is designed for children.” This can help enforce the Children’s Online Privacy Protection Act (COPPA)....
...
Apr 13 2016  
  The state of phishing attacks
Hong J. Communications of the ACM 55(1): 74-81, 2012.  Type: Article

Phishing is a social-engineering attack utilizing spoofed email messages to trick recipients into sharing sensitive information or installing malware on their computers. “Whaling” involves sophisticated attacks agai...
...
Mar 5 2012  
  School of phish: a real-world evaluation of anti-phishing training
Kumaraguru P., Cranshaw J., Acquisti A., Cranor L., Hong J., Blair M., Pham T.  SOUPS 2009 (Proceedings of the 5th Symposium on Usable Privacy and Security, Mountain View, CA, Jul 15-17, 2009) 1-12, 2009.  Type: Proceedings

The well-designed “school of phish” experiment compares to what extent three groups, of about 170 participants each, fall for phishing scams. The control group received no training, one group was trained once, and t...
...
Jan 19 2010  
  WebQuilt: A proxy-based approach to remote web usability testing
Hong J., Heer J., Waterson S., Landay J. ACM Transactions on Information Systems 19(3): 263-285, 2001.  Type: Article

Web browsing has become a significant activity throughout the developed world. It is an activity that underpins modern e-commerce, as well as facilitating access to the vast store of communal knowledge held in the World Wide Web. Resea...
...
Jun 11 2002  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy