Home Publications Personal FAQ Bio
Notes
Note 1: Here are links to my Curriculum Vitae and brief bio. The CV is more likely than this page to be up to date with most recent publications.

Note 2: This list of publications is getting unwieldy due to length, so I've organized based on theme. As such, some publications will appear in more than one place. I've also tried to give a summary of each major theme, along with the most salient papers if you are looking for a representative one.

Note 3: The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright.

Some Highlighted Publications
Recent Publications
Communication of the ACM (CACM)
  • ACM DL Author-ize service Hong, J. The state of phishing attacks. This paper presents a survey of the current state of phishing attacks, looking at the damage caused, the methods used by criminals, and approaches for protecting end-users.
ACM Transactions on Information and System Security (TISSEC) Ubicomp 2011 SOUPS 2011 Mobisys 2011 CHI 2011 HotMobile 2011
  • Lindqvist, J. and J.I. Hong. Undistracted Driving: A Mobile Phone that Doesn't Distract. Undistracted Driving: A Mobile Phone that Doesn't Distract. We look at design rationale and user interface design for a smartphone system that uses time-shifting, burden-shifting, and activity sharing to reduce distractions while driving.
Books
  • van Duyne, D.K., J.A. Landay, and J.I. Hong, The Design of Sites: Patterns, Principles, and Processes for Crafting a Customer-Centered Web Experience. Reading, MA: Addison-Wesley, 2002.
         Book Website

    We've sold over 50,000 copies of our book since 2001.
Survey Papers
  • Johnson, G., M.D. Gross, J.I. Hong, and E.Y. Do. Computational Support for Sketching in Design: A Review. Foundations and Trends in HCI 2(2), 2009.
          Paper: PDF

  • Iachello, G., and J.I. Hong. End-User Privacy in Human-Computer Interaction. Foundations and Trends in HCI 1(1), Now Publishers (2007) 1-137.
          Paper: PDF
Thesis
  • Hong, J.I. An Architecture for Privacy-Sensitive Ubiquitous Computing. Unpublished PhD Thesis, University of California at Berkeley, Computer Science Division, Berkeley, 2005.
         Dissertation: PDF
Publications Organized by Theme
Theme: Usable Security
  • ACM DL Author-ize service Hayashi, E., J.I. Hong, and N. Christin Security through a different kind of obscurity: Evaluating Distortion in Graphical Authentication Schemes. In Proceedings of ACM Conference on Human Factors in Computing Systems (CHI2011), CHI Letters 13(1). Short paper.
    Image-based authentication is an alternative to passwords, but tends to be highly guessable if people choose their own images. This paper examines the robustness of image-based authentication if you blur the images.
  • ACM DL Author-ize service Hayashi, E., and J.I. Hong. A Diary Study of Password Usage in Daily Life. In Proceedings of ACM Conference on Human Factors in Computing Systems (CHI2011), CHI Letters 13(1).
    This paper looks at how often people login across all devices and settings, where they login, and what kinds of password aids they use.
Theme: Usable Privacy
  • Iachello, G., and J.I. Hong. End-User Privacy in Human-Computer Interaction. Foundations and Trends in HCI 1(1), Now Publishers (2007) 1-137.
          Paper: PDF

  • ACM DL Author-ize service Tang, K.P., J.I. Hong, and D.P. Siewiorek. Understanding How Visual Representations of Location Feeds Affect End-User Privacy Concerns. We look at how alternative representations of location data affect people's perceptions of privacy.

  • Hsieh, G., K.P. Tang, W.Y. Low, and J.I. Hong. Field Deployment of IMBuddy: A Study of Privacy Control and Feedback Mechanisms for Contextual Instant Messengers. In Proceedings of The Ninth International Conference on Ubiquitous Computing (Ubicomp 2007). To Appear.
          Paper: PDF

  • Cornwell, J., I. Fette, G. Hsieh, M. Prabaker, J. Rao, K. Tang, K. Vaniea, L. Bauer, L. Cranor, J. Hong, B. McLaren, M. Reiter, and N. Sadeh. User-Controllable Security and Privacy for Pervasive Computing. In the 8th IEEE Workshop on Mobile Computing Systems and Applications (HotMobile 2007). 2007.
          Paper: PDF

  • Lederer, S., J.I. Hong, A. Dey, and J.A. Landay, Personal Privacy through Understanding and Action: Five Pitfalls for Designers, in Designing Secure Systems That People Can Use, L. Cranor and S.L. Garfinkel, Editors, 2005. pp 421-445.

  • Lederer, S., J.I. Hong, A. Dey, and J.A. Landay, Personal Privacy through Understanding and Action: Five Pitfalls for Designers. Personal and Ubiquitous Computing 2004. 8(6): p. 440 - 454.
          Paper: PDF     SpringerLink: Web Page

  • Tsai, J., P.G. Kelley, P. Drielsma, L.F. Cranor, J.I. Hong, and N.A. Sadeh. Who's Viewed You? The Impact of Feedback on Mobile-location Sharing. In Proceedings of ACM Conference on Human Factors in Computing Systems (CHI2009), CHI Letters 11(1).
          Paper: PDF

  • Hong, J.I., J. Ng, and J.A. Landay. Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems. In Proceedings of Designing Interactive Systems (DIS2004). Boston, MA. pp. 91-100 2004.
          Paper: PDF       Talk: PPT

  • Hong, J.I. and J.A. Landay. An Architecture for Privacy-Sensitive Ubiquitous Computing. In Proceedings of The Second International Conference on Mobile Systems, Applications, and Services (Mobisys 2004). Boston, MA. pp. 177-189 2004.
          Paper: PDF       Talk: PPT

  • Hong, J.I., G. Boriello, J.A. Landay, D.W. McDonald, B.N. Schilit, and J.D. Tygar. Privacy and Security in the Location-enhanced World Wide Web. In Proceedings of Fifth International Conference on Ubiquitous Computing: Ubicomp 2003 (Workshop on Ubicomp Communities: Privacy as Boundary Negotiation). Seattle, WA 2003.
          Paper: PDF  

  • Schilit, B.N., A. LaMarca, D. McDonald, J. Tabert, E. Cadag, G. Borriello, W.G. Griswold, and J. Hong. Bootstrapping the Location-enhanced World Wide Web. In Proceedings of Fifth International Conference on Ubiquitous Computing: Ubicomp 2003 (Workshop on Location-Aware Computing). Seattle, WA 2003.
          Paper: PDF  

  • Jiang, X., J.I. Hong, and J.A. Landay. Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing. In Proceedings of Ubicomp 2002. Goteborg, Sweden 2002. pp. 176-193.
         Paper: PDF   Ubicomp 2002 Presentation: PPT
Theme: Mobile Social Computing

  • ACM DL Author-ize service Wiese, J., P.G. Kelley, L.F. Cranor, L. Dabbish, J.I. Hong, J. Zimmerman. Are you close with me? Are you nearby? Investigating social groups, closeness, and willingness to share. In this paper, we examined how strength of ties can be used to predict privacy policies.

  • ACM DL Author-ize service Lindqvist, J., J. Cranshaw, J. Wiese, J.I. Hong, and J. Zimmerman. I'm the Mayor of My House: Examining Why People Use foursquare - a Social-Driven Location Sharing Application. Why the heck do people use foursquare?

  • Cranshaw, J., E. Toch, J.I. Hong, N. Kittur, N. Sadeh. Bridging the Gap Between Physical Location and Online Social Networks. In Proceedings of The Twelfth International Conference on Ubiquitous Computing (Ubicomp 2010).
         Paper: PDF

  • Tang, K, J. Lin, J.I. Hong, N. Sadeh. Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. Purpose-Driven Location Sharing. In Proceedings of The Twelfth International Conference on Ubiquitous Computing (Ubicomp 2010)
         Paper: PDF

  • Toch, E., J. Cranshaw, P.H. Drielsma, J.Y. Tsai, P.G. Kelley, L.F. Cranor, J.I. Hong, and N.A. Sadeh. Empirical Models of Privacy in Location Sharing. In Proceedings of The Twelfth International Conference on Ubiquitous Computing (Ubicomp 2010)
         Paper: PDF
Theme: Mobile Computing / Ubiquitous Computing / Location-based Services

  • Lindqvist, J. and J.I. Hong. Undistracted Driving: A Mobile Phone that Doesn't Distract. In the Proceedings of The 12th IEEE Workshop on Mobile Computing Systems and Applications (HotMobile 2011).
          Paper: PDF

  • Amini, S. J. Lindqvist, J.I. Hong, J. Lin, E. Toch, N. Sadeh. Caché: Caching Location-Enhanced Content to Improve User Privacy. In the Proceedings of The Ninth International Conference on Mobile Systems, Applications, and Services (MobiSys 2011).
          Paper: PDF

  • Tang, K, J. Lin, J.I. Hong, N. Sadeh. Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. Purpose-Driven Location Sharing. In Proceedings of The Twelfth International Conference on Ubiquitous Computing (Ubicomp 2010)
         Paper: PDF

  • Toch, E., J. Cranshaw, P.H. Drielsma, J.Y. Tsai, P.G. Kelley, L.F. Cranor, J.I. Hong, and N.A. Sadeh. Empirical Models of Privacy in Location Sharing. In Proceedings of The Twelfth International Conference on Ubiquitous Computing (Ubicomp 2010)
         Paper: PDF

  • Lin, J, G. Xiang, J.I. Hong, N. Sadeh. Modeling People's Place Naming Preferences in Location Sharing. In Proceedings of The Twelfth International Conference on Ubiquitous Computing (Ubicomp 2010)
         Paper: PDF

  • Tsai, J., P.G. Kelley, P. Drielsma, L.F. Cranor, J.I. Hong, and N.A. Sadeh. Who's Viewed You? The Impact of Feedback on Mobile-location Sharing. In Proceedings of ACM Conference on Human Factors in Computing Systems (CHI2009), CHI Letters 11(1).
          Paper: PDF

  • Gonzalez I.E., J.I. Hong. GurunGo: Coupling Personal Computers and Mobile Devices through Mobile Data Types. In the Proceedings of The 11th IEEE Workshop on Mobile Computing Systems and Applications (HotMobile 2010). 2010.
          Paper: PDF

  • Balan, R., N. Ramasubbu, K. Prakobphol, N. Christin, J.I. Hong. mFerio: The Design and Evaluation of a Peer-toPeer Mobile Payment System. In the Proceedings of The Seventh International Conference on Mobile Systems, Applications, and Services (MobiSys 2009).
          Paper: PDF

  • Wang, Y., J. Lin, M. Annavaram, Q.A. Jacobson, J.I. Hong, B. Krishnamachari, and N. Sadeh. A Framework of Energy Efficient Mobile Sensing for Automatic Human State Recognition. In the Proceedings of The Seventh International Conference on Mobile Systems, Applications, and Services (MobiSys 2009).
          Paper: PDF

  • Heer, J., A. Newberger, C. Beckmann, and J.I. Hong. liquid: Context-Aware Distributed Queries. In Proceedings of Fifth International Conference on Ubiquitous Computing: Ubicomp 2003. Seattle, WA: Springer-Verlag. pp. 140-148 2003.
         Paper: PDF Talk: PPT

  • Tang, K.P., I. Smith, A. Ha, L. Satpathy, and J.I. Hong. Memory Karaoke: Aiding Episodic Memory with Location-Enhanced Mobile Phones. In Proceedings of MobileHCI 2007.

  • Sadeh, N., J.I.Hong, L.F. Cranor, I. Fette, P.G. Kelley, M. Prabaker, J. Rao. Understanding and Capturing People's Privacy Policies in a People Finder Application. Journal of Personal and Ubiquitous Computing. Springer. 2008.
          Paper: PDF

  • Hong, J.I. and J.A. Landay, An Infrastructure Approach to Context-Aware Computing. Human-Computer Interaction (HCI) Journal, 2001. 16(2-3).
          Paper: PDF

  • Schilit, B.N., A. LaMarca, G. Borriello, W.G. Griswold, D. McDonald, E. Lazowska, A. Balachandran, J. Hong, and V. Iverson. Challenge: Ubiquitous Location-Aware Computing and the Place Lab Initiative. In Proceedings of The First ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH 2003). San Diego, CA: ACM Press. To Appear, 2003.
          Paper: PDF  

  • Hsieh, G., K.P. Tang, W.Y. Low, and J.I. Hong. Field Deployment of IMBuddy: A Study of Privacy Control and Feedback Mechanisms for Contextual Instant Messengers. In Proceedings of The Ninth International Conference on Ubiquitous Computing (Ubicomp 2007). To Appear.
          Paper: PDF

  • Cornwell, J., I. Fette, G. Hsieh, M. Prabaker, J. Rao, K. Tang, K. Vaniea, L. Bauer, L. Cranor, J. Hong, B. McLaren, M. Reiter, and N. Sadeh. User-Controllable Security and Privacy for Pervasive Computing. In the 8th IEEE Workshop on Mobile Computing Systems and Applications (HotMobile 2007). 2007.
          Paper: PDF

  • Tang, K.P., J. Fogarty, P. Keyani, and J.I. Hong, Putting People in their Place: An Anonymous and Privacy Sensitive Approach to Collecting Sensed Data in Location-Based Applications. In Proceedings of ACM Conference on Human Factors in Computing Systems (CHI2006), CHI Letters, 2006. 8(1): pp. 93-102.
          Paper: PDF Presentation: PPT

  • Hong, J.I., J. Ng, and J.A. Landay. Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems. In Proceedings of Designing Interactive Systems (DIS2004). Boston, MA. pp. 91-100 2004.
          Paper: PDF       Talk: PPT

  • Hong, J.I. and J.A. Landay. An Architecture for Privacy-Sensitive Ubiquitous Computing. In Proceedings of The Second International Conference on Mobile Systems, Applications, and Services (Mobisys 2004). Boston, MA. pp. 177-189 2004.
          Paper: PDF       Talk: PPT

  • Jiang, X., N.Y. Chen, J.I. Hong, K. Wang, L.A. Takayama, and J.A. Landay. Siren: Context-aware Computing for Firefighting. In Proceedings of The Second International Conference on Pervasive Computing (Pervasive 2004). Vienna, Austria. pp. 87-105 2004.
         Paper: PDF

  • Jiang, X., J.I. Hong, L.A. Takayama, and J.A. Landay, Ubiquitous Computing for Firefighters: Field Studies and Prototypes of Large Displays for Incident Command. CHI Letters (Human Factors in Computing Systems: CHI 2004), 2004. 6(1): p. 679 - 686.
         Paper: PDF

  • Takayama, L., Leung, L., Jiang, X., and Hong, J.I. You're Getting Warmer! How Proximity Information Affects Search Behavior in Physical Spaces. In Extended Abstracts of Human Factors in Computing Systems: CHI 2003. Fort Lauderdale, FL 2003.
          CHI2003 Poster: PDF

  • Hong, J.I., G. Boriello, J.A. Landay, D.W. McDonald, B.N. Schilit, and J.D. Tygar. Privacy and Security in the Location-enhanced World Wide Web. In Proceedings of Fifth International Conference on Ubiquitous Computing: Ubicomp 2003 (Workshop on Ubicomp Communities: Privacy as Boundary Negotiation). Seattle, WA 2003.
          Paper: PDF  

  • Schilit, B.N., A. LaMarca, D. McDonald, J. Tabert, E. Cadag, G. Borriello, W.G. Griswold, and J. Hong. Bootstrapping the Location-enhanced World Wide Web. In Proceedings of Fifth International Conference on Ubiquitous Computing: Ubicomp 2003 (Workshop on Location-Aware Computing). Seattle, WA 2003.
          Paper: PDF  

  • Abowd, G.D., C.G. Atkeson, J.I. Hong, S. Long, R. Kooper, and M. Pinkerton, Cyberguide: A Mobile Context-Aware Tour Guide. ACM Wireless Networks 1997. 3(5): p. 421-433.
          Paper: PDF
Theme: Visualizations

  • ACM DL Author-ize service Chau, D.H., A. Kittur, J.I. Hong, and C. Faloutsos. Making Sense of Large Network Data: Combining Rich User Interaction and Machine Learning. Apolo is a tool we built for exploring very large graphs, where there are more nodes than pixels on the screen.

  • Hong, J.I., J. Heer, S. Waterson, and J.A. Landay, WebQuilt: A Proxy-based Approach to Remote Web Usability Testing. ACM Transactions on Information Systems 2001. 19(3): p. 263-285.
          Paper: PDF

  • Waterson, S.J., J.I. Hong, and J.A. Landay. What Were They Doing? Visual Analysis of Web Usability Log Data. In Proceedings of Advanced Visual Interfaces: AVI 2002. pp. 94-102.

  • Hong, J.I. and J.A. Landay. WebQuilt: A Framework for Capturing and Visualizing the Web Experience. In Proceedings of The Tenth International World Wide Web Conference. Hong Kong, May 2001.
          Paper: PDF       WWW10 Presentation: PPT
Theme: Anti-Phishing
  • ACM DL Author-ize service Xiang, G., J.I. Hong, C.P. Rose, L. Cranor. CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites. This paper presents the design and evaluation of the CANTINA+ automated phish detectiom system. Lots of machine learning and evaluation results.

  • ACM DL Author-ize service Liu, G., G. Xiang, B.A. Pendleton, J.I. Hong, W. Liu. Smartening the Crowds: Computational Techniques for Improving Human Verification to Fight Phishing Scams. Here, we look at how to support crowdsourcing for identifying phishing web sites. Our results show very high accuracy and outperforms existing techniques with respect to time.

  • Xiang, G., C. Rose, J.I. Hong, B. Pendleton. A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection. European Symposium on Research in Computer Security (ESORICS 2010).
          Paper: PDF

  • Sheng, S., P. Kumaraguru, A. Acquisti, L. Cranor, J.I. Hong. Improving Phishing Countermeasures: An Analysis of Expert Interviews. APWG eCrime Researcher's Summit (eCrime 2009).
          Paper: PDF

  • Sheng, S., B. Wardman, G. Warner, L. Cranor, J.I. Hong and C. Zhang. An Empirical Analysis of Phishing Blacklists. Conference on Email and Anti-Spam 2009.
          Paper: PDF

  • Kumaraguru, P., J. Cranshaw, A. Acquisti, L. Cranor, J.I. Hong, M.A. Blair and T. Pham. School of Phish: A RealWorld Evaluation of Anti-Phishing Training. In the Proceedings of Symposium on Usable Privacy and Security 2009 (SOUPS 2009). 200
          Paper: PDF

  • Kumaraguru, PK, S. Sheng, A. Acquisti, L. Cranor, J.I. Hong. Teaching Johnny Not to Fall for Phish. ACM TOIS.

  • Xiang, G., and J.I. Hong. A Hybrid Phish Detection Approach by Identity Discovery and Keywords Retrieval. In Proceedings of WWW 2009.
          Paper: PDF

  • Kumaraguru, P., S. Sheng, A. Acquisti, L.F. Cranor, and J.I. Hong. Lessons From a Real World Evaluation of Anti-Phishing Training. In Proceedings of eCrime 2008.
          Paper: PDF

  • Egelman, S., L.F. Cranor, J.I. Hong. You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings. In Proceedings of ACM Conference on Human Factors in Computing Systems (CHI2008), CHI Letters 10(1). 2007. Nominee for CHI Best Paper Award.
          Paper: PDF

  • Kumaraguru, P., Y.W. Rhee, S. Sheng, A. Acquisti, L. Cranor, and J.I. Hong. Getting Users to Pay Attention to Anti-Phishing Education: Evaluation of Retention and Transfer. In Proceedings of eCrime 2007.
          Paper: PDF

  • Kumaraguru, P., Y.W. Rhee, A. Acquisti, L. Cranor, and J.I. Hong, E. Nunge. Protecting People from Phishing: The Design and Evaluation of an Embedded Training Email System. In Proceedings of ACM Conference on Human Factors in Computing Systems (CHI2007), CHI Letters 9(1). 2007.
          Paper: PDF

  • Zhang, Y., S. Egelman, L. Cranor, and J. Hong. Phinding Phish: An Evaluation of Anti-Phishing Toolbars. In Proceedings of The 14th Annual Network & Distributed System Security Symposium (NDSS2007) 2007.
          Paper: PDF

  • Kumaraguru, P., S. Sheng, A. Acquisti, L.F. Cranor, and J.I. Hong. Anti-Phishing Education. In Proceedings of The International Conference on E-Learning in the Workplace (ICELW 2008).
Theme: Rapid Prototyping Tools

  • Newman, M.W., J. Lin, J.I. Hong, and J.A. Landay, DENIM: An Informal Web Site Design Tool Inspired by Observations of Practice. Human-Computer Interaction 2002. 18(3): p. 259-324.
         

  • Li, Y., J.I. Hong, and J.A. Landay. Topiary: A Tool for Prototyping Location-Enhanced Applications. In Proceedings of ACM Symposium on User Interface Software and Technology (UIST2004), CHI Letters 6(2) 2004.
          Paper: PDF

  • ACM DL Author-ize service Lin, J., M.W. Newman, J.I. Hong, and J.A. Landay DENIM: Finding a tighter fit between tools and practice for web site design. In Proceedings of ACM Conference on Human Factors in Computing Systems (CHI2000). Presentation: PPT

  • Li, Y., J.I. Hong, and J. Landay, Design Challenges and Principles for Wizard of Oz Testing of Location-Enhanced Applications. IEEE Pervasive Computing, 2006. 6(2): p70-75.
          IEEE Link: Web page
Theme: Sketch-based User Interfaces
  • Johnson, G., M.D. Gross, J.I. Hong, and E.Y. Do. Computational Support for Sketching in Design: A Review. Foundations and Trends in HCI 2(2), 2009.
          Paper: PDF

  • Newman, M.W., J. Lin, J.I. Hong, and J.A. Landay, DENIM: An Informal Web Site Design Tool Inspired by Observations of Practice. Human-Computer Interaction 2002. 18(3): p. 259-324.
         

  • ACM DL Author-ize service Lin, J., M.W. Newman, J.I. Hong, and J.A. Landay DENIM: Finding a tighter fit between tools and practice for web site design. In Proceedings of ACM Conference on Human Factors in Computing Systems (CHI2000). Presentation: PPT

  • ACM DL Author-ize service Hong, J.I. and J.A. Landay SATIN: A Toolkit for Informal Ink-based Applications. The 13th Annual ACM Symposium on User Interface Software and Technology (UIST 2000). p. 63-72. Presentation: PPT

  • Li, Y., J.I. Hong, and J.A. Landay. Topiary: A Tool for Prototyping Location-Enhanced Applications. In Proceedings of ACM Symposium on User Interface Software and Technology (UIST2004), CHI Letters 6(2) 2004.
          Paper: PDF

  • Hong, J.I., F.C. Li, J. Lin, and J.A. Landay. End-User Perceptions of Formal and Informal Representations of Web Sites. In Proceedings of Extended Abstracts of Human Factors in Computing Systems: CHI 2001. Seattle, WA. pp. 385-386, March 31-April 5 2001.
          Paper: PDF   CHI2001 Presentation: PPT

  • Landay, J.A., J.I. Hong, S. Klemmer, J. Lin, and M. Newman. Informal PUIs: No Recognition Required. In AAAI 2002 Spring Symposium (Sketch Understanding Workshop). Stanford, CA 2002.
          Paper: PDF   AAAI 2002 Presentation: PPT

  • Hong, J.I., J.A. Landay, A.C. Long, and J. Mankoff. Sketch Recognizers from the End-User's, the Designer's, and the Programmer's Perspective. In AAAI 2002 Spring Symposium (Sketch Understanding Workshop). Stanford, CA 2002.
          Paper: PDF   AAAI 2002 Presentation: PPT
Theme: Web Design Patterns
The core idea behind design patterns is to offer people solutions to design problems, solutions that work in practice. Design patterns are well-known in real-world architecture as well as software architecture. Our work on web design patterns looked at how to capture design solutions for user interface problems on the web.

Towards this end, I helped co-author a book on web design patterns. This book is fairly popular, having sold over 50,000 since 2001 and used in at least ten different universities.

  • van Duyne, D.K., J.A. Landay, and J.I. Hong, The Design of Sites: Patterns, Principles, and Processes for Crafting a Customer-Centered Web Experience. Reading, MA: Addison-Wesley, 2002.
         Book Website
  • Romanosky, S., A. Acquisti, J.I. Hong, L.F. Cranor, and B. Friedman, Privacy Patterns for Online Interactions, in Europlop 2006. To Appear. 2006.
          Paper: PDF
  • Chung, E.S., J.I. Hong, J. Lin, M.K. Prabaker, J.A. Landay, and A. Liu. Development and Evaluation of Emerging Design Patterns for Ubiquitous Computing. In Proceedings of Designing Interactive Systems (DIS2004). Boston, MA. pp. 233-242 2004.
          Paper: PDF       Talk: PPT
  • van Duyne, D., J.A. Landay, and J.I. Hong. The Design of Sites. In Human Factors in Computing Systems: CHI 2002 (Workshop on Patterns in Practice: A Workshop for UI Designers). Minneapolis, MN 2002.
          Paper: PDF
  • van Duyne, D., J.I. Hong, and J.A. Landay. Web Design Patterns for eCommerce. In Human Factors in Computing Systems: CHI 2000 (Workshop on Pattern Languages for Interaction Design: Building Momentum). The Hague, The Netherlands 2000.
          Paper: DOC
Odds and Ends

  • Jing, J., S. Wong, and J.I. Hong. Contextual Web History: Using Visual and Contextual Cues to Improve Web Browser History. In Proceedings of ACM Conference on Human Factors in Computing Systems (CHI2009), CHI Letters 11(1).
          Paper: PDF

  • Schleyer, T., T. Thyvalikakath, P. Malatack, M. Marotta, T. Shah, P. Phanichphant, G. Price, and J.I. Hong. Development and Initial Validation of a Three-Dimensional Dental Charting Interface. The Journal of the American Dental Association. 138: p1072-1080.
          Web page: link

  • Wong, J. and J.I. Hong. Making Mashups with Marmite: Re-purposing Web Content through End-User Programming. In Proceedings of ACM Conference on Human Factors in Computing Systems (CHI2007), CHI Letters 9(1). 2007.
          Paper: PDF

  • Newman, M.W., J.Z. Sedivy, W.K. Edwards, T. Smith, K. Marcelo, C.M. Neuwirth, J.I. Hong, and S. Izadi. Designing for Serendipity: Supporting End-User Configuration of Ubiquitous Computing Environments. In Proceedings of Designing Interactive Systems: DIS2002.
         Paper: PDF

  • Hong, J.I. and J.A. Landay, A Context/Communication Information Agent. Personal Technologies (Special Issue on Situated Interaction and Context-Aware Computing), 2001. 5(1): p. 78-81.
          Paper: PDF | Personal Technologies Abstract

  • Chen, M., M.A. Hearst, J.I. Hong, and J. Lin. Cha-Cha: A System for Organizing Intranet Search Results. In Proceedings of 2nd USENIX Symposium on Internet Technologies and Systems (USITS). Boulder, CO 1998.
         Paper: PDF

  • Fisher, D., K. Hildrum, J. Hong, M. Newman, M. Thomas, and R. Vuduc. SWAMI: A Framework for Collaborative Filtering Algorithm Development and Evaluation. In Proceedings of SIGIR2000. Athens, Greece: ACM Press 2000.
         Paper: PDF

  • ACM DL Author-ize service Hong, J.I., M.N. Price, B.N. Schilit, and G. Golovchinsky Printertainment: Printing with Interactive Cover Sheets. In Proceedings of ACM Conference on Human Factors in Computing Systems (CHI1999). Short paper. CHI99 Presentation: PPT