Personal Information
Organization / Workplace
Greater Pittsburgh Area United States
Occupation
Professor at Carnegie Mellon University, Human Computer Interaction
Industry
Technology / Software / Internet
Website
http://www.cs.cmu.edu/~jasonh/
About
I'm a professor in the Human-Computer Interaction Institute at Carnegie Mellon University, part of our School of Computer Science. I'm also a co-founder of Wombat Security Technologies.
My main areas of research are in Usable Privacy and Security and Mobile Computing. I'm also an author of the book Design of Sites: Patterns for Creating Winning Web Sites.
Specialties: Usable Privacy and Security
Anti-Phishing
Computer privacy
Mobile Computing
Mobile Social Computing
Ubiquitous Computing
Location-based services
Human-computer interaction
Web design
User interface design
Tags
usable privacy and security
cybersecurity
privacy
carnegie mellon university
security
ubiquitous computing
smartphone
ubicomp
phishing
hci
phish
human computer interaction
android
education and training
wombat security technologies
anti-phishing phil
mental models
mobile computing
phishguru
human factors
sensor
location-based service
authentication
location
human-computer interaction
crowdsourcing
iot
developers
social psychology
issa
apps
internet of things
password
training
wisdom of crowds
mobile
social cybersecurity
privacygrade
ethics
design
machine learning
user interface design
social graph
user interface
sensors
context-aware computing
urban analytics
geotagging
urban design
urban planning
facebook
information visualization
web
sketch
sketch-based interaction
malware
gdpr
anti-phishing
big data
geotag
smartphones
web browser
social media
analytics
qr code
location sharing
foursquare
relationships
rapid prototyping
wireless sensor network
google
caching
infoviz
visualization
data mining
call log
sms
research
user experience
matcha
peekaboo
privacy nutrition labels
java
privacy annotations
ccpa
ios
smartphone privacy
mobile sensing
information technology
spyware
privacystreams
social good
cmu
bias
ai
social proof
behavior change
social
health
intelligent agent
healthcare
a/b testing
maslow
uniauth
permission
purpose
hcic
diffusion of innovations
theory
marmite
mashup
paper
printers
firefighter
policies
se
firefighters
denim
zooming user interface
web design
program committee
mobisys
energy
social networking
sensing
google glass
kinect
sleep
heuristic evaluation
color
contextual inquiry
layout
ux
design patterns
public policy
poptech
cognitive psychology
memory
groupware
cscw
search
mobile search
user modeling
usability
reviews
warnings
google maps
email
game design
computer virus
browsers
map
city
relationship
locaccino
gps
rsa
gamification
lbs
login
xml
tablet
drawing
tablet computer
phishtank
iteams
mobile data type
prefetching
mobile device
prototyping tool
prototyping
games
query
queries
database
usability testing
remote usability testing
uist
pen
clustering
life facet
social relationships
cylab
iapp
privacy policy
user experience design
children
kids and teens
See more
Presentations
(90)Likes
(1)Privacy and Security for the Emerging Internet of Things
Jason Hong
•
7 years ago
Personal Information
Organization / Workplace
Greater Pittsburgh Area United States
Occupation
Professor at Carnegie Mellon University, Human Computer Interaction
Industry
Technology / Software / Internet
Website
http://www.cs.cmu.edu/~jasonh/
About
I'm a professor in the Human-Computer Interaction Institute at Carnegie Mellon University, part of our School of Computer Science. I'm also a co-founder of Wombat Security Technologies.
My main areas of research are in Usable Privacy and Security and Mobile Computing. I'm also an author of the book Design of Sites: Patterns for Creating Winning Web Sites.
Specialties: Usable Privacy and Security
Anti-Phishing
Computer privacy
Mobile Computing
Mobile Social Computing
Ubiquitous Computing
Location-based services
Human-computer interaction
Web design
User interface design
Tags
usable privacy and security
cybersecurity
privacy
carnegie mellon university
security
ubiquitous computing
smartphone
ubicomp
phishing
hci
phish
human computer interaction
android
education and training
wombat security technologies
anti-phishing phil
mental models
mobile computing
phishguru
human factors
sensor
location-based service
authentication
location
human-computer interaction
crowdsourcing
iot
developers
social psychology
issa
apps
internet of things
password
training
wisdom of crowds
mobile
social cybersecurity
privacygrade
ethics
design
machine learning
user interface design
social graph
user interface
sensors
context-aware computing
urban analytics
geotagging
urban design
urban planning
facebook
information visualization
web
sketch
sketch-based interaction
malware
gdpr
anti-phishing
big data
geotag
smartphones
web browser
social media
analytics
qr code
location sharing
foursquare
relationships
rapid prototyping
wireless sensor network
google
caching
infoviz
visualization
data mining
call log
sms
research
user experience
matcha
peekaboo
privacy nutrition labels
java
privacy annotations
ccpa
ios
smartphone privacy
mobile sensing
information technology
spyware
privacystreams
social good
cmu
bias
ai
social proof
behavior change
social
health
intelligent agent
healthcare
a/b testing
maslow
uniauth
permission
purpose
hcic
diffusion of innovations
theory
marmite
mashup
paper
printers
firefighter
policies
se
firefighters
denim
zooming user interface
web design
program committee
mobisys
energy
social networking
sensing
google glass
kinect
sleep
heuristic evaluation
color
contextual inquiry
layout
ux
design patterns
public policy
poptech
cognitive psychology
memory
groupware
cscw
search
mobile search
user modeling
usability
reviews
warnings
google maps
email
game design
computer virus
browsers
map
city
relationship
locaccino
gps
rsa
gamification
lbs
login
xml
tablet
drawing
tablet computer
phishtank
iteams
mobile data type
prefetching
mobile device
prototyping tool
prototyping
games
query
queries
database
usability testing
remote usability testing
uist
pen
clustering
life facet
social relationships
cylab
iapp
privacy policy
user experience design
children
kids and teens
See more