×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [jason hong]
Technology
The Privacy and Security Behaviors of Smartphone, at USEC 2014
102 views
Technology
Why People Hate Your App: Making Sense of User Feedback in a Mobile App Store, at KDD 2013
121 views
Technology
Exploring Capturable Everyday Memory for Autobiographical Authentication, at Ubicomp 2013
121 views
Technology
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
108 views
Technology
OTO: Online Trust Oracle for User-Centric Trust Establishment, at CCS 2012
107 views
Technology
Empirical Models of Privacy in Location Sharing, at Ubicomp2010
110 views
Technology
Modeling People’s Place Naming Preferences in Location Sharing, at Ubicomp2010
104 views
Technology
Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. Purpose-Driven Location Sharing, at Ubicomp2010
109 views
Technology
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
106 views
Technology
Teaching Johnny Not to Fall for Phish, for ISSA 2010 on May 2010
104 views
Technology
Teaching Johnny Not to Fall for Phish, for ISSA 2011 in Pittsburgh on Feb2011
102 views
Technology
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
102 views
Next >