Skip to main content

Showing 1–15 of 15 results for author: Hong, J I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.03582  [pdf, other

    cs.HC cs.CR

    Matcha: An IDE Plugin for Creating Accurate Privacy Nutrition Labels

    Authors: Tianshi Li, Lorrie Faith Cranor, Yuvraj Agarwal, Jason I. Hong

    Abstract: Apple and Google introduced their versions of privacy nutrition labels to the mobile app stores to better inform users of the apps' data practices. However, these labels are self-reported by developers and have been found to contain many inaccuracies due to misunderstandings of the label taxonomy. In this work, we present Matcha, an IDE plugin that uses automated code analysis to help developers c… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

    Comments: 38 pages

  2. Understanding Frontline Workers' and Unhoused Individuals' Perspectives on AI Used in Homeless Services

    Authors: Tzu-Sheng Kuo, Hong Shen, Jisoo Geum, Nev Jones, Jason I. Hong, Haiyi Zhu, Kenneth Holstein

    Abstract: Recent years have seen growing adoption of AI-based decision-support systems (ADS) in homeless services, yet we know little about stakeholder desires and concerns surrounding their use. In this work, we aim to understand impacted stakeholders' perspectives on a deployed ADS that prioritizes scarce housing resources. We employed AI lifecycle comicboarding, an adapted version of the comicboarding me… ▽ More

    Submitted 16 March, 2023; originally announced March 2023.

    Journal ref: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (CHI '23)

  3. Zeno: An Interactive Framework for Behavioral Evaluation of Machine Learning

    Authors: Ángel Alexander Cabrera, Erica Fu, Donald Bertucci, Kenneth Holstein, Ameet Talwalkar, Jason I. Hong, Adam Perer

    Abstract: Machine learning models with high accuracy on test data can still produce systematic failures, such as harmful biases and safety issues, when deployed in the real world. To detect and mitigate such failures, practitioners run behavioral evaluation of their models, checking model outputs for specific types of inputs. Behavioral evaluation is important but challenging, requiring that practitioners d… ▽ More

    Submitted 9 February, 2023; originally announced February 2023.

  4. arXiv:2301.06937  [pdf, other

    cs.HC cs.AI

    Improving Human-AI Collaboration With Descriptions of AI Behavior

    Authors: Ángel Alexander Cabrera, Adam Perer, Jason I. Hong

    Abstract: People work with AI systems to improve their decision making, but often under- or over-rely on AI predictions and perform worse than they would have unassisted. To help people appropriately rely on AI aids, we propose showing them behavior descriptions, details of how AI systems perform on subgroups of instances. We tested the efficacy of behavior descriptions through user studies with 225 partici… ▽ More

    Submitted 5 January, 2023; originally announced January 2023.

    Comments: 21 pages

    Journal ref: Proc. ACM Hum.-Comput. Interact. 7, CSCW1, Article 136 (April 2023)

  5. arXiv:2205.06937  [pdf

    cs.HC cs.CR

    Experimental Evidence for Using a TTM Stages of Change Model in Boosting Progress Toward 2FA Adoption

    Authors: Cori Faklaris, Laura Dabbish, Jason I. Hong

    Abstract: Behavior change ideas from health psychology can also help boost end user compliance with security recommendations, such as adopting two-factor authentication (2FA). Our research adapts the Transtheoretical Model Stages of Change from health and wellness research to a cybersecurity context. We first create and validate an assessment to identify workers on Amazon Mechanical Turk who have not enable… ▽ More

    Submitted 13 May, 2022; originally announced May 2022.

    Comments: 41 pages, including the stage algorithm programmed on Mturk, the survey flow and specific items used, and a link to download the five informational handouts used for the control condition and the 2FA intervention conditions

    ACM Class: H.1.2; H.5.2; K.6.5

  6. arXiv:2204.04540  [pdf, other

    cs.CR cs.NI cs.SE

    Peekaboo: A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes (Extended Technical Report)

    Authors: Haojian **, Gram Liu, David Hwang, Swarun Kumar, Yuvraj Agarwal, Jason I. Hong

    Abstract: We present Peekaboo, a new privacy-sensitive architecture for smart homes that leverages an in-home hub to pre-process and minimize outgoing data in a structured and enforceable manner before sending it to external cloud servers. Peekaboo's key innovations are (1) abstracting common data pre-processing functionality into a small and fixed set of chainable operators, and (2) requiring that develope… ▽ More

    Submitted 18 May, 2022; v1 submitted 9 April, 2022; originally announced April 2022.

    Comments: 19 pages

  7. arXiv:2204.03114  [pdf

    cs.CR cs.HC cs.SI

    Do They Accept or Resist Cybersecurity Measures? Development and Validation of the 13-Item Security Attitude Inventory (SA-13)

    Authors: Cori Faklaris, Laura Dabbish, Jason I. Hong

    Abstract: We present SA-13, the 13-item Security Attitude inventory. We develop and validate this assessment of cybersecurity attitudes by conducting an exploratory factor analysis, confirmatory factor analysis, and other tests with data from a U.S. Census-weighted Qualtrics panel (N=209). Beyond a core six indicators of Engagement with Security Measures (SA-Engagement, three items) and Attentiveness to Sec… ▽ More

    Submitted 6 April, 2022; originally announced April 2022.

    Comments: Includes the directions for administering the scales in an appendix

    ACM Class: H.1.2; I.3.6; J.4

  8. arXiv:2112.14205  [pdf

    cs.CR cs.CY cs.HC

    Analysis of Longitudinal Changes in Privacy Behavior of Android Applications

    Authors: Alexander Yu, Yuvraj Agarwal, Jason I. Hong

    Abstract: Privacy concerns have long been expressed around smart devices, and the concerns around Android apps have been studied by many past works. Over the past 10 years, we have crawled and scraped data for almost 1.9 million apps, and also stored the APKs for 135,536 of them. In this paper, we examine the trends in how Android apps have changed over time with respect to privacy and look at it from two p… ▽ More

    Submitted 28 December, 2021; originally announced December 2021.

  9. arXiv:2112.12009  [pdf

    cs.HC

    Travel Guides for Creative Tourists, Powered by Geotagged Social Media

    Authors: Dan Tasse, Jason I. Hong

    Abstract: Many modern tourists want to know about everyday life and spend time like a local in a new city. Current tools and guides typically provide them with lists of sights to see, which do not meet their needs. Manually building new tools for them would not scale. However, public geotagged social media data, like tweets and photos, have the potential to fill this gap, showing users an interesting and un… ▽ More

    Submitted 22 December, 2021; originally announced December 2021.

    ACM Class: H.5.m

  10. arXiv:2112.02775  [pdf, ps, other

    cs.NI cs.CY

    Sensor as a Company: On Self-Sustaining IoT Commons

    Authors: Haojian **, Swarun Kumar, Jason I. Hong

    Abstract: Beyond the "smart home" and "smart enterprise", the Internet of Things (IoT) revolution is creating "smart communities", where shared IoT devices collectively benefit a large number of residents, for transportation, healthcare, safety, and more. However, large-scale deployments of IoT-powered neighborhoods face two key socio-technical challenges: the significant upfront investment and the lack of… ▽ More

    Submitted 5 December, 2021; originally announced December 2021.

  11. arXiv:2111.12182  [pdf

    cs.HC

    Identifying Terms and Conditions Important to Consumers using Crowdsourcing

    Authors: Xingyu Liu, Annabel Sun, Jason I. Hong

    Abstract: Terms and conditions (T&Cs) are pervasive on the web and often contain important information for consumers, but are rarely read. Previous research has explored methods to surface alarming privacy policies using manual labelers, natural language processing, and deep learning techniques. However, this prior work used pre-determined categories for annotations, and did not investigate what consumers r… ▽ More

    Submitted 30 November, 2021; v1 submitted 23 November, 2021; originally announced November 2021.

  12. arXiv:2109.11690  [pdf, other

    cs.HC cs.LG

    Discovering and Validating AI Errors With Crowdsourced Failure Reports

    Authors: Ángel Alexander Cabrera, Abraham J. Druck, Jason I. Hong, Adam Perer

    Abstract: AI systems can fail to learn important behaviors, leading to real-world issues like safety concerns and biases. Discovering these systematic failures often requires significant developer attention, from hypothesizing potential edge cases to collecting evidence and validating patterns. To scale and streamline this process, we introduce crowdsourced failure reports, end-user descriptions of how or w… ▽ More

    Submitted 23 September, 2021; originally announced September 2021.

  13. arXiv:2104.12032  [pdf

    cs.CR cs.HC

    The Design of the User Interfaces for Privacy Enhancements for Android

    Authors: Jason I. Hong, Yuvraj Agarwal, Matt Fredrikson, Mike Czapik, Shawn Hanna, Swarup Sahoo, Judy Chun, Won-Woo Chung, Aniruddh Iyer, Ally Liu, Shen Lu, Rituparna Roychoudhury, Qian Wang, Shan Wang, Siqi Wang, Vida Zhang, Jessica Zhao, Yuan Jiang, Haojian **, Sam Kim, Evelyn Kuo, Tianshi Li, **** Liu, Yile Liu, Robert Zhang

    Abstract: We present the design and design rationale for the user interfaces for Privacy Enhancements for Android (PE for Android). These UIs are built around two core ideas, namely that developers should explicitly declare the purpose of why sensitive data is being used, and these permission-purpose pairs should be split by first party and third party uses. We also present a taxonomy of purposes and ways o… ▽ More

    Submitted 24 April, 2021; originally announced April 2021.

    Comments: 58 pages, 21 figures, 3 tables

  14. arXiv:2012.12415  [pdf, other

    cs.HC cs.CY

    What Makes People Install a COVID-19 Contact-Tracing App? Understanding the Influence of App Design and Individual Difference on Contact-Tracing App Adoption Intention

    Authors: Tianshi Li, Camille Cobb, Jackie, Yang, Sagar Baviskar, Yuvraj Agarwal, Beibei Li, Lujo Bauer, Jason I. Hong

    Abstract: Smartphone-based contact-tracing apps are a promising solution to help scale up the conventional contact-tracing process. However, low adoption rates have become a major issue that prevents these apps from achieving their full potential. In this paper, we present a national-scale survey experiment ($N = 1963$) in the U.S. to investigate the effects of app design choices and individual differences… ▽ More

    Submitted 10 May, 2021; v1 submitted 22 December, 2020; originally announced December 2020.

    Comments: 44 pages, 7 figures, 7 tables

  15. arXiv:2005.11957  [pdf, other

    cs.HC cs.CY

    Decentralized is not risk-free: Understanding public perceptions of privacy-utility trade-offs in COVID-19 contact-tracing apps

    Authors: Tianshi Li, Jackie, Yang, Cori Faklaris, Jennifer King, Yuvraj Agarwal, Laura Dabbish, Jason I. Hong

    Abstract: Contact-tracing apps have potential benefits in hel** health authorities to act swiftly to halt the spread of COVID-19. However, their effectiveness is heavily dependent on their installation rate, which may be influenced by people's perceptions of the utility of these apps and any potential privacy risks due to the collection and releasing of sensitive user data (e.g., user identity and locatio… ▽ More

    Submitted 25 May, 2020; originally announced May 2020.

    Comments: 21 pages, 8 figures

    ACM Class: K.4.1; H.5.m