Number of co-authors:18
Number of publications with 3 favourite co-authors:James Springfield:Patrick Gage Kelley:Janice Y. Tsai:
Justin Cranshaw's 3 most productive colleagues in number of publications:John Zimmerman:51Aniket Kittur:27Jason Hong:20
go to course
Information Visualization: Getting Dashboards Right
89% booked. Starts in 6 days
Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess
User Experience and Experience Design !
Our Latest Books
The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
Publications by Justin Cranshaw (bibliography)
Cranshaw, Justin and Kittur, Aniket (2011): The polymath project: lessons from a successful online collaboration in mathematics. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems 2011. pp. 1865-1874. Available online
Although science is becoming increasingly collaborative, there are remarkably few success stories of online collaborations between professional scientists that actually result in real discoveries. A notable exception is the Polymath Project, a group of mathematicians who collaborate online to solve open mathematics problems. We provide an in-depth descriptive history of Polymath, using data analysis and visualization to elucidate the principles that led to its success, and the difficulties that must be addressed before the project can be scaled up. We find that although a small percentage of users created most of the content, almost all users nevertheless contributed some content that was highly influential to the task at hand. We also find that leadership played an important role in the success of the project. Based on our analysis, we present a set of design suggestions for how future collaborative mathematics sites can encourage and foster newcomer participation.
© All rights reserved Cranshaw and Kittur and/or their publisher
Lindqvist, Janne, Cranshaw, Justin, Wiese, Jason, Hong, Jason and Zimmerman, John (2011): I'm the mayor of my house: examining why people use foursquare -- a social-driven location sharing application. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems 2011. pp. 2409-2418. Available online
There have been many location sharing systems developed over the past two decades, and only recently have they started to be adopted by consumers. In this paper, we present the results of three studies focusing on the foursquare check-in system. We conducted interviews and two surveys to understand, both qualitatively and quantitatively, how and why people use location sharing applications, as well as how they manage their privacy. We also document surprising uses of foursquare, and discuss implications for design of mobile social services.
© All rights reserved Lindqvist et al. and/or their publisher
Cranshaw, Justin, Toch, Eran, Hong, Jason, Kittur, Aniket and Sadeh, Norman (2010): Bridging the gap between physical location and online social networks. In: Proceedings of the 2010 International Conference on Uniquitous Computing 2010. pp. 119-128. Available online
This paper examines the location traces of 489 users of a location sharing social network for relationships between the users' mobility patterns and structural properties of their underlying social network. We introduce a novel set of location-based features for analyzing the social context of a geographic region, including location entropy, which measures the diversity of unique visitors of a location. Using these features, we provide a model for predicting friendship between two users by analyzing their location trails. Our model achieves significant gains over simpler models based only on direct properties of the co-location histories, such as the number of co-locations. We also show a positive relationship between the entropy of the locations the user visits and the number of social ties that user has in the network. We discuss how the offline mobility of users can have implications for both researchers and designers of online social networks.
© All rights reserved Cranshaw et al. and/or their publisher
Toch, Eran, Cranshaw, Justin, Drielsma, Paul Hankes, Tsai, Janice Y., Kelley, Patrick Gage, Springfield, James, Cranor, Lorrie, Hong, Jason and Sadeh, Norman (2010): Empirical models of privacy in location sharing. In: Proceedings of the 2010 International Conference on Uniquitous Computing 2010. pp. 129-138. Available online
The rapid adoption of location tracking and mobile social networking technologies raises significant privacy challenges. Today our understanding of people's location sharing privacy preferences remains very limited, including how these preferences are impacted by the type of location tracking device or the nature of the locations visited. To address this gap, we deployed Locaccino, a mobile location sharing system, in a four week long field study, where we examined the behavior of study participants (n=28) who shared their location with their acquaintances (n=373.) Our results show that users appear more comfortable sharing their presence at locations visited by a large and diverse set of people. Our study also indicates that people who visit a wider number of places tend to also be the subject of a greater number of requests for their locations. Over time these same people tend to also evolve more sophisticated privacy preferences, reflected by an increase in time- and location-based restrictions. We conclude by discussing the implications our findings.
© All rights reserved Toch et al. and/or their publisher
Toch, Eran, Cranshaw, Justin, Hankes-Drielsma, Paul, Springfield, Jay, Kelley, Patrick Gage, Cranor, Lorrie, Hong, Jason and Sadeh, Norman (2010): Locaccino: a privacy-centric location sharing application. In: Proceedings of the 2010 International Conference on Uniquitous Computing 2010. pp. 381-382. Available online
Locaccino is a location sharing application designed to empower users to effectively control their privacy. It has been piloted by close to 2000 users and has been used by researchers as an experimental platform for conducting research on location-based social networks. Featured technologies include expressive privacy rule creation, detailed feedback mechanisms that help users understand their privacy, algorithms for analyzing privacy preferences, and clients for mobile computers and smartphone devices. In addition, variations of Locaccino are also being piloted as part of research on user-controllable policy learning, learning usable privacy personas and reconciling expressiveness and user burden. The purpose of this demo is to introduce participants to the features of Locaccino, so that they can try out the Locaccino smartphone and laptop applications on their own devices, locate their friends and colleagues, and set rich privacy policies for sharing their location.
© All rights reserved Toch et al. and/or their publisher
Kumaraguru, Ponnurangam, Cranshaw, Justin, Acquisti, Alessandro, Cranor, Lorrie, Hong, Jason, Blair, Mary Ann and Pham, Theodore (2009): School of phish: a real-word evaluation of anti-phishing training. In: Proceedings of the 2009 Symposium on Usable Privacy and Security 2009. p. 3. Available online
PhishGuru is an embedded training system that teaches users to avoid falling for phishing attacks by delivering a training message when the user clicks on the URL in a simulated phishing email. In previous lab and real-world experiments, we validated the effectiveness of this approach. Here, we extend our previous work with a 515-participant, real-world study in which we focus on long-term retention and the effect of two training messages. We also investigate demographic factors that influence training and general phishing susceptibility. Results of this study show that (1) users trained with PhishGuru retain knowledge even after 28 days; (2) adding a second training message to reinforce the original training decreases the likelihood of people giving information to phishing websites; and (3) training does not decrease users' willingness to click on links in legitimate messages. We found no significant difference between males and females in the tendency to fall for phishing emails both before and after the training. We found that participants in the 18-25 age group were consistently more vulnerable to phishing attacks on all days of the study than older participants. Finally, our exit survey results indicate that most participants enjoyed receiving training during their normal use of email.
© All rights reserved Kumaraguru et al. and/or ACM Press
Join our community and advance:
Page maintainer: The Editorial Team