skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Jones, Jasmine"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Free, publicly-accessible full text available June 3, 2026
  2. In this community driven project, hemp plants were used to extract PFAS from contaminated soil and hydrothermal liquefaction was used to degrade PFAS in the harvested hemp. 
    more » « less
  3. Recovery from substance abuse disorders (SUDs) is a lifelong process of change. Self-tracking technologies have been proposed by the recovery community as a beneficial design space to support people adopting positive lifestyles and behaviors in their recovery. To explore the potential of this design space, we designed and deployed a technology probe consisting of a mobile app, wearable visualization, and ambient display to enable people to track and reflect on the activities they adopted in their recovery process. With this probe we conducted a four-week exploratory field study with 17 adults in early recovery to investigate 1) what activities people in recovery desire to track, 2) how people perceive self-tracking tools in relation to their recovery process, and 3) what digital resources self-tracking tools can provide to aid the recovery process. Our findings illustrate the array of activities that people track in their recovery, along with usage scenarios, preferences and design tensions that arose. We discuss implications for holistic self-tracking technologies and opportunities for future work in behavior change support for this context. 
    more » « less
  4. HCI has a history of developing rich media spaces to support collaboration between remote parties and testing such systems in investigations where each partner uses the same device setup (i.e., homogeneous device arrangements). In this work, we contribute an infrastructure that supports connection between a projector-camera media space and commodity mobile devices (i.e., tablets, smartphones). Deploying three device arrangements using this infrastructure, we conducted a mixed-methods investigation of device heterogeneity in media space collaboration. We found that the commodity devices provided a worse user experience, though this effect was moderated in some collaboration tasks. Collaborating with a partner who was using a commodity device also negatively affected the experience of the other user. We report specific collaboration concerns introduced by device heterogeneity. Based on these findings, we offer implications for the design of media spaces that use heterogeneous devices. 
    more » « less
  5. Policy design is an important part of software development. As security breaches increase in variety, designing a security policy that addresses all potential breaches becomes a nontrivial task. A complete security policy would specify rules to prevent breaches. Systematically determining which, if any, policy clause has been violated by a reported breach is a means for identifying gaps in a policy. Our research goal is to help analysts measure the gaps between security policies and reported breaches by developing a systematic process based on semantic reasoning. We propose SEMAVER, a framework for determining coverage of breaches by policies via comparison of individual policy clauses and breach descriptions. We represent a security policy as a set of norms. Norms (commitments, authorizations, and prohibitions) describe expected behaviors of users, and formalize who is accountable to whom and for what. A breach corresponds to a norm violation. We develop a semantic similarity metric for pairwise comparison between the norm that represents a policy clause and the norm that has been violated by a reported breach. We use the US Health Insurance Portability and Accountability Act (HIPAA) as a case study. Our investigation of a subset of the breaches reported by the US Department of Health and Human Services (HHS) reveals the gaps between HIPAA and reported breaches, leading to a coverage of 65%. Additionally, our classification of the 1,577 HHS breaches shows that 44% of the breaches are accidental misuses and 56% are malicious misuses. We find that HIPAA's gaps regarding accidental misuses are significantly larger than its gaps regarding malicious misuses. 
    more » « less