Heng Xu

According to our database1, Heng Xu authored at least 113 papers between 2002 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
An improved MDS localisation algorithm for a WSN in a sub-surface mine.
IJSNet, 2019

Protecting Privacy on Social Media: Is Consumer Privacy Self-Management Sufficient?
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Localized Rendering of Button Click Sensation via Active Lateral Force Feedback.
Proceedings of the 2019 IEEE World Haptics Conference, 2019

2018
An Optimization Routing Algorithm for Green Communication in Underground Mines.
Sensors, 2018

When SNS Privacy Settings Become Granular: Investigating Users' Choices, Rationales, and Influences on Their Social Experience.
PACMHCI, 2018

My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Integrating Topic Information into VAE for Text Semantic Similarity.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

Your Privacy Is Your Friend's Privacy: Examining Interdependent Information Disclosure on Online Social Networks.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

UltraShiver: Lateral force feedback on a bare fingertip via ultrasonic oscillation and electroadhesion.
Proceedings of the 2018 IEEE Haptics Symposium, 2018

Extracting Conflict Models from Interaction Traces in Virtual Collaborative Work.
Proceedings of the Advances in Conceptual Modeling, 2018

A Matter of Control or Safety?: Examining Parental Use of Technical Monitoring Apps on Teens' Mobile Devices.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Confidence Levels for Empirical Research Using Twitter Data.
Proceedings of the Technology, Mind, and Society Conference, 2018

2017
Most Teens Bounce Back: Using Diary Methods to Examine How Quickly Teens Recover from Episodic Online Risk Exposure.
PACMHCI, 2017

An exploratory study on mobile banking adoption in Indian metropolitan and urban areas: a scenario-based experiment.
IT for Development, 2017

Resolving the privacy paradox: Toward a cognitive appraisal and emotion approach to online privacy behaviors.
Information & Management, 2017

Examining the intended and unintended consequences of organisational privacy safeguards.
EJIS, 2017

Privacy concerns for mobile app download: An elaboration likelihood model perspective.
Decision Support Systems, 2017

How Are Social Capital and Parental Mediation Associated with Cyberbullying and Cybervictimization Among Youth in the United States?
Proceedings of the HCI International 2017 - Posters' Extended Abstracts, 2017

Parents Just Don't Understand: Why Teens Don't Talk to Parents about Their Online Risk Experiences.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

Parental Control vs. Teen Self-Regulation: Is there a middle ground for mobile online safety?
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

Examining Parents' Technical Mediation of Teens' Mobile Devices.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

Adolescent Online Safety: Moving Beyond Formative Evaluations to Designing Solutions for the Future.
Proceedings of the 2017 Conference on Interaction Design and Children, 2017

2016
The boundaries between: Parental involvement in a teen's online world.
JASIST, 2016

Quantifying Different Tactile Sensations Evoked by Cutaneous Electrical Stimulation Using Electroencephalography Features.
Int. J. Neural Syst., 2016

Performance analysis of delayed mobile data offloading with multi-level priority.
Proceedings of the 27th IEEE Annual International Symposium on Personal, 2016

Simultaneous information and energy transfer in large-scale cellular networks with sleep mode.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Privacy Nudges for Mobile Applications: Effects on the Creepiness Emotion and Privacy Attitudes.
Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, 2016

Dear Diary: Teens Reflect on Their Weekly Online Risk Experiences.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Autonomous and Interdependent: Collaborative Privacy Management on Social Networking Sites.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Argument Detection in Online Discussion: A Theory Based Approach.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

Big Data in Fashion Industry: Color Cycle Mining from Runway Data.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
Facebook apps and tagging: The trade-off between personal privacy and engaging with friends.
JASIST, 2015

The role of information systems research in shaping the future of information privacy.
Inf. Syst. J., 2015

Designing for privacy management in hospitals: Understanding the gap between user activities and IT staff's understandings.
I. J. Medical Informatics, 2015

Styles in the Fashion Social Network: An Analysis on Lookbook.nu.
Proceedings of the Social Computing, Behavioral-Cultural Modeling, and Prediction, 2015

Exploring the effect of permission notice on users' initial trust to an application store: The case of China's Android application market.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Measuring Individuals' Concerns over Collective Privacy on Social Networking Sites.
Proceedings of the International Conference on Information Systems, 2015

Providing Slip Feedback for Closed-Loop Control of Myoelectric Prosthesis via Electrotactile Stimulation.
Proceedings of the Intelligent Robotics and Applications - 8th International Conference, 2015

Text-Generated Fashion Influence Model: An Empirical Study on Style.com.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

Interaction Effects of Contextual Cues on Privacy Concerns: The Case of Android Applications.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

"Preventative" vs. "Reactive": How Parental Mediation Influences Teens' Social Media Privacy Behaviors.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

Risk-taking as a Learning Process for Shaping Teen's Online Information Privacy Behaviors.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

Resilience Mitigates the Negative Effects of Adolescent Internet Addiction and Online Risk Exposure.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
Privacy-aware electronic society.
Annales des Télécommunications, 2014

Privacy in the Age of Big Data: The Challenges and Opportunities for Privacy Research.
Proceedings of the International Conference on Information Systems, 2014

Adolescent online safety: the "moral" of the story.
Proceedings of the Computer Supported Cooperative Work, 2014

Designing the default privacy settings for facebook applications.
Proceedings of the Computer Supported Cooperative Work, 2014

Privacy practices in collaborative environments: a study of emergency department staff.
Proceedings of the Computer Supported Cooperative Work, 2014

Understanding user adaptation strategies for the launching of facebook timeline.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts.
EJIS, 2013

Is this app safe for children?: a comparison study of maturity ratings on Android and iOS applications.
Proceedings of the 22nd International World Wide Web Conference, 2013

Children's Exposure to Mobile In-App Advertising: An Analysis of Content Appropriateness.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Effects of Fear appeals and point of reference on the persuasiveness of IT security communications.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

An online experiment of privacy authorization dialogues for social applications.
Proceedings of the Computer Supported Cooperative Work, 2013

Privacy management in dynamic groups: understanding information privacy in medical practices.
Proceedings of the Computer Supported Cooperative Work, 2013

Using contextual integrity to examine interpersonal information boundary on social network sites.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

Grand Challenges of Researching Adolescent Online Safety: A Family Systems Approach.
Proceedings of the 19th Americas Conference on Information Systems, 2013

2012
Research Note - Effects of Individual Self-Protection, Industry Self-Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services.
Information Systems Research, 2012

E-commerce intelligence development and research in the Greater China Region.
Electronic Markets, 2012

The security-liberty balance: individuals' attitudes towards internet government surveillance.
EG, 2012

A Value Sensitive Design Investigation of Privacy Enhancing Tools in Web Browsers.
Decision Support Systems, 2012

Launching the New Profile on Facebook: Understanding the Triggers and Outcomes of Users' Privacy Concerns.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

Detecting Offensive Language in Social Media to Protect Adolescent Online Safety.
Proceedings of the 2012 International Conference on Privacy, 2012

Privacy by ReDesign: Alleviating Privacy Concerns for Third-Party Apps.
Proceedings of the International Conference on Information Systems, 2012

Measuring Mobile Users' Concerns for Information Privacy.
Proceedings of the International Conference on Information Systems, 2012

Beyond the Individual Privacy Paradigm: Implications for Interpersonal Interactions on Facebook.
Proceedings of the 25th Bled eConference: eTrust: eDependability: Reliable and Trustworthy eStructures, 2012

See Friendship: Interpersonal Privacy Management in a Collective World.
Proceedings of the 18th Americas Conference on Information Systems, 2012

Who will be your next friend: the bonding role of linkage influence in social networks.
Proceedings of the Fourteenth International Conference on Electronic Commerce, 2012

2011
Introduction to special issue on information privacy and trust in social media.
EAI Endorsed Trans. Security Safety, 2011

Trust in social computing. The case of peer-to-peer file sharing networks.
EAI Endorsed Trans. Security Safety, 2011

Information Privacy Research: An Interdisciplinary Review.
MIS Quarterly, 2011

CoPE: Enabling collaborative privacy management in online social networks.
JASIST, 2011

Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances.
J. AIS, 2011

Balancing privacy concerns in the adoption of Location-Based Services: an empirical analysis.
IJEB, 2011

The influence of product integration on online advertising effectiveness.
Electronic Commerce Research and Applications, 2011

The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing.
Decision Support Systems, 2011

The role of affect and cognition on online consumers' decision to disclose personal information to unfamiliar online vendors.
Decision Support Systems, 2011

Open source software adoption: motivations of adopters and amotivations of non-adopters.
DATA BASE, 2011

Informing security indicator design in web browsers.
Proceedings of the iConference 2011, 2011

Understanding the Drivers and Outcomes of Healthcare Organizational Privacy Responses.
Proceedings of the International Conference on Information Systems, 2011

Healthcare Information Privacy Research: Iusses, Gaps and What Next?
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

Ethics and Privacy Considerations for Systems Biology Applications in Predictive and Personalized Medicine.
Proceedings of the Handbook of Research on Computational and Systems Biology, 2011

2010
The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services.
J. of Management Information Systems, 2010

Understanding Situational Online Information Disclosure as a Privacy Calculus.
JCIS, 2010

An investigation of the word-processing software market war in South Korea: A game-theoretic approach.
Information & Management, 2010

Online auction: the effects of transaction probability and listing price on a seller's decision-making behavior.
Electronic Markets, 2010

Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry.
Electronic Commerce Research and Applications, 2010

Information Disclosure and Online Social Networks: From the Case of Facebook News Feed Controversy to a Theoretical Understanding.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

COP: A Step toward Children Online Privacy.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Perceived effectiveness of text vs. multimedia Location-Based Advertising messaging.
IJMC, 2009

Consumer Responses to the Introduction of Privacy Protection Measures: An Exploratory Research Framework.
IJEBR, 2009

The effects of privacy concerns and personal innovativeness on potential and experienced customers' adoption of location-based services.
Electronic Markets, 2009

Privacy protection for RFID data.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Regulating Privacy in Wireless Advertising Messaging: FIPP Compliance by Policy vs. by Design.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

Information Privacy Values, Beliefs and Attitudes: An Empirical Analysis of Web 2.0 Privacy.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Trust in the Social Computing: The Case of Peer-to-Peer (P2P) File Sharing Networks.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
Alleviating Parental Concerns for Children's Online Privacy: A Value Sensitive Design Investigation.
Proceedings of the International Conference on Information Systems, 2008

Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View.
Proceedings of the International Conference on Information Systems, 2008

Mobile User's Privacy Decision Making: Integrating Economic Exchange and Social Justice Perspectives.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

2007
Lesbian, gay, bisexual and transgender (LGBT) issues in virtual worlds.
DATA BASE, 2007

The Effects of Self-Construal and Perceived Control on Privacy Concerns.
Proceedings of the International Conference on Information Systems, 2007

2006
Information Privacy in the Digital Era: An Exploratory Research Framework.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2005
Partitioned Cache Shadowing for Deep Sub-Micron (DSM) Regime.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

Comparative Analysis of Scheduling Algorithms in Ad Hoc Mobile Networking.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Privacy Considerations in Location-Based Advertising.
Proceedings of the Designing Ubiquitous Information Environments: Socio-Technical Issues and Challenges, 2005

Predicting the Adoption of Location-Based Services: The Role of Trust and Perceived Privacy Risk.
Proceedings of the International Conference on Information Systems, 2005

Predicting the Usage of P2P Sharing Software: The Role of Trust and Perceived Risk.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Consumers' Privacy Concerns toward Using Location-Based Services: An Exploratory Framework and Research Proposal.
Proceedings of the 13th European Conference on Information Systems, 2005

2004
Alleviating Consumers' Privacy Concerns in Location-Based Services: A Psychological Control Perspective.
Proceedings of the International Conference on Information Systems, 2004

2003
Effects of Multimedia on Mobile Consumer Behavior: An Empirical Study of Location-Aware Advertising.
Proceedings of the International Conference on Information Systems, 2003

Foundations of SMS Commerce Success: Lessons from SMS Messaging and Co-Opetition.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

2002
Adaptive congestion control in infrastructure wireless LANs with bounded medium access delay.
Proceedings of the International Mobility and Wireless Access Workshop, 2002

Critical Success Factors for Web-Based Organizational IT Training Systems.
Proceedings of the Advances in Web-Based Learning, First International Conference, 2002


  Loading...