Shuyuan Mary Ho

Orcid: 0000-0002-4790-1821

According to our database1, Shuyuan Mary Ho authored at least 41 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Social distance "nudge:" a context aware mHealth intervention in response to COVID pandemics.
Comput. Math. Organ. Theory, September, 2023

Do You Speak Meme? A Dynamic Digital Language for the InformationSociety.
Proceedings of the Information for a Better World: Normality, Virtuality, Physicality, Inclusivity, 2023

Enhancing Object Detection in YouTube Thumbnails Forensics with YOLOv4.
Proceedings of the IEEE International Conference on Big Data, 2023

Youth Exodus! A Framework of Social Media Migration by Young Adults.
Proceedings of the 29th Americas Conference on Information Systems, 2023

Towards A Unified Utilitarian Ethics Framework for Healthcare Artificial Intelligence.
Proceedings of the 29th Americas Conference on Information Systems, 2023

2022
"I know you are, but what am I?" Profiling cyberbullying based on charged language.
Comput. Math. Organ. Theory, 2022

2021
Collective Learning for Developing Cyber Defense Consciousness: An Activity System Analysis.
J. Inf. Syst. Educ., 2021

Consciousness of cyber defense: A collective activity system for developing organizational cyber awareness.
Comput. Secur., 2021

2020
Detecting Cyberbullying "Hotspots" on Twitter: A Predictive Analytics Approach.
Digit. Investig., 2020

"On the left side, there's nothing right. On the right side, there's nothing left: " Polarization of Political Opinion by News Media.
Proceedings of the Sustainable Digital Communities - 15th International Conference, 2020

2019
Context in a bottle: Language-action cues in spontaneous computer-mediated deception.
Comput. Hum. Behav., 2019

Leader Member Exchange: An Interactive Framework to Uncover a Deceptive Insider as Revealed by Human Sensors.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Consciousness of Cyber Defense: Boundary Objects for Expansive Learning Through Creation of Contradictions.
Proceedings of the HCI in Business, Government and Organizations. Information Systems and Analytics, 2019

The Privacy Paradox in HCI: Calculus Behavior in Disclosing PII Online.
Proceedings of the HCI in Business, Government and Organizations. Information Systems and Analytics, 2019

2018
Trustworthiness attribution: Inquiry into insider threat detection.
J. Assoc. Inf. Sci. Technol., 2018

Following the breadcrumbs: Timestamp pattern identification for cloud forensics.
Digit. Investig., 2018

Computer-Mediated Deception: Collective Language-action Cues as Stigmergic Signals for Computational Intelligence.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

2017
Ethical dilemma: Deception dynamics in computer-mediated group communication.
J. Assoc. Inf. Sci. Technol., 2017

Leader's dilemma game: An experimental design for cyber insider threat research.
Inf. Syst. Frontiers, 2017

Gender deception in asynchronous online communication: A path analysis.
Inf. Process. Manag., 2017

Trust or consequences? Causal effects of perceived risk and subjective norms on cloud technology adoption.
Comput. Secur., 2017

Bridging the Security Gap between Software Developers and Penetration Testers: A Job Characteristic Theory Perspective.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
Computer-Mediated Deception: Strategies Revealed by Language-Action Cues in Spontaneous Communication.
J. Manag. Inf. Syst., 2016

<i>Saint or Sinner</i>? Language-Action Cues for Modeling Deception Using Support Vector Machines.
Proceedings of the Social, Cultural, and Behavioral Modeling, 9th International Conference, 2016

Real or Spiel? A Decision Tree Approach for Automated Detection of Deceptive Language-Action Cues.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Demystifying Insider Threat: Language-Action Cues in Group Dynamics.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
An online game simulation environment for detecting potential deceptive insiders.
Proceedings of the 2015 Winter Simulation Conference, 2015

Insider Threat: Language-action Cues in Group Dynamics.
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, 2015

Panel: Cybersecurity Workforce Development.
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, 2015

Factors Affecting Individual Information Security Practices.
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, 2015

Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Do You Trust the Cloud? Modeling Cloud Technology Adoption in Organizations.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
Dyadic attribution model: A mechanism to assess trustworthiness in virtual organizations.
J. Assoc. Inf. Sci. Technol., 2014

Dyadic Attribution: A Theoretical Model for Interpreting Online Words and Actions.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2014

2013
Seeking beyond with IntegraL: A user study of sense-making enabled by anchor-based virtual integration of library systems.
J. Assoc. Inf. Sci. Technol., 2013

Guess who? An empirical study of gender deception and detection in computer-mediated communication.
Proceedings of the Beyond the Cloud: Rethinking Information Boundaries, 2013

2012
A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

Whodunit? Collective Trust in Virtual Interactions.
Proceedings of the Social Computing, Behavioral - Cultural Modeling and Prediction, 2012

2011
i-sensor inference model for assessing trustworthiness in computer-mediated communications.
Proceedings of the 2011 ACM Conference on Computer Supported Cooperative Work, 2011

2010
IntegraL Connects Data, User and Scientists.
Proceedings of the IASSIST 2010, 2010

2004
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats.
Proceedings of the Intelligence and Security Informatics, 2004


  Loading...