Shuyuan Mary Ho
Orcid: 0000-0002-4790-1821
According to our database1,
Shuyuan Mary Ho
authored at least 42 papers
between 2004 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Social distance "nudge:" a context aware mHealth intervention in response to COVID pandemics.
Comput. Math. Organ. Theory, September, 2023
Genie Breaks the Bottle: Ethics in Artificial Intelligence Adoption: ChatGPT; The Beginning and the End of Human Wisdom.
Proceedings of the 2023 Computers and People Research Conference, 2023
Proceedings of the Information for a Better World: Normality, Virtuality, Physicality, Inclusivity, 2023
Proceedings of the IEEE International Conference on Big Data, 2023
Proceedings of the 29th Americas Conference on Information Systems, 2023
Towards A Unified Utilitarian Ethics Framework for Healthcare Artificial Intelligence.
Proceedings of the 29th Americas Conference on Information Systems, 2023
2022
Comput. Math. Organ. Theory, 2022
2021
Collective Learning for Developing Cyber Defense Consciousness: An Activity System Analysis.
J. Inf. Syst. Educ., 2021
Consciousness of cyber defense: A collective activity system for developing organizational cyber awareness.
Comput. Secur., 2021
2020
Digit. Investig., 2020
"On the left side, there's nothing right. On the right side, there's nothing left: " Polarization of Political Opinion by News Media.
Proceedings of the Sustainable Digital Communities - 15th International Conference, 2020
2019
Context in a bottle: Language-action cues in spontaneous computer-mediated deception.
Comput. Hum. Behav., 2019
Leader Member Exchange: An Interactive Framework to Uncover a Deceptive Insider as Revealed by Human Sensors.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Consciousness of Cyber Defense: Boundary Objects for Expansive Learning Through Creation of Contradictions.
Proceedings of the HCI in Business, Government and Organizations. Information Systems and Analytics, 2019
Proceedings of the HCI in Business, Government and Organizations. Information Systems and Analytics, 2019
2018
J. Assoc. Inf. Sci. Technol., 2018
Digit. Investig., 2018
Computer-Mediated Deception: Collective Language-action Cues as Stigmergic Signals for Computational Intelligence.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
2017
J. Assoc. Inf. Sci. Technol., 2017
Inf. Syst. Frontiers, 2017
Inf. Process. Manag., 2017
Trust or consequences? Causal effects of perceived risk and subjective norms on cloud technology adoption.
Comput. Secur., 2017
Bridging the Security Gap between Software Developers and Penetration Testers: A Job Characteristic Theory Perspective.
Proceedings of the 23rd Americas Conference on Information Systems, 2017
2016
Computer-Mediated Deception: Strategies Revealed by Language-Action Cues in Spontaneous Communication.
J. Manag. Inf. Syst., 2016
<i>Saint or Sinner</i>? Language-Action Cues for Modeling Deception Using Support Vector Machines.
Proceedings of the Social, Cultural, and Behavioral Modeling, 9th International Conference, 2016
Real or Spiel? A Decision Tree Approach for Automated Detection of Deceptive Language-Action Cues.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
2015
Proceedings of the 2015 Winter Simulation Conference, 2015
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, 2015
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, 2015
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research, 2015
Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015
Proceedings of the 21st Americas Conference on Information Systems, 2015
2014
Dyadic attribution model: A mechanism to assess trustworthiness in virtual organizations.
J. Assoc. Inf. Sci. Technol., 2014
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2014
2013
Seeking beyond with IntegraL: A user study of sense-making enabled by anchor-based virtual integration of library systems.
J. Assoc. Inf. Sci. Technol., 2013
Guess who? An empirical study of gender deception and detection in computer-mediated communication.
Proceedings of the Beyond the Cloud: Rethinking Information Boundaries, 2013
2012
A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
Proceedings of the Social Computing, Behavioral - Cultural Modeling and Prediction, 2012
2011
i-sensor inference model for assessing trustworthiness in computer-mediated communications.
Proceedings of the 2011 ACM Conference on Computer Supported Cooperative Work, 2011
2010
2004
Proceedings of the Intelligence and Security Informatics, 2004