


default search action
Shuyuan Mary Ho
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j16]Shuyuan Mary Ho
, Xiuwen Liu, Md Shamim Seraj, Sabrina Dickey:
Social distance "nudge:" a context aware mHealth intervention in response to COVID pandemics. Comput. Math. Organ. Theory 29(3): 391-414 (2023) - [c25]Forhan Bin Emdad, Shuyuan Mary Ho, Benhur Ravuri, Shezin Hussain:
Towards A Unified Utilitarian Ethics Framework for Healthcare Artificial Intelligence. AMCIS 2023 - [c24]Ghazal Manzoor Hussain, Shuyuan Mary Ho:
Youth Exodus! A Framework of Social Media Migration by Young Adults. AMCIS 2023 - [c23]Shahrzad Sayyafzadeh, Hongmei Chi, Shuyuan Mary Ho, Idongesit Mkpong-Ruffin:
Enhancing Object Detection in YouTube Thumbnails Forensics with YOLOv4. IEEE Big Data 2023: 5588-5597 - [c22]Minhyung Jo
, Shuyuan Mary Ho
, Gary Burnett:
Do You Speak Meme? A Dynamic Digital Language for the InformationSociety. iConference (1) 2023: 523-534 - [c21]Shuyuan Mary Ho
, Yue Liu
:
Genie Breaks the Bottle: Ethics in Artificial Intelligence Adoption: ChatGPT; The Beginning and the End of Human Wisdom. SIGMIS-CPR 2023: 6:1-6:4 - [i2]Forhan Bin Emdad, Shuyuan Mary Ho, Benhur Ravuri, Shezin Hussain:
Towards A Unified Utilitarian Ethics Framework for Healthcare Artificial Intelligence. CoRR abs/2309.14617 (2023) - 2022
- [j15]Shuyuan Mary Ho
, Wenyi Li:
"I know you are, but what am I?" Profiling cyberbullying based on charged language. Comput. Math. Organ. Theory 28(4): 293-320 (2022) - 2021
- [j14]Shuyuan Mary Ho
, Melissa R. Gross
:
Consciousness of cyber defense: A collective activity system for developing organizational cyber awareness. Comput. Secur. 108: 102357 (2021) - [j13]Melissa R. Gross, Shuyuan Mary Ho:
Collective Learning for Developing Cyber Defense Consciousness: An Activity System Analysis. J. Inf. Syst. Educ. 32(1): 65-76 (2021) - 2020
- [j12]Shuyuan Mary Ho, Da-Yu Kao, Ming-Jung Chiu-Huang, Wenyi Li, Chung-Jui Lai:
Detecting Cyberbullying "Hotspots" on Twitter: A Predictive Analytics Approach. Digit. Investig. 32 Supplement: 300906 (2020) - [c20]Shuyuan Mary Ho, Da-Yu Kao, Wenyi Li, Chung-Jui Lai, Ming-Jung Chiu-Huang:
"On the left side, there's nothing right. On the right side, there's nothing left: " Polarization of Political Opinion by News Media. iConference 2020: 209-219
2010 – 2019
- 2019
- [j11]Shuyuan Mary Ho
, Jeffrey T. Hancock
:
Context in a bottle: Language-action cues in spontaneous computer-mediated deception. Comput. Hum. Behav. 91: 33-41 (2019) - [c19]Cheryl Booth, Shuyuan Mary Ho:
The Privacy Paradox in HCI: Calculus Behavior in Disclosing PII Online. HCI (24) 2019: 163-177 - [c18]Shuyuan Mary Ho, Diogo Oliveira, Raghav Rathi
:
Consciousness of Cyber Defense: Boundary Objects for Expansive Learning Through Creation of Contradictions. HCI (24) 2019: 338-353 - [c17]Shuyuan Mary Ho:
Leader Member Exchange: An Interactive Framework to Uncover a Deceptive Insider as Revealed by Human Sensors. HICSS 2019: 1-10 - 2018
- [j10]Shuyuan Mary Ho, Da-Yu Kao, Wen-Ying Wu:
Following the breadcrumbs: Timestamp pattern identification for cloud forensics. Digit. Investig. 24: 79-94 (2018) - [j9]Shuyuan Mary Ho
, Michelle L. Kaarst-Brown, Izak Benbasat:
Trustworthiness attribution: Inquiry into insider threat detection. J. Assoc. Inf. Sci. Technol. 69(2): 271-280 (2018) - [c16]Shuyuan Mary Ho, Jeffrey T. Hancock:
Computer-Mediated Deception: Collective Language-action Cues as Stigmergic Signals for Computational Intelligence. HICSS 2018: 1-10 - 2017
- [j8]Shuyuan Mary Ho
, Mónica Ocasio Velázquez, Cheryl Booth:
Trust or consequences? Causal effects of perceived risk and subjective norms on cloud technology adoption. Comput. Secur. 70: 581-595 (2017) - [j7]Shuyuan Mary Ho
, Paul Benjamin Lowry, Merrill Warkentin
, Yanyun Yang, Jonathan M. Hollister
:
Gender deception in asynchronous online communication: A path analysis. Inf. Process. Manag. 53(1): 21-41 (2017) - [j6]Shuyuan Mary Ho
, Merrill Warkentin
:
Leader's dilemma game: An experimental design for cyber insider threat research. Inf. Syst. Frontiers 19(2): 377-396 (2017) - [j5]Shuyuan Mary Ho
, Jeffrey T. Hancock
, Cheryl Booth:
Ethical dilemma: Deception dynamics in computer-mediated group communication. J. Assoc. Inf. Sci. Technol. 68(12): 2729-2742 (2017) - [c15]Hwee-Joo Kam, Vishal Shah, Shuyuan Mary Ho:
Bridging the Security Gap between Software Developers and Penetration Testers: A Job Characteristic Theory Perspective. AMCIS 2017 - 2016
- [j4]Shuyuan Mary Ho, Jeffrey T. Hancock
, Cheryl Booth, Xiuwen Liu:
Computer-Mediated Deception: Strategies Revealed by Language-Action Cues in Spontaneous Communication. J. Manag. Inf. Syst. 33(2): 393-420 (2016) - [c14]Shuyuan Mary Ho, Jeffrey T. Hancock
, Cheryl Booth, Mike Burmester, Xiuwen Liu, Shashanka Surya Timmarajus:
Demystifying Insider Threat: Language-Action Cues in Group Dynamics. HICSS 2016: 2729-2738 - [c13]Shuyuan Mary Ho, Jeffrey T. Hancock
, Cheryl Booth, Xiuwen Liu, Muye Liu, Shashanka Surya Timmarajus, Mike Burmester:
Real or Spiel? A Decision Tree Approach for Automated Detection of Deceptive Language-Action Cues. HICSS 2016: 3706-3715 - [c12]Shuyuan Mary Ho, Xiuwen Liu, Cheryl Booth, Aravind Hariharan:
Saint or Sinner? Language-Action Cues for Modeling Deception Using Support Vector Machines. SBP-BRiMS 2016: 325-334 - 2015
- [c11]Shuyuan Mary Ho, Mónica Ocasio Velázquez:
Do You Trust the Cloud? Modeling Cloud Technology Adoption in Organizations. AMCIS 2015 - [c10]Shuyuan Mary Ho, Jeffrey T. Hancock
, Cheryl Booth, Xiuwen Liu, Shashanka Surya Timmarajus, Mike Burmester:
Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication. ISI 2015: 157-159 - [c9]Indira R. Guzman
, Thomas Hilton, Miguel (Mike) O. Villegas, Michelle L. Kaarst-Brown, Jason James, Ashraf Shirani, Shuyuan Mary Ho, Diane Lending:
Panel: Cybersecurity Workforce Development. CPR 2015: 15-17 - [c8]Shuyuan Mary Ho, Hengyi Fu, Shashanka Surya Timmarajus, Cheryl Booth, Jung Hoon Baeg, Muye Liu:
Insider Threat: Language-action Cues in Group Dynamics. CPR 2015: 101-104 - [c7]Santos M. Galvez, Joshua D. Shackman, Indira R. Guzman
, Shuyuan Mary Ho:
Factors Affecting Individual Information Security Practices. CPR 2015: 135-144 - [c6]Hongmei Chi, Shuyuan Mary Ho, Dominique Hubbard:
An online game simulation environment for detecting potential deceptive insiders. WSC 2015: 3222-3223 - 2014
- [j3]Shuyuan Mary Ho
, Izak Benbasat:
Dyadic attribution model: A mechanism to assess trustworthiness in virtual organizations. J. Assoc. Inf. Sci. Technol. 65(8): 1555-1576 (2014) - [c5]Shuyuan Mary Ho, Shashanka Surya Timmarajus, Mike Burmester, Xiuwen Liu:
Dyadic Attribution: A Theoretical Model for Interpreting Online Words and Actions. SBP 2014: 277-284 - 2013
- [j2]Shuyuan Mary Ho
, Michael Bieber, Min Song
, Xiangmin Zhang:
Seeking beyond with IntegraL: A user study of sense-making enabled by anchor-based virtual integration of library systems. J. Assoc. Inf. Sci. Technol. 64(9): 1927-1945 (2013) - [c4]Shuyuan Mary Ho, Jonathan M. Hollister
:
Guess who? An empirical study of gender deception and detection in computer-mediated communication. ASIST 2013: 1-4 - 2012
- [j1]Shuyuan Mary Ho, Hwajung Lee:
A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 82-98 (2012) - [c3]Shuyuan Mary Ho, Issam Ahmed, Roberto Salome:
Whodunit? Collective Trust in Virtual Interactions. SBP 2012: 348-356 - 2011
- [c2]Shuyuan Mary Ho, Xiangmin Zhang:
i-sensor inference model for assessing trustworthiness in computer-mediated communications. CSCW 2011: 645-648 - 2010
- [i1]Shuyuan Mary Ho, Min Song, Michael Bieber:
IntegraL Connects Data, User and Scientists. IASSIST 2010
2000 – 2009
- 2004
- [c1]Joon S. Park, Shuyuan Mary Ho:
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats. ISI 2004: 201-213
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint