Shuyuan Mary Ho
Title
Cited by
Cited by
Year
Trust or consequences? Causal effects of perceived risk and subjective norms on cloud technology adoption
SM Ho, M Ocasio-Velázquez, C Booth
Computers & Security 70, 581-595, 2017
682017
Composite role-based monitoring (CRBM) for countering insider threats
JS Park, SM Ho
International Conference on Intelligence and Security Informatics, 201-213, 2004
512004
Computer-mediated deception: Strategies revealed by language-action cues in spontaneous communication
SM Ho, JT Hancock, C Booth, X Liu
Journal of Management Information Systems 33 (2), 393-420, 2016
472016
Leader’s dilemma game: An experimental design for cyber insider threat research
SM Ho, M Warkentin
Information Systems Frontiers 19 (2), 377-396, 2017
292017
Demystifying insider threat: Language-action cues in group dynamics
SM Ho, JT Hancock, C Booth, M Burmester, X Liu, SS Timmarajus
2016 49th Hawaii International Conference on System Sciences (HICSS), 2729-2738, 2016
282016
Following the breadcrumbs: Timestamp pattern identification for cloud forensics
SM Ho, D Kao, WY Wu
Digital Investigation 24, 79-94, 2018
192018
Trustworthiness attribution: Inquiry into insider threat detection
SM Ho, M Kaarst‐Brown, I Benbasat
Journal of the Association for Information Science and Technology 69 (2 …, 2018
192018
Insider threat: Language-action cues in group dynamics
SM Ho, H Fu, SS Timmarajus, C Booth, JH Baeg, M Liu
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People …, 2015
182015
Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication
SM Ho, JT Hancock, C Booth, X Liu, SS Timmarajus, M Burmester
2015 IEEE International Conference on Intelligence and Security Informatics …, 2015
172015
Real or Spiel? A decision tree approach for automated detection of deceptive language-action cues
SM Ho, JT Hancock, C Booth, X Liu, M Liu, SS Timmarajus, M Burmester
2016 49th Hawaii International Conference on System Sciences (HICSS), 3706-3715, 2016
162016
Dyadic attribution model: A mechanism to assess trustworthiness in virtual organizations
SM Ho, I Benbasat
Journal of the Association for Information Science and Technology 65 (8 …, 2014
162014
Saint or Sinner? Language-Action Cues for Modeling Deception Using Support Vector Machines
SM Ho, X Liu, C Booth, A Hariharan
International Conference on Social Computing, Behavioral-Cultural Modeling …, 2016
142016
A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications.
SM Ho, H Lee
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3 (1/2), 82-98, 2012
142012
Ethical dilemma: Deception dynamics in computer‐mediated group communication
SM Ho, JT Hancock, C Booth
Journal of the Association for Information Science and Technology 68 (12 …, 2017
132017
Gender deception in asynchronous online communication: A path analysis
SM Ho, PB Lowry, M Warkentin, Y Yang, JM Hollister
Information Processing & Management 53 (1), 21-41, 2017
122017
Guess who? An empirical study of gender deception and detection in computer‐mediated communication
SM Ho, JM Hollister
Proceedings of the American Society for Information Science and Technology …, 2013
122013
Factors affecting individual information security practices
SM Galvez, JD Shackman, IR Guzman, SM Ho
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People …, 2015
112015
A socio-technical approach to understanding perceptions of trustworthiness in virtual organizations
SM Ho
Social Computing and Behavioral Modeling, 1-10, 2009
112009
Behavioral anomaly detection: a socio-technical study of trustworthiness in virtual organizations
SM Ho
Syracuse University, 2009
102009
Attribution-based anomaly detection: trustworthiness in an online community
SM Ho
Social Computing, Behavioral Modeling, and Prediction, 129-140, 2008
102008
The system can't perform the operation now. Try again later.
Articles 1–20