Publications

Refereed Journal Publications

Ho, S.M., Kaarst-Brown, M., and Benbasat, I. (in press) Trustworthiness attribution: Inquiry into insider threat detectionJournal of the Association for Information Science and Technology. doi:10.1002/asi.23938.

Ho, S.M., Hancock, J.T., Booth, C. (2017) Ethical dilemma: Deception dynamics in computer-mediated group communication. Journal of the Association for Information Science and Technology, 68(12), 2729-2742, December 2017. doi:10.1002/asi.23849.

Ho, S.M., Ocasio Velázquez, M., and Booth, C. (2017) Trust or consequences? Causal effects of perceived risks and subjective norms on cloud technology adoption. Computers & Security, 70, 581-595, September 2017. doi:10.1016/j.cose.2017.08.004.

Ho, S.M. and Warkentin, M. (2017) Leader’s dilemma game: An experimental design for cyber insider threat research. Information Systems Frontiers, 19(2): 377-396. doi:10.1007/s10796-015-9599-5.

Ho, S.M., Lowry, P.B., Warkentin, M., Yang, Y.Y., Hollister, J. (2017) Gender deception in asynchronous online communication: A path analysis. Information Processing & Management,53(1), 21-41, January 2017. doi:10.1016/j.ipm.2016.06.004.

Ho, S.M., Hancock, J.T., Booth, C., and Liu, X. (2016) Computer-mediated deception: Strategies revealed by language-action cues in spontaneous communication. Journal of Management Information Systems, 33(2), 393-420, October 2016. doi:10.1080/07421222.2016.1205924.

Ho, S.M. and Benbasat, I. (2014) Dyadic attribution model: A mechanism to assess trustworthiness in virtual organizationsJournal of the Association for Information Science and Technology, 65(8), 1555-1576, August 2014. doi:10.1002/asi.23074.

Ho, S.M., Bieber, M., Song, M., and Zhang, X. (2013) Seeking beyond with IntegraL: A user study of sense-making enabled by anchor-based virtual Integration of library systems. Journal of the Association for Information Science and Technology, 64(9), 1927-1945, September 2013. doi:10.1002/asi.22904.

Ho, S.M. and Katukoori, R.R., (2013) Agent-based modeling to visualize trustworthiness: A socio-technical framework. Special Issue of Detecting and Mitigating Information Security Threats for Mobile Networks, Int’l Journal of Mobile Network Design and Innovation, 5(1), 17-27, October 2013. doi:10.1504/IJMNDI.2013.057145.

Ho, S.M. and Lee, H.J. (2012) A thief among us: The use of finite-state machines to dissect insider threat in cloud communications. Special Issue of Frontiers in Insider Threats and Data Leakage Prevention, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 3(1/2), 82-98, March 2012.

Ho, S.M., Hancock, J.T., Zhang, Q., and Booth, C. (under review) Computer-mediated deception in leader-member exchange. Journal of Management Information Systems, 30 pages.

Ho, S. M., & Hancock, J. T. (under review). Context in a bottle: Language-action cues in spontaneous computer-mediated deception. Computers in Human Behavior, 22 pages.

Ho, S.M., Kao, D. Y., and Wu, W. Y. (under review). Following the breadcrumbs: Pattern identification of cloud behavioral forensics. Digital Investigation, 14 pages.

Ho, S.M. (in progress) Computer-mediated deception in context. Journal of Theoretical and Applied Electronic Commerce Research. Special issue on dark side of social e-Commerce.

Refereed Conference Proceedings

Ho, S.M. and Hancock, J.T. (2018) Computer-mediated deception: Collective language-action cues as stigmergic signals for computational intelligence. Proceedings of the 2018 51th Hawaii International Conference on System Sciences (HICSS-51). January 3-6, 2018.

Ho, S.M., von Eberstein, A., and Chatmon, C. (2017) Expansive learning in cyber defense: Transformation of organizational information security culture. The 12th Annual Symposium on Information Assurance (ASIA’17), pp. 23-28. Albany, NY, June 6-8, 2017.

Booth, C. and Ho, S.M. (2017). Does the Cloud have a Silver Lining? Privacy concerns and perceived risk in cloud technology adoption. Proceedings of the iConference 2017, pp. 1-4. Wuhan, China, March 22-25, 2017.

Ho, S.M., Liu, X., Booth, C., and Hariharan, A. (2016) Saint or Sinner? Language-action cues for modeling deception using support vector machines. In K.S. Xu, D. Reitter, D. Lee, and N. Osgood (Eds.) Social, Cultural and Behavioral Modeling (SBP-BRiMS), LNCS 9708, 325-334, Springer International Publishing Switzerland. doi:10.1007/978-3-319-39931-7_31.

Ho, S.M., Hancock, J.T., Booth, C., Burmester, M., Liu, X., and Timmarajus, S.S. (2016) Demystifying insider threat: Language-action cues in group dynamics,Proceedings of the 2016 49th Hawaii International Conference on System Sciences (HICSS-49), pp. 2729-2738. Kauai, Hawaii. doi:10.1109/HICSS.2016.343.

Ho, S.M., Hancock, J.T., Booth, C., Liu, X., Liu, M., Timmarajus, S.S., and Burmester, M. (2016) Real or Spiel? A decision tree approach for automated detection of deceptive language-action cues, Proceedings of the 2016 49th Hawaii International Conference on System Sciences (HICSS-49), pp. 3706-3715. Kauai, Hawaii. doi:10.1109/HICSS.2016.462.

Booth, C. and Ho, S.M. (2016). Get a clue! Some truths about online deception. Proceedings of the iConference 2016, pp. 1-4. Philadelphia, PA, March 20-23, 2016.

Ho, S.M., Hancock, J.T., Booth, C., Liu, X., Timmarajus, S.S., Burmester, M. (2015) Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication, IEEE Intelligence and Security Informatics: 157-159. IEEE: Baltimore, MD. doi:10.1007/978-1-4799-9889-0/15.

Ho, S.M., Fu, H., Timmarajus, S.S., Booth, C., Baeg, J.H., Liu, M. (2015) Insider threat: Language-action cues in group dynamics, ACM SIGMIS Computers and People Research: 101-104. ACM: New Beach, California. doi:10.1145/2751957.2751978.

Ocasio Velázquez, M., and Ho, S.M. (2015) Do you trust the cloud? Modeling cloud technology adoption in organizations. Proceedings of the 2015 Americas Conference on Information Systems (AMCIS’15). Association for Information Systems: Puerto Rico, August 13-15. doi: aisel.aisnet.org/amcis2015/AdoptionofIT/GeneralPresentations/18/.

Galvez, S.M., Shackman, J.D., Guzman, I.R., and Ho, S.M. (2015) Factors affecting individual information security practices, ACM SIGMIS Computers and People Research: 135-144. ACM: New Beach, California. doi:10.1145/2751957.2751966.

Ho, S.M., Timmarajus, S.S., Burmester, M., and Liu, X. (2014). Dyadic attribution: A theoretical model for computationally interpreting words and action. In W.G. Kennedy, N. Agarwal, and S.J. Yang (Eds.) Social Computing, Behavioral Modeling, and Prediction, LNCS 8393, 277-284, Springer International Publishing Switzerland. doi:10.1007/978-3-319-05579-4_34.

Ho, S.M., and Hollister, J. (2013). Guess Who? An empirical study of gender deception and detection in computer-mediated communication. In Proceedings of the 76th Annual Meeting of the Association for Information Science & Technology (ASIS&T 2013), 50(1): 1-4. doi:10.1002/meet.14505001116.

Ho, S.M., Ahmed, I., and Salome, R. (2012). Whodunit? Collective trust in virtual interactions. In S.J. Yang, A.M. Greenberg, and M. Endsley (Eds.) Social Computing, Behavioral Modeling, and Prediction, LNCS 7227, 348-356, Springer-Verlag Berlin Heidelberg 2012. doi:10.1007/978-3-642-29047-3_42.

Ho, S.M. and Zhang, X. (2011). iSensor inference model for assessing trustworthiness in computer-mediated communications, In ACM Proceedings of CSCW 2011, 645-648, Hangzhou, China, March 19-23, 2011, doi:10.1145/1958824.1958935.

Ho, S.M. (2009). A socio-technical approach to theorizing on perceptions of trustworthiness in virtual organizations. In Proceedings of 4th Annual i-Conference on iSociety: Research, Education and Engagement, University of North Carolina, Chapel Hill, NC. doi: hdl.handle.net/2142/15225.

Ho, S.M. and Metcalfe, C.F. (2009). Life-cycle thinking: What can IT do to be green? In Proceedings of 4th Annual i-Conference on iSociety: Research, Education and Engagement, University of North Carolina, Chapel Hill, NC. doi: hdl.handle.net/2142/15239.

Ho, S.M. (2009). Trustworthiness in virtual organizations. In Proceedings of 15th Americas Conference on Information Systems, San Francisco, California, August 6-9, 2009. doi: aisel.aisnet.org/amcis2009_dc/5/.

Ho, S.M. (2009). A socio-technical approach to understanding perceptions of trustworthiness in virtual organizations. In H. Liu, J.J. Salerno, and M.J. Young (Eds.) Social Computing, Behavioral Modeling, and Prediction, 113-122. Tempe, FL: Springer. doi: 10.1007/978-1-4419-0056-2_15.

Ho, S.M. (2008). A framework of coordinated defense. In Subrahmanian, V.S. and Kruglanski, A. (Eds.) Proceedings of the 2nd International Conference on Computational Cultural Dynamics, 39-44. Menlo Park, CA: AAAI Press. doi: aaai/icccd08-006.

Ho, S.M. (2008). Attribution-based anomaly-detection: Trustworthiness in an online community. In H. Liu, J.J. Salerno, and M.J. Young (Eds.) Social Computing, Behavioral Modeling, and Prediction, 129-140. Tempe, FL: Springer. doi: 10.1007/978-0-387-77672-9_15.

Ho, S.M. (2008). Toward a deeper understanding of personnel anomaly detection. In L.J. Janczewski and A.M. Colarik (Eds.) Encyclopedia of Cyber Warfare and Cyber Terrorism, 1st Edition, 206-215. Hershey, NY: IGI Global. doi:10.4018/978-1-59140-991-5.ch026.

Ho, S.M. (2007). Leap in the dark: An attempt to theorize personnel anomaly detection for countering insider threats. In Proceedings of 2nd International Conference on i-Warfare and Security, Naval Postgraduate School, 95-100, Monterey, CA, March 8-9, 2007. ISBN9781905305407.

Ho, S.M., and Eseryel, U.Y. (2006). Monitoring-based coordinated defense through the lens of the coordination theory. In M. Khosrow-Pour (Ed.) Emerging Trends and Challenges in Information Technology Management Proceedings of 2006 International Conference of Information Resource Management Association, 1, 188-191. Hershey, PA: IDEA Group Publishing. doi:10.4018/978-1-59904-019-6.ch045.

Ho, S.M. and Li, Q. (2006). Modeling an effective coordinated defense through the lens of the coordination theory. In Armistead, Leigh (Ed.) Proceedings of First International Conference on i-Warfare and Security, University of Maryland Eastern Shore, Princess Anne, Maryland, 111-118. ISBN:1-905305-17-6.

Ho, S.M., and Wang, C. (2005). Source of threats to security-based knowledge management. In Proceedings of APSDI2005 Taiwan. Track: Knowledge Management. The 10th Asia Pacific Decision Science Institute, June 28-July 2, 2005.  ISBN:1539-1191.

Park, J.S., and Ho, S.M. (2004). Composite role-based monitoring (CRBM) for countering insider threats, In H. Chen, R. Moore, D.D. Zeng, and J. Leavitt (Eds.) IEEE Intelligence and Security Informatics, LNCS 3073: 201-213. Tucson, AZ: Springer-Verlag Berlin Heidelberg 2004. doi:10.1007/978-3-540-25952-7_15.

Refereed Conference Papers

Ho, S.M., and Warkentin, M. (2012). Lie to me: Gender deception and detection in computer-mediated communications. Dewald Roode Information Systems Security Workshop, IFIP WG 8.11/11.13, Brigham Young University, Provo, Utah, September 21-22, 2012.

Ho, S.M., and Lee, H.J. (2011). Group attribution of human betrayal in a virtual collaborative context. Pre-ICIS’11 Workshop on Information Security and Privacy (WISP’11), Shanghai, China, December 3-4, 2011.

Ho, S.M., and Benbasat, I. (2011). Two-stage recursive attribution mechanism for sensing behavioral anomalies in virtual organizations. MIS Quarterly special issue on “Information Systems for Symbolic Action: Social Media and Beyond” Pre-ICIS Workshop, Shanghai, China, December 3-4, 2011.

Ho, S.M. (2011). Theorizing on virtual identity theft using the Turing Imagination Game, The 6th Mediterranean Conference on Information Systems (MCIS’11), Cyprus, September 3-5, 2011, ISBN: 978-1-4503-0556-3.

Ho, S.M., Song, M., Bieber, M., Koppel, E., Hamidullah, V., and Bokota, P. (2010). IntegraL: An effective link-based federated search infrastructure. Proceedings of iConference, University of Illinois, Urbana-Champaign, February 3-6, 2010.

Ho, S.M., Benbasat, I., and Stanton, J. (2010). Theory of trustworthiness attribution for countering insider threats. Pre-ICIS’10 MIS Quarterly New Author’s Workshop, St. Louis, MO, December 12, 2010.

Ho, S.M., Benbasat, I., and Stanton, J. (2010). Theory of trustworthiness attribution for countering insider threats. Pre-ICIS’10 JAIS Theory Development Workshop, St. Louis, MO, December 11, 2010.

Ho, S.M. (2009). Simulating insider threats with online games. Pre-ICIS Workshop on Information Security and Privacy (WISP), December 14, 2009.

Song, M., Ho, S.M., Bieber, M., et al. (2009). A scalable digital library infrastructure that expands search and beyond. Books Online 2009 Workshop, Corfu, Greece.

Ho, S.M. (2007). Leap in the dark: An attempt to theorize personnel anomaly detection for countering insider threats. In Proceedings of 2nd International Conference on i-Warfare and Security, Naval Postgraduate School, Monterey, CA, March 8-9, 2007.

Ho, S.M. (2007). From past to future: Paradigm shifts in information security. In Electronic Proceedings of 1st Annual AGEP Academic Excellent Symposium, Syracuse University, Syracuse, NY, 15 June 2007.

DelZoppo, R., Browns, E., Downey, M., Liddy, E.D., Symonenko, S., Park, J.S., Ho, S.M., D’Eredita, M. and Natarajan, A. (2005). Situational awareness for countering insider threats: A multi-disciplinary approach. In Proceedings of the 14th FiestaCrow Technical Symposium, San Antonio, Texas, April 18-20, 2005.

DelZoppo, R., Browns, E., Downey, M., Liddy, E.D., Symonenko, S., Park, J.S., Ho, S.M., D’Eredita, M. and Natarajan, A. (2004). A Multi-disciplinary approach for countering insider threats. In Proceedings of Workshop on Secure Knowledge Management (SKM), Amherst, NY, September 23-24, 2004.

Refereed Book Chapters

Ho, S.M., and Hollister, J. (2015). Cyber insider threats in virtual organizations. In M. Khosrow-Pour (Ed.), Encyclopedia of Information Science and Technology3rd Ed., (pp. 1517-1525). Hershey, PA: Information Resource Management Association. doi:10.4018/978-1-4666-5888-2.ch145.

Ho, S.M. (2014). Cyber insider threat: Trustworthiness in virtual organizations. LAP Lambert Academic Publishing. pp. 1-436. ISBN: 978-3-659-51702-0.

Ho, S.M., and Wang, C. (2009) Security-based knowledge management. In M. Khosrow-Pour (Ed.), Encyclopedia of Information Science and Technology, 2nd Ed. (pp. 3401-3405). Hershey, PA: Information Science Reference. doi:10.4018/978-1-60566-026-4.ch540.

Bernard, S., and Ho, S.M. (2009) Enterprise architecture as context and method for designing and implementing information security and data privacy controls in government agencies. In P. Saha (Ed.), Advances in Government Enterprise Architecture, (pp. 340-370). Hershey, PA: Information Science Reference. doi:10.4018/978-1-60566-068-4.ch015.

Ho, S.M., Tschai, H.J., Lin, A., and Park, J.S. (2004). Composite role-based monitoring (CRBM) for countering insider threats. 7th Edition of Communications Electronics & Information Journal, Ministry of National Defense, R.O.C. December 2004.

Refereed Conference Presentations / Posters

Ho, S.M. (2016). Panel presentation with the whitepaper on Radicalized “Lone Wolf:” Invisible Threat in the Society at the Sociotechnical Cybersecurity Workshop, Organized by Computing Community Consortium (CCC), College Park, Maryland, December 12-13, 2016.

Ho, S.M. (2016). Lightning Talk on Language-action cues research in spontaneous computer-mediated communication at the Collective Intelligence Workshop, Hawaii International Conference on System Sciences (HICSS-49), Kauai, January 5-8, 2016.

Ho, S.M. (2015). Insider Threat: Philosophy, Research and Academic Perspectives, at the 2015 Florida Center for Cybersecurity Annual Conference, organized by University of South Florida: Tampa, FL, October 2015.

Ho, S.M. (2011). Lightning Talk: Using online game to simulate insider threats in cyberspace, the Symposium on Usable Privacy and Security (SOUPS’11), Carnegie Mellon CyLab, Pittsburgh, PA, July 20-22, 2011.

Ho, S.M. and Zhang, X. (2011). iSensor inference model for assessing trustworthiness in computer-mediated communications, the Symposium on Usable Privacy and Security (SOUPS’11), Carnegie Mellon CyLab, Pittsburgh, PA, July 20-22, 2011.

Ho, S.M., Song, M., Bieber, M. (2010). IntegraL connects data, users and scientists, the 36th Annual Conference of International Association for Social Science Information Services & Technology (IASSIST 2010), Cornell University, Ithaca, NY., June 1-4, 2010.

Song, M., Ho, S.M., Bieber, M., et al. (2009). Building a sustainable NSDL community infrastructure. NSDL’09 Annual Meeting, Washington D.C., November 17-19, 2009.

Panel Discussions

March 2015: Chen, S., Ho, S.M., and Nocolas-Rocca, T.S. (2015) “Big Data Analytics for Behavioral Modeling” Workshop at Social Computing, Behavioral Modeling and Prediction, Washington, D.C., March 31-April 3, 2015.

March 2014: Liddy, E., Eisenberg, M., Burnett, K., Sawyer, S., Bruce, H., Fenske, D., Budd, J., Madsen, D., Milojevic, S., Ho, S.M. (2014) “Interdisciplinary practice in iSchools” Workshop at iConference, Berlin, Germany, March 4-7, 2014.

Feb 2013: Reynolds, R., Warren, A., Ho, S.M., Howison, J., Erickson, I., Schmidt, I. (2013) “Sociotechnical systems research: Advancing clear definitions, conceptual boundaries, shared understandings, and promising and fruitful research problem domains” Workshop at iConference, Fort Worth, TX, Feb 12-15, 2013.

Feb 2012: Mueller, M., Kuehn, A., Santoso, S., Clement, A., Deibert, R., Ho, S.M. (2012) “Network surveillance: Access control, transparency, power and circumvention in the 21st century” Workshop at iConference, Toronto Canada, Feb 7-10, 2012.

March 2011: Ho, S.M. (Chair) 2011 Drexel Cybersecurity Research Forum Spring Series, Philadelphia, PA.

Feb 2009: Ho, S.M. and Treglia, J.V. (2009). Roundtable Discussion—Feasibility discussion on identifying possibility for a national behavioral anomaly detection platform. 4th Annual i-Conference on iSociety: Research, Education and Engagement, University of North Carolina, Chapel Hill, NC

Feb 2008: Paquette, S., Fagnot, I., Ho, S.M. et al. (2008). Roundtable Discussion—Information assurance, intelligence and security: Opportunities and directions for future research. 3rd Annual i-Conference on iFutures: Systems, Selves, Society, University of California, Los Angeles, CA

May 2006: Haque, S.N., Fagnot, I., and Ho, S.M. (2006). Workshop—Privacy and Security. Connections 2006, Syracuse University, Syracuse, NY.

Junior Faculty Consortium

Ho, S.M. (2012). The International Conference on Information Systems (ICIS’12) Junior Faculty Consortium, Orlando, FL, December 16, 2012.

Ho, S.M. (2012). The Academy of Management (AOM) Annual Meeting Junior Faculty Consortium, Boston, MA, August 3, 2012.

Doctoral Consortium

Ho, S.M. (2009). Trustworthiness in virtual organizations. The 15thAnnual AMCIS 2009 Doctoral Consortium, San Francisco, CA, August 6, 2009. AIS Electronic Library (AISel) doi: http://aisel.aisnet.org/amcis2009_dc/5.

Ho, S.M. (2009). The 3rd Annual iConference Doctoral Colloquium, University of Los Angeles, CA, February 2009.

Ho, S.M. (2006). The ISOneWorld Doctoral Symposium, Las Vegas, Nevada, April 2006.