About

Shuyuan H. Metcalfe, Ph.D.   
Associate Professor | Florida State University

Trusted CI Fellow, The NSF Cybersecurity Center of Excellence
AIS Distinguished Member, CISSP, CSX, CRISC, CISM,
MPhil, MBA, BSc

Shuyuan’s research focuses on trusted human-computer interactions, specifically addressing issues of cyber insider threats and automated detection of computer-mediated deception. Shuyuan’s theory of trustworthiness attribution integrates social psychologies on trust and attribution, for insider threat detection as supported by cyber infrastructure. Shuyuan further develops the framework for a dyadic attribution model to assess human trustworthiness in sophisticated online communication environments. Shuyuan designs online games as an experiment protocol for investigating human deception and betrayal in virtual organizations. Shuyuan’s socio-technical research approach utilizes social-psychological theories along with pragmatic viewpoints on language-action cues to create an innovative methodology for computational modeling of next generation behavioral inference systems based on language-action cues in complex trust relationships, human disposition and intent detection.

Shuyuan founded the iSensor Analytics Lab in 2010. iSensor Analytics Lab is primarily dedicated to sociotechnical research related to human factors (e.g., behavioral threat) in cyberspace. Experiments are conducted in a live, and virtual laboratory. Research data is collected through confined resources and interactions that are based on real-world cyber trust and deception simulations. Shuyuan currently holds a US patent US-17/162,468 on systems and methods for detecting deception in computer-mediated communication, and also has a copyrighted invention (TechID 21-003); CV19 Self Defense mHealth intervention that helps mobile phone users with situational awareness during a pandemic

Keywords for Shuyuan’s research: Trusted human-computer interactions; cyber insider threats; computer-mediated deception; sociotechnical systems; online games for research; language-action cues; information use and seeking behavior; deceptive information behavior; trustworthiness attribution; dyadic attribution model; computational modeling for complex trust and online deception.

***

Shuyuan teaches Information Security, Risk Assessment and Management, Incident Response, Disaster Recovery, Computer Auditing, Intrusion Detection, Digital and Cyber Forensics, Access Control Models for Intrusion Prevention, and Information Systems Management.

***

Shuyuan’s professional industry experience in information systems security (ISS) encompasses ten years of securing E-commerce systems with public key infrastructure, virtual private networks, systems engineering of role-based access control, policy-based integrated firewall, intrusion detection systems and network security. Shuyuan designed an enterprise information security architecture (EISA) called SIMPL/E (secure information management platform and environment) for a government client. She worked with a team to build a Security Operations Center (SOC) for the military. She completed a large-scale virtual private network technology transfer project for a military research center. Click here for Shuyuan’s curriculum vitae.