Publications

Refereed Journal Publications

Ho, S.M., Nickerson, J., & Zhang Q. (2023) Hive mind online: Collective sensing in times of disinformation. Journal of Digital Social Research, 4(4): 89-129. doi:10.33621/jdsr.v4i4.119.

Ho, S.M., Liu, X., Seraj, M.S., and Dickey, S. (2023) Social distance “nudge:” a context aware mHealth intervention in response to COVID pandemics. Computational and Mathematical Organization Theory, 29(2023), 391-414, September 2022. doi:10.1007/s10588-022-09365-0.

Ho, S.M., & Li, W. (2022). “I know you are but what am I?” Profiling cyberbullying based on charged language. Computational and Mathematical Organization Theory, 28(2022), 293-320, February 2022. doi:10.1007/s10588-022-09360-5.

Ho, S.M., & Gross, M. (2021). Consciousness of cyber defense: A collective activity system for developing organizational cyber awareness. Computers & Security, 108, 102357, 1-18, September 2021. doi:10.1016/j.cose.2021.102357.

Gross, M., & Ho, S.M. (2021) Collective learning for increasing cyber defense consciousness: An activity system analysis, Journal of Information Systems Education, 32(1): 65-76.

Ho, S.M., & Burmester, M. (2021). Cyber forensics on Internet of Things: Slicing and dicing Raspberry Pi. Journal of Cyber Forensics and Advanced Threat Investigations, 2(1), 29-49. doi:10.46386/ijcfati.v2i1.22.

Ho, S.M., Kao, D.Y., Chiu-Huang, M.J., Li, W.Y., and Lai, C.J. (2020). Detecting cyberbullying “hotspots” on Twitter: A predictive analytics approach, Forensic Science International: Digital Investigation, 32, 300906, S1-S3, April 2020. In Proceedings of the 2020 European Digital Forensics Research Workshop (DFRWS EU-2020), Oxford, United Kingdom, pp. S1-S3, June 3-5, 2020. doi:10.1016/j.fsidi.2020.300906. Click here for the paper presentation at FSU iSchool Spring Colloquium.

Ho, S.M., & Hancock, J.T. (2019). Context in a bottle: Language-action cues in spontaneous computer-mediated deception. Computers in Human Behavior, 91, 33-41, February 2019. doi:10.1016/j.chb.2018.09.008.

Ho, S.M., Kao, D.Y., and Wu, W.Y. (2018). Following the breadcrumbs: Timestamp pattern identification for cloud forensics. Digital Investigation, 24, 79-94, March 2018. doi:10.1016/j.diin.2017.12.001.

Ho, S.M., Kaarst-Brown, M., and Benbasat, I. (2018) Trustworthiness attribution: Inquiry into insider threat detection. Journal of the Association for Information Science and Technology, 69(2), 271-280, February 2018. doi:10.1002/asi.23938.

Ho, S.M., Hancock, J.T., Booth, C. (2017) Ethical dilemma: Deception dynamics in computer-mediated group communication. Journal of the Association for Information Science and Technology, 68(12), 2729-2742, December 2017. doi:10.1002/asi.23849.

Ho, S.M., Ocasio Velázquez, M., and Booth, C. (2017) Trust or consequences? Causal effects of perceived risks and subjective norms on cloud technology adoption. Computers & Security, 70, 581-595, September 2017. doi:10.1016/j.cose.2017.08.004.

Ho, S.M. and Warkentin, M. (2017) Leader’s dilemma game: An experimental design for cyber insider threat research. Information Systems Frontiers, 19(2): 377-396. doi:10.1007/s10796-015-9599-5.

Ho, S.M., Lowry, P.B., Warkentin, M., Yang, Y.Y., Hollister, J. (2017) Gender deception in asynchronous online communication: A path analysis. Information Processing & Management,53(1), 21-41, January 2017. doi:10.1016/j.ipm.2016.06.004.

Ho, S.M., Hancock, J.T., Booth, C., and Liu, X. (2016) Computer-mediated deception: Strategies revealed by language-action cues in spontaneous communication. Journal of Management Information Systems, 33(2), 393-420, October 2016. doi:10.1080/07421222.2016.1205924.

Ho, S.M. and Benbasat, I. (2014) Dyadic attribution model: A mechanism to assess trustworthiness in virtual organizations. Journal of the Association for Information Science and Technology, 65(8), 1555-1576, August 2014. doi:10.1002/asi.23074.

Ho, S.M., Bieber, M., Song, M., and Zhang, X. (2013) Seeking beyond with IntegraL: A user study of sense-making enabled by anchor-based virtual Integration of library systems. Journal of the Association for Information Science and Technology, 64(9), 1927-1945, September 2013. doi:10.1002/asi.22904.

Ho, S.M. and Katukoori, R.R., (2013) Agent-based modeling to visualize trustworthiness: A socio-technical framework. Special Issue of Detecting and Mitigating Information Security Threats for Mobile Networks, Int’l Journal of Mobile Network Design and Innovation, 5(1), 17-27, October 2013. doi:10.1504/IJMNDI.2013.057145.

Ho, S.M. and Lee, H.J. (2012) A thief among us: The use of finite-state machines to dissect insider threat in cloud communications. Special Issue of Frontiers in Insider Threats and Data Leakage Prevention, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 3(1/2), 82-98.

Refereed Conference Proceedings

Sayyafzadeh, S., Ho, S.M., Chi, H., and Mkpong-Ruffin, I. (2023) Enhancing object detection in YouTube thumbnails forensics with YOLOv4, in Proceedings of 2023 IEEE International Conference on Big Data (BigData), (pp. 5588-5597), Sorrento, Italy, 15-18 December 2023: IEEE. doi:10.1109/BigData59044.2023.10386427  Retrieved from https://ieeexplore.ieee.org/document/10386427

Emdad, F. B., Ho, S.M., Ravuri, B., & Hussain, S. (2023). Towards a unified Utilitarian ethics framework for healthcare artificial intelligence. In Alanah Mitchell, Traci Carte, & Alexandre Graeml (Eds.), in Proceedings of the 2023 Americas Conference on Information Systems (AMCIS) (pp. 1-10), August 10-12, 2023. Panama City, Panama: AIS. Retrieved from: https://aisel.aisnet.org/amcis2023/sig_health/sig_health/17/

Hussain, G., & Ho, S.M. (2023). Youth exodus! A framework of social media migration by young adults. In Alanah Mitchell, Traci Carte, & Alexandre Graeml (Eds.), in Proceedings of the 2023 Americas Conference on Information Systems (AMCIS) (pp. 1-5), August 10-12, 2023. Panama City, Panama: AIS. Retrieved from: https://aisel.aisnet.org/amcis2023/sig_adit/sig_adit/23/

Ho, S.M., & Liu, Y. (2023). Genie breaks the bottle: Ethics in artificial intelligence adoption. In Nancy Deng, Deborah Armstrong, & Guillermo Rodriguez-Abitia (Eds.), in Proceedings of the 2023 ACM SIGMIS Computers and People Research (pp. 1-4), June 1-3, 2023. Pomona, California: ACM. doi:10.1145/3579168.3632724.

Jo, M., Ho, S.M., and Burnett, G. (2023) Do you speak meme? A dynamic digital language for the information society, in Proceedings of the 2023 18th iConference (LNCS 13971), Information for a Better World: Normality, Virtuality, Physicality, Inclusivity, Barcelona, Spain, pp. 523-534, March 13-17, 2023. doi:10.1007/978-3-031-28035-1_39.

Ho, S.M., Kao, D.Y., Li, W.Y., Lai, C.J., and Chiu-Huang, M.J. (2020). “On the left side, there’s nothing right. On the right side, there’s nothing left:” Polarization of the political opinions by news media, in Proceedings of the 2020 15th iConference (LNCS 12051), Sustainable Digital Communities, Boras, Sweden, pp. 209-219, March 23-26, 2020. doi:10.1007/978-3-030-43687-2_16. Please click here for the conference presentation.

Purian, R., Ho, S.M., and Te’Eni, D. (2020). Resilience of society to recognize disinformation: Human and/or machine intelligence, in Proceedings of the 2020 25th UK Academy for Information Systems, London, UK, pp. 1-10, March 31-April 1, 2020. Retrieved from: https://aisel.aisnet.org/ukais2020/11/

Ho, S.M., Kao, D.Y., Chiu-Huang, M.J., Li, W.Y., Lai, C.J., and Ankamah, B. (2019). Charged language on Twitter: A predictive model of cyberbullying to prevent victimization, in Proceedings of the 2019 AIS SIGSEC Special Interest Group 10th Annual Workshop on Information Security and Privacy (WISP), 21, in conjunction with International Conference on Information Systems (ICIS), Munich, Germany, pp. 1-13, December 15, 2019. A short news article about this paper presentation.

Ho, S.M., Oliveira, D., and Rathi, R. (2019) Consciousness of cyber defense: Boundary Objects for Expansive Learning through creation of contradictions. In F. Nah and K. Siau (Eds.), HCI in Business, Government and Organizations – Information Systems and Analytics, LNCS 11589, pp. 338–353. doi:10.1007/978-3-030-22338-0_28.

Booth, C., and Ho, S.M. (2019) The privacy paradox in HCI: Calculus behavior in disclosing PII online. In F. Nah and K. Siau (Eds.), HCI in Business, Government and Organizations – Information Systems and Analytics, LNCS 11589, pp. 163–177. doi:10.1007/978-3-030-22338-0_13.

Ho, S.M., Oliveira, D., and Rathi, R. (2019) The shield and the sword: Expanding learning in cyber defense through competition. In Proceedings of the iConference 2019, Illinois Digital Environment for Access to Learning and Scholarship (IDEALS), 1-4. Washington, DC., March 31-April 3, 2019. doi:10.21900/iconf.2019.103318.

Ho, S.M. (2019) Leader member exchange: An interactive framework to uncover a deceptive insider as revealed by human sensors. In Proceedings of the 2019 52nd Hawaii International Conference on System Sciences (HICSS-52), 3212-3221. Maui, Hawaii. doi:hdl.handle.net/10125/59757. Presentation of this paper can be found on iSensorLab’s YouTube channel here.

Ho, S.M. and Hancock, J.T. (2018) Computer-mediated deception: Collective language-action cues as stigmergic signals for computational intelligence. In Proceedings of the 2018 51st Hawaii International Conference on System Sciences (HICSS-51), 1671-1680. Big Island, Hawaii. handle: 10125/50098.

Ho, S.M., von Eberstein, A., and Chatmon, C. (2017) Expansive learning in cyber defense: Transformation of organizational information security culture. The 12th Annual Symposium on Information Assurance (ASIA’17), 23-28. Albany, NY, June 6-8, 2017.

Booth, C. and Ho, S.M. (2017). Does the Cloud have a silver lining? Privacy concerns and perceived risk in cloud technology adoption. In Proceedings of the iConference 2017, Illinois Digital Environment for Access to Learning and Scholarship (IDEALS), 1-4. Wuhan, China, March 22-25, 2017. handle: 2142/96712.

Ho, S.M., Liu, X., Booth, C., and Hariharan, A. (2016) Saint or sinner? Language-action cues for modeling deception using support vector machines. In K.S. Xu, D. Reitter, D. Lee, and N. Osgood (Eds.) Social, Cultural and Behavioral Modeling (SBP-BRiMS), LNCS 9708, 325-334, Springer International Publishing Switzerland. doi:10.1007/978-3-319-39931-7_31.

Ho, S.M., Hancock, J.T., Booth, C., Burmester, M., Liu, X., and Timmarajus, S.S. (2016) Demystifying insider threat: Language-action cues in group dynamics, in Proceedings of the 2016 49th Hawaii International Conference on System Sciences (HICSS-49), 2729-2738. Kauai, Hawaii. doi:10.1109/HICSS.2016.343.

Ho, S.M., Hancock, J.T., Booth, C., Liu, X., Liu, M., Timmarajus, S.S., and Burmester, M. (2016) Real or Spiel? A decision tree approach for automated detection of deceptive language-action cues, in Proceedings of the 2016 49th Hawaii International Conference on System Sciences (HICSS-49), 3706-3715. Kauai, Hawaii. doi:10.1109/HICSS.2016.462.

Booth, C. and Ho, S.M. (2016). Get a clue! Some truths about online deception. In Proceedings of the iConference 2016, 1-4. Philadelphia, PA, March 20-23, 2016. handle: 2142/89336.

Ho, S.M., Hancock, J.T., Booth, C., Liu, X., Timmarajus, S.S., Burmester, M. (2015) Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication, IEEE Intelligence and Security Informatics, 157-159. IEEE: Baltimore, MD. doi:10.1109/ISI.2015.7165960.

Ho, S.M., Fu, H., Timmarajus, S.S., Booth, C., Baeg, J.H., Liu, M. (2015) Insider threat: Language-action cues in group dynamics, ACM SIGMIS Computers and People Research, 101-104. ACM: New Beach, California. doi:10.1145/2751957.2751978.

Ocasio Velázquez, M., and Ho, S.M. (2015) Do you trust the cloud? Modeling cloud technology adoption in organizations. In Proceedings of the 2015 Americas Conference on Information Systems (AMCIS’15). Association for Information Systems: Puerto Rico, August 13-15. https://aisel.aisnet.org/amcis2015/AdoptionofIT/GeneralPresentations/18/.

Galvez, S.M., Shackman, J.D., Guzman, I.R., and Ho, S.M. (2015) Factors affecting individual information security practices, ACM SIGMIS Computers and People Research, 135-144. ACM: New Beach, California. doi:10.1145/2751957.2751966.

Ho, S.M., Timmarajus, S.S., Burmester, M., and Liu, X. (2014). Dyadic attribution: A theoretical model for computationally interpreting words and action. In W.G. Kennedy, N. Agarwal, and S.J. Yang (Eds.) Social Computing, Behavioral Modeling, and Prediction, LNCS 8393, 277-284, Springer International Publishing Switzerland. doi:10.1007/978-3-319-05579-4_34.

Ho, S.M., and Hollister, J. (2013). Guess Who? An empirical study of gender deception and detection in computer-mediated communication. In Proceedings of the 76th Annual Meeting of the Association for Information Science & Technology (ASIS&T 2013), 50(1), 1-4. doi:10.1002/meet.14505001116.

Ho, S.M., Ahmed, I., and Salome, R. (2012). Whodunit? Collective trust in virtual interactions. In S.J. Yang, A.M. Greenberg, and M. Endsley (Eds.) Social Computing, Behavioral Modeling, and Prediction, LNCS 7227, 348-356, Springer-Verlag Berlin Heidelberg 2012. doi:10.1007/978-3-642-29047-3_42.

Ho, S.M. and Zhang, X. (2011). iSensor inference model for assessing trustworthiness in computer-mediated communications, In ACM Proceedings of CSCW 2011, 645-648, Hangzhou, China, March 19-23, 2011, doi:10.1145/1958824.1958935.

Ho, S.M. (2009). A socio-technical approach to theorizing on perceptions of trustworthiness in virtual organizations. In Proceedings of the i-Conference 2009, Illinois Digital Environment for Access to Learning and Scholarship (IDEALS), Chapel Hill, NC. handle: 2142/15225.

Ho, S.M. and Metcalfe, C.F. (2009). Life-cycle thinking: What can IT do to be green? In Proceedings of the i-Conference 2009, Illinois Digital Environment for Access to Learning and Scholarship (IDEALS), Chapel Hill, NC. handle: 2142/15239.

Ho, S.M. (2009). Trustworthiness in virtual organizations. In Proceedings of 15th Americas Conference on Information Systems, San Francisco, California, August 6-9, 2009. https://aisel.aisnet.org/amcis2009_dc/5/.

Ho, S.M. (2009). A socio-technical approach to understanding perceptions of trustworthiness in virtual organizations. In H. Liu, J.J. Salerno, and M.J. Young (Eds.) Social Computing, Behavioral Modeling, and Prediction, 113-122. Tempe, FL: Springer. doi:10.1007/978-1-4419-0056-2_15.

Ho, S.M. (2008). A framework of coordinated defense. In Subrahmanian, V.S. and Kruglanski, A. (Eds.) In Proceedings of the 2nd International Conference on Computational Cultural Dynamics, 39-44. Menlo Park, CA: AAAI Press. doi:aaai/icccd08-006.

Ho, S.M. (2008). Attribution-based anomaly-detection: Trustworthiness in an online community. In H. Liu, J.J. Salerno, and M.J. Young (Eds.) Social Computing, Behavioral Modeling, and Prediction, 129-140. Tempe, FL: Springer. doi:10.1007/978-0-387-77672-9_15.

Ho, S.M. (2008). Toward a deeper understanding of personnel anomaly detection. In L.J. Janczewski and A.M. Colarik (Eds.) Encyclopedia of Cyber Warfare and Cyber Terrorism, 1st Edition, 206-215. Hershey, NY: IGI Global. doi:10.4018/978-1-59140-991-5.ch026.

Ho, S.M. (2007). Leap in the dark: An attempt to theorize personnel anomaly detection for countering insider threats. In Proceedings of 2nd International Conference on i-Warfare and Security, Naval Postgraduate School, 95-100, Monterey, CA, March 8-9, 2007. ISBN:  978-1-905305-41-4.

Ho, S.M., and Eseryel, U.Y. (2006). Monitoring-based coordinated defense through the lens of the coordination theory. In M. Khosrow-Pour (Ed.) Emerging Trends and Challenges in Information Technology Management Proceedings of 2006 International Conference of Information Resource Management Association, 1, 188-191. Hershey, PA: IDEA Group Publishing. doi:10.4018/978-1-59904-019-6.ch045.

Ho, S.M. and Li, Q. (2006). Modeling an effective coordinated defense through the lens of the coordination theory. In Armistead, Leigh (Ed.) Proceedings of First International Conference on i-Warfare and Security, University of Maryland Eastern Shore, Princess Anne, Maryland, 111-118. ISBN:1-905305-17-6.

Ho, S.M., and Wang, C. (2005). Source of threats to security-based knowledge management. In Proceedings of APSDI2005 Taiwan. Track: Knowledge Management. The 10th Asia Pacific Decision Science Institute, June 28-July 2, 2005.  ISSN:1539-1191.

Park, J.S., and Ho, S.M. (2004). Composite role-based monitoring (CRBM) for countering insider threats, In H. Chen, R. Moore, D.D. Zeng, and J. Leavitt (Eds.) IEEE Intelligence and Security Informatics, LNCS 3073: 201-213. Tucson, AZ: Springer-Verlag Berlin Heidelberg 2004. doi:10.1007/978-3-540-25952-7_15.

Refereed Book Chapters

Ho, S.M. (2020). Trustworthiness: Top qualification for cyber information professionals. Cybersecurity for Information Professionals: Concepts and Applications (pp.21-38). Chapter 2. CRC Press, Taylor and Francis Group, LLC. Retrieved from doi:10.1201/9781003042235-2.

Ho, S. M., Oliveira, D., & Rathi, R. (2019). Consciousness of cyber defense: Boundary Objects for Expansive learning through creation of contradictions. In F. Nah, & K. Siau (Eds.), HCI in Business, Government and Organizations: Information Systems and Analytics (LNCS 11589) (pp. 1-16). Springer Nature Switzerland. doi:10.1007/978-3-030-22338-0_28.

Booth, C., & Ho, S. M. (2019). The privacy paradox in HCI: Calculus behavior in disclosing PII online? In F. Nah, & K. Siau (Eds.), HCI in Business, Government and Organizations: Information Systems and Analytics (LNCS 11589), Proceedings of the HCII 2019 (pp. 1-15). Springer Nature Switzerland. Retrieved from doi:10.1007/978-3-030-22338-0_13.

Ho, S.M., and Hollister, J. (2015). Cyber insider threats in virtual organizations. In M. Khosrow-Pour (Ed.), Encyclopedia of Information Science and Technology3rd Ed., (pp. 1517-1525). Hershey, PA: Information Resource Management Association. Retrieved from doi:10.4018/978-1-4666-5888-2.ch145.

Ho, S.M. (2014). Cyber insider threat: Trustworthiness in virtual organizations. LAP Lambert Academic Publishing. pp. 1-436. ISBN: 978-3659517020.

Ho, S.M., and Wang, C. (2009) Security-based knowledge management. In M. Khosrow-Pour (Ed.), Encyclopedia of Information Science and Technology, 2nd Ed. (pp. 3401-3405). Hershey, PA: Information Science Reference. Retrieved from doi:10.4018/978-1-60566-026-4.ch540.

Bernard, S., and Ho, S.M. (2009) Enterprise architecture as context and method for designing and implementing information security and data privacy controls in government agencies. In P. Saha (Ed.), Advances in Government Enterprise Architecture, (pp. 340-370). Hershey, PA: Information Science Reference. Retrieved from doi:10.4018/978-1-60566-068-4.ch015.

Ho, S.M., Tschai, H.J., Lin, A., and Park, J.S. (2004). Composite role-based monitoring (CRBM) for countering insider threats. 7th Edition of Communications Electronics & Information Journal, Ministry of National Defense, R.O.C. December 2004.

Refereed Conference Papers

Ho, S.M., Seraj, M.S., Yee, K., Liu, X., and Erlebacher, G. (2020) A context-aware social distancing nudge for public health in response to COVID-19 pandemic, Presented at the International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS’20), Oct 18-21, 2020. Paper 81, pp. 1-10.

Ezeakunne, U., Ho, S.M., and Liu, X. (2020) Sentiment and retweet analysis of user response for fake news detection, Presented at the International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS’20), Oct 18-21, 2020. Paper 37, pp. 1-10.

Ho, S., Seraj, M. S., Yee, K., Lustria, M. L., Liu, X., & Erlebacher, G. (2020). CV19 SelfDefense: Situational awareness in a pandemic through mHealth intervention. Presented at 2020 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS’20), a virtual demo on 10/20/2022.

Chi, H., Ho, S.M., and Hubbard, D. (2015) An online game simulation environment for detecting potential deceptive insiders, in Proceedings of the 2015 IEEE Winter Simulation Conference, Huntington Beach, CA. December 6-9, 2015. doi:10.1109/WSC.2015.7408480.

Ho, S.M., and Warkentin, M. (2012). Lie to me: Gender deception and detection in computer-mediated communications. Dewald Roode Information Systems Security Workshop, IFIP WG 8.11/11.13, Brigham Young University, Provo, Utah, September 21-22, 2012.

Ho, S.M., and Lee, H.J. (2011). Group attribution of human betrayal in a virtual collaborative context. Pre-ICIS’11 Workshop on Information Security and Privacy (WISP’11), Shanghai, China, December 3-4, 2011.

Ho, S.M., and Benbasat, I. (2011). Two-stage recursive attribution mechanism for sensing behavioral anomalies in virtual organizations. MIS Quarterly special issue on “Information Systems for Symbolic Action: Social Media and Beyond” Pre-ICIS Workshop, Shanghai, China, December 3-4, 2011.

Ho, S.M. (2011). Theorizing on virtual identity theft using the Turing Imagination Game, in Proceedings of the 6th Mediterranean Conference on Information Systems (MCIS’11), Cyprus, September 3-5, 2011, ISBN: 978-1-4503-0556-3. Retrieved from: https://aisel.aisnet.org/mcis2011/109/

Ho, S.M., Song, M., Bieber, M., Koppel, E., Hamidullah, V., and Bokota, P. (2010). IntegraL: An effective link-based federated search infrastructure. Proceedings of iConference, University of Illinois, Urbana-Champaign, February 3-6, 2010. handle: 2142/14917.

Ho, S.M. (2009). Simulating insider threats with online games. Pre-ICIS Workshop on Information Security and Privacy (WISP), December 14, 2009.

Song, M., Ho, S.M., Bieber, M., et al. (2009). A scalable digital library infrastructure that expands search and beyond. Books Online 2009 Workshop, Corfu, Greece.

Ho, S.M. (2007). From past to future: Paradigm shifts in information security. In Electronic Proceedings of 1st Annual AGEP Academic Excellent Symposium, Syracuse University, Syracuse, NY, 15 June 2007.

DelZoppo, R., Browns, E., Downey, M., Liddy, E.D., Symonenko, S., Park, J.S., Ho, S.M., D’Eredita, M. and Natarajan, A. (2005). Situational awareness for countering insider threats: A multi-disciplinary approach. In Proceedings of the 14th FiestaCrow Technical Symposium, San Antonio, Texas, April 18-20, 2005.

DelZoppo, R., Browns, E., Downey, M., Liddy, E.D., Symonenko, S., Park, J.S., Ho, S.M., D’Eredita, M. and Natarajan, A. (2004). A Multi-disciplinary approach for countering insider threats. In Proceedings of 2004 Workshop on Secure Knowledge Management (SKM), Amherst, NY, September 23-24, 2004.

Invited Talks at Conferences

Ho, S.M. (August 12, 2023). AI technology for identifying deepfake and computer-mediated deception, The Future of System Goals and Human Rights: Data Governance & AI Ethics [PDS]. AMCIS 2023. Panama City, Panama. doi:10.17605/OSF.IO/XEUMD.

Ho, S.M. (2019) Virtual vetting: Spotting computer-mediated deception, The CASE Challenge Workshop, Intelligence Advanced Research Projects Activity (IARPA), Washington DC, July 18, 2019.

Ho, S.M. (2019) Cyber threats in Smart City: A light-weight user-side detection of evil twin attack based on TCP packets analysis, 2nd Annual Digital Forensics and Cybercrime Investigation Workshop, Central Police University, Taiwan, May 7, 2019.

Ho, S.M. (2019) Cyber threats and digital forensics of Internet of Things (IoT), New Taipei City Police Branch, May 6, 2019.

Ho, S.M. (2018). Two sides of a coin: A dualistic view of sociotechnical systems, Consortium for Science of Sociotechnical Systems (CSST): Decennial Sociotech Futures Symposium, Ann Arbor, MI, June 29-July 1, 2018.

Ho, S.M. (2018) Cyber behavioral forensics in deceptive human computer interaction, Annual IT Management and Risk Assessment Workshop, National Taxation Bureau North District, Ministry of Finance, Taiwan, May 23, 2018.

Ho, S.M. (2018) Cybersecurity KSAs as protocols in the United States, 1st Annual Digital Forensics and Cybercrime Investigation Workshop, Central Police University, Taiwan, May 14, 2018.

Ho, S.M. (2016). Panel presentation with the whitepaper on Radicalized “Lone Wolf:” Invisible Threat in the Society at the Sociotechnical Cybersecurity Workshop, Organized by Computing Community Consortium (CCC), College Park, Maryland, December 12-13, 2016.

Ho, S.M. (2016). Lightning Talk on Language-action cues research in spontaneous computer-mediated communication at the Collective Intelligence Workshop, Hawaii International Conference on System Sciences (HICSS-49), Kauai, January 5-8, 2016.

Ho, S.M. (2015). Insider Threat: Philosophy, Research and Academic Perspectives, at the 2015 Florida Center for Cybersecurity Annual Conference, organized by University of South Florida: Tampa, FL, October 2015.

Ho, S.M. (2011). Lightning Talk: Using online game to simulate insider threats in cyberspace, the Symposium on Usable Privacy and Security (SOUPS’11), Carnegie Mellon CyLab, Pittsburgh, PA, July 20-22, 2011.

Ho, S.M. and Zhang, X. (2011). iSensor inference model for assessing trustworthiness in computer-mediated communications, the Symposium on Usable Privacy and Security (SOUPS’11), Carnegie Mellon CyLab, Pittsburgh, PA, July 20-22, 2011.

Ho, S.M., Song, M., Bieber, M. (2010). IntegraL connects data, users and scientists, the 36th Annual Conference of International Association for Social Science Information Services & Technology (IASSIST 2010), Cornell University, Ithaca, NY., June 1-4, 2010.

Song, M., Ho, S.M., Bieber, M., et al. (2009). Building a sustainable NSDL community infrastructure. NSDL’09 Annual Meeting, Washington D.C., November 17-19, 2009.

Panel Discussions

March 2015: Chen, S., Ho, S.M., and Nocolas-Rocca, T.S. (2015) “Big Data Analytics for Behavioral Modeling” Workshop at Social Computing, Behavioral Modeling and Prediction, Washington, D.C., March 31-April 3, 2015.

March 2014: Liddy, E., Eisenberg, M., Burnett, K., Sawyer, S., Bruce, H., Fenske, D., Budd, J., Madsen, D., Milojevic, S., Ho, S.M. (2014) “Interdisciplinary practice in iSchools” Workshop at iConference, Berlin, Germany, March 4-7, 2014.

Feb 2013: Reynolds, R., Warren, A., Ho, S.M., Howison, J., Erickson, I., Schmidt, I. (2013) “Sociotechnical systems research: Advancing clear definitions, conceptual boundaries, shared understandings, and promising and fruitful research problem domains” Workshop at iConference, Fort Worth, TX, Feb 12-15, 2013.

Feb 2012: Mueller, M., Kuehn, A., Santoso, S., Clement, A., Deibert, R., Ho, S.M. (2012) “Network surveillance: Access control, transparency, power and circumvention in the 21st century” Workshop at iConference, Toronto Canada, Feb 7-10, 2012.

March 2011: Ho, S.M. (Chair) 2011 Drexel Cybersecurity Research Forum Spring Series, Philadelphia, PA.

Feb 2009: Ho, S.M. and Treglia, J.V. (2009). Roundtable Discussion—Feasibility discussion on identifying possibility for a national behavioral anomaly detection platform. 4th Annual i-Conference on iSociety: Research, Education and Engagement, University of North Carolina, Chapel Hill, NC

Feb 2008: Paquette, S., Fagnot, I., Ho, S.M. et al. (2008). Roundtable Discussion—Information assurance, intelligence and security: Opportunities and directions for future research. 3rd Annual i-Conference on iFutures: Systems, Selves, Society, University of California, Los Angeles, CA

May 2006: Haque, S.N., Fagnot, I., and Ho, S.M. (2006). Workshop—Privacy and Security. Connections 2006, Syracuse University, Syracuse, NY.

Mid-Career Consortium

Ho, S.M. (2018).The International Conference on Information Systems (ICIS’18) Mid-Career Consortium, San Francisco, CA, December 13-16, 2018.

Ho, S.M. (2018). The 24th Annual AMCIS 2018 Mid-Career Consortium, New Orleans, LA, August 16, 2018.

Junior Faculty Consortium

Ho, S.M. (2012). The International Conference on Information Systems (ICIS’12) Junior Faculty Consortium, Orlando, FL, December 16, 2012.

Ho, S.M. (2012). The Academy of Management (AOM) Annual Meeting Junior Faculty Consortium, Boston, MA, August 3, 2012.

Doctoral Consortium

Ho, S.M. (2009). Trustworthiness in virtual organizations. The 15th Annual AMCIS 2009 Doctoral Consortium, San Francisco, CA, August 6, 2009. AIS Electronic Library (AISel) doi: http://aisel.aisnet.org/amcis2009_dc/5.

Ho, S.M. (2009). The 3rd Annual iConference Doctoral Colloquium, University of Los Angeles, CA, February 2009.

Ho, S.M. (2006). The ISOneWorld Doctoral Symposium, Las Vegas, Nevada, April 2006.