{"id":689,"date":"2012-01-20T15:35:41","date_gmt":"2012-01-20T20:35:41","guid":{"rendered":"http:\/\/goodwin.drexel.edu\/isensor\/drho\/?page_id=689"},"modified":"2025-12-27T17:00:43","modified_gmt":"2025-12-27T17:00:43","slug":"home","status":"publish","type":"page","link":"https:\/\/shuyuanmaryho.com\/","title":{"rendered":"About"},"content":{"rendered":"<div class=\"fcbkbttn_buttons_block\" id=\"fcbkbttn_left\"><div class=\"fcbkbttn_button\">\n                            <a href=\"https:\/\/www.facebook.com\/\" target=\"_blank\">\n                                <img decoding=\"async\" src=\"https:\/\/shuyuanmaryho.com\/wp-content\/plugins\/facebook-button-plugin\/images\/standard-facebook-ico.png\" alt=\"Fb-Button\" \/>\n                            <\/a>\n                        <\/div><div class=\"fcbkbttn_like \"><fb:like href=\"https:\/\/shuyuanmaryho.com\/\" action=\"like\" colorscheme=\"light\" layout=\"standard\"  width=\"450px\" size=\"small\"><\/fb:like><\/div><\/div><p><span style=\"font-family: bell mt; font-size: large;\"><strong><span style=\"color: #ff6600;\">Shuyuan H. Metcalfe, Ph.D.\u00a0 <a href=\"https:\/\/orcid.org\/0000-0002-4790-1821\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-2401\" src=\"http:\/\/shuyuanmaryho.com\/wp-content\/uploads\/2021\/09\/orcid-02.png\" alt=\"\" width=\"31\" height=\"31\" \/><\/a> <a href=\"https:\/\/badgr.com\/public\/assertions\/zjBQwRa9RMe0OUlWO0vaRg?identity__email=smho@fsu.edu\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-2361\" src=\"http:\/\/shuyuanmaryho.com\/wp-content\/uploads\/2021\/03\/TrustedCIFellow.png\" alt=\"\" width=\"33\" height=\"33\" \/><\/a> \u00a0<a href=\"https:\/\/scholar.google.com\/citations?user=jDBhiiEAAAAJ&amp;hl=en\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2434\" src=\"http:\/\/shuyuanmaryho.com\/wp-content\/uploads\/2021\/09\/google.schlar-01.png\" alt=\"\" width=\"104\" height=\"18\" \/><\/a><\/span><\/strong><br \/><span style=\"color: #888888; font-size: small;\">Associate Professor | Florida State University<\/span><\/span><\/p>\n<p><span style=\"color: #888888;\"><a href=\"https:\/\/api.badgr.io\/public\/assertions\/zjBQwRa9RMe0OUlWO0vaRg?identity__email=smho%40fsu.edu\">Trusted CI Fellow<\/a>, The NSF Cybersecurity Center of Excellence<\/span><span style=\"color: #888888;\"><br \/><a href=\"https:\/\/credential.certifyme.online\/\/verify\/e8cc42a42167\">AIS Distinguished Member<\/a>, <a href=\"https:\/\/www.isc2.org\/MemberVerification?LastName=ho&amp;MemberNumber=39416\">CISSP<\/a>, <a href=\"https:\/\/www.youracclaim.com\/badges\/7e436704-5ea1-4a21-bc14-e0ca477331ff\/public_url\">CSX<\/a>, <a href=\"https:\/\/www.youracclaim.com\/badges\/def2daa3-8e26-4006-b5c0-2ddd2e6a7de6\/public_url\">CRISC<\/a>, <a href=\"https:\/\/www.youracclaim.com\/badges\/0879dfc9-6e2d-46ac-b140-adeef0cf85e4\/public_url\">CISM<\/a>,<br \/>MPhil, MBA, BSc<br \/><\/span><\/p>\n<p>Shuyuan\u2019s research advances a forward-looking cybersecurity agenda that centers on trusted human-computer interaction as the next frontier of cyber defense. Her work addresses the most consequential human-centered threats in the digital ecosystem\u2014<a href=\"https:\/\/www.youtube.com\/watch?v=A_vpzcxg4g4&amp;t=6s\"><span style=\"color: #ff6600;\">cyber insider threats<\/span><\/a>, <a href=\"https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/07421222.2016.1205924?journalCode=mmis20\"><span style=\"color: #ff6600;\">computer-mediated deception<\/span><\/a> and <a href=\"https:\/\/veracity.cci.fsu.edu\/\"><span style=\"color: #ff6600;\">deepfakes<\/span><\/a>\u2014by rethinking how trust, intent, and manipulation are detected and defended against in increasingly intelligent and autonomous systems.<\/p>\n<p>At the core of her research program is the theory of <a href=\"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/asi.23938\"><span style=\"color: #ff6600;\">trustworthiness attribution<\/span><\/a>, which integrates foundational insights from social psychology, attribution theory, and information systems to model insider threat detection supported by cyberinfrastructure. Building on this foundation, Shuyuan develops the <a href=\"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/asi.23074\"><span style=\"color: #ff6600;\">dyadic attribution model<\/span><\/a>, a novel approach for assessing human trustworthiness in sophisticated online interactions where intent is often concealed, mediated, or algorithmically amplified. This framework moves cybersecurity beyond static risk models toward dynamic, relational, and behavior-aware defense systems.<\/p>\n<p>Methodologically, Shuyuan pioneers the use of interactive <a href=\"https:\/\/link.springer.com\/article\/10.1007\/s10796-015-9599-5\"><span style=\"color: #ff6600;\">online games<\/span><\/a> and simulated environments as experimental protocols for studying deception, betrayal, and trust breakdowns in virtual organizations. These environments enable controlled yet realistic observation of adversarial behavior, creating empirical foundations for next-generation cyber defense research. Her sociotechnical approach deliberately bridges theory and practice, combining social-psychological models with pragmatic theories of language-action to establish innovative methods for computational behavioral inference.<\/p>\n<p>A defining contribution of this work is the concept of <a href=\"https:\/\/jdsr.se\/ojs\/index.php\/jdsr\/article\/view\/119\"><span style=\"color: #ff6600;\">collective sensing<\/span><\/a>, which positions generative AI and large language networks as mechanisms for integrating\u00a0 <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0747563218304485?via%3Dihub\"><span style=\"color: #ff6600;\">language-action cues<\/span><\/a> to infer human disposition, intent, and risk within complex\u00a0<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0167404817301591?via%3Dihub\"><span style=\"color: #ff6600;\">trust<\/span><\/a> relationships. This line of research sets the stage for future cybersecurity systems that do not merely react to attacks, but anticipate, interpret, and adapt to human behavior in real time.<\/p>\n<p>From theory, Shuyuan\u2019s research extends into real-world experiments and applied domains, analyzing digital evidence and big data drawn from social media, network traffic, IoT devices, and multimedia sources to address organizational and societal cybersecurity challenges. To strengthen organizational cyber awareness, she applies activity theory to conceptualize cyber defense as a collective activity system\u2014offering a transformative lens through which organizations can develop shared\u00a0<a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1016\/j.cose.2021.102357\"><span style=\"color: #ff6600;\">consciousness of cyber defense<\/span><\/a>, coordinated response, and resilient security cultures.<\/p>\n<p>Her work also engages urgent societal concerns. To counter <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2666281720300019?via%3Dihub\"><span style=\"color: #ff6600;\">cyberbullying<\/span><\/a>\u00a0and the erosion of free expression in digital spaces, Shuyuan develops big-data profiling analytics based on\u00a0<a href=\"https:\/\/link.springer.com\/article\/10.1007\/s10588-022-09360-5\"><span style=\"color: #ff6600;\">charged language<\/span><\/a>, proposing identification algorithms that enable early intervention and prevention of escalated or criminal online behavior. As cybercrime-as-a-service (CaaS) continues to normalize and scale cyber threats globally, her research underscores the growing importance of advanced\u00a0<a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S174228761730292X?via%3Dihub\"><span style=\"color: #ff6600;\">cyber forensics<\/span><\/a>\u00a0for law enforcement, particularly in analyzing distributed, heterogeneous digital evidence across <a href=\"https:\/\/conceptechint.net\/index.php\/CFATI\/article\/view\/22\"><span style=\"color: #ff6600;\">Internet of Things<\/span><\/a> (IoT) ecosystems and network infrastructures.<\/p>\n<p>Beyond institutional and societal defense, Shuyuan\u2019s research agenda also extends to personal cyber resilience. During the pandemic, she developed the <a href=\"https:\/\/pubmed.ncbi.nlm.nih.gov\/36106126\/\"><span style=\"color: #ff6600;\">social distance nudge<\/span><\/a>, a context-aware mHealth intervention designed to influence and safeguard individual behavior\u2014demonstrating how cybersecurity principles can be translated into human-centered interventions that support everyday decision-making in times of crisis.<\/p>\n<p>Collectively, Shuyuan\u2019s work articulates a vision for the next generation of cybersecurity research\u2014one that integrates human behavior, intelligent systems, and sociotechnical design to redefine how trust, deception, and defense are understood in a digitally mediated world. Her scholarship lays the groundwork for future cybersecurity systems that are not only technically robust, but socially aware, ethically grounded, and adaptive to the evolving human dimensions of cyber risk. Additional details about Shuyuan\u2019s work can be found on her <span style=\"color: #ff6600;\"><a style=\"color: #ff6600;\" href=\"https:\/\/orcid.org\/0000-0002-4790-1821\">ORCID<\/a><\/span>, <span style=\"color: #ff6600;\"><a style=\"color: #ff6600;\" href=\"https:\/\/scholar.google.com.tw\/citations?user=jDBhiiEAAAAJ&amp;hl=en\">Google Scholar<\/a><\/span> and <span style=\"color: #ff6600;\"><a style=\"color: #ff6600;\" href=\"https:\/\/www.fsu.edu\/cvdb\/SMHO.rtf\">CV<\/a><\/span>.<\/p>\n<p>Shuyuan founded the\u00a0<span style=\"color: #ff6600;\"><a title=\"iSensor Lab\" href=\"https:\/\/isensoranalytics.com\/\"><span style=\"color: #ff6600;\">iSensor Analytics Lab<\/span><\/a><\/span>\u00a0in 2010. <span style=\"color: #000000;\">iSensor Analytics Lab<\/span> is primarily focused\u00a0 on conducting sociotechnical research related to human factors (e.g., behavioral threat) in cyberspace. Experiments are conducted in a live, and virtual laboratory. Research data is collected through confined resources and interactions that are based on real-world cyber trust and deception simulations. Shuyuan currently holds a <a href=\"https:\/\/news.cci.fsu.edu\/cci-news\/cci-faculty\/ischool-professor-gets-patent-approved-by-uspto\/\"><strong><span style=\"color: #ff6600;\">US patent<\/span><\/strong><\/a><strong>\u00a0US-17\/162,468<\/strong> on systems and methods for detecting deception in computer-mediated communication, and also has two <strong>copyrighted inventions<\/strong>; <a href=\"https:\/\/veracity.cci.fsu.edu\/\"><strong><span style=\"color: #ff6600;\">Veracity AI<\/span><\/strong><\/a> truth disclosure against adversarial image manipulation; <a href=\"https:\/\/isensoranalytics.com\/forum\/?page_id=680\"><strong><span style=\"color: #ff6600;\">Pandemic Self Defense<\/span><\/strong><\/a> (TechID 21-003) mHealth intervention that helps mobile phone users with situational awareness during a pandemic.<\/p>\n<p>Keywords for Shuyuan&#8217;s research: Trusted human-computer interactions; cyber insider threats; computer-mediated deception; deepfakes; sociotechnical systems; online games for research; language-action cues; information use and seeking behavior; deceptive information behavior; trustworthiness attribution; dyadic attribution model; artificial intelligence; machine\/deep learning; computational modeling for complex trust and online deception.<\/p>\n<p>***<\/p>\n<p>Shuyuan teaches Information Systems Security, Information Systems Research, Information systems Management, Cyber Defense Operations, Incident Response, Disaster Recovery, Computer Auditing, Intrusion Detection, Digital and Cyber Forensics, Access Control Models for Intrusion Prevention, and Risk Assessment and Management.<\/p>\n<p>***<\/p>\n<p>Shuyuan&#8217;s professional industry experience in information systems security (ISS) encompasses ten years of securing E-commerce systems with public key infrastructure, virtual private networks, systems engineering of role-based access control, policy-based integrated firewall, intrusion detection systems and network security.\u00a0Shuyuan designed an enterprise information security architecture (EISA) called SIMPL\/E (secure information management platform and environment) for a government client. She worked with a team to build a Security Operations Center (SOC) for the military. She completed a large-scale virtual private network technology transfer project for a military research center. Click here for Shuyuan\u2019s\u00a0<a href=\"http:\/\/www.fsu.edu\/cvdb\/SMHO.rtf\"><span style=\"color: #ff6600;\"><span style=\"color: #ff6600;\">curriculum vitae<\/span><\/span><\/a>.<\/p>\n<p><iframe loading=\"lazy\" title=\"Faculty of the Future | Shuyuan Ho\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/f_3nsp792Js?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Research in a Minute: Shuyuan Mary Ho\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/ie0D7KuHcRU?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Shuyuan H. Metcalfe, Ph.D.\u00a0 \u00a0Associate Professor | Florida State University Trusted CI Fellow, The NSF Cybersecurity Center of ExcellenceAIS Distinguished Member, CISSP, CSX, CRISC, CISM,MPhil, MBA, BSc Shuyuan\u2019s research advances a forward-looking cybersecurity agenda that centers on trusted human-computer interaction &hellip; <a href=\"https:\/\/shuyuanmaryho.com\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":2361,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-689","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/pages\/689","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=689"}],"version-history":[{"count":122,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/pages\/689\/revisions"}],"predecessor-version":[{"id":2683,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/pages\/689\/revisions\/2683"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/media\/2361"}],"wp:attachment":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}