{"id":75,"date":"2010-11-09T17:40:05","date_gmt":"2010-11-09T22:40:05","guid":{"rendered":"http:\/\/test.goodwin.drexel.edu\/isensor\/drho\/?page_id=75"},"modified":"2024-01-26T16:43:55","modified_gmt":"2024-01-26T16:43:55","slug":"publications","status":"publish","type":"page","link":"https:\/\/shuyuanmaryho.com\/?page_id=75","title":{"rendered":"Publications"},"content":{"rendered":"<div class=\"fcbkbttn_buttons_block\" id=\"fcbkbttn_left\"><div class=\"fcbkbttn_button\">\n                            <a href=\"https:\/\/www.facebook.com\/\" target=\"_blank\">\n                                <img decoding=\"async\" src=\"https:\/\/shuyuanmaryho.com\/wp-content\/plugins\/facebook-button-plugin\/images\/standard-facebook-ico.png\" alt=\"Fb-Button\" \/>\n                            <\/a>\n                        <\/div><div class=\"fcbkbttn_like \"><fb:like href=\"https:\/\/shuyuanmaryho.com\/?page_id=75\" action=\"like\" colorscheme=\"light\" layout=\"standard\"  width=\"450px\" size=\"small\"><\/fb:like><\/div><\/div><h2><span style=\"color: #ff6600;\">Refereed Journal Publications<\/span><\/h2>\n<p><strong>Ho, S.M.<\/strong>, Nickerson, J., &amp; Zhang Q. (2023) Hive mind online: Collective sensing in times of disinformation. <em>Journal of Digital Social Research<\/em>, 4(4): 89-129. doi:<a id=\"pub-id::doi\" href=\"https:\/\/doi.org\/10.33621\/jdsr.v4i4.119\">10.33621\/jdsr.v4i4.119<\/a>.<\/p>\n<p><strong>Ho, S.M.<\/strong>, Liu, X., Seraj, M.S., and Dickey, S. (2023) Social distance \u201cnudge:\u201d a context aware mHealth intervention in response to COVID pandemics. <em>Computational and Mathematical Organization Theory<\/em>, 29(2023), 391-414, September 2022. doi:<a href=\"https:\/\/doi.org\/10.1007\/s10588-022-09365-0\">10.1007\/s10588-022-09365-0<\/a>.<\/p>\n<p><strong>Ho, S.M.<\/strong>, &amp; Li, W. (2022). &#8220;I know you are but what am I?&#8221; Profiling cyberbullying based on charged language. <em>Computational and Mathematical Organization Theory<\/em>, 28(2022), 293-320, February 2022. doi:<a class=\"underline mat-body-1 ng-star-inserted\" href=\"https:\/\/doi.org\/10.1007\/s10588-022-09360-5\" target=\"_blank\" rel=\"noopener noreferrer\">10.1007\/s10588-022-09360-5<\/a>.<\/p>\n<p><strong>Ho, S.M.<\/strong>, &amp; Gross, M. (2021). Consciousness of cyber defense: A collective activity system for developing organizational cyber awareness. <i>Computers &amp; Security<\/i>, 108, 102357, 1-18, September 2021. doi:<a href=\"https:\/\/doi.org\/10.1016\/j.cose.2021.102357\">10.1016\/j.cose.2021.102357<\/a>.<\/p>\n<p>Gross, M., &amp; <strong>Ho, S.M.<\/strong> (2021) <a href=\"https:\/\/jise.org\/Volume32\/n1\/jise2021v32n1pp65-76.html\">Collective learning for increasing cyber defense consciousness: An activity system analysis<\/a>, <em>Journal of Information Systems Education<\/em>, 32(1): 65-76.<\/p>\n<p><strong>Ho, S.M.<\/strong>, &amp; Burmester, M. (2021). Cyber forensics on Internet of Things: Slicing and dicing Raspberry Pi. <em>Journal of Cyber Forensics and Advanced Threat Investigations<\/em>, 2(1), 29-49. doi:<a href=\"https:\/\/doi.org\/10.46386\/ijcfati.v2i1.22\">10.46386\/ijcfati.v2i1.22<\/a>.<\/p>\n<p align=\"left\"><strong>Ho, S.M.<\/strong>, Kao, D.Y., Chiu-Huang, M.J., Li, W.Y., and Lai, C.J. (2020). Detecting cyberbullying \u201chotspots\u201d on Twitter: A predictive analytics approach, <em>Forensic Science International<\/em>: <em>Digital Investigation<\/em>, 32, 300906, S1-S3, April 2020. In Proceedings of the 2020 European Digital Forensics Research Workshop (DFRWS EU-2020), Oxford, United Kingdom, pp. S1-S3, June 3-5, 2020. doi:<a href=\"https:\/\/doi.org\/10.1016\/j.fsidi.2020.300906\">10.1016\/j.fsidi.2020.300906<\/a>. Click <a href=\"https:\/\/www.youtube.com\/watch?v=3b59QeDdvLE&amp;feature=youtu.be&amp;fbclid=IwAR2qSGDySIuA77b1pMEPN1t2YTBpdC9HH2Jr5nQ49pIi9jt6fSUJBUHsK50\">here<\/a> for the paper presentation at FSU iSchool Spring Colloquium.<\/p>\n<p align=\"left\"><strong>Ho, S.M.<\/strong>, &amp; Hancock, J.T. (2019). Context in a bottle: Language-action cues in spontaneous computer-mediated deception. <i>Computers in Human Behavior<\/i>, 91, 33-41, February 2019. doi:<a class=\"doi\" title=\"Persistent link using digital object identifier\" href=\"https:\/\/doi.org\/10.1016\/j.chb.2018.09.008\" target=\"_blank\" rel=\"noopener noreferrer\" aria-label=\"Persistent link using digital object identifier\">10.1016\/j.chb.2018.09.008<\/a>.<\/p>\n<p align=\"left\"><strong>Ho, S.M.<\/strong>, Kao, D.Y., and Wu, W.Y. (2018). Following the breadcrumbs: Timestamp pattern identification for cloud forensics. <em>Digital Investigation<\/em>, 24, 79-94, March 2018. doi:<a href=\"https:\/\/doi.org\/10.1016\/j.diin.2017.12.001\">10.1016\/j.diin.2017.12.001<\/a>.<\/p>\n<p align=\"left\"><strong>Ho, S.M.<\/strong>, Kaarst-Brown, M., and Benbasat, I. (2018) Trustworthiness attribution: Inquiry into insider threat detection.\u00a0<em>Journal of the Association\u00a0for Information Science and Technology<\/em>, 69(2), 271-280, February 2018. doi:<a href=\"https:\/\/doi.org\/10.1002\/asi.23938\">10.1002\/asi.23938<\/a>.<\/p>\n<p align=\"left\"><strong>Ho, S.M.<\/strong>, Hancock, J.T., Booth, C. (2017) Ethical dilemma: Deception dynamics in computer-mediated group communication. <em>Journal of the Association\u00a0for Information Science and Technology<\/em>, 68(12), 2729-2742, December 2017. doi:<a href=\"https:\/\/doi.org\/10.1002\/asi.23849\">10.1002\/asi.23849<\/a>.<\/p>\n<p align=\"left\"><strong>Ho, S.M.<\/strong>,\u00a0Ocasio Vel\u00e1zquez, M., and Booth, C. (2017) Trust or consequences? Causal effects of perceived risks and subjective norms on cloud technology adoption. <em>Computers &amp; Security, 70, 581-595<\/em>, September 2017. doi:<a href=\"https:\/\/doi.org\/10.1016\/j.cose.2017.08.004\">10.1016\/j.cose.2017.08.004<\/a>.<\/p>\n<p align=\"left\"><strong>Ho, S.M.<\/strong>\u00a0and Warkentin, M. (2017) Leader&#8217;s dilemma game: An experimental design for cyber insider threat research. <em>Information Systems Frontiers<\/em>, 19(2): 377-396. doi:<a href=\"https:\/\/doi.org\/10.1007\/s10796-015-9599-5\">10.1007\/s10796-015-9599-5<\/a>.<\/p>\n<p align=\"left\"><strong>Ho, S.M.<\/strong>, Lowry, P.B., Warkentin, M., Yang, Y.Y., Hollister, J. (2017) Gender deception in asynchronous online\u00a0communication: A path analysis. <em>Information Processing &amp; Management<\/em>,53(1), 21-41, January 2017. doi:<a href=\"https:\/\/doi.org\/10.1016\/j.ipm.2016.06.004\">10.1016\/j.ipm.2016.06.004<\/a>.<\/p>\n<p align=\"left\"><strong>Ho, S.M.<\/strong>, Hancock, J.T., Booth, C., and Liu, X. (2016) Computer-mediated deception: Strategies revealed by language-action cues in spontaneous communication. <em>Journal of Management Information Systems<\/em>, 33(2), 393-420, October 2016<span style=\"color: #222222;\">. doi:<a href=\"https:\/\/doi.org\/10.1080\/07421222.2016.1205924\">10.1080\/07421222.2016.1205924<\/a>.<\/span><\/p>\n<p align=\"left\"><strong>Ho, S.M.<\/strong>\u00a0and Benbasat, I.\u00a0(2014)\u00a0Dyadic attribution model: A mechanism to assess trustworthiness in virtual organizations.\u00a0<em>Journal of the Association\u00a0for Information Science and Technology<\/em>, 65(8), 1555-1576, August 2014. doi:<a href=\"https:\/\/doi.org\/10.1002\/asi.23074\">10.1002\/asi.23074<\/a>.<\/p>\n<p align=\"left\"><strong>Ho, S.M.<\/strong>, Bieber, M., Song, M., and Zhang, X. (2013)\u00a0Seeking beyond with IntegraL: A user study of sense-making enabled by anchor-based virtual Integration of library systems. <em>Journal of the Association for Information Science and Technology<\/em>, 64(9), 1927-1945, September 2013. doi:<a href=\"https:\/\/doi.org\/10.1002\/asi.22904\">10.1002\/asi.22904<\/a>.<\/p>\n<p align=\"left\"><strong>Ho, S.M.<\/strong>\u00a0and Katukoori, R.R., (2013)\u00a0<a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1504\/IJMNDI.2013.057145\">Agent-based modeling to visualize trustworthiness: A socio-technical framework<\/a>. Special Issue of Detecting and Mitigating Information Security Threats for Mobile Networks,\u00a0<em>Int&#8217;l Journal of Mobile Network Design and Innovation<\/em>, 5(1), 17-27, October 2013. doi:<a href=\"https:\/\/doi.org\/10.1504\/IJMNDI.2013.057145\">10.1504\/IJMNDI.2013.057145<\/a>.<\/p>\n<p align=\"left\"><strong>Ho, S.M.<\/strong>\u00a0and Lee, H.J. (2012)\u00a0<a href=\"http:\/\/isyou.info\/jowua\/papers\/jowua-v3n12-6.pdf\">A thief among us: The use of finite-state machines to dissect insider threat in cloud communications<\/a>. Special Issue of <em><span style=\"text-decoration: underline;\">Frontiers in Insider Threats and Data Leakage Prevention<\/span><\/em>, <a href=\"http:\/\/dblp.org\/db\/journals\/jowua\/jowua3.html\"><em>Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications<\/em><\/a>, 3(1\/2), 82-98.<\/p>\n<h2><span style=\"color: #ff6600;\">Refereed Conference Proceedings<\/span><\/h2>\n<p>Sayyafzadeh, S., <strong>Ho, S.M.<\/strong>, Chi, H., and Mkpong-Ruffin, I. (2023) Enhancing object detection in YouTube thumbnails forensics with YOLOv4, in Proceedings of 2023 IEEE International Conference on Big Data (BigData), (pp. 5588-5597), Sorrento, Italy, 15-18 December 2023: IEEE. doi:<a class=\"dark-link\" href=\"https:\/\/doi.ieeecomputersociety.org\/10.1109\/BigData59044.2023.10386427\" data-feathr-click-track=\"true\" data-feathr-link-aids=\"5cdda43ba3a493000bf82f7f\">10.1109\/BigData59044.2023.10386427<\/a>\u00a0 Retrieved from <a href=\"https:\/\/ieeexplore.ieee.org\/document\/10386427\">https:\/\/ieeexplore.ieee.org\/document\/10386427<\/a><\/p>\n<p>Emdad, F. B., <strong>Ho, S.M.<\/strong>, Ravuri, B., &amp; Hussain, S. (2023). <a href=\"https:\/\/aisel.aisnet.org\/amcis2023\/sig_health\/sig_health\/17\/\">Towards a unified Utilitarian ethics framework for healthcare artificial intelligence<\/a>. In Alanah Mitchell, Traci Carte, &amp; Alexandre Graeml (Eds.), in <i>Proceedings of the 2023 Americas Conference on Information Systems (AMCIS)<\/i> (pp. 1-10), August 10-12, 2023. Panama City, Panama: AIS. Retrieved from: <a href=\"https:\/\/aisel.aisnet.org\/amcis2023\/sig_health\/sig_health\/17\/\">https:\/\/aisel.aisnet.org\/amcis2023\/sig_health\/sig_health\/17\/<\/a><\/p>\n<p class=\"p1\">Hussain, G., &amp; <strong>Ho, S.M.<\/strong> (2023). <a href=\"https:\/\/aisel.aisnet.org\/amcis2023\/sig_adit\/sig_adit\/23\/\">Youth exodus! A framework of social media migration by young adults<\/a>. In Alanah Mitchell, Traci Carte, &amp; Alexandre Graeml (Eds.), in <i>Proceedings of the 2023 Americas Conference on Information Systems (AMCIS)<\/i> (pp. 1-5), August 10-12, 2023. Panama City, Panama: AIS. Retrieved from: <a href=\"https:\/\/aisel.aisnet.org\/amcis2023\/sig_adit\/sig_adit\/23\/\">https:\/\/aisel.aisnet.org\/amcis2023\/sig_adit\/sig_adit\/23\/<\/a><\/p>\n<p class=\"p1\"><strong>Ho, S.M.<\/strong>, &amp; Liu, Y. (2023). Genie breaks the bottle: Ethics in artificial intelligence adoption. In Nancy Deng, Deborah Armstrong, &amp; Guillermo Rodriguez-Abitia (Eds.), in <i>Proceedings of the 2023 ACM SIGMIS Computers and People Research<\/i> (pp. 1-4), June 1-3, 2023. Pomona, California: ACM. doi:<a href=\"https:\/\/doi.org\/10.1145\/3579168.3632724\">10.1145\/3579168.3632724<\/a>.<\/p>\n<p>Jo, M., <strong>Ho, S.M.<\/strong>, and Burnett, G. (2023) <a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1007\/978-3-031-28035-1_39\">Do you speak meme? A dynamic digital language for the information society<\/a>, in <em>Proceedings of the 2023 18th iConference<\/em> (LNCS 13971), Information for a Better World: Normality, Virtuality, Physicality, Inclusivity, Barcelona, Spain, pp. 523-534, March 13-17, 2023. doi:<a href=\"https:\/\/doi.org\/10.1007\/978-3-031-28035-1_39\">10.1007\/978-3-031-28035-1<span class=\"s1\">_<\/span>39<\/a>.<\/p>\n<p><strong>Ho, S.M.<\/strong>, Kao, D.Y., Li, W.Y., Lai, C.J., and Chiu-Huang, M.J. (2020). &#8220;On the left side, there&#8217;s nothing right. On the right side, there&#8217;s nothing left:&#8221; Polarization of the political opinions by news media, in Proceedings of the 2020 15th iConference (LNCS 12051), Sustainable Digital Communities, Boras, Sweden, pp. 209-219, March 23-26, 2020. doi:<a href=\"https:\/\/doi.org\/10.1007\/978-3-030-43687-2_16\">10.1007\/978-3-030-43687-2_16<\/a>. Please click <a href=\"https:\/\/youtu.be\/DAk5SHToL2g\">here<\/a> for the conference presentation.<\/p>\n<p>Purian, R., <strong>Ho, S.M.<\/strong>, and Te&#8217;Eni, D. (2020). <a href=\"https:\/\/aisel.aisnet.org\/ukais2020\/11\/\">Resilience of society to recognize disinformation: Human and\/or machine intelligence<\/a>, in Proceedings of the 2020 25th UK Academy for Information Systems, London, UK, pp. 1-10, March 31-April 1, 2020. Retrieved from: <a href=\"https:\/\/aisel.aisnet.org\/ukais2020\/11\/\">https:\/\/aisel.aisnet.org\/ukais2020\/11\/<\/a><\/p>\n<p><strong>Ho, S.M.<\/strong>, Kao, D.Y., Chiu-Huang, M.J., Li, W.Y., Lai, C.J., and Ankamah, B. (2019). <a href=\"https:\/\/aisel.aisnet.org\/wisp2019\/21\/\">Charged language on Twitter: A predictive model of cyberbullying to prevent victimization<\/a>, in <a href=\"https:\/\/aisel.aisnet.org\/wisp2019\/21\/\">Proceedings of the 2019 AIS SIGSEC Special Interest Group 10th Annual Workshop on Information Security and Privacy (WISP)<\/a>, <a href=\"https:\/\/aisel.aisnet.org\/wisp2019\/21\/\">21<\/a>, in conjunction with International Conference on Information Systems (ICIS), Munich, Germany, pp. 1-13, December 15, 2019. <a href=\"https:\/\/news.cci.fsu.edu\/cci-news\/cci-faculty\/professor-shares-cyberbullying-research-across-europe\/\">A short news article<\/a> about this paper presentation.<\/p>\n<p><strong>Ho, S.M.<\/strong>, Oliveira, D., and Rathi, R. (2019) Consciousness of cyber defense: Boundary Objects for Expansive Learning through creation of contradictions. In F. Nah and K. Siau (Eds.), HCI in Business, Government and Organizations &#8211; Information Systems and Analytics, LNCS 11589, pp. 338\u2013353. doi:<a href=\"https:\/\/doi.org\/10.1007\/978-3-030-22338-0_28\">10.1007\/978-3-030-22338-0_28<\/a>.<\/p>\n<p>Booth, C., and <strong>Ho, S.M.<\/strong> (2019) The privacy paradox in HCI: Calculus behavior in disclosing PII online. In F. Nah and K. Siau (Eds.), HCI in Business, Government and Organizations &#8211; Information Systems and Analytics, LNCS 11589, pp. 163\u2013177. doi:<a href=\"https:\/\/doi.org\/10.1007\/978-3-030-22338-0_13\">10.1007\/978-3-030-22338-0_13<\/a>.<\/p>\n<p><strong>Ho, S.M.<\/strong>, Oliveira, D., and Rathi, R. (2019) <a href=\"http:\/\/hdl.handle.net\/2142\/103318\">The shield and the sword: Expanding learning in cyber defense through competition<\/a>. In Proceedings of the <em>i<\/em>Conference 2019, Illinois Digital Environment for Access to Learning and Scholarship (IDEALS), 1-4. Washington, DC., March 31-April 3, 2019. doi:<a href=\"https:\/\/doi.org\/10.21900\/iconf.2019.103318\">10.21900\/iconf.2019.103318<\/a>.<\/p>\n<p><strong>Ho, S.M.<\/strong>\u00a0(2019) <a href=\"https:\/\/scholarspace.manoa.hawaii.edu\/items\/ca2c81eb-268d-4658-aa33-56eb0e26f1ee\/full\">Leader member exchange: An interactive framework to uncover a deceptive insider as revealed by human sensors<\/a>. In Proceedings of the 2019 52nd Hawaii International Conference on System Sciences (HICSS-52), 3212-3221. Maui, Hawaii. doi:<a href=\"https:\/\/hdl.handle.net\/10125\/59757\">hdl.handle.net\/10125\/59757<\/a>. Presentation of this paper can be found on iSensorLab&#8217;s YouTube channel\u00a0<a href=\"https:\/\/youtu.be\/mjEwJxdkuqU\">here<\/a>.<\/p>\n<p><strong>Ho, S.M.<\/strong> and Hancock, J.T. (2018) <a href=\"https:\/\/scholarspace.manoa.hawaii.edu\/bitstream\/10125\/50098\/1\/paper0211.pdf\">Computer-mediated deception: Collective language-action cues as stigmergic signals for computational intelligence<\/a>. In Proceedings of the 2018 51st Hawaii International Conference on System Sciences (HICSS-51), 1671-1680. Big Island, Hawaii. handle: <a href=\"http:\/\/hdl.handle.net\/10125\/50098\">10125\/50098<\/a>.<\/p>\n<p><strong>Ho, S.M.<\/strong>, von Eberstein, A., and Chatmon, C. (2017) Expansive learning in cyber defense: Transformation of organizational information security culture. <a href=\"https:\/\/www.researchgate.net\/publication\/362749724_Expansive_Learning_in_Cyber_Defense_Transformation_of_Organizational_Information_Security_Culture\">The 12th\u00a0Annual Symposium on Information Assurance<\/a> (ASIA&#8217;17), 23-28. Albany, NY, June 6-8, 2017.<\/p>\n<p>Booth, C. and\u00a0<strong>Ho, S.M.<\/strong>\u00a0(2017). <a href=\"https:\/\/www.ideals.illinois.edu\/handle\/2142\/96712\"><span style=\"color: #222222;\">Does the Cloud have a silver lining? Privacy concerns and perceived risk in cloud technology adoption<\/span><\/a>. In Proceedings of the <em>i<\/em>Conference 2017, Illinois Digital Environment for Access to Learning and Scholarship (IDEALS), 1-4. Wuhan, China, March 22-25, 2017. handle: <a href=\"https:\/\/hdl.handle.net\/2142\/96712\">2142\/96712<\/a>.<\/p>\n<p><strong>Ho, S.M.<\/strong>, Liu, X., Booth, C.,\u00a0and Hariharan, A. (2016) <a href=\"http:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-39931-7_31\">Saint or sinner? Language-action cues for modeling deception using support vector machines<\/a>. In K.S. Xu, D. Reitter, D. Lee, and N. Osgood (Eds.)\u00a0<em>Social, Cultural and Behavioral Modeling (SBP-BRiMS)<\/em>,\u00a0LNCS 9708, 325-334, Springer International Publishing Switzerland. doi:<a href=\"https:\/\/doi.org\/10.1007\/978-3-319-39931-7_31\">10.1007\/978-3-319-39931-7_31<\/a>.<\/p>\n<p><strong>Ho, S.M.<\/strong>, Hancock, J.T., Booth, C., Burmester, M., Liu, X., and Timmarajus,\u00a0S.S.\u00a0(2016) <a href=\"https:\/\/ieeexplore.ieee.org\/document\/7427526\">Demystifying insider threat: Language-action cues in group dynamics<\/a>, in Proceedings of the 2016 49th Hawaii International Conference on System Sciences (HICSS-49), 2729-2738. Kauai, Hawaii. doi:<a href=\"https:\/\/doi.org\/10.1109\/HICSS.2016.343\">10.1109\/HICSS.2016.343<\/a>.<\/p>\n<p><strong>Ho, S.M.<\/strong>, Hancock, J.T., Booth, C., Liu, X., Liu, M., Timmarajus, S.S., and Burmester, M.\u00a0(2016) <a href=\"https:\/\/ieeexplore.ieee.org\/document\/7427646\">Real or Spiel? A decision tree approach for automated detection of deceptive language-action cues<\/a>, in Proceedings of the 2016 49th Hawaii International Conference on System Sciences (HICSS-49), 3706-3715. Kauai, Hawaii. doi:<a href=\"https:\/\/doi.org\/10.1109\/HICSS.2016.462\">10.1109\/HICSS.2016.462<\/a>.<\/p>\n<p>Booth, C. and <strong>Ho, S.M.<\/strong> (2016). <a href=\"https:\/\/www.ideals.illinois.edu\/handle\/2142\/89336\">Get a clue! Some truths about online deception<\/a>. In Proceedings of the <em>i<\/em>Conference 2016, 1-4. Philadelphia, PA, March 20-23, 2016. handle: <a href=\"https:\/\/hdl.handle.net\/2142\/89336\">2142\/89336<\/a>.<\/p>\n<p><strong>Ho, S.M.<\/strong>, Hancock, J.T., Booth, C., Liu, X.,\u00a0Timmarajus, S.S., Burmester, M. (2015) <a href=\"https:\/\/ieeexplore.ieee.org\/document\/7165960\">Liar, Liar, IM on Fire: Deceptive language-action\u00a0cues in spontaneous online communication<\/a>, IEEE Intelligence and Security Informatics, 157-159. IEEE: Baltimore, MD. doi:<a href=\"https:\/\/doi.org\/10.1109\/ISI.2015.7165960\" target=\"_blank\" rel=\"noopener\">10.1109\/ISI.2015.7165960<\/a><span style=\"color: #000000;\">.<\/span><\/p>\n<p><strong>Ho, S.M.<\/strong>, Fu, H., Timmarajus, S.S., Booth, C., Baeg, J.H., Liu, M. (2015) <a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/2751957.2751978\">Insider threat: Language-action cues in group dynamics<\/a>, ACM SIGMIS Computers and People Research, 101-104. ACM: New Beach, California. doi:<a href=\"https:\/\/doi.org\/10.1145\/2751957.2751978\">10.1145\/2751957.2751978<\/a>.<\/p>\n<p>Ocasio Vel\u00e1zquez, M., and <strong>Ho, S.M.<\/strong> (2015) <a href=\"http:\/\/aisel.aisnet.org\/cgi\/viewcontent.cgi?article=1488&amp;context=amcis2015\">Do you trust the cloud? Modeling cloud technology adoption in organizations<\/a>. In Proceedings of the 2015 Americas Conference on Information Systems (AMCIS&#8217;15). Association for Information Systems: Puerto Rico, August 13-15. <a href=\"https:\/\/aisel.aisnet.org\/amcis2015\/AdoptionofIT\/GeneralPresentations\/18\">https:\/\/aisel.aisnet.org\/amcis2015\/AdoptionofIT\/GeneralPresentations\/18\/<\/a>.<\/p>\n<p>Galvez, S.M., Shackman, J.D., Guzman, I.R., and <strong>Ho, S.M.<\/strong> (2015) <a href=\"http:\/\/dl.acm.org\/citation.cfm?id=2751966\">Factors affecting individual information security practices<\/a>,\u00a0ACM SIGMIS Computers and People Research, 135-144. ACM: New Beach, California. doi:<a href=\"https:\/\/doi.org\/10.1145\/2751957.2751966\">10.1145\/2751957.2751966<\/a>.<\/p>\n<p><strong>Ho, S.M.<\/strong>, Timmarajus, S.S., Burmester, M., and Liu, X. (2014). <a title=\"Dyadic attribution model\" href=\"http:\/\/link.springer.com\/chapter\/10.1007%2F978-3-319-05579-4_34\" target=\"_blank\" rel=\"noopener noreferrer\">Dyadic attribution: A theoretical model for computationally interpreting words and action<\/a>. In W.G. Kennedy, N. Agarwal, and S.J. Yang (Eds.)\u00a0<em>Social Computing, Behavioral Modeling, and Prediction<\/em>,\u00a0LNCS 8393, 277-284, Springer International Publishing Switzerland. doi:<span style=\"color: #000000;\"><a href=\"https:\/\/doi.org\/10.1007\/978-3-319-05579-4_34\">10.1007\/978-3-319-05579-4_34<\/a>.<\/span><\/p>\n<p><strong>Ho, S.M.<\/strong>, and Hollister, J. (2013). <a href=\"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/full\/10.1002\/meet.14505001116\"><em>Guess Who<\/em>? An empirical study of gender deception and detection in computer-mediated communication<\/a>. In <em>Proceedings of the 76th Annual Meeting of the Association for Information Science &amp; Technology<\/em> (ASIS&amp;T 2013), 50(1), 1-4. doi:<a href=\"https:\/\/doi.org\/10.1002\/meet.14505001116\">10.1002\/meet.14505001116<\/a>.<\/p>\n<p><strong>Ho, S.M.<\/strong>, Ahmed, I., and Salome, R. (2012). <a href=\"http:\/\/dl.acm.org\/citation.cfm?id=2260808\"><em>Whodunit<\/em>? Collective trust in virtual interactions<\/a>. In S.J. Yang, A.M. Greenberg, and M. Endsley (Eds.) <em>Social Computing, Behavioral Modeling, and Prediction<\/em>, LNCS 7227, 348-356, Springer-Verlag Berlin Heidelberg 2012. <span style=\"color: #000000;\">doi:<a href=\"https:\/\/doi.org\/10.1007\/978-3-642-29047-3_42\">10.1007\/978-3-642-29047-3_42<\/a>.<\/span><\/p>\n<p><strong>Ho, S.M.<\/strong> and Zhang, X. (2011). <a href=\"https:\/\/dl.acm.org\/citation.cfm?id=1958935&amp;dl=ACM&amp;preflayout=tabs\">iSensor inference model for assessing trustworthiness in computer-mediated communications<\/a>, In <em>ACM Proceedings of CSCW 2011<\/em>, 645-648,\u00a0Hangzhou, China, March 19-23, 2011, <span style=\"color: #000000;\">doi:<a href=\"https:\/\/doi.org\/10.1145\/1958824.1958935\"><span style=\"color: #000000;\">10.1145\/1958824.1958935<\/span><\/a>.<\/span><\/p>\n<p><strong>Ho, S.M.<\/strong>\u00a0(2009).\u00a0<a href=\"http:\/\/hdl.handle.net\/2142\/15225\">A socio-technical approach to theorizing on perceptions of trustworthiness in virtual organizations<\/a>. In\u00a0<em>Proceedings of the i-Conference 2009<\/em>, Illinois Digital Environment for Access to Learning and Scholarship (IDEALS), Chapel Hill, NC. handle: 2142\/15225.<\/p>\n<p><strong>Ho, S.M.<\/strong> and Metcalfe, C.F. (2009). <a href=\"http:\/\/hdl.handle.net\/2142\/15239\">Life-cycle thinking: What can <em>IT<\/em> do to be green?<\/a> In <em>Proceedings of the i-Conference 2009<\/em>, Illinois Digital Environment for Access to Learning and Scholarship (IDEALS), Chapel Hill, NC. handle: <a href=\"https:\/\/hdl.handle.net\/2142\/15239\">2142\/15239<\/a>.<\/p>\n<p><strong>Ho, S.M.<\/strong> (2009). <a href=\"http:\/\/aisel.aisnet.org\/amcis2009_dc\/5\/\">Trustworthiness in virtual organizations<\/a>. In <em>Proceedings of 15th Americas Conference on Information Systems<\/em>, San Francisco, California, August 6-9, 2009. <a href=\"https:\/\/aisel.aisnet.org\/amcis2009_dc\/5\/\">https:\/\/aisel.aisnet.org\/amcis2009_dc\/5\/<\/a>.<\/p>\n<p><strong>Ho, S.M. <\/strong>(2009). <span style=\"color: #000080;\"><a href=\"http:\/\/link.springer.com\/chapter\/10.1007\/978-1-4419-0056-2_15\">A socio-technical approach to understanding perceptions of trustworthiness in virtual organizations<\/a><\/span>. In H. Liu, J.J. Salerno, and M.J. Young (Eds.)\u00a0<span style=\"color: #000000;\"><em>Social Computing, Behavioral Modeling, and Prediction<\/em>, 113-122. Tempe, FL: Springer. doi:<a href=\"https:\/\/doi.org\/10.1007\/978-1-4419-0056-2_15\">10.1007\/978-1-4419-0056-2_15<\/a>.<\/span><\/p>\n<p><strong>Ho, S.M.<\/strong> (2008). <span style=\"color: #000000;\"><span style=\"color: #000080;\"><a href=\"http:\/\/www.aaai.org\/Papers\/ICCCD\/2008\/ICCCD08-006.pdf\">A framework of coordinated defense<\/a>. In Subrahmanian, V.S. and Kruglanski, A. (Eds.) In <\/span>Proceedings of the 2<sup>nd<\/sup> International Conference on Computational Cultural Dynamics, 39-44. Menlo Park, CA: AAAI Press. doi:aaai\/icccd08-006.<\/span><\/p>\n<p><strong>Ho, S.M.<\/strong> (2008). <span style=\"color: #000080;\"><a href=\"http:\/\/link.springer.com\/chapter\/10.1007\/978-0-387-77672-9_15\">Attribution-based anomaly-detection: Trustworthiness in an online community<\/a>.<\/span> In H. Liu, J.J. Salerno, and M.J. Young (Eds.) <em>Social Computing, Behavioral Modeling, and Prediction<\/em>, 129-140. Tempe, FL: Springer.\u00a0doi:<a href=\"https:\/\/doi.org\/10.1007\/978-0-387-77672-9_15\">10.1007\/978-0-387-77672-9_15<\/a>.<\/p>\n<p><strong>Ho, S.M.<\/strong> (2008). <a href=\"http:\/\/www.igi-global.com\/chapter\/cyber-warfare-cyber-terrorism\/7458\">Toward a deeper understanding of personnel anomaly detection<\/a>. In L.J. Janczewski and A.M. Colarik (Eds.) <em>Encyclopedia of Cyber Warfare and Cyber Terrorism<\/em>, 1<sup>st<\/sup> Edition, 206-215. Hershey, NY: IGI Global. doi:<a href=\"https:\/\/doi.org\/10.4018\/978-1-59140-991-5.ch026\">10.4018\/978-1-59140-991-5.ch026<\/a>.<\/p>\n<p><strong>Ho, S.M.<\/strong> (2007). <a href=\"http:\/\/books.google.com\/books?id=qH7hAXN0b4sC&amp;lpg=PA95&amp;ots=BkEX6s0bgk&amp;dq=Leap%20in%20the%20Dark%3A%20An%20Attempt%20to%20Theorize%20Personnel%20Anomaly%20Detection%20for%20Countering%20Insider%20Threats&amp;pg=PA95#v=onepage&amp;q=Leap%20in%20the%20Dark:%20An%20Attempt%20to%20Theorize%20Personnel%20Anomaly%20Detection%20for%20Countering%20Insider%20Threats&amp;f=false\">Leap in the dark: An attempt to theorize personnel anomaly detection for countering insider threats<\/a>. In <a href=\"https:\/\/simson.net\/ref\/2007\/iciw07-cd.pdf\">Proceedings of 2<sup>nd<\/sup> International Conference on i-Warfare and Security<\/a>, Naval Postgraduate School, 95-100, Monterey, CA, March 8-9, 2007. ISBN<span style=\"color: #000000;\">: \u00a0<a href=\"https:\/\/simson.net\/ref\/2007\/iciw07-cd.pdf\">978-1-905305-41-4<\/a>.<\/span><\/p>\n<p><strong>Ho, S.M.<\/strong>, and Eseryel, U.Y. (2006). <a href=\"http:\/\/www.irma-international.org\/proceeding-paper\/monitoring-based-coordinated-defense-through\/32740\/\">Monitoring-based coordinated defense through the lens of the coordination theory<\/a>. In M. Khosrow-Pour (Ed.) Emerging Trends and Challenges in Information Technology Management Proceedings of 2006 International Conference of Information Resource Management Association, 1, 188-191. Hershey, PA: IDEA Group Publishing. doi:<a href=\"https:\/\/doi.org\/10.4018\/978-1-59904-019-6.ch045\">10.4018\/978-1-59904-019-6.ch045<\/a><span style=\"color: #222222;\">.<\/span><\/p>\n<p><strong>Ho, S.M.<\/strong> and Li, Q. (2006). <a href=\"http:\/\/toc.proceedings.com\/21310webtoc.pdf\">Modeling an effective coordinated defense through the lens of the coordination theory<\/a>.\u00a0In Armistead, Leigh (Ed.)\u00a0<a href=\"http:\/\/toc.proceedings.com\/21310webtoc.pdf\">Proceedings of First International Conference on i-Warfare and Security<\/a><em>,<\/em>\u00a0University of Maryland Eastern Shore, Princess Anne, Maryland, 111-118. <span style=\"color: #000000;\">ISBN:1-905305-17-6.<\/span><\/p>\n<p><strong>Ho, S.M.<\/strong>, and Wang, C. (2005). <a href=\"http:\/\/gebrc.nccu.edu.tw\/proceedings\/APDSI\/2005\/SessionIndex\/Knowledge%20Management\/KM-05.pdf\">Source of threats to security-based knowledge management<\/a>. In Proceedings of APSDI2005 Taiwan. Track: Knowledge Management. <a href=\"http:\/\/gebrc.nccu.edu.tw\/proceedings\/APDSI\/2005\/\">The 10<sup>th<\/sup> Asia Pacific Decision Science Institute<\/a>, June 28-July 2, 2005.\u00a0\u00a0ISSN:1539-1191.<\/p>\n<p>Park, J.S., and <strong>Ho, S.M.<\/strong> (2004). Composite role-based monitoring (CRBM) for countering insider threats, In H. Chen, R. Moore, D.D. Zeng, and J. Leavitt (Eds.) IEEE<em>\u00a0Intelligence and Security Informatics, LNCS\u00a0<\/em><span id=\"book-volume\" style=\"color: #333333;\">3073:\u00a0<\/span>201-213. Tucson, AZ: Springer-Verlag Berlin Heidelberg 2004. <span style=\"color: #000000;\">doi:<a href=\"https:\/\/doi.org\/10.1007\/978-3-540-25952-7_15\">10.1007\/978-3-540-25952-7_15<\/a>.<\/span><\/p>\n<h2><span style=\"color: #ff6600;\">Refereed Book Chapters<\/span><\/h2>\n<p><strong>Ho, S.M.<\/strong> (2020). Trustworthiness: Top qualification for cyber information professionals. Cybersecurity for Information Professionals: Concepts and Applications (pp.21-38). Chapter 2. CRC Press, Taylor and Francis Group, LLC. Retrieved from doi:<a class=\"nova-e-link nova-e-link--color-inherit nova-e-link--theme-decorated\" href=\"https:\/\/www.researchgate.net\/deref\/http%3A%2F%2Fdx.doi.org%2F10.1201%2F9781003042235-2\" target=\"_blank\" rel=\"noopener noreferrer\">10.1201\/9781003042235-2<\/a>.<\/p>\n<p class=\"p1\"><strong>Ho, S. M.<\/strong>, Oliveira, D., &amp; Rathi, R. (2019). Consciousness of cyber defense: Boundary Objects for Expansive learning through creation of contradictions. In F. Nah, &amp; K. Siau (Eds.), <i>HCI in Business, Government and Organizations: Information Systems and Analytics (LNCS 11589)<\/i> (pp. 1-16). Springer Nature Switzerland. doi:<a href=\"https:\/\/doi.org\/10.1007\/978-3-030-22338-0_28\">10.1007\/978-3-030-22338-0_28<\/a>.<\/p>\n<p class=\"p1\">Booth, C., &amp; <strong>Ho, S. M.<\/strong> (2019). The privacy paradox in HCI: Calculus behavior in disclosing PII online? In F. Nah, &amp; K. Siau (Eds.), <i>HCI in Business, Government and Organizations: Information Systems and Analytics (LNCS 11589), Proceedings of the HCII 2019<\/i> (pp. 1-15). Springer Nature Switzerland. Retrieved from doi:<a href=\"https:\/\/doi.org\/10.1007\/978-3-030-22338-0_13\">10.1007\/978-3-030-22338-0_13<\/a>.<\/p>\n<p><strong>Ho, S.M.<\/strong>, and Hollister, J. (2015). <a href=\"http:\/\/www.igi-global.com\/chapter\/cyber-insider-threat-in-virtual-organizations\/112555\">Cyber insider threats in virtual organizations<\/a>.\u00a0In M. Khosrow-Pour (Ed.),\u00a0<em>Encyclopedia of Information Science and Technology<\/em>,\u00a0<em>3<sup>rd<\/sup>\u00a0Ed<\/em>., (pp. 1517-1525). Hershey, PA: Information Resource Management Association. Retrieved from doi:<a href=\"https:\/\/doi.org\/10.4018\/978-1-4666-5888-2.ch145\"><span style=\"color: #333333;\">10.4018\/978-1-4666-5888-2.ch145<\/span><\/a>.<\/p>\n<p><strong>Ho, S.M.<\/strong>\u00a0(2014). <a title=\"Cyber Insider Threat: Trustworthiness in Virtual Organizations\" href=\"http:\/\/www.amazon.co.uk\/Cyber-Insider-Threat-Trustworthiness-Organizations\/dp\/365951702X\"><strong>Cyber insider threat: Trustworthiness in virtual organizations<\/strong><\/a>. LAP Lambert Academic Publishing. pp. 1-436. ISBN: 978-3659517020.<\/p>\n<p><strong>Ho, S.M.<\/strong>, and Wang, C. (2009) <a href=\"https:\/\/www.igi-global.com\/chapter\/security-based-knowledge-management\/14078\">Security-based knowledge management<\/a>. In M. Khosrow-Pour (Ed.), Encyclopedia of Information Science and Technology, 2nd Ed. (pp. 3401-3405). Hershey, PA: Information Science Reference. Retrieved from doi:<a href=\"https:\/\/doi.org\/10.4018\/978-1-60566-026-4.ch540\">10.4018\/978-1-60566-026-4.ch540<\/a>.<\/p>\n<p>Bernard, S., and <strong>Ho, S.M.<\/strong> (2009) <a href=\"https:\/\/www.igi-global.com\/chapter\/enterprise-architecture-context-method-designing\/4830\">Enterprise architecture as context and method for designing and implementing information security and data privacy controls in government agencies<\/a>. In P. Saha (Ed.), Advances in Government Enterprise Architecture, (pp. 340-370). Hershey, PA: Information Science Reference. Retrieved from doi:<a href=\"https:\/\/doi.org\/10.4018\/978-1-60566-068-4.ch015\">10.4018\/978-1-60566-068-4.ch015<\/a>.<\/p>\n<p><strong>Ho, S.M.<\/strong>, Tschai, H.J., Lin, A., and Park, J.S. (2004). <a href=\"http:\/\/craigchamberlain.com\/library\/insider\/Composite%20Role-Based%20Monitoring%20(CRBM).pdf\"><span style=\"color: #000080;\">Composite role-based monitoring (CRBM) for countering insider threats<\/span><\/a>. <em>7<sup>th<\/sup> Edition of Communications Electronics &amp; Information Journal, Ministry of National Defense<\/em>, R.O.C. December 2004.<\/p>\n<h2><span style=\"color: #ff6600;\">Refereed Conference Papers<\/span><\/h2>\n<p><strong>Ho, S.M.<\/strong>, Seraj, M.S., Yee, K., Liu, X., and Erlebacher, G. (2020) <a href=\"https:\/\/diginole.lib.fsu.edu\/islandora\/object\/fsu:840412\">A context-aware social distancing nudge for public health in response to COVID-19 pandemic<\/a>, Presented at the International Conference on Social Computing, Behavioral-Cultural Modeling, &amp; Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS&#8217;20), Oct 18-21, 2020. <a href=\"https:\/\/diginole.lib.fsu.edu\/islandora\/object\/fsu:840412\">Paper 81<\/a>, pp. 1-10.<\/p>\n<p>Ezeakunne, U., <strong>Ho, S.M.<\/strong>, and Liu, X. (2020) <a href=\"https:\/\/diginole.lib.fsu.edu\/islandora\/object\/fsu:840410\">Sentiment and retweet analysis of user response for fake news detection<\/a>, Presented at the International Conference on Social Computing, Behavioral-Cultural Modeling, &amp; Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS&#8217;20), Oct 18-21, 2020. <a href=\"https:\/\/diginole.lib.fsu.edu\/islandora\/object\/fsu:840410\">Paper 37<\/a>, pp. 1-10.<\/p>\n<p class=\"p1\"><strong>Ho, S.<\/strong>, Seraj, M. S., Yee, K., Lustria, M. L., Liu, X., &amp; Erlebacher, G. (2020). <a href=\"https:\/\/diginole.lib.fsu.edu\/islandora\/object\/fsu:840411\"><i>CV19 SelfDefense: Situational awareness in a pandemic through mHealth intervention<\/i><\/a>. Presented at 2020 International Conference on Social Computing, Behavioral-Cultural Modeling, &amp; Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS&#8217;20), <a href=\"https:\/\/www.youtube.com\/watch?v=6Z1k8tC36UA\">a virtual demo<\/a> on 10\/20\/2022.<\/p>\n<p>Chi, H., <strong>Ho, S.M.<\/strong>, and Hubbard, D. (2015) An online game simulation environment for detecting potential deceptive insiders, in Proceedings of the 2015 IEEE Winter Simulation Conference, Huntington Beach, CA. December 6-9, 2015. doi:<a href=\"https:\/\/doi.org\/10.1109\/WSC.2015.7408480\" target=\"_blank\" rel=\"noopener\">10.1109\/WSC.2015.7408480<\/a>.<\/p>\n<p align=\"left\"><strong>Ho, S.M.<\/strong>, and Warkentin, M. (2012). Lie to me: Gender deception and detection in computer-mediated communications. Dewald Roode Information Systems Security Workshop, IFIP WG 8.11\/11.13, Brigham Young University, Provo, Utah, September 21-22, 2012.<\/p>\n<p><strong>Ho, S.M.<\/strong>, and Lee, H.J. (2011). Group attribution of human betrayal in a virtual collaborative context. Pre-ICIS\u201911 Workshop on Information Security and Privacy (WISP\u201911), Shanghai, China, December 3-4, 2011.<\/p>\n<p><strong>Ho, S.M.<\/strong>, and Benbasat, I. (2011). Two-stage recursive attribution mechanism for sensing behavioral anomalies in virtual organizations. <em>MIS Quarterly<\/em> special issue on \u201cInformation Systems for Symbolic Action: Social Media and Beyond\u201d Pre-ICIS Workshop, Shanghai, China, December 3-4, 2011.<\/p>\n<p><strong>Ho, S.M<\/strong>. (2011). Theorizing on virtual identity theft using the Turing Imagination Game, in Proceedings of the 6<sup>th<\/sup> Mediterranean Conference on Information Systems (MCIS\u201911), Cyprus, September 3-5, 2011, ISBN: 978-1-4503-0556-3. Retrieved from: <a href=\"https:\/\/aisel.aisnet.org\/mcis2011\/109\/\">https:\/\/aisel.aisnet.org\/mcis2011\/109\/<\/a><\/p>\n<p><strong>Ho, S.M.<\/strong>, Song, M., Bieber, M., Koppel, E., Hamidullah, V., and Bokota, P. (2010).\u00a0<a href=\"https:\/\/www.ideals.illinois.edu\/items\/14886\">IntegraL: An effective link-based federated search infrastructure<\/a>. Proceedings of\u00a0<em>i<\/em>Conference, University of Illinois, Urbana-Champaign, February 3-6, 2010. handle: <a href=\"https:\/\/hdl.handle.net\/2142\/14917\">2142\/14917<\/a>.<\/p>\n<p><strong>Ho, S.M.<\/strong> (2009). Simulating insider threats with online games. Pre-ICIS Workshop on Information Security and Privacy (WISP), December 14, 2009.<\/p>\n<p>Song, M., <strong>Ho, S.M.<\/strong>, Bieber, M., et al. (2009). A scalable digital library infrastructure that expands search and beyond. <em>Books Online 2009 Workshop<\/em>, Corfu, Greece.<\/p>\n<p><strong>Ho, S.M.<\/strong> (2007). From past to future: Paradigm shifts in information security. In Electronic <em>Proceedings of 1st Annual AGEP Academic Excellent Symposium<\/em>, Syracuse University, Syracuse, NY, 15 June 2007.<\/p>\n<p>DelZoppo, R., Browns, E., Downey, M., Liddy, E.D., Symonenko, S., Park, J.S., <strong>Ho, S.M.<\/strong>, D\u2019Eredita, M. and Natarajan, A. (2005). Situational awareness for countering insider threats: A multi-disciplinary approach. In <em>Proceedings of the 14th FiestaCrow Technical Symposium<\/em>, San Antonio, Texas, April 18-20, 2005.<\/p>\n<p>DelZoppo, R., Browns, E., Downey, M., Liddy, E.D., Symonenko, S., Park, J.S., <strong>Ho, S.M.<\/strong>, D\u2019Eredita, M. and Natarajan, A. (2004). <a href=\"https:\/\/cse.buffalo.edu\/caeiae\/skm2004\/presentation_slides\/B-Sessions\/5B-01-delzoppo\/5B-01-delzoppoC010305.pdf\">A Multi-disciplinary approach for countering insider threats<\/a>. In <a href=\"https:\/\/cse.buffalo.edu\/caeiae\/skm2004\/presentation_slides.htm\"><em>Proceedings of 2004 Workshop on Secure Knowledge Management (SKM)<\/em><\/a>, Amherst, NY, September 23-24, 2004.<\/p>\n<h2><span style=\"color: #ff6600;\">Invited Talks at Conferences<\/span><\/h2>\n<p><strong>Ho, S.M.<\/strong> (August 12, 2023). AI technology for identifying deepfake and computer-mediated deception, The Future of System Goals and Human Rights: Data Governance &amp; AI Ethics [PDS]. AMCIS 2023. Panama City, Panama. doi:10.17605\/<a href=\"https:\/\/urldefense.com\/v3\/__http:\/\/OSF.IO\/XEUMD__;!!PhOWcWs!34YAEbt5iWPUZ7Tpsyya2KNFPEWvoAdyt1c6ruiiuh-ER2iNZyF70UsrB-ZyR6GTgv1iMtByX0QwVfHt9SOBMg$\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\" data-linkindex=\"1\">OSF.IO\/XEUMD<\/a>.<\/p>\n<p><strong>Ho, S.M.<\/strong> (2019) Virtual vetting: Spotting computer-mediated deception, The CASE Challenge Workshop, Intelligence Advanced Research Projects Activity (IARPA), Washington DC, July 18, 2019.<\/p>\n<p><strong>Ho, S.M.<\/strong> (2019) Cyber threats in Smart City: A light-weight user-side detection of evil twin attack based on TCP packets analysis, 2nd Annual Digital Forensics and Cybercrime Investigation Workshop, Central Police University, Taiwan, May 7, 2019.<\/p>\n<p><strong>Ho, S.M.<\/strong> (2019) Cyber threats and digital forensics of\u00a0Internet of Things (IoT), New Taipei City Police Branch, May 6, 2019.<\/p>\n<p><strong>Ho, S.M.<\/strong> (2018). Two sides of a coin: A dualistic view of sociotechnical systems, Consortium for Science of Sociotechnical Systems (CSST): Decennial Sociotech Futures Symposium, Ann Arbor, MI, June 29-July 1, 2018.<\/p>\n<p><strong>Ho, S.M.<\/strong> (2018) Cyber behavioral forensics in deceptive human computer interaction, Annual IT Management and Risk Assessment Workshop, National Taxation Bureau North District, Ministry of Finance, Taiwan, May 23, 2018.<\/p>\n<p><strong>Ho, S.M.<\/strong> (2018) Cybersecurity KSAs as protocols in the United States, 1st Annual Digital Forensics and Cybercrime Investigation Workshop, Central Police University, Taiwan, May 14, 2018.<\/p>\n<p><strong>Ho, S.M.<\/strong> (2016). Panel presentation\u00a0with the whitepaper on\u00a0<a title=\"Modeling and Measurement\" href=\"http:\/\/cra.org\/ccc\/wp-content\/uploads\/sites\/2\/2016\/12\/Shuyuan-slides.pdf\">Radicalized &#8220;Lone Wolf:&#8221; Invisible Threat in the Society<\/a> at the <a href=\"http:\/\/cra.org\/ccc\/events\/sociotechnical-cybersecurity\/#agenda\"><strong>Sociotechnical Cybersecurity Workshop<\/strong><\/a>, Organized by Computing Community Consortium (CCC), College Park, Maryland, December 12-13, 2016.<\/p>\n<p><strong>Ho, S.M.<\/strong>\u00a0(2016). Lightning Talk on Language-action cues research in spontaneous computer-mediated communication at the Collective Intelligence Workshop, <strong>Hawaii International Conference on System Sciences<\/strong> (<strong>HICSS-49<\/strong>), Kauai, January 5-8, 2016.<\/p>\n<p><strong>Ho, S.M<\/strong>. (2015). <a href=\"http:\/\/thefc2.org\/outreach\/insiderthreat-2015.pdf\">Insider Threat: Philosophy, Research and Academic Perspectives<\/a>, at the 2015 <strong>Florida Center for Cybersecurity Annual Conference<\/strong>, organized by\u00a0University of South Florida: Tampa, FL, October 2015.<\/p>\n<p><strong>Ho, S.M.<\/strong> (2011). Lightning Talk: Using online game to simulate insider threats in cyberspace, the <strong>Symposium on Usable Privacy and Security<\/strong> (<strong>SOUPS\u201911<\/strong>), Carnegie Mellon CyLab, Pittsburgh, PA, July 20-22, 2011.<\/p>\n<p><strong>Ho, S.M.<\/strong> and Zhang, X. (2011). iSensor inference model for assessing trustworthiness in computer-mediated communications, the <strong>Symposium on Usable Privacy and Security<\/strong> (<strong>SOUPS\u201911<\/strong>), Carnegie Mellon CyLab, Pittsburgh, PA, July 20-22, 2011.<\/p>\n<p><strong>Ho, S.M.<\/strong>, Song, M., Bieber, M. (2010). IntegraL connects data, users and scientists, the 36<sup>th<\/sup> Annual Conference of International Association for Social Science Information Services &amp; Technology (IASSIST 2010), Cornell University, Ithaca, NY., June 1-4, 2010.<\/p>\n<p>Song, M., <strong>Ho, S.M.<\/strong>, Bieber, M., et al. (2009). Building a sustainable NSDL community infrastructure. NSDL\u201909 Annual Meeting, Washington D.C., November 17-19, 2009.<\/p>\n<h2><span style=\"color: #ff6600;\">Panel Discussions<\/span><\/h2>\n<p>March 2015: Chen, S., <strong>Ho, S.M.<\/strong>, and\u00a0Nocolas-Rocca, T.S. (2015) &#8220;<a href=\"http:\/\/sbp-conference.org\/tutorial\/\">Big Data Analytics for Behavioral Modeling<\/a>&#8221; Workshop at Social Computing, Behavioral Modeling and Prediction, Washington, D.C., March 31-April 3, 2015.<\/p>\n<p>March 2014: Liddy, E., Eisenberg, M., Burnett, K., Sawyer, S., Bruce, H., Fenske, D., Budd, J., Madsen, D.,\u00a0Milojevic, S.,\u00a0<strong>Ho, S.M.<\/strong> (2014) &#8220;<a href=\"https:\/\/research-api.cbs.dk\/ws\/portalfiles\/portal\/58846814\/Madsen_1.pdf\">Interdisciplinary practice in iSchools<\/a>&#8221; Workshop at iConference, Berlin, Germany, March 4-7, 2014.<\/p>\n<p>Feb 2013: Reynolds, R., Warren, A., <strong>Ho, S.M.<\/strong>, Howison, J., Erickson, I., Schmidt, I. (2013) \u201cSociotechnical systems research: Advancing clear definitions, conceptual boundaries, shared understandings, and promising and fruitful research problem domains\u201d Workshop at iConference, Fort Worth, TX, Feb 12-15, 2013.<\/p>\n<p>Feb 2012: Mueller, M., Kuehn, A., Santoso, S., Clement, A., Deibert, R., <strong>Ho, S.M.<\/strong> (2012) \u201cNetwork surveillance: Access control, transparency, power and circumvention in the 21<sup>st<\/sup>\u00a0century\u201d Workshop at <em>i<\/em>Conference, Toronto Canada, Feb 7-10, 2012.<\/p>\n<p>March 2011: <strong>Ho, S.M.<\/strong> (<em>Chair<\/em>) 2011 Drexel Cybersecurity Research Forum Spring Series, Philadelphia, PA.<\/p>\n<p>Feb 2009:\u00a0<strong>Ho, S.M.<\/strong>\u00a0and Treglia, J.V. (2009). Roundtable Discussion\u2014Feasibility discussion on identifying possibility for a national behavioral anomaly detection platform.\u00a04th Annual i-Conference on iSociety: Research, Education and Engagement, University of North Carolina, Chapel Hill, NC<\/p>\n<p>Feb 2008:\u00a0Paquette, S., Fagnot, I.,\u00a0<strong>Ho, S.M.<\/strong>\u00a0et al. (2008). Roundtable Discussion\u2014Information assurance, intelligence and security: Opportunities and directions for future research.\u00a03rd Annual i-Conference on iFutures: Systems, Selves, Society, University of California, Los Angeles, CA<\/p>\n<p>May 2006:\u00a0Haque, S.N., Fagnot, I., and\u00a0<strong>Ho, S.M.<\/strong>\u00a0(2006). Workshop\u2014Privacy and Security. Connections 2006, Syracuse University, Syracuse, NY.<\/p>\n<h2><span style=\"color: #ff6600;\">Mid-Career Consortium<\/span><\/h2>\n<p><strong>Ho, S.M.<\/strong> (2018).The International Conference on Information Systems (ICIS&#8217;18) Mid-Career Consortium, San Francisco, CA, December 13-16, 2018.<\/p>\n<p><strong>Ho, S.M.<\/strong> (2018). The 24th Annual <em>AMCIS 2018 Mid-Career Consortium<\/em>, New Orleans, LA, August 16, 2018.<\/p>\n<h2><span style=\"color: #ff6600;\">Junior Faculty Consortium<\/span><\/h2>\n<p><strong>Ho, S.M.<\/strong> (2012). The International Conference on Information Systems (ICIS&#8217;12) Junior Faculty Consortium, Orlando, FL, December 16, 2012.<\/p>\n<p><strong>Ho, S.M.<\/strong> (2012). The Academy of Management (AOM) Annual Meeting Junior Faculty Consortium, Boston, MA, August 3, 2012.<\/p>\n<h2><span style=\"color: #ff6600;\">Doctoral Consortium<\/span><\/h2>\n<p><strong>Ho, S.M.<\/strong> (2009). <a href=\"http:\/\/aisel.aisnet.org\/amcis2009_dc\/5\/\">Trustworthiness in virtual organizations<\/a>. The 15th Annual <em>AMCIS 2009 Doctoral Consortium<\/em>, San Francisco, CA, August 6, 2009. AIS Electronic Library (AISel)\u00a0doi: http:\/\/aisel.aisnet.org\/amcis2009_dc\/5.<\/p>\n<p><strong>Ho, S.M.<\/strong> (2009). The 3rd Annual <em>i<\/em>Conference<em> Doctoral Colloquium<\/em>, University of Los Angeles, CA, February 2009.<\/p>\n<p><strong>Ho, S.M.<\/strong> (2006). The <em>I<\/em><em>SOneWorld Doctoral Symposium<\/em>, Las Vegas, Nevada, April 2006.<\/p>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Refereed Journal Publications Ho, S.M., Nickerson, J., &amp; Zhang Q. (2023) Hive mind online: Collective sensing in times of disinformation. Journal of Digital Social Research, 4(4): 89-129. doi:10.33621\/jdsr.v4i4.119. Ho, S.M., Liu, X., Seraj, M.S., and Dickey, S. (2023) Social distance &hellip; <a href=\"https:\/\/shuyuanmaryho.com\/?page_id=75\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1485,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-75","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/pages\/75","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=75"}],"version-history":[{"count":551,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/pages\/75\/revisions"}],"predecessor-version":[{"id":2675,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/pages\/75\/revisions\/2675"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/media\/1485"}],"wp:attachment":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=75"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}