Follow
Shuyuan Mary Ho Metcalfe
Title
Cited by
Cited by
Year
Trust or consequences? Causal effects of perceived risk and subjective norms on cloud technology adoption
SM Ho, M Ocasio-Velázquez, C Booth
Computers & Security 70, 581-595, 2017
1532017
Computer-mediated deception: Strategies revealed by language-action cues in spontaneous communication
SM Ho, JT Hancock, C Booth, X Liu
Journal of Management Information Systems 33 (2), 393-420, 2016
952016
Composite role-based monitoring (CRBM) for countering insider threats
JS Park, SM Ho
International Conference on Intelligence and Security Informatics, 201-213, 2004
542004
Trustworthiness attribution: Inquiry into insider threat detection
SM Ho, M Kaarst‐Brown, I Benbasat
Journal of the Association for Information Science and Technology 69 (2 …, 2018
382018
Leader’s dilemma game: An experimental design for cyber insider threat research
SM Ho, M Warkentin
Information Systems Frontiers 19, 377-396, 2017
382017
Demystifying insider threat: Language-action cues in group dynamics
SM Ho, JT Hancock, C Booth, M Burmester, X Liu, SS Timmarajus
2016 49th Hawaii International Conference on System Sciences (HICSS), 2729-2738, 2016
342016
Following the breadcrumbs: Timestamp pattern identification for cloud forensics
SM Ho, D Kao, WY Wu
Digital Investigation 24, 79-94, 2018
282018
Context in a bottle: Language-action cues in spontaneous computer-mediated deception
SM Ho, JT Hancock
Computers in Human Behavior 91, 33-41, 2019
242019
Gender deception in asynchronous online communication: A path analysis
SM Ho, PB Lowry, M Warkentin, Y Yang, JM Hollister
Information Processing & Management 53 (1), 21-41, 2017
242017
Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication
SM Ho, JT Hancock, C Booth, X Liu, SS Timmarajus, M Burmester
2015 IEEE International Conference on Intelligence and Security Informatics …, 2015
212015
Insider threat: Language-action cues in group dynamics
SM Ho, H Fu, SS Timmarajus, C Booth, JH Baeg, M Liu
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People …, 2015
202015
Real or Spiel? A decision tree approach for automated detection of deceptive language-action cues
SM Ho, JT Hancock, C Booth, X Liu, M Liu, SS Timmarajus, M Burmester
2016 49th Hawaii International Conference on System Sciences (HICSS), 3706-3715, 2016
192016
Ethical dilemma: Deception dynamics in computer‐mediated group communication
SM Ho, JT Hancock, C Booth
Journal of the Association for Information Science and Technology 68 (12 …, 2017
182017
Dyadic attribution model: A mechanism to assess trustworthiness in virtual organizations
SM Ho, I Benbasat
Journal of the Association for Information Science and Technology 65 (8 …, 2014
172014
Saint or Sinner? Language-Action Cues for Modeling Deception Using Support Vector Machines
SM Ho, X Liu, C Booth, A Hariharan
Social, Cultural, and Behavioral Modeling: 9th International Conference, SBP …, 2016
162016
Factors affecting individual information security practices
SM Galvez, JD Shackman, IR Guzman, SM Ho
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People …, 2015
162015
Guess who? An empirical study of gender deception and detection in computer‐mediated communication
SM Ho, JM Hollister
Proceedings of the American Society for Information Science and Technology …, 2013
162013
A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications.
SM Ho, H Lee
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3 (1/2), 82-98, 2012
152012
Collective learning for developing cyber defense consciousness: an activity system analysis
M Gross, SM Ho
Journal of Information Systems Education 32 (1), 65-76, 2021
132021
Consciousness of cyber defense: A collective activity system for developing organizational cyber awareness
SM Ho, M Gross
Computers & Security 108, 102357, 2021
122021
The system can't perform the operation now. Try again later.
Articles 1–20