Follow
Shuyuan Mary Ho Metcalfe
Title
Cited by
Cited by
Year
Trust or consequences? Causal effects of perceived risk and subjective norms on cloud technology adoption
SM Ho, M Ocasio-Velázquez, C Booth
Computers & Security 70, 581-595, 2017
1822017
Computer-mediated deception: Strategies revealed by language-action cues in spontaneous communication
SM Ho, JT Hancock, C Booth, X Liu
Journal of Management Information Systems 33 (2), 393-420, 2016
1032016
Composite role-based monitoring (CRBM) for countering insider threats
JS Park, SM Ho
International Conference on Intelligence and Security Informatics, 201-213, 2004
542004
Insider threat: Language-action cues in group dynamics
SM Ho, H Fu, SS Timmarajus, C Booth, JH Baeg, M Liu
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People …, 2015
452015
Trustworthiness attribution: Inquiry into insider threat detection
SM Ho, M Kaarst‐Brown, I Benbasat
Journal of the Association for Information Science and Technology 69 (2 …, 2018
432018
Leader’s dilemma game: An experimental design for cyber insider threat research
SM Ho, M Warkentin
Information Systems Frontiers 19, 377-396, 2017
392017
Following the breadcrumbs: Timestamp pattern identification for cloud forensics
SM Ho, D Kao, WY Wu
Digital Investigation 24, 79-94, 2018
292018
Context in a bottle: Language-action cues in spontaneous computer-mediated deception
SM Ho, JT Hancock
Computers in Human Behavior 91, 33-41, 2019
262019
Gender deception in asynchronous online communication: A path analysis
SM Ho, PB Lowry, M Warkentin, Y Yang, JM Hollister
Information Processing & Management 53 (1), 21-41, 2017
242017
Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication
SM Ho, JT Hancock, C Booth, X Liu, SS Timmarajus, M Burmester
2015 IEEE International Conference on Intelligence and Security Informatics …, 2015
222015
Ethical dilemma: Deception dynamics in computer‐mediated group communication
SM Ho, JT Hancock, C Booth
Journal of the Association for Information Science and Technology 68 (12 …, 2017
202017
Real or Spiel? A decision tree approach for automated detection of deceptive language-action cues
SM Ho, JT Hancock, C Booth, X Liu, M Liu, SS Timmarajus, M Burmester
2016 49th Hawaii International Conference on System Sciences (HICSS), 3706-3715, 2016
192016
Dyadic attribution model: A mechanism to assess trustworthiness in virtual organizations
SM Ho, I Benbasat
Journal of the Association for Information Science and Technology 65 (8 …, 2014
192014
Factors affecting individual information security practices
SM Galvez, JD Shackman, IR Guzman, SM Ho
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People …, 2015
172015
Saint or Sinner? Language-Action Cues for Modeling Deception Using Support Vector Machines
SM Ho, X Liu, C Booth, A Hariharan
Social, Cultural, and Behavioral Modeling: 9th International Conference, SBP …, 2016
162016
Guess who? An empirical study of gender deception and detection in computer‐mediated communication
SM Ho, JM Hollister
Proceedings of the American Society for Information Science and Technology …, 2013
162013
Consciousness of cyber defense: A collective activity system for developing organizational cyber awareness
SM Ho, M Gross
Computers & Security 108, 102357, 2021
152021
Detecting cyberbullying “hotspots” on Twitter: a predictive analytics approach
SM Ho, D Kao, MJ Chiu-Huang, W Li, CJ Lai
Forensic science international: digital investigation 32, 300906, 2020
152020
A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications.
SM Ho, H Lee
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3 (1/2), 82-98, 2012
152012
Collective learning for developing cyber defense consciousness: an activity system analysis
M Gross, SM Ho
Journal of Information Systems Education 32 (1), 65-76, 2021
142021
The system can't perform the operation now. Try again later.
Articles 1–20