Name
Affiliation
Papers
SHUYUAN MARY HO
Drexel University, Philadelphia, PA
30
Collaborators
Citations 
PageRank 
46
53
11.59
Referers 
Referees 
References 
86
400
294
Search Limit
100400
Title
Citations
PageRank
Year
Consciousness Of Cyber Defense: A Collective Activity System For Developing Organizational Cyber Awareness00.342021
Detecting Cyberbullying “Hotspots” on Twitter: A Predictive Analytics Approach10.362020
Leader Member Exchange: An Interactive Framework To Uncover A Deceptive Insider As Revealed By Human Sensors00.342019
Consciousness Of Cyber Defense: Boundary Objects For Expansive Learning Through Creation Of Contradictions00.342019
The Privacy Paradox In Hci: Calculus Behavior In Disclosing Pii Online00.342019
Context in a bottle: Language-action cues in spontaneous computer-mediated deception.00.342019
Trustworthiness attribution: Inquiry into insider threat detection.00.342018
Computer-Mediated Deception: Collective Language-Action Cues As Stigmergic Signals For Computational Intelligence10.352018
Following the breadcrumbs: Timestamp pattern identification for cloud forensics10.352018
Bridging The Security Gap Between Software Developers And Penetration Testers: A Job Characteristic Theory Perspective00.342017
Leader’s dilemma game: An experimental design for cyber insider threat research40.522017
Trust or consequences? Causal effects of perceived risk and subjective norms on cloud technology adoption.20.362017
Ethical dilemma: Deception dynamics in computer-mediated group communication.00.342017
Gender deception in asynchronous online communication: A path analysis.30.372017
Computer-Mediated Deception: Strategies Revealed by Language-Action Cues in Spontaneous Communication.70.432016
Saint or Sinner? Language-Action Cues for Modeling Deception Using Support Vector Machines.30.412016
Demystifying Insider Threat: Language-Action Cues In Group Dynamics60.432016
Real Or Spiel? A Decision Tree Approach For Automated Detection Of Deceptive Language-Action Cues40.422016
Do You Trust the Cloud? Modeling Cloud Technology Adoption in Organizations00.342015
Insider Threat: Language-action Cues in Group Dynamics60.522015
An online game simulation environment for detecting potential deceptive insiders.00.342015
Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication50.502015
Panel: Cybersecurity Workforce Development00.342015
Dyadic attribution model: A mechanism to assess trustworthiness in virtual organizations40.712014
Dyadic Attribution: A Theoretical Model for Interpreting Online Words and Actions.10.352014
Guess who?: an empirical study of gender deception and detection in computer-mediated communication50.432013
Seeking beyond with IntegraL: A user study of sense-making enabled by anchor-based virtual integration of library systems.00.342013
Whodunit? collective trust in virtual interactions00.342012
i-sensor inference model for assessing trustworthiness in computer-mediated communications00.342011
IntegraL Connects Data, User and Scientists.00.342010