Trust or consequences? Causal effects of perceived risk and subjective norms on cloud technology adoption SM Ho, M Ocasio-Velázquez, C Booth Computers & Security 70, 581-595, 2017 | 157 | 2017 |
Computer-mediated deception: Strategies revealed by language-action cues in spontaneous communication SM Ho, JT Hancock, C Booth, X Liu Journal of Management Information Systems 33 (2), 393-420, 2016 | 95 | 2016 |
Composite role-based monitoring (CRBM) for countering insider threats JS Park, SM Ho International Conference on Intelligence and Security Informatics, 201-213, 2004 | 54 | 2004 |
Insider threat: Language-action cues in group dynamics SM Ho, H Fu, SS Timmarajus, C Booth, JH Baeg, M Liu Proceedings of the 2015 ACM SIGMIS Conference on Computers and People …, 2015 | 43 | 2015 |
Trustworthiness attribution: Inquiry into insider threat detection SM Ho, M Kaarst‐Brown, I Benbasat Journal of the Association for Information Science and Technology 69 (2 …, 2018 | 39 | 2018 |
Leader’s dilemma game: An experimental design for cyber insider threat research SM Ho, M Warkentin Information Systems Frontiers 19, 377-396, 2017 | 38 | 2017 |
Following the breadcrumbs: Timestamp pattern identification for cloud forensics SM Ho, D Kao, WY Wu Digital Investigation 24, 79-94, 2018 | 28 | 2018 |
Context in a bottle: Language-action cues in spontaneous computer-mediated deception SM Ho, JT Hancock Computers in Human Behavior 91, 33-41, 2019 | 24 | 2019 |
Gender deception in asynchronous online communication: A path analysis SM Ho, PB Lowry, M Warkentin, Y Yang, JM Hollister Information Processing & Management 53 (1), 21-41, 2017 | 24 | 2017 |
Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication SM Ho, JT Hancock, C Booth, X Liu, SS Timmarajus, M Burmester 2015 IEEE International Conference on Intelligence and Security Informatics …, 2015 | 21 | 2015 |
Real or Spiel? A decision tree approach for automated detection of deceptive language-action cues SM Ho, JT Hancock, C Booth, X Liu, M Liu, SS Timmarajus, M Burmester 2016 49th Hawaii International Conference on System Sciences (HICSS), 3706-3715, 2016 | 19 | 2016 |
Ethical dilemma: Deception dynamics in computer‐mediated group communication SM Ho, JT Hancock, C Booth Journal of the Association for Information Science and Technology 68 (12 …, 2017 | 18 | 2017 |
Dyadic attribution model: A mechanism to assess trustworthiness in virtual organizations SM Ho, I Benbasat Journal of the Association for Information Science and Technology 65 (8 …, 2014 | 17 | 2014 |
Saint or Sinner? Language-Action Cues for Modeling Deception Using Support Vector Machines SM Ho, X Liu, C Booth, A Hariharan Social, Cultural, and Behavioral Modeling: 9th International Conference, SBP …, 2016 | 16 | 2016 |
Factors affecting individual information security practices SM Galvez, JD Shackman, IR Guzman, SM Ho Proceedings of the 2015 ACM SIGMIS Conference on Computers and People …, 2015 | 16 | 2015 |
Guess who? An empirical study of gender deception and detection in computer‐mediated communication SM Ho, JM Hollister Proceedings of the American Society for Information Science and Technology …, 2013 | 16 | 2013 |
A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications. SM Ho, H Lee J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3 (1/2), 82-98, 2012 | 15 | 2012 |
Collective learning for developing cyber defense consciousness: an activity system analysis M Gross, SM Ho Journal of Information Systems Education 32 (1), 65-76, 2021 | 14 | 2021 |
Consciousness of cyber defense: A collective activity system for developing organizational cyber awareness SM Ho, M Gross Computers & Security 108, 102357, 2021 | 13 | 2021 |
Detecting cyberbullying “hotspots” on Twitter: a predictive analytics approach SM Ho, D Kao, MJ Chiu-Huang, W Li, CJ Lai Forensic science international: digital investigation 32, 300906, 2020 | 13 | 2020 |