Begin Date | End Date | Title |
---|---|---|
03-10-2022 | 12-31-2023 | USAF STTR Phase II: Project Aletheia: Detecting Adversarial Manipulation of Image Data |
06-02-2021 | 01-02-2022 | Project Aletheia: A Gamified Truth Disclosure Platform |
07-01-2018 | 06-30-2020 | Capture-the-Flag (CTF) Scenario-Based Cybersecurity Exercises\r\nDevelopment |
12-15-2014 | 12-31-2016 | iCorps: Market Impact Identification of Dyadic Attribution Model for Disposition Assessment Using Online Games |
03-01-2015 | 08-31-2016 | A Sociotechnical Approach To Lawful Interception And Computational Assessment Of Information Behavior To Protect Against Insider Threat |
09-01-2013 | 08-31-2015 | EAGER:Collab Research: Language-Action Causal Graphs for Trustworthiness Attribution in Computer-Mediated Communications |
Burmester, Michael V
Professor 9 Mo SAL Comp Sci Sponsored Projects |
Liu, Xiuwen
Professor 9 Mo SAL Comp Sci Sponsored Projects |
Industries |
---|
Logistics & Distribution > Specialized Logistics IT |
Research Keywords |
---|
Computer-Mediated Deception |
Covid-19 |
Dyadic Attribution Model |
Language-Action Cues |
Online Game For Research |
Sociotechnical Systems |
Trusted Human Computer Interaction |
Trustworthiness Attribution |
Recent Publications: "Enhancing Object Detection in YouTube Thumbnails Forensics with YOLOv4" 2023 ▪ 2021 IEEE International Conference on Big Data (Big Data) Shahrzad Sayyafzadeh,Hongmei Chi,Shuyuan Mary Ho,Idongesit Mkpong-Ruffin "Genie Breaks the Bottle: Ethics in Artificial Intelligence Adoption: ChatGPT; The Beginning and the End of Human Wisdom" 2023 ▪ Shuyuan Mary Ho,Yue Liu "Hive Mind Online: Collective Sensing in Times of Disinformation" 2023 ▪ Journal of Digital Social Research Shuyuan Mary Ho,Jeffrey Nickerson,Qian Zhang "Do You Speak Meme? A Dynamic Digital Language for the Information Society" 2023 ▪ Lecture notes in computer science Minhyung Jo,Shuyuan Mary Ho,Gary Burnett "Social distance “nudge:” a context aware mHealth intervention in response to COVID pandemics" 2022 ▪ Computational and Mathematical Organization Theory Shuyuan Mary Ho,Xiuwen Liu,Md Shamim Seraj,Sabrina Dickey "“I know you are, but what am I?” Profiling cyberbullying based on charged language" 2022 ▪ Computational and Mathematical Organization Theory Shuyuan Mary Ho,Wenyi Li "Consciousness of cyber defense: A collective activity system for developing organizational cyber awareness" 2021 ▪ Computers & Security Shuyuan Mary Ho,Melissa Gross "Cyber Forensics on Internet of Things: Slicing and Dicing Raspberry Pi" 2021 ▪ International Journal of Cyber Forensics and Advanced Threat Investigations Shuyuan Mary Ho,Mike Burmester "Collective Learning for Developing Cyber Defense Consciousness: An Activity System Analysis" 2021 ▪ The Journal of Information and Systems in Education Melissa Gross,Shuyuan Mary Ho "Trustworthiness: Top Qualification for Cyber Information Professionals" 2020 ▪ Auerbach Publications eBooks Shuyuan Mary Ho "Detecting Cyberbullying “Hotspots” on Twitter: A Predictive Analytics Approach" 2020 ▪ Forensic Science International Digital Investigation Shuyuan Mary Ho,Dayu Kao,Ming-Jung Chiu-Huang,Wenyi Li,Chung-Jui Lai "“On the left side, there’s nothing right. On the right side, there’s nothing left:” Polarization of Political Opinion by News Media" 2020 ▪ Lecture notes in computer science Shuyuan Mary Ho,Dayu Kao,Wenyi Li,Chung-Jui Lai,Ming-Jung Chiu-Huang "Resilience of Society to Recognize Disinformation: Human and/or Machine Intelligence" 2020 ▪ Ronit Purian,Shuyuan Mary Ho,Dov Te'Eni "Charged language on Twitter: A predictive model of cyberbullying to prevent victimization" 2019 ▪ Shuyuan Mary Ho,Dayu Kao,Ming-June Chiu-Huang,Wenyi Li,Chung-Jui Lai,Bismark Ankamah "Consciousness of Cyber Defense: Boundary Objects for Expansive Learning Through Creation of Contradictions" 2019 ▪ Lecture notes in computer science Shuyuan Mary Ho,Diogo Oliveira,Raghav Rathi "Leader Member Exchange: An Interactive Framework to Uncover a Deceptive Insider as Revealed by Human Sensors" 2019 ▪ Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences Shuyuan Mary Ho Ph.D. "The Privacy Paradox in HCI: Calculus Behavior in Disclosing PII Online" 2019 ▪ Lecture notes in computer science Cheryl Booth,Shuyuan Mary Ho "The shield and the sword: Expanding learning in cyber defense through competition" 2019 ▪ iConference 2014 Proceedings Shuyuan Mary Ho,Diogo Oliveira,Raghav Rathi "Context in a bottle: Language-action cues in spontaneous computer-mediated deception" 2018 ▪ Computers in Human Behavior Shuyuan Mary Ho,Jeffrey T. Hancock "Data for: Following the Breadcrumbs: Pattern Identification of Cloud Behavioral Forensics" 2018 ▪ Shuyuan Mary Ho,Da-Yu Kao,Wen-Ying Wu "Following the breadcrumbs: Timestamp pattern identification for cloud forensics" 2018 ▪ Digital Investigation Shuyuan Mary Ho,Dayu Kao,Wen-Ying Wu "Computer-Mediated Deception: Collective Language-action Cues as Stigmergic Signals for Computational Intelligence" 2018 ▪ Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences Shuyuan Mary Ho,Jeffrey T. Hancock "Trustworthiness attribution: Inquiry into insider threat detection" 2017 ▪ Journal of the Association for Information Science and Technology Shuyuan Mary Ho,Michelle Kaarst?Brown,Izak Benbasat "Ethical dilemma: Deception dynamics in computer?mediated group communication" 2017 ▪ Journal of the Association for Information Science and Technology Shuyuan Mary Ho,Jeffrey T. Hancock,Cheryl Booth "Trust or consequences? Causal effects of perceived risk and subjective norms on cloud technology adoption" 2017 ▪ Computers & Security Shuyuan Mary Ho,Mónica Ocasio-Velázquez,Cheryl Booth "Gender deception in asynchronous online communication: A path analysis" 2017 ▪ SSRN Electronic Journal Shuyuan Mary Ho,Paul Benjamin Lowry,Merrill Warkentin,Yanyun Yang,Jonathan Hollister "Bridging the Security Gap between Software Developers and Penetration Testers: A Job Characteristic Theory Perspective" 2017 ▪ Americas Conference on Information Systems Hwee-Joo Kam,Vishal Shah,Shuyuan Mary Ho "Does the cloud have a silver lining? Privacy concerns and perceived risk in cloud technology adoption" 2017 ▪ Cheryl Booth,Shuyuan Mary Ho "Gender deception in asynchronous online communication: A path analysis" 2016 ▪ Information Processing & Management Shuyuan Mary Ho,Paul Benjamin Lowry,Merrill Warkentin,Yanyun Yang,Jonathan M. Hollister "Lie to Me: A Multifactorial Analysis of Gender Deception in Asynchronous Online Communication" 2016 ▪ SSRN Electronic Journal Shuyuan Mary Ho,Paul Benjamin Lowry,Merrill Warkentin,Yanyun Yang,Jonathan Hollister "Computer-Mediated Deception: Strategies Revealed by Language-Action Cues in Spontaneous Communication" 2016 ▪ Journal of Management Information Systems Shuyuan Mary Ho,Jeffrey T. Hancock,Cheryl Booth,Xiuwen Liu "Demystifying Insider Threat: Language-Action Cues in Group Dynamics" 2016 ▪ Shuyuan Mary Ho,Jeffrey T. Hancock,Cheryl Booth,Mike Burmester,Xiuwen Liu,Shashank S. Timmarajus "Real or Spiel? A Decision Tree Approach for Automated Detection of Deceptive Language-Action Cues" 2016 ▪ Shuyuan Mary Ho,Jeffrey T. Hancock,Cheryl Booth,Xiuwen Liu,Muye Liu,Shashank S. Timmarajus,Mike Burmester "Saint or Sinner? Language-Action Cues for Modeling Deception Using Support Vector Machines" 2016 ▪ Lecture notes in computer science Shuyuan Mary Ho,Xiuwen Liu,Cheryl Booth,Aravind Hariharan "An online game simulation environment for detecting potential deceptive insiders" 2015 ▪ Winter Simulation Conference Hongmei Chi,Shuyuan Mary Ho,Dominique Hubbard "An online game simulation environment for detecting potential deceptive insiders" 2015 ▪ 2018 Winter Simulation Conference (WSC) None Hongmei Chi,Shuyuan Mary Ho,Dominique Hubbard "Leader’s dilemma game: An experimental design for cyber insider threat research" 2015 ▪ Information Systems Frontiers Shuyuan Mary Ho,Merrill Warkentin "Factors Affecting Individual Information Security Practices" 2015 ▪ Santos M. Galvez,Joshua D. Shackman,Indira R. Guzman,Shuyuan M. Ho "Insider Threat" 2015 ▪ Shuyuan Mary Ho,Hengyi Fu,Shashanka S. Timmarajus,Cheryl Booth,Jung Hoon Baeg,Muye Liu "Panel" 2015 ▪ Indira R. Guzman,Thomas Hilton,Miguel (Mike) O. Villegas,Michelle Kaarst-Brown,Jason James,Ashraf Shirani,Shuyuan Mary Ho,Diane Lending "Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication" 2015 ▪ Shuyuan Mary Ho,Jeffrey T. Hancock,Cheryl Booth,Xiuwen Liu,Shashanka S. Timmarajus,Mike Burmester "Do You Trust the Cloud? Modeling Cloud Technology Adoption in Organizations" 2015 ▪ Americas Conference on Information Systems Shuyuan Mary Ho,Mónica Ocasio Velázquez "Cyber Insider Threat in Virtual Organizations" 2014 ▪ Advances in information quality and management Shuyuan Mary Ho,Jonathan M. Hollister "Dyadic attribution model: A mechanism to assess trustworthiness in virtual organizations" 2014 ▪ Journal of the Association for Information Science and Technology Shuyuan Mary Ho,Izak Benbasat "Interdisciplinary Practices in iSchools" 2014 ▪ iConference 2014 Proceedings Dorte Madsen,Shuyuan Mary Ho "Cyber Insider Threat: Trustworthiness in Virtual Organizations" 2014 ▪ Shuyuan Mary Ho "Dyadic Attribution: A Theoretical Model for Interpreting Online Words and Actions" 2014 ▪ Lecture notes in computer science Shuyuan Mary Ho,Shashanka Surya Timmarajus,Mike Burmester,Xiuwen Liu "Seeking beyond with IntegraL: A user study of sense?making enabled by anchor?based virtual integration of library systems" 2013 ▪ Journal of the American Society for Information Science and Technology Shuyuan Mary Ho,Michael Bieber,Min Song,Xiangmin Zhang "Sociotechnical systems research: Defining, converging, and researching as a community" 2013 ▪ Rebecca Reynolds,Warren Allen,Ingrid Erickson,Shuyuan Mary Ho,James Howison,Ingbert Schmidt "Agent-based modelling to visualise trustworthiness: a socio-technical framework" 2013 ▪ International Journal of Mobile Network Design and Innovation Shuyuan Mary Ho,Ram Reddy Katukoori "Guess who? An empirical study of gender deception and detection in computer?mediated communication" 2013 ▪ Proceedings of the American Society for Information Science and Technology Shuyuan Mary Ho,Jonathan M. Hollister "Plenary lecture 1: human-centered computational modeling for trustworthy cloud communications" 2012 ▪ International Conference on Communications Shuyuan Mary Ho "A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications." 2012 ▪ J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. Shuyuan Mary Ho,Hwajung Lee "Whodunit? Collective Trust in Virtual Interactions" 2012 ▪ Lecture notes in computer science Shuyuan Mary Ho,Issam Ahmed,Roberto Salome "i-sensor inference model for assessing trustworthiness in computer-mediated communications" 2011 ▪ Shuyuan Mary Ho,Xiangmin Zhang "Enterprise Architecture as Context and Method for Designing and Implementing Information Security and Data Privacy Controls in Government Agencies" 2011 ▪ IGI Global eBooks Scott Bernard,Shuyuan Mary Ho "Enterprise Architecture as Context and Method for Designing and Implementing Information Security and Data Privacy Controls in Government Agencies" 2011 ▪ IGI Global eBooks Scott Bernard,Shuyuan Mary Ho "Toward a Deeper Understanding of Personnel Anomaly Detection" 2011 ▪ IGI Global eBooks Shuyuan Mary Ho "THEORIZING ON VIRTUAL IDENTITY THEFT USING THE TURING IMAGINATION GAME" 2011 ▪ Shuyuan Mary Ho "IntegraL: An Effective Link-based Federated Search Infrastructure" 2010 ▪ Shuyuan Mary Ho,Min Song,Michael Bieber,Eric Koppel,Vahid Hamidullah,Pawel Bokota "IntegraL Connects Data, User and Scientists." 2010 ▪ IASSIST Shuyuan Mary Ho,Min Song,Michael Bieber "A Socio-Technical Approach to Theorizing on Perceptions of Trustworthiness in Virtual Organizations" 2009 ▪ Shuyuan Mary Ho "Feasibility Discussion on Identifying Possibility for a National Behavioral Anomaly Detection Platform" 2009 ▪ Shuyuan Mary Ho,Joseph Vincent Treglia "Life-Cycle Thinking: What can IT do to be green?" 2009 ▪ Shuyuan Mary Ho,Conrad F. Metcalfe "Life-Cycle Thinking: What can IT do to be green?" 2009 ▪ Shuyuan Mary Ho,Conrad F. Metcalfe "A Socio-Technical Approach to Understanding Perceptions of Trustworthiness in Virtual Organizations" 2009 ▪ Springer eBooks Shuyuan Mary Ho "Behavioral anomaly detection: A socio-technical study of trustworthiness in virtual organizations" 2009 ▪ ProQuest LLC eBooks Shuyuan Mary Ho "Enterprise Architecture as Context and Method for Designing and Implementing Information Security and Data Privacy Controls in Government Agencies" 2009 ▪ IGI Global eBooks Scott Bernard,Shuyuan Mary Ho "iConference 2009 iSociety: Research, Education, Engagement Roundtable Discussion Feasibility Discussion on Identifying Possibility for a National Behavioral Anomaly Detection Platform" 2009 ▪ Shuyuan Mary Ho,Joseph Vincent Treglia "Security-Based Knowledge Management" 2009 ▪ IGI Global eBooks Shuyuan Mary Ho,Chingning Wang "Trustworthiness in Virtual Organizations" 2009 ▪ Shuyuan Mary Ho "Behavioral Parameters of Trustworthiness for Countering Insider Threats" 2008 ▪ Shuyuan Mary Ho "Information Assurance, Intelligence and Security: Opportunities and Directions for Future Research" 2008 ▪ Scott Paquette,Isabelle Fagnot,Kevin C. Desouza,Dave Yates,Shuyuan Mary Ho "Attribution-based Anomaly Detection: Trustworthiness in an Online Community" 2008 ▪ Social Computing, Behavioral Modeling, and Prediction Shuyuan Mary Ho "Toward a Deeper Understanding of Personnel Anomaly Detection" 2007 ▪ IGI Global eBooks Shuyuan Mary Ho "Monitoring-based coordinated defense through the lens of the coordination theory" 2006 ▪ S.M. Ho,Ugur Eseryel "Composite Role-Based Monitoring (CRBM) for countering insider threats" 2004 ▪ Lecture notes in computer science Joon S. Park,Shuyuan Mary Ho "Composite Role-Based Monitoring (CRBM) for Countering Insider Threats" 2004 ▪ Lecture notes in computer science Joon S. Park,Shuyuan Mary Ho "Implemetation of space link extension services in NASA/JPL's deep space mission system" 2001 ▪ M. J. Stoloff,S. Ho,J. Louie,J. Diep,S. Davis,C. Aguilera,A. Guerrero,M. Levesque |
My Research Interests: | • Trusted human-computer interaction • Predictive analytics • Social media dis-/misinformation • Cyberbullying, political polarization | |
My Research Background: | My research interests are in trusted human-computer interactions, specifically addressing issues of computer-mediated deception, cyber insider threats, dis-/misinformation, and cyberbullying. Recent projects include the study of predictive analytics for identifying online deception and cyberbullying in social forums, as well as polarization in political forums. My iSensor Lab analyzes and extracts language-action cues, such as in charged language for identifying hate speech. My research discovers and identify subtle but noticeable computational differences in communicative intent that can be observed, triangulated and codified. I can collaborate on detecting COVID-19 social media dis-/misinformation campaign and societal impacts. I build research experimentations to explore and collect conversational artifacts from social simulations. I’m also interested in building an AI-based system that can assist the Centers for Disease Control and Prevention in devising containment strategies based on live data | |
How I Can Help Collaborators: | • Scenario-based experimentation • User-centered interactive system design • Behavioral modeling & prediction • Modeling of language-action cues with analytics, social factors/ computing • Detecting social media dis/misinformation campaign and societal impacts | |
How Collaborators Can Help Me: | • Bring your biggest problems for analysis • Access to big datasets (e.g., COVID-19, healthcare, social data, utilities, etc.) • Machine learning, artificial intelligence • Statistical analysis and modeling • Coding and programming | |
Additional Information: | I founded the iSensor Lab in 2010 to conduct sociotechnical research related to human factors in cyberspace. Experiments are conducted in live and virtual environments using online games. Research data is collected through confined resources and interactions that are based on real-world cyber trust and deception simulations. We generate data based on real world scenarios that are created for specific purposes. This is done through the deployment of online games that contain identical variables as in real-world situations. Statistical modeling and machine learning are used to parse out the cues of conversations and make sense of the data collected. |
![]() |
Faculty of the Future Duration: (2:55) Year: 2019 Keyword: Research |
![]() |
CV19 SelfDefense Mobile App Concept Demo Duration: (6:10) Year: 2020 Keyword: COVID-19, digital response, The iSensor Lab is pleased to announce its digital response to COVID-19 pandemic; CV19 SelfDefense android mobile app. The CV19 SelfDefense mobile app is a research artifact funded by Florida State University Collaborative Collision Seed Grant (CC-045704, 5/11/20 – 8/18/20). Interested users may download this version on an android phone, register an account with the iSensor server, and login to their personal account with a dashboard of features and tools to begin utilizing the services provided that help users to defend themselves during the Coronavirus pandemic. For more information, please visit iSensor Lab at https://isensoranalytics.com
|
![]() |
Research on Computer-Mediated Deception Duration: (1:21) Year: 2018 Keyword: computer-mediated deception, online deception, language-action cues, cybersecurity, information behavior The chance of a human spotting lies is 52.4%, approximately equivalent to random. However, a machine-learning approach can spot lies and classify online deception with nearly 85-100% accuracy.
|
![]() |
Research on Cyber Insider Threat Duration: (1:22) Year: 2018 Keyword: cyber insider threat, cybersecurity, language-action cues, computer-mediated deception The sociotechnical systems approach models multi-level interactions, extracts language-action cues, constructs dyadic attribution on trustworthiness, and identifies computer-mediated deception with accuracy.
|
![]() |
iSensor Tech Talk for NSF ICorps Duration: (00.03.06) Year: 2015 Keyword: iSnesor Analytics |
![]() |
iSensor Analytics ICorps Lessons Learned Duration: (00:01:00) Year: 2015 Keyword: iSensor Analytics NSF I-CORPS NYCRIN Feb-March 2015
|
![]() |
Research in a minute Duration: (00:01:00) Year: 2014 Keyword: insider threat, computer-mediated deception Florida State University researcher Shuyuan Mary Ho discusses her research regarding the issues of cyber insider threats and online identity theft.
|
Name: | Shuyuan Mary Ho | ||
Title: | Asoc Professor | ||
University: | Florida State University | ||
College/School: | College Of Communication and Information | ||
Home Department: | School Of Information | ||
Address: |
142 COLLEGIATE LOOP TALLAHASSEE, FL |
||
Email: | smho@fsu.edu | ||
Phone: | 850/645-0406 | ||
ORCID: |
|