Projects

Begin Date End Date Title
03-10-2022 12-31-2023 USAF STTR Phase II: Project Aletheia: Detecting Adversarial Manipulation of Image Data
06-02-2021 01-02-2022 Project Aletheia: A Gamified Truth Disclosure Platform
07-01-2018 06-30-2020 Capture-the-Flag (CTF) Scenario-Based Cybersecurity Exercises\r\nDevelopment
12-15-2014 12-31-2016 iCorps: Market Impact Identification of Dyadic Attribution Model for Disposition Assessment Using Online Games
03-01-2015 08-31-2016 A Sociotechnical Approach To Lawful Interception And Computational Assessment Of Information Behavior To Protect Against Insider Threat
09-01-2013 08-31-2015 EAGER:Collab Research: Language-Action Causal Graphs for Trustworthiness Attribution in Computer-Mediated Communications

Network

Burmester, Michael V
Professor 9 Mo SAL
Comp Sci Sponsored Projects
Liu, Xiuwen
Professor 9 Mo SAL
Comp Sci Sponsored Projects

Research Terms

Research Terms
Information Science
Information Science > Information Management > Information Processing
Information Science > Information Management > Information Processing > Data Processing > Data Analysis
Information Science > Information Systems > Management Information Systems
Information Science > Information Technology
Information Science > Information Theory
Industries
Logistics & Distribution > Specialized Logistics IT
Research Keywords
Computer-Mediated Deception
Covid-19
Dyadic Attribution Model
Language-Action Cues
Online Game For Research
Sociotechnical Systems
Trusted Human Computer Interaction
Trustworthiness Attribution

Publications

Recent Publications:

"Enhancing Object Detection in YouTube Thumbnails Forensics with YOLOv4"

2023 ▪ 2021 IEEE International Conference on Big Data (Big Data)

Shahrzad Sayyafzadeh,Hongmei Chi,Shuyuan Mary Ho,Idongesit Mkpong-Ruffin


"Genie Breaks the Bottle: Ethics in Artificial Intelligence Adoption: ChatGPT; The Beginning and the End of Human Wisdom"

2023 ▪

Shuyuan Mary Ho,Yue Liu


"Hive Mind Online: Collective Sensing in Times of Disinformation"

2023 ▪ Journal of Digital Social Research

Shuyuan Mary Ho,Jeffrey Nickerson,Qian Zhang


"Do You Speak Meme? A Dynamic Digital Language for the Information Society"

2023 ▪ Lecture notes in computer science

Minhyung Jo,Shuyuan Mary Ho,Gary Burnett


"Social distance “nudge:” a context aware mHealth intervention in response to COVID pandemics"

2022 ▪ Computational and Mathematical Organization Theory

Shuyuan Mary Ho,Xiuwen Liu,Md Shamim Seraj,Sabrina Dickey


"“I know you are, but what am I?” Profiling cyberbullying based on charged language"

2022 ▪ Computational and Mathematical Organization Theory

Shuyuan Mary Ho,Wenyi Li


"Consciousness of cyber defense: A collective activity system for developing organizational cyber awareness"

2021 ▪ Computers & Security

Shuyuan Mary Ho,Melissa Gross


"Cyber Forensics on Internet of Things: Slicing and Dicing Raspberry Pi"

2021 ▪ International Journal of Cyber Forensics and Advanced Threat Investigations

Shuyuan Mary Ho,Mike Burmester


"Collective Learning for Developing Cyber Defense Consciousness: An Activity System Analysis"

2021 ▪ The Journal of Information and Systems in Education

Melissa Gross,Shuyuan Mary Ho


"Trustworthiness: Top Qualification for Cyber Information Professionals"

2020 ▪ Auerbach Publications eBooks

Shuyuan Mary Ho


"Detecting Cyberbullying “Hotspots” on Twitter: A Predictive Analytics Approach"

2020 ▪ Forensic Science International Digital Investigation

Shuyuan Mary Ho,Dayu Kao,Ming-Jung Chiu-Huang,Wenyi Li,Chung-Jui Lai


"“On the left side, there’s nothing right. On the right side, there’s nothing left:” Polarization of Political Opinion by News Media"

2020 ▪ Lecture notes in computer science

Shuyuan Mary Ho,Dayu Kao,Wenyi Li,Chung-Jui Lai,Ming-Jung Chiu-Huang


"Resilience of Society to Recognize Disinformation: Human and/or Machine Intelligence"

2020 ▪

Ronit Purian,Shuyuan Mary Ho,Dov Te'Eni


"Charged language on Twitter: A predictive model of cyberbullying to prevent victimization"

2019 ▪

Shuyuan Mary Ho,Dayu Kao,Ming-June Chiu-Huang,Wenyi Li,Chung-Jui Lai,Bismark Ankamah


"Consciousness of Cyber Defense: Boundary Objects for Expansive Learning Through Creation of Contradictions"

2019 ▪ Lecture notes in computer science

Shuyuan Mary Ho,Diogo Oliveira,Raghav Rathi


"Leader Member Exchange: An Interactive Framework to Uncover a Deceptive Insider as Revealed by Human Sensors"

2019 ▪ Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences

Shuyuan Mary Ho Ph.D.


"The Privacy Paradox in HCI: Calculus Behavior in Disclosing PII Online"

2019 ▪ Lecture notes in computer science

Cheryl Booth,Shuyuan Mary Ho


"The shield and the sword: Expanding learning in cyber defense through competition"

2019 ▪ iConference 2014 Proceedings

Shuyuan Mary Ho,Diogo Oliveira,Raghav Rathi


"Context in a bottle: Language-action cues in spontaneous computer-mediated deception"

2018 ▪ Computers in Human Behavior

Shuyuan Mary Ho,Jeffrey T. Hancock


"Data for: Following the Breadcrumbs: Pattern Identification of Cloud Behavioral Forensics"

2018 ▪

Shuyuan Mary Ho,Da-Yu Kao,Wen-Ying Wu


"Following the breadcrumbs: Timestamp pattern identification for cloud forensics"

2018 ▪ Digital Investigation

Shuyuan Mary Ho,Dayu Kao,Wen-Ying Wu


"Computer-Mediated Deception: Collective Language-action Cues as Stigmergic Signals for Computational Intelligence"

2018 ▪ Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences

Shuyuan Mary Ho,Jeffrey T. Hancock


"Trustworthiness attribution: Inquiry into insider threat detection"

2017 ▪ Journal of the Association for Information Science and Technology

Shuyuan Mary Ho,Michelle Kaarst?Brown,Izak Benbasat


"Ethical dilemma: Deception dynamics in computer?mediated group communication"

2017 ▪ Journal of the Association for Information Science and Technology

Shuyuan Mary Ho,Jeffrey T. Hancock,Cheryl Booth


"Trust or consequences? Causal effects of perceived risk and subjective norms on cloud technology adoption"

2017 ▪ Computers & Security

Shuyuan Mary Ho,Mónica Ocasio-Velázquez,Cheryl Booth


"Gender deception in asynchronous online communication: A path analysis"

2017 ▪ SSRN Electronic Journal

Shuyuan Mary Ho,Paul Benjamin Lowry,Merrill Warkentin,Yanyun Yang,Jonathan Hollister


"Bridging the Security Gap between Software Developers and Penetration Testers: A Job Characteristic Theory Perspective"

2017 ▪ Americas Conference on Information Systems

Hwee-Joo Kam,Vishal Shah,Shuyuan Mary Ho


"Does the cloud have a silver lining? Privacy concerns and perceived risk in cloud technology adoption"

2017 ▪

Cheryl Booth,Shuyuan Mary Ho


"Gender deception in asynchronous online communication: A path analysis"

2016 ▪ Information Processing & Management

Shuyuan Mary Ho,Paul Benjamin Lowry,Merrill Warkentin,Yanyun Yang,Jonathan M. Hollister


"Lie to Me: A Multifactorial Analysis of Gender Deception in Asynchronous Online Communication"

2016 ▪ SSRN Electronic Journal

Shuyuan Mary Ho,Paul Benjamin Lowry,Merrill Warkentin,Yanyun Yang,Jonathan Hollister


"Computer-Mediated Deception: Strategies Revealed by Language-Action Cues in Spontaneous Communication"

2016 ▪ Journal of Management Information Systems

Shuyuan Mary Ho,Jeffrey T. Hancock,Cheryl Booth,Xiuwen Liu


"Demystifying Insider Threat: Language-Action Cues in Group Dynamics"

2016 ▪

Shuyuan Mary Ho,Jeffrey T. Hancock,Cheryl Booth,Mike Burmester,Xiuwen Liu,Shashank S. Timmarajus


"Real or Spiel? A Decision Tree Approach for Automated Detection of Deceptive Language-Action Cues"

2016 ▪

Shuyuan Mary Ho,Jeffrey T. Hancock,Cheryl Booth,Xiuwen Liu,Muye Liu,Shashank S. Timmarajus,Mike Burmester


"Saint or Sinner? Language-Action Cues for Modeling Deception Using Support Vector Machines"

2016 ▪ Lecture notes in computer science

Shuyuan Mary Ho,Xiuwen Liu,Cheryl Booth,Aravind Hariharan


"An online game simulation environment for detecting potential deceptive insiders"

2015 ▪ Winter Simulation Conference

Hongmei Chi,Shuyuan Mary Ho,Dominique Hubbard


"An online game simulation environment for detecting potential deceptive insiders"

2015 ▪ 2018 Winter Simulation Conference (WSC)

None Hongmei Chi,Shuyuan Mary Ho,Dominique Hubbard


"Leader’s dilemma game: An experimental design for cyber insider threat research"

2015 ▪ Information Systems Frontiers

Shuyuan Mary Ho,Merrill Warkentin


"Factors Affecting Individual Information Security Practices"

2015 ▪

Santos M. Galvez,Joshua D. Shackman,Indira R. Guzman,Shuyuan M. Ho


"Insider Threat"

2015 ▪

Shuyuan Mary Ho,Hengyi Fu,Shashanka S. Timmarajus,Cheryl Booth,Jung Hoon Baeg,Muye Liu


"Panel"

2015 ▪

Indira R. Guzman,Thomas Hilton,Miguel (Mike) O. Villegas,Michelle Kaarst-Brown,Jason James,Ashraf Shirani,Shuyuan Mary Ho,Diane Lending


"Liar, Liar, IM on Fire: Deceptive language-action cues in spontaneous online communication"

2015 ▪

Shuyuan Mary Ho,Jeffrey T. Hancock,Cheryl Booth,Xiuwen Liu,Shashanka S. Timmarajus,Mike Burmester


"Do You Trust the Cloud? Modeling Cloud Technology Adoption in Organizations"

2015 ▪ Americas Conference on Information Systems

Shuyuan Mary Ho,Mónica Ocasio Velázquez


"Cyber Insider Threat in Virtual Organizations"

2014 ▪ Advances in information quality and management

Shuyuan Mary Ho,Jonathan M. Hollister


"Dyadic attribution model: A mechanism to assess trustworthiness in virtual organizations"

2014 ▪ Journal of the Association for Information Science and Technology

Shuyuan Mary Ho,Izak Benbasat


"Interdisciplinary Practices in iSchools"

2014 ▪ iConference 2014 Proceedings

Dorte Madsen,Shuyuan Mary Ho


"Cyber Insider Threat: Trustworthiness in Virtual Organizations"

2014 ▪

Shuyuan Mary Ho


"Dyadic Attribution: A Theoretical Model for Interpreting Online Words and Actions"

2014 ▪ Lecture notes in computer science

Shuyuan Mary Ho,Shashanka Surya Timmarajus,Mike Burmester,Xiuwen Liu


"Seeking beyond with IntegraL: A user study of sense?making enabled by anchor?based virtual integration of library systems"

2013 ▪ Journal of the American Society for Information Science and Technology

Shuyuan Mary Ho,Michael Bieber,Min Song,Xiangmin Zhang


"Sociotechnical systems research: Defining, converging, and researching as a community"

2013 ▪

Rebecca Reynolds,Warren Allen,Ingrid Erickson,Shuyuan Mary Ho,James Howison,Ingbert Schmidt


"Agent-based modelling to visualise trustworthiness: a socio-technical framework"

2013 ▪ International Journal of Mobile Network Design and Innovation

Shuyuan Mary Ho,Ram Reddy Katukoori


"Guess who? An empirical study of gender deception and detection in computer?mediated communication"

2013 ▪ Proceedings of the American Society for Information Science and Technology

Shuyuan Mary Ho,Jonathan M. Hollister


"Plenary lecture 1: human-centered computational modeling for trustworthy cloud communications"

2012 ▪ International Conference on Communications

Shuyuan Mary Ho


"A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications."

2012 ▪ J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.

Shuyuan Mary Ho,Hwajung Lee


"Whodunit? Collective Trust in Virtual Interactions"

2012 ▪ Lecture notes in computer science

Shuyuan Mary Ho,Issam Ahmed,Roberto Salome


"i-sensor inference model for assessing trustworthiness in computer-mediated communications"

2011 ▪

Shuyuan Mary Ho,Xiangmin Zhang


"Enterprise Architecture as Context and Method for Designing and Implementing Information Security and Data Privacy Controls in Government Agencies"

2011 ▪ IGI Global eBooks

Scott Bernard,Shuyuan Mary Ho


"Enterprise Architecture as Context and Method for Designing and Implementing Information Security and Data Privacy Controls in Government Agencies"

2011 ▪ IGI Global eBooks

Scott Bernard,Shuyuan Mary Ho


"Toward a Deeper Understanding of Personnel Anomaly Detection"

2011 ▪ IGI Global eBooks

Shuyuan Mary Ho


"THEORIZING ON VIRTUAL IDENTITY THEFT USING THE TURING IMAGINATION GAME"

2011 ▪

Shuyuan Mary Ho


"IntegraL: An Effective Link-based Federated Search Infrastructure"

2010 ▪

Shuyuan Mary Ho,Min Song,Michael Bieber,Eric Koppel,Vahid Hamidullah,Pawel Bokota


"IntegraL Connects Data, User and Scientists."

2010 ▪ IASSIST

Shuyuan Mary Ho,Min Song,Michael Bieber


"A Socio-Technical Approach to Theorizing on Perceptions of Trustworthiness in Virtual Organizations"

2009 ▪

Shuyuan Mary Ho


"Feasibility Discussion on Identifying Possibility for a National Behavioral Anomaly Detection Platform"

2009 ▪

Shuyuan Mary Ho,Joseph Vincent Treglia


"Life-Cycle Thinking: What can IT do to be green?"

2009 ▪

Shuyuan Mary Ho,Conrad F. Metcalfe


"Life-Cycle Thinking: What can IT do to be green?"

2009 ▪

Shuyuan Mary Ho,Conrad F. Metcalfe


"A Socio-Technical Approach to Understanding Perceptions of Trustworthiness in Virtual Organizations"

2009 ▪ Springer eBooks

Shuyuan Mary Ho


"Behavioral anomaly detection: A socio-technical study of trustworthiness in virtual organizations"

2009 ▪ ProQuest LLC eBooks

Shuyuan Mary Ho


"Enterprise Architecture as Context and Method for Designing and Implementing Information Security and Data Privacy Controls in Government Agencies"

2009 ▪ IGI Global eBooks

Scott Bernard,Shuyuan Mary Ho


"iConference 2009 iSociety: Research, Education, Engagement Roundtable Discussion Feasibility Discussion on Identifying Possibility for a National Behavioral Anomaly Detection Platform"

2009 ▪

Shuyuan Mary Ho,Joseph Vincent Treglia


"Security-Based Knowledge Management"

2009 ▪ IGI Global eBooks

Shuyuan Mary Ho,Chingning Wang


"Trustworthiness in Virtual Organizations"

2009 ▪

Shuyuan Mary Ho


"Behavioral Parameters of Trustworthiness for Countering Insider Threats"

2008 ▪

Shuyuan Mary Ho


"Information Assurance, Intelligence and Security: Opportunities and Directions for Future Research"

2008 ▪

Scott Paquette,Isabelle Fagnot,Kevin C. Desouza,Dave Yates,Shuyuan Mary Ho


"Attribution-based Anomaly Detection: Trustworthiness in an Online Community"

2008 ▪ Social Computing, Behavioral Modeling, and Prediction

Shuyuan Mary Ho


"Toward a Deeper Understanding of Personnel Anomaly Detection"

2007 ▪ IGI Global eBooks

Shuyuan Mary Ho


"Monitoring-based coordinated defense through the lens of the coordination theory"

2006 ▪

S.M. Ho,Ugur Eseryel


"Composite Role-Based Monitoring (CRBM) for countering insider threats"

2004 ▪ Lecture notes in computer science

Joon S. Park,Shuyuan Mary Ho


"Composite Role-Based Monitoring (CRBM) for Countering Insider Threats"

2004 ▪ Lecture notes in computer science

Joon S. Park,Shuyuan Mary Ho


"Implemetation of space link extension services in NASA/JPL's deep space mission system"

2001 ▪

M. J. Stoloff,S. Ho,J. Louie,J. Diep,S. Davis,C. Aguilera,A. Guerrero,M. Levesque


COVID-19 Research-Ready

My Research Interests: • Trusted human-computer interaction • Predictive analytics • Social media dis-/misinformation • Cyberbullying, political polarization
My Research Background: My research interests are in trusted human-computer interactions, specifically addressing issues of computer-mediated deception, cyber insider threats, dis-/misinformation, and cyberbullying. Recent projects include the study of predictive analytics for identifying online deception and cyberbullying in social forums, as well as polarization in political forums. My iSensor Lab analyzes and extracts language-action cues, such as in charged language for identifying hate speech. My research discovers and identify subtle but noticeable computational differences in communicative intent that can be observed, triangulated and codified. I can collaborate on detecting COVID-19 social media dis-/misinformation campaign and societal impacts. I build research experimentations to explore and collect conversational artifacts from social simulations. I’m also interested in building an AI-based system that can assist the Centers for Disease Control and Prevention in devising containment strategies based on live data
How I Can Help Collaborators: • Scenario-based experimentation • User-centered interactive system design • Behavioral modeling & prediction • Modeling of language-action cues with analytics, social factors/ computing • Detecting social media dis/misinformation campaign and societal impacts
How Collaborators Can Help Me: • Bring your biggest problems for analysis • Access to big datasets (e.g., COVID-19, healthcare, social data, utilities, etc.) • Machine learning, artificial intelligence • Statistical analysis and modeling • Coding and programming
Additional Information: I founded the iSensor Lab in 2010 to conduct sociotechnical research related to human factors in cyberspace. Experiments are conducted in live and virtual environments using online games. Research data is collected through confined resources and interactions that are based on real-world cyber trust and deception simulations. We generate data based on real world scenarios that are created for specific purposes. This is done through the deployment of online games that contain identical variables as in real-world situations. Statistical modeling and machine learning are used to parse out the cues of conversations and make sense of the data collected.

Videos

Faculty of the Future
Duration: (2:55)
Year: 2019
Keyword: Research
CV19 SelfDefense Mobile App Concept Demo
Duration: (6:10)
Year: 2020
Keyword: COVID-19, digital response,
The iSensor Lab is pleased to announce its digital response to COVID-19 pandemic; CV19 SelfDefense android mobile app. The CV19 SelfDefense mobile app is a research artifact funded by Florida State University Collaborative Collision Seed Grant (CC-045704, 5/11/20 – 8/18/20). Interested users may download this version on an android phone, register an account with the iSensor server, and login to their personal account with a dashboard of features and tools to begin utilizing the services provided that help users to defend themselves during the Coronavirus pandemic. For more information, please visit iSensor Lab at https://isensoranalytics.com

Research on Computer-Mediated Deception
Duration: (1:21)
Year: 2018
Keyword: computer-mediated deception, online deception, language-action cues, cybersecurity, information behavior
The chance of a human spotting lies is 52.4%, approximately equivalent to random. However, a machine-learning approach can spot lies and classify online deception with nearly 85-100% accuracy.

Research on Cyber Insider Threat
Duration: (1:22)
Year: 2018
Keyword: cyber insider threat, cybersecurity, language-action cues, computer-mediated deception
The sociotechnical systems approach models multi-level interactions, extracts language-action cues, constructs dyadic attribution on trustworthiness, and identifies computer-mediated deception with accuracy.

iSensor Tech Talk for NSF ICorps
Duration: (00.03.06)
Year: 2015
Keyword: iSnesor Analytics
iSensor Analytics ICorps Lessons Learned
Duration: (00:01:00)
Year: 2015
Keyword: iSensor Analytics
NSF I-CORPS NYCRIN Feb-March 2015

Research in a minute
Duration: (00:01:00)
Year: 2014
Keyword: insider threat, computer-mediated deception
Florida State University researcher Shuyuan Mary Ho discusses her research regarding the issues of cyber insider threats and online identity theft.

Contact

Name: Shuyuan Mary Ho  
Title: Asoc Professor
University: Florida State University
College/School: College Of Communication and Information
Home Department: School Of Information
Address: 142 COLLEGIATE LOOP
TALLAHASSEE, FL
Email:
Phone: 850/645-0406
ORCID: https://orcid.org/0000-0002-4790-1821