... Enterprise Architecture as Context and Method for Designing and Implementing Information Secu... more ... Enterprise Architecture as Context and Method for Designing and Implementing Information Security and Data Privacy Controls in Government Agencies. View Sample PDF Cite Chapter. MLA. Bernard, Scott, and Shuyuan Mary Ho. ...
... Enterprise Architecture as Context and Method for Designing and Implementing Information Secu... more ... Enterprise Architecture as Context and Method for Designing and Implementing Information Security and Data Privacy Controls in Government Agencies. View Sample PDF Cite Chapter. MLA. Bernard, Scott, and Shuyuan Mary Ho. ...
Interdisciplinarity is in the DNA of the iSchools. This workshop invites you to discuss how inter... more Interdisciplinarity is in the DNA of the iSchools. This workshop invites you to discuss how inter-disciplinarity plays out in theory and practice. The workshop addresses the uniqueness of the iSchools, provides an interactive framework to discuss and reflect on interdisciplinary practice. It suggests some models and tools to describe relations between disciplines, while offering a venue to brainstorm and envision issues of interest with like-minded colleagues. The purpose of this workshop is to establish a setting for continuous dialogue among colleagues on how interdisciplinarity plays out in practice. The workshop aims to create a forum for reflection on local inter-disciplinary practice(s) and to consider the possibilities of forming research networks. The workshop opens with a panel presentation from iSchool deans and senior faculty discussing current interdisciplinarity practices in iSchools and with presentations that address theoretical frameworks of interdisciplinarity. Thes...
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research - SIGMIS-CPR '15, 2015
ABSTRACT Language as a symbolic medium plays an important role in virtual communications. Words c... more ABSTRACT Language as a symbolic medium plays an important role in virtual communications. Words communicated online as action cues can provide indications of an actor's behavioral intent. This paper describes an ongoing investigation into the impact of a deceptive insider on group dynamics in virtual team collaboration. An experiment using an online game environment was conducted in 2014. Our findings support the hypothesis that language-action cues of group interactions will change significantly after an insider has been compromised and makes efforts to deceive. Furthermore, the language used in group dynamic interaction will tend to employ more cognition, inclusivity and exclusivity words when interacting with each other and with the focal insider. Future work will employ finely tuned complex Linguistic Inquiry and Word Count dictionaries to identify additional language-action cues for deception.
Proceedings of the American Society for Information Science and Technology, 2013
ABSTRACT The verification of an online conversation partner's identity is a challenge due... more ABSTRACT The verification of an online conversation partner's identity is a challenge due to the lack of verbal and visual cues in computer-mediated communication. People must constantly assess the identity of whomever they are communicating with based on limited interaction. This poster describes an empirical study that identifies how people attribute gender and detects gender deception in online text-based communication. Data has been collected through an interactive social media game platform and designed as a quasi-experiment. Our study confirms that the speakers' domain knowledge, perceived trustworthiness, and self-efficacy have an impact on the success of gender deception and attribution. Perceived gender of the speaker also had an impact on the successful detection of gender deceptive messages.
0 Chapter XXVI Toward a Deeper Understanding of Personnel Anomaly Detection Shuyuan Mary Ho Syrac... more 0 Chapter XXVI Toward a Deeper Understanding of Personnel Anomaly Detection Shuyuan Mary Ho Syracuse University, USA abstract Recent threats to prominent organizations have greatly increased social awareness of the need for information security. Many measures have ...
Journal of the American Society for Information Science and Technology, 2013
ABSTRACT This article presents a user study showing the effectiveness of a linked-based, virtual ... more ABSTRACT This article presents a user study showing the effectiveness of a linked-based, virtual integration infrastructure that gives users access to relevant online resources, empowering them to design an information-seeking path that is specifically relevant to their context. IntegraL provides a lightweight approach to improve and augment search functionality by dynamically generating context-focused “anchors” for recognized elements of interest generated by library services. This article includes a description of how IntegraL's design supports users' information-seeking behavior. A full user study with both objective and subjective measures of IntegraL and hypothesis testing regarding IntegraL's effectiveness of the user's information-seeking experience are described along with data analysis, implications arising from this kind of virtual integration, and possible future directions.
International Journal of Mobile Network Design and Innovation, 2013
ABSTRACT This paper describes a socio-technical study based on physical world scenarios of decept... more ABSTRACT This paper describes a socio-technical study based on physical world scenarios of deceptive behaviour occurring in a virtual collaborative environment. An agent-based modelling ABM approach was adopted to visualise trustworthiness that can signal deceptive behaviour in virtual communications among social actors. The modelling strategies were guided by attribution theories toward an agent's perceived trustworthiness. The assessment of an agent's trustworthiness is based on their language actions as observable information-based behavioural cues, derived from objective semantic analysis. The consistency between an agent's words and actions and distinctiveness of the agent's behaviour when compared against his/her regular behaviour can serve as input data in each interaction. A set of ABM rules is proposed to systematically capture this interaction and assessment of trustworthiness. The logic behind a dyadic attribution can support computations on the trustworthiness of an agent.
Abstract: The purpose of this panel is to identify and discuss high-level parameters and social i... more Abstract: The purpose of this panel is to identify and discuss high-level parameters and social issues regarding the implementation of a national behavioral anomaly detection platform. This platform would provide a statistical firewall to protect the rights of individual ...
A growing number of the iSchools have recently begun to emphasize programs of research directed t... more A growing number of the iSchools have recently begun to emphasize programs of research directed towards the topic of information assurance, intelligence and security. Covering such areas as network and infrastructure security, information systems auditing and security practices ...
... Enterprise Architecture as Context and Method for Designing and Implementing Information Secu... more ... Enterprise Architecture as Context and Method for Designing and Implementing Information Security and Data Privacy Controls in Government Agencies. View Sample PDF Cite Chapter. MLA. Bernard, Scott, and Shuyuan Mary Ho. ...
... Enterprise Architecture as Context and Method for Designing and Implementing Information Secu... more ... Enterprise Architecture as Context and Method for Designing and Implementing Information Security and Data Privacy Controls in Government Agencies. View Sample PDF Cite Chapter. MLA. Bernard, Scott, and Shuyuan Mary Ho. ...
Interdisciplinarity is in the DNA of the iSchools. This workshop invites you to discuss how inter... more Interdisciplinarity is in the DNA of the iSchools. This workshop invites you to discuss how inter-disciplinarity plays out in theory and practice. The workshop addresses the uniqueness of the iSchools, provides an interactive framework to discuss and reflect on interdisciplinary practice. It suggests some models and tools to describe relations between disciplines, while offering a venue to brainstorm and envision issues of interest with like-minded colleagues. The purpose of this workshop is to establish a setting for continuous dialogue among colleagues on how interdisciplinarity plays out in practice. The workshop aims to create a forum for reflection on local inter-disciplinary practice(s) and to consider the possibilities of forming research networks. The workshop opens with a panel presentation from iSchool deans and senior faculty discussing current interdisciplinarity practices in iSchools and with presentations that address theoretical frameworks of interdisciplinarity. Thes...
Proceedings of the 2015 ACM SIGMIS Conference on Computers and People Research - SIGMIS-CPR '15, 2015
ABSTRACT Language as a symbolic medium plays an important role in virtual communications. Words c... more ABSTRACT Language as a symbolic medium plays an important role in virtual communications. Words communicated online as action cues can provide indications of an actor's behavioral intent. This paper describes an ongoing investigation into the impact of a deceptive insider on group dynamics in virtual team collaboration. An experiment using an online game environment was conducted in 2014. Our findings support the hypothesis that language-action cues of group interactions will change significantly after an insider has been compromised and makes efforts to deceive. Furthermore, the language used in group dynamic interaction will tend to employ more cognition, inclusivity and exclusivity words when interacting with each other and with the focal insider. Future work will employ finely tuned complex Linguistic Inquiry and Word Count dictionaries to identify additional language-action cues for deception.
Proceedings of the American Society for Information Science and Technology, 2013
ABSTRACT The verification of an online conversation partner's identity is a challenge due... more ABSTRACT The verification of an online conversation partner's identity is a challenge due to the lack of verbal and visual cues in computer-mediated communication. People must constantly assess the identity of whomever they are communicating with based on limited interaction. This poster describes an empirical study that identifies how people attribute gender and detects gender deception in online text-based communication. Data has been collected through an interactive social media game platform and designed as a quasi-experiment. Our study confirms that the speakers' domain knowledge, perceived trustworthiness, and self-efficacy have an impact on the success of gender deception and attribution. Perceived gender of the speaker also had an impact on the successful detection of gender deceptive messages.
0 Chapter XXVI Toward a Deeper Understanding of Personnel Anomaly Detection Shuyuan Mary Ho Syrac... more 0 Chapter XXVI Toward a Deeper Understanding of Personnel Anomaly Detection Shuyuan Mary Ho Syracuse University, USA abstract Recent threats to prominent organizations have greatly increased social awareness of the need for information security. Many measures have ...
Journal of the American Society for Information Science and Technology, 2013
ABSTRACT This article presents a user study showing the effectiveness of a linked-based, virtual ... more ABSTRACT This article presents a user study showing the effectiveness of a linked-based, virtual integration infrastructure that gives users access to relevant online resources, empowering them to design an information-seeking path that is specifically relevant to their context. IntegraL provides a lightweight approach to improve and augment search functionality by dynamically generating context-focused “anchors” for recognized elements of interest generated by library services. This article includes a description of how IntegraL's design supports users' information-seeking behavior. A full user study with both objective and subjective measures of IntegraL and hypothesis testing regarding IntegraL's effectiveness of the user's information-seeking experience are described along with data analysis, implications arising from this kind of virtual integration, and possible future directions.
International Journal of Mobile Network Design and Innovation, 2013
ABSTRACT This paper describes a socio-technical study based on physical world scenarios of decept... more ABSTRACT This paper describes a socio-technical study based on physical world scenarios of deceptive behaviour occurring in a virtual collaborative environment. An agent-based modelling ABM approach was adopted to visualise trustworthiness that can signal deceptive behaviour in virtual communications among social actors. The modelling strategies were guided by attribution theories toward an agent's perceived trustworthiness. The assessment of an agent's trustworthiness is based on their language actions as observable information-based behavioural cues, derived from objective semantic analysis. The consistency between an agent's words and actions and distinctiveness of the agent's behaviour when compared against his/her regular behaviour can serve as input data in each interaction. A set of ABM rules is proposed to systematically capture this interaction and assessment of trustworthiness. The logic behind a dyadic attribution can support computations on the trustworthiness of an agent.
Abstract: The purpose of this panel is to identify and discuss high-level parameters and social i... more Abstract: The purpose of this panel is to identify and discuss high-level parameters and social issues regarding the implementation of a national behavioral anomaly detection platform. This platform would provide a statistical firewall to protect the rights of individual ...
A growing number of the iSchools have recently begun to emphasize programs of research directed t... more A growing number of the iSchools have recently begun to emphasize programs of research directed towards the topic of information assurance, intelligence and security. Covering such areas as network and infrastructure security, information systems auditing and security practices ...
The increasing social reliance on computer-mediated communication has resulted in the rise of dec... more The increasing social reliance on computer-mediated communication has resulted in the rise of deceptive communication. Gender is a salient feature of identity that can be easily disguised online, and yet the phenomenon of gender deception has not been fully investigated. This study adopts a multifactorial analysis to examine motivation, self-efficacy and gender of a deceiver in relation to self-efficacy and gender of the detector as a contribution to understanding online gender deception. An asynchronous online game was developed to simulate scenarios in which males were incentivized to speak like females, and females were incentivized to speak like males. Using path analysis, we analyzed cognitive factors of gender deception, to support our hypotheses that an actor’s actual gender can affect the motivation to deceive; males had higher self-efficacy beliefs in gender deception, and females had a higher success rate in detecting such deception. Our research suggests that the gender of the message recipient could be a significant factor in uncovering gender deception.
Uploads