About
107
Publications
148,416
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
8,151
Citations
Publications
Publications (107)
The landscape of social media content has evolved significantly, extending from text to multimodal formats. This evolution presents a significant challenge in combating misinformation. Previous research has primarily focused on single modalities or text-image combinations, leaving a gap in detecting multimodal misinformation. While the concept of e...
Content moderation is a common intervention strategy for reviewing user-generated content on social media platforms. Engaging users in content moderation is promising for making ethical and fair moderation decisions. A few studies that have considered user engagement in content moderation have primarily focused on classifying user-generated comment...
The pervasive use of mobile devices exposes users to an elevated risk of shoulder-surfing attacks. Despite the prior work on shoulder-surfing resistance of mobile user authentication methods, there is a lack of empirical studies on textual password authentication methods, particularly the hybrid passwords that integrate textual passwords with biome...
Assistive technology is extremely important for maintaining and improving the elderly’s quality of life. Biometrics-based mobile user authentication (MUA) methods have witnessed rapid development in recent years owing to their usability and security benefits. However, there is a lack of a comprehensive review of such methods for the elderly. The pr...
Background
The ultimate goal of any prescribed medical therapy is to achieve desired outcomes of patient care. However, patient nonadherence has long been a major problem detrimental to patient health and, thus, is a concern for all health care providers. Moreover, nonadherence is extremely costly for global medical systems because of unnecessary c...
Some consumers have various product demands that are associated with each other. Although there are methods for discovering the associations among co-purchased products, they have limitations, including redundancy of the extracted association rules, the potential to miss novel and interesting associations among co-demanded products hidden in shoppi...
Objective
With the advancement of mobile technologies, patients can access medical and patient educational information anytime and anywhere. Computer-aided patient education has been advocated as a key means of interventions for improving patient knowledge and compliance (i.e., adherence). However, evidence of the efficacy of computer-aided patient...
The QWERTY keyboard on mobile devices usually requires users’ full visual attention and both hands, which is not always possible. We propose a thumb-stroke-based keyboard, ThumbStroke, to support both sight-free and one-handed text entry. Text entry via ThumbStroke completely relies on the directions of thumb strokes at any place on the screen of a...
Recent advances in sensing and wireless communication technologies have led to an explosion in the use of touch-screen mobile devices such as smartphones and tablets in mobile commerce and other daily work and life activities. These activities have resulted in more and more private and sensitive information stored on those devices. Therefore, impro...
Objectives
This study investigates the public’s opinions on a new school meals policy for childhood obesity prevention, discovers aspects concerning those opinions, and identifies possible gender and regional differences in the U.S.
Methods
We collected 14,317 relevant tweets from 11,715 users since the national policy enactment on Feb 9, 2010 thr...
Despite its ubiquitous use, the pinch zooming technique is not effective for single-handed interaction with touch-screen mobile devices. We propose ContextZoom, a novel technique for single-handed zooming on touch-screen mobile devices. It allows users to specify any location on a device screen as the zooming center and ensures that this intended z...
The pervasive and prevalent use of touch-screen mobile phones in both work and daily life has generated more and more private and sensitive information on those devices. Accordingly, there is an ever-increasing need to improve the security of mobile phones. Recent advances in mobile user authentication technologies mainly focus on entry-point authe...
Online consumer product reviews are a main source for consumers to obtain product information and reduce product uncertainty before making a purchase decision. However, the great volume of product reviews makes it tedious and ineffective for consumers to peruse individual reviews one by one and search for comments on specific product features of th...
The lack of patient compliance to medical recommendations and treatments suggested by doctors has long been a significant problem. In practice, patient education is considered an important intervention to empower patients and increase their compliance. It has been advocated as a means of improving patient medical knowledge and compliance. However,...
Multimedia content in web pages poses a variety of problems to mobile web users, such as incompatibility with mobile devices or failing to meet accessibility needs of users with vision disabilities. To address those problems, this study proposes and evaluates a context-aware approach to multimedia content adaptation for mobile Web. It uniquely take...
information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. This version of the referenced work is the post-print version of the article—it is NOT the final published version nor the corrected proofs. If yo...
In this research, we propose a novel classification model that consists of features of website URL and content for automatically detecting Chinese phishing e-Business websites. The model incorporates several unique domain-specific features of Chinese e-Business. We have trained and evaluated the proposed model using four different classification al...
Behavioral cues to deception are instrumental to detecting deception. As one of the primary sources of deception behavior, text has been analyzed at the level of sub-sentence or message but not the discourse of interaction. Additionally, empirical studies on cues to deception in the case of multiple receivers remain nonexistent. To fill these voids...
Multimedia content in websites poses a variety of problems to mobile WEB users, such as content incompatible with mobile devices or failing to meet the accessibility needs of users with disabilities. This study proposes and evaluates a user-centered, device-aware approach to multimedia content adaptation for mobile WEB to address those problems. It...
The explosive growth of mobile handheld devices users and the increasing need of ubiquitous information access make the use of mobile WEB a common practice. The effectiveness of mobile WEB is contingent upon many factors. Among them, visual properties such as colors of WEB content can significantly influence user experience. However, website design...
Understanding text requires not only the extraction of individual concepts, but the identification of semantic relationships among concepts as well. Lexical resources have been applied to analyzing text in a wide range of applications. However, manual compilation of lexical resources is difficult to keep up with the rapid increase of the volume and...
Deception has been an important problem in interactive groups, impeding effective group communication and group work, yet deception detection in such a context remains understudied. Extrapolated from the interpersonal deception theory (IDT) and group composition research in cooperative contexts, this research proposes that group factors, including...
Social computing can be broadly defined as the computational facilitation of social studies and human social dynamics as well as the design and use of computing technologies that consider social contexts. With the development and adoption of social computing technologies, social computing systems are increasingly involved with the economic contexts...
Many applications require knowledge about how to deceive, including those related to safety, security, and warfare. Speech and text analysis can help detect deception, as can cameras, microphones, physiological sensors, and intelligent software. Models of deception and noncooperation can make a virtual or mixed-reality training environment more rea...
The pervasiveness of mobile handheld devices and advancement in real-time continuous speech recognition technology has opened up a wide range of research opportunities in human-computer interaction for those devices. On the one hand, there has been an increasing amount of research on developing user-friendly speech recognition solutions and applica...
There are currently many active movements towards computerizing patient healthcare information. As Electronic Medical Record (EMR) systems are being increasingly adopted in healthcare facilities, however, there is a big challenge in effectively utilizing ...
Managing personal information such as to-dos and contacts has become our daily routines, consuming more time than needed. Existing PIM tools require extensive involvement of human users. This becomes a problem in using mobile devices due to their physical constraints. To address the limitations of traditional PIM tools, we propose a model of mobile...
Deception in computer-mediated group Negotiation and decision making presents a variety of risks. Gaining a better understanding of online deception has important implications for both individuals and organizations. Despite the rapidly increasing number of online deception cases reported in recent years, extant deception research has not considered...
Accessing the Web from mobile handheld devices has become increasingly common. However, accomplishing that task remains challenging mainly due to the physical constraints of handheld devices and the static presentation of Web pages. Adapting the presentation of Web pages is, therefore, critical to enabling effective mobile Web browsing and informat...
Recent studies on open-source software (OSS) products report that smaller modules are proportionally more defect prone compared to larger ones. This phenomenon, referred to as the Theory of Relative Defect Proneness (RDP),
challenges the traditional QA approaches that give a higher priority to larger modules, and it attracts growing interest from
c...
Existing research on context and context awareness has broadly focused on the technical aspects of context acquisition and interpretation of users' surroundings, also called physical or sensor-based context. Such an approach is lack of reconciling the user's perception of real-world context and a context-aware system's interpretation of that contex...
This study examines trust in technology-supported groups from the perspectives of culture, social presence, and group composition. Our results demonstrate that, in culturally homogeneous groups, individualism has a negative impact on the level of interpersonal trust; however, in culturally heterogeneous groups consisting of Chinese and U.S. partici...
As the use of mobile handheld devices for Web access becomes increasingly popular, ease of use has become an important issue
for mobile devices. However, due to their small screen size, users often suffer from the poor content presentation that seriously
hinders the usability of Mobile Web applications. Therefore, adapting Web content presentation...
Context-aware mobile applications are systems that can sense clues about the situational environment and enable appropriate mechanisms of interaction between end users and systems, making mobile devices more intelligent, adaptive, and personalized. In order to better understand such systems and the potentials and barriers of their development and p...
The importance of the relationship between size and defect proneness of software modules is well recognized. Understanding the nature of that relationship can facilitate various development decisions related to prioritization of quality assurance activities. Overall, the previous research only drew a general conclusion that there was a monotonicall...
Document summarization is an important function for knowledge management when a digital library of text documents grows. It allows documents to be presented in a concise manner for easy reading and understanding. Traditionally, document summarization adopts sentence-based mechanisms that identify and extract key sentences from long documents and as...
There is a growing interest in the use of context-aware systems, which can recognize user’s situational context and accordingly
provide a desirable interaction with the user. However, the design, development, evaluation and deployment of context-aware
systems are still at its infancy. In this paper, we propose an operational mechanism approach to c...
In this study, we investigated the functional form of the size-defect relationship for software modules through replicated
studies conducted on ten open-source products. We consistently observed a power-law relationship where defect proneness increases
at a slower rate compared to size. Therefore, smaller modules are proportionally more defect pron...
A number of studies have been conducted, providing linguistic cues about deception in online communication and leading to the development of models for automatic deception detection. These studies have demonstrated that these linguistic cues and models can be used to, to assist people in detecting online deception and to increase public awareness a...
Online deception is disrupting our daily life, organizational process, and even national security. Existing approaches to online deception detection follow a traditional paradigm by using a set of cues as antecedents for deception detection, which may be hindered by ineffective cue identification. Motivated by the strength of statistical language m...
Web service composition can enhance the efficiency and agility of knowledge management by composing individual Web services together for complex business requirements. There are two main research streams in knowledge representation for Web service composition: the syntactic-based approach and the semantic-based approach. Despite the promises brough...
Globalization has led to the increasing use of organizational teams comprised of individuals with diverse cultural backgrounds. Existing research suggests that collaborative software may benefit multicultural teams. However, most prior studies are limited by their focus on U.S. and Western cultures. We explore this issue by comprehensively examinin...
Software is developed in a dynamic context where team structure, requirements, and processes evolve together with the product. Although researchers have been studying the evolution of software systems since the early 70s, the study on the evolution of software development teams remains rare. Such evolutionary patterns and their impact on software q...
Web service composition can enhance the efficiency and agility of knowledge management by composing individual Web services together for complex business requirements. There are two main research streams in knowledge representation for Web service composition: the syntactic-based approach and the semantic-based approach. Despite the promises brough...
Osteoarthritis is a common locomotor disorder affecting many older people and has become a growing public health problem. Adherence to exercise is a key to the successful recovery of patients but is often a major problem for older adults with osteoarthritis. The proposed pilot study is aimed to explore the feasibility and acceptance of an interacti...
Motivated by the practical significance of deception detection to both organizations and individuals and the recent surge of research interests in deception in computer-mediated communication (CMC), this study examines whether and how the modality of communication media can influence deception detection in CMC. The results of empirical evaluations...
The importance of research on misinformation has received wide recognition. Two major challenges faced by this research community are the lack of theoretical models and the scarcity of misinformation in support of such research. This paper aims to address the aforementioned challenges by conceptualizing misinformation and enabling the interoperabil...
Context-aware computing is aimed to make mobile devices smarter by giving them the ability to recognize and interpret the surrounding environment and react proactively and intelligently. However, the development and deployment of context-aware mobile artifacts are still at their infancy, with few theories and little empirical evidence about how to...
Quality is becoming increasingly important with the continuous adoption of open-source software. Previous research has found that there is generally a positive relationship between module size and defect proneness. Therefore, in open-source software development, it is important to monitor module size and understand its impact on defect proneness. H...
Full Text at Springer, may require registration or fee
Majority influence is the attempt by a majority of group members to impose their common position on group dissenters during group decision making. Because of globalization, the use of cross-cultural teams in group tasks is becoming increasingly common. The objective of this study was to investigate how national culture, social presence, and group d...
Collaborative commerce (C-Commerce) is a set of technologies and business practices that allows companies to build stronger relationships with their trading partners through integrating complex and cross-enterprise processes governed by business logic and rules, as well as workflows. Business Process Management (BPM) is a key element of C-Commerce...
The World Wide Web Consortium (W3C) has announced the launch of a new Mobile Web Initiative (MWI), aiming to address the interoperability and usability problems in order to make Web access from a mobile device simple, easy, and convenient. Various summarization and visualization techniques have been used in content presentation adaptation for mobil...
As globalization increases, firms that rely on intellectual assets have realized that their competitive advantage depends on the development and effective use of collaboration technologies. Today, teams within or across organizations often consist of individuals with diverse cultural backgrounds and skills, creating a pressing need to better unders...
In this empirical study we examine the impact of national culture and social presence on interpersonal trust in both culturally homogeneous and heterogeneous groups. Results demonstrate that interpersonal trust is higher in homogeneous, low-individualism groups (represented by Chinese participants) than that in homogeneous, high-individualism group...
ABATRACT Since the late 1990s, online shopping has taken off as an increasing number of consumers purchase increasingly diversified products on the Internet. Given that how to attract and retain consumers is critical to the success of online retailers, research on the antecedents of consumer acceptance of online shopping has attracted widespread at...
Collaborative Filtering (CF) systems generate recommendations for a user by aggregating item ratings of other like-minded users. The memory-based approach is a common technique used in CF. This approach first uses statistical methods such as Pearson's Correlation Coefficient to measure user similarities based on their previous ratings on different...
Web service composition can enhance the efficiency and agility of knowledge management by composing individual Web services together for complex business requirements. There are two main research streams in knowledge representation for Web service composition: the syntactic-based approach and the semantic-based approach. Despite the promises brough...
We describe our findings and experiences from our technical review of vote verification systems for the Maryland State Board of Elections (SBE). The review included the following four systems for possible use together with Maryland's existing Diebold AccuVote-TS (touch screen) voting system: VoteHere Sentinel; SCYTL Pnyx.DRE; MIT-Selker audio syste...
The small screen size of handheld mobile devices poses an inherent problem in visualizing data: very often it is too difficult and unpleasant to navigate through the plethora of presented information. This paper presents a novel approach to personalized and adaptive content presentation for handheld devices, which has been implemented in a mobile f...
The great potential of speech recognition systems in freeing users' hands while interacting with computers has inspired a variety of promising applications. However, given the performance of the state-of-the-art speech recognition technology today, widespread acceptance of speech recognition technology would not be realistic without designing and d...
Deception can be detrimental to individual and organizational decision mak- ing. Existing research on behavioral cues to deception has focused mainly on monologue and dyadic interaction. No studies have empirically examined the impact of group size on behavioral cues to deception. This study is the first attempt to investigate whether deceivers beh...
Interactive video in an e-learning system allows proactive and random access to video content. Our empirical study examined the influence of interactive video on learning outcome and learner satisfaction in e-learning environments. Four different settings were studied: three were e-learning environments—with interactive video, with non-interactive...
Web stores, where buyers place orders over the Internet, have emerged to become a prevalent sales channel. In this research, we developed neural network models, which are known for their capability of modeling noncompensatory decision processes, to predict and explain consumer choice between web and traditional stores. We conducted an empirical sur...
Web service composition can enhance the efficiency and agility of knowledge management by composing individual Web services together for complex business requirements. There are two main research streams in knowledge representation for Web service composition: the syntactic-based approach and the semantic-based approach. Despite the promises brough...
Presently, there is an increasing demand of accessing Web from mobile handheld devices. However, due to the small screen of handheld devices, mobile users often suffer from the poor presentation that seriously hinders the usability of mobile applications. In addition, users have different information needs and preferences. They prefer to receive co...
The purpose of this study is to address questions on how collectivistic and individualistic cultures affect majority influence in a group decision making task when there are differences in media richness. We developed a theory that explains and predicts these phenomena, and tested hypotheses using 112 four-person groups that consisted of Chinese an...
The popularity of distributed learning and the continued growth in the number of colleges and universities offering courses delivered entirely via asynchronous learning networks (ALN) are unquestioned. There is little agreement on what constitutes the ...
Instant Messaging (IM) features informal writing styles such as the omission of punctuation. Punctuation plays an important role in representing prosody and facilitating syntactic processing during communication. The discrepancy between the recognized importance and actual inadequate usage of punctuation in IM calls for establishing punctuation con...
With the rapid advance of mobile technologies and the widely use of handheld mobile devices, there is an increasing demand of accessing web information from mobile devices. However, a variety of inherent constraints of mobile devices and wireless environments pose challenges to users for navigating or locating the desirable information on small scr...
Usability testing of software applications developed for mobile devices is an emerging research area that faces a variety of challenges due to unique features of mobile devices, limited bandwidth, unreliability of wireless networks, as well as the changing context (environmental factors). Traditional guidelines and methods used in usability testing...
Building composite Web services can save significant time and cost for developing new applications and enhancing the interoperability and collaboration among E-business partners. This article proposes a framework for dynamic and personalized composition of Web services using an approach that integrates not only functional attributes of Web services...
In order to reduce costs and gain competitive advantages, many companies are offering web services that enable software components to be accessed by their customers and trading partners over the internet. With the latest advances in mobile computing and communication technologies, web services are increasingly used to expose functionalities of many...
The rapid growth of mobile technology has expedited ubiquitous information access via handheld devices. However, the fundamental natures of mobile information systems are different from those of desktop applications in terms of purpose of use, device features, communication networks, and working environments. This poses various challenges to mobile...
Interface design is arguably one of the most important issues in the development of mobile applications. Mobile users often suffer from the poor interface design that seriously hinders the usability of those mobile applications. The major challenge in the interface design of mobile applications is caused by the unique features of mobile devices, su...
Business process management (BPM) includes the capability to discover, design, deploy, execute, interact with, operate, optimize, and analyze business processes. It is critical for businesses in the current intensive and competitive market. Traditional BPM has problems in interoperability, agility, and flexibility. This research investigates the ro...
With the increase of economic globalization and evolution of information technology, financial data are being generated and accumulated at an unprecedented pace. As a result, there has been a critical need for automated approaches to effective and efficient utilization of massive amount of financial data to support companies and individuals in stra...
Natural language interface (NLI) facilitates the human use of computers. In this paper, we review the state-of-the-art NLI application. Based on the extant literature, we design process flow of an NLI system enabling easy information access via mobile devices. Full Text at Springer, may require registration or fee
The importance of misinformation research has received wide recognition. However, one major challenge facing the research community is the lack of misinformation data and the difficulty in managing such data. Motivated by the role of ontology in information sharing and reuse, we propose a misinformation ontology and its representation based on the...
As a powerful and expressive nontextual media that can capture and present information, instructional videos are extensively used in e-Learning (Web-based distance learning). Since each video may cover many subjects, it is critical for an e-Learning environment to have content-based video searching capabilities to meet diverse individual learning n...
The advantages of electeronic learning technology over the traditional class room learning system are discussed. In comparison with the traditional class room learning that centres on instructors, electronic learning offers a learner-centered self-paced learning environment. More multimedia based e-learning systems are becoming available to integra...
Dominance is not only a complicated social phenomenon that involves interpersonal dynamics, but also an effective strategy used in various applications such as deception detection, negotiation, and online community. The extensive literature on dominance has primarily focused on the personality traits and socio-biological influence, as well as vario...
Deception has been extensively studied in many disciplines in social science. With the increasing use of instant messaging (IM) in both informal communication and performing tasks in work place, deception in IM is emerging as an important issue. In this study, we aimed to explore the online behavior of deception in a group IM setting. The empirical...
Network-aware Applications is a promising new concept in which applications are aware of network conditions and thus can adapt to the varying environment to achieve acceptable and predictable performance. This paper reviews the current research on network-aware applications, with a focus on their appliance on mobile multimedia applications. First,...
Network traffic monitoring is critical for wireless applications to ensure the QoS while streaming multimedia content. The high rate of traffic monitoring is likely to obtain the high accuracy of the network traffic. However, using a high monitoring rate has a tradeoff due to the extra bandwidth consumption. In a wireless network environment with l...
Mobile computing has become an interesting field of research due to the advancement of wireless technology. With the rapidly increasing bandwidth of wireless networks and demand of acquiring information anytime, anywhere, delivering content to mobile devices in an effective, efficient, and personalized manner has been recognized as one of the impor...
Nowadays, multimedia-based e-Learning systems have become widely available. Many systems, however, provide little interactivity to learners. E-Learners do not have much control over learning content and process to meet their individual needs. Therefore, we face challenges of how to integrate instructional material in different media and how to prov...
In today's new economy characterized by industrial change, globalization, increased intensive competition, knowl-edge sharing and transfer, and information technology revolu-tion, traditional classroom education or training does not always satisfy all the needs of the new world of lifelong learning. Learn-ing is shifting from instructor-centered to...
The role of information retrieval (IR) in support of decision making and knowledge management has become increasingly significant. Confronted by various problems in traditional keyword-based IR, many researchers have been investigating the potential of natural language processing (NLP) technologies. Despite widespread application of NLP in IR and h...
The major challenge in current humanitarian assistance/disaster relief (HA/DR) efforts is that diverse information and knowledge are widely distributed and owned by different organizations. These resources are not efficiently organized and utilized during HA/DR operations. We present a knowledge management framework that integrates multiple informa...
Network
Cited