Dongsong Zhang

Dongsong Zhang
University of Maryland, Baltimore County | UMBC · Department of Information Systems

About

107
Publications
148,416
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
8,151
Citations

Publications

Publications (107)
Preprint
The landscape of social media content has evolved significantly, extending from text to multimodal formats. This evolution presents a significant challenge in combating misinformation. Previous research has primarily focused on single modalities or text-image combinations, leaving a gap in detecting multimodal misinformation. While the concept of e...
Conference Paper
Full-text available
Content moderation is a common intervention strategy for reviewing user-generated content on social media platforms. Engaging users in content moderation is promising for making ethical and fair moderation decisions. A few studies that have considered user engagement in content moderation have primarily focused on classifying user-generated comment...
Article
Full-text available
The pervasive use of mobile devices exposes users to an elevated risk of shoulder-surfing attacks. Despite the prior work on shoulder-surfing resistance of mobile user authentication methods, there is a lack of empirical studies on textual password authentication methods, particularly the hybrid passwords that integrate textual passwords with biome...
Article
Full-text available
Assistive technology is extremely important for maintaining and improving the elderly’s quality of life. Biometrics-based mobile user authentication (MUA) methods have witnessed rapid development in recent years owing to their usability and security benefits. However, there is a lack of a comprehensive review of such methods for the elderly. The pr...
Article
Full-text available
Background The ultimate goal of any prescribed medical therapy is to achieve desired outcomes of patient care. However, patient nonadherence has long been a major problem detrimental to patient health and, thus, is a concern for all health care providers. Moreover, nonadherence is extremely costly for global medical systems because of unnecessary c...
Article
Some consumers have various product demands that are associated with each other. Although there are methods for discovering the associations among co-purchased products, they have limitations, including redundancy of the extracted association rules, the potential to miss novel and interesting associations among co-demanded products hidden in shoppi...
Article
Full-text available
Objective With the advancement of mobile technologies, patients can access medical and patient educational information anytime and anywhere. Computer-aided patient education has been advocated as a key means of interventions for improving patient knowledge and compliance (i.e., adherence). However, evidence of the efficacy of computer-aided patient...
Article
The QWERTY keyboard on mobile devices usually requires users’ full visual attention and both hands, which is not always possible. We propose a thumb-stroke-based keyboard, ThumbStroke, to support both sight-free and one-handed text entry. Text entry via ThumbStroke completely relies on the directions of thumb strokes at any place on the screen of a...
Conference Paper
Recent advances in sensing and wireless communication technologies have led to an explosion in the use of touch-screen mobile devices such as smartphones and tablets in mobile commerce and other daily work and life activities. These activities have resulted in more and more private and sensitive information stored on those devices. Therefore, impro...
Article
Objectives This study investigates the public’s opinions on a new school meals policy for childhood obesity prevention, discovers aspects concerning those opinions, and identifies possible gender and regional differences in the U.S. Methods We collected 14,317 relevant tweets from 11,715 users since the national policy enactment on Feb 9, 2010 thr...
Article
Despite its ubiquitous use, the pinch zooming technique is not effective for single-handed interaction with touch-screen mobile devices. We propose ContextZoom, a novel technique for single-handed zooming on touch-screen mobile devices. It allows users to specify any location on a device screen as the zooming center and ensures that this intended z...
Article
The pervasive and prevalent use of touch-screen mobile phones in both work and daily life has generated more and more private and sensitive information on those devices. Accordingly, there is an ever-increasing need to improve the security of mobile phones. Recent advances in mobile user authentication technologies mainly focus on entry-point authe...
Article
Full-text available
Online consumer product reviews are a main source for consumers to obtain product information and reduce product uncertainty before making a purchase decision. However, the great volume of product reviews makes it tedious and ineffective for consumers to peruse individual reviews one by one and search for comments on specific product features of th...
Conference Paper
Full-text available
The lack of patient compliance to medical recommendations and treatments suggested by doctors has long been a significant problem. In practice, patient education is considered an important intervention to empower patients and increase their compliance. It has been advocated as a means of improving patient medical knowledge and compliance. However,...
Article
Full-text available
Multimedia content in web pages poses a variety of problems to mobile web users, such as incompatibility with mobile devices or failing to meet accessibility needs of users with vision disabilities. To address those problems, this study proposes and evaluates a context-aware approach to multimedia content adaptation for mobile Web. It uniquely take...
Conference Paper
Full-text available
information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. This version of the referenced work is the post-print version of the article—it is NOT the final published version nor the corrected proofs. If yo...
Article
In this research, we propose a novel classification model that consists of features of website URL and content for automatically detecting Chinese phishing e-Business websites. The model incorporates several unique domain-specific features of Chinese e-Business. We have trained and evaluated the proposed model using four different classification al...
Article
Behavioral cues to deception are instrumental to detecting deception. As one of the primary sources of deception behavior, text has been analyzed at the level of sub-sentence or message but not the discourse of interaction. Additionally, empirical studies on cues to deception in the case of multiple receivers remain nonexistent. To fill these voids...
Conference Paper
Full-text available
Multimedia content in websites poses a variety of problems to mobile WEB users, such as content incompatible with mobile devices or failing to meet the accessibility needs of users with disabilities. This study proposes and evaluates a user-centered, device-aware approach to multimedia content adaptation for mobile WEB to address those problems. It...
Conference Paper
The explosive growth of mobile handheld devices users and the increasing need of ubiquitous information access make the use of mobile WEB a common practice. The effectiveness of mobile WEB is contingent upon many factors. Among them, visual properties such as colors of WEB content can significantly influence user experience. However, website design...
Conference Paper
Understanding text requires not only the extraction of individual concepts, but the identification of semantic relationships among concepts as well. Lexical resources have been applied to analyzing text in a wide range of applications. However, manual compilation of lexical resources is difficult to keep up with the rapid increase of the volume and...
Article
Deception has been an important problem in interactive groups, impeding effective group communication and group work, yet deception detection in such a context remains understudied. Extrapolated from the interpersonal deception theory (IDT) and group composition research in cooperative contexts, this research proposes that group factors, including...
Article
Social computing can be broadly defined as the computational facilitation of social studies and human social dynamics as well as the design and use of computing technologies that consider social contexts. With the development and adoption of social computing technologies, social computing systems are increasingly involved with the economic contexts...
Article
Many applications require knowledge about how to deceive, including those related to safety, security, and warfare. Speech and text analysis can help detect deception, as can cameras, microphones, physiological sensors, and intelligent software. Models of deception and noncooperation can make a virtual or mixed-reality training environment more rea...
Article
The pervasiveness of mobile handheld devices and advancement in real-time continuous speech recognition technology has opened up a wide range of research opportunities in human-computer interaction for those devices. On the one hand, there has been an increasing amount of research on developing user-friendly speech recognition solutions and applica...
Article
There are currently many active movements towards computerizing patient healthcare information. As Electronic Medical Record (EMR) systems are being increasingly adopted in healthcare facilities, however, there is a big challenge in effectively utilizing ...
Article
Managing personal information such as to-dos and contacts has become our daily routines, consuming more time than needed. Existing PIM tools require extensive involvement of human users. This becomes a problem in using mobile devices due to their physical constraints. To address the limitations of traditional PIM tools, we propose a model of mobile...
Article
Deception in computer-mediated group Negotiation and decision making presents a variety of risks. Gaining a better understanding of online deception has important implications for both individuals and organizations. Despite the rapidly increasing number of online deception cases reported in recent years, extant deception research has not considered...
Article
Accessing the Web from mobile handheld devices has become increasingly common. However, accomplishing that task remains challenging mainly due to the physical constraints of handheld devices and the static presentation of Web pages. Adapting the presentation of Web pages is, therefore, critical to enabling effective mobile Web browsing and informat...
Article
Recent studies on open-source software (OSS) products report that smaller modules are proportionally more defect prone compared to larger ones. This phenomenon, referred to as the Theory of Relative Defect Proneness (RDP), challenges the traditional QA approaches that give a higher priority to larger modules, and it attracts growing interest from c...
Conference Paper
Full-text available
Existing research on context and context awareness has broadly focused on the technical aspects of context acquisition and interpretation of users' surroundings, also called physical or sensor-based context. Such an approach is lack of reconciling the user's perception of real-world context and a context-aware system's interpretation of that contex...
Article
Full-text available
This study examines trust in technology-supported groups from the perspectives of culture, social presence, and group composition. Our results demonstrate that, in culturally homogeneous groups, individualism has a negative impact on the level of interpersonal trust; however, in culturally heterogeneous groups consisting of Chinese and U.S. partici...
Conference Paper
As the use of mobile handheld devices for Web access becomes increasingly popular, ease of use has become an important issue for mobile devices. However, due to their small screen size, users often suffer from the poor content presentation that seriously hinders the usability of Mobile Web applications. Therefore, adapting Web content presentation...
Article
Context-aware mobile applications are systems that can sense clues about the situational environment and enable appropriate mechanisms of interaction between end users and systems, making mobile devices more intelligent, adaptive, and personalized. In order to better understand such systems and the potentials and barriers of their development and p...
Article
Full-text available
The importance of the relationship between size and defect proneness of software modules is well recognized. Understanding the nature of that relationship can facilitate various development decisions related to prioritization of quality assurance activities. Overall, the previous research only drew a general conclusion that there was a monotonicall...
Conference Paper
Full-text available
Document summarization is an important function for knowledge management when a digital library of text documents grows. It allows documents to be presented in a concise manner for easy reading and understanding. Traditionally, document summarization adopts sentence-based mechanisms that identify and extract key sentences from long documents and as...
Conference Paper
Full-text available
There is a growing interest in the use of context-aware systems, which can recognize user’s situational context and accordingly provide a desirable interaction with the user. However, the design, development, evaluation and deployment of context-aware systems are still at its infancy. In this paper, we propose an operational mechanism approach to c...
Article
Full-text available
In this study, we investigated the functional form of the size-defect relationship for software modules through replicated studies conducted on ten open-source products. We consistently observed a power-law relationship where defect proneness increases at a slower rate compared to size. Therefore, smaller modules are proportionally more defect pron...
Article
A number of studies have been conducted, providing linguistic cues about deception in online communication and leading to the development of models for automatic deception detection. These studies have demonstrated that these linguistic cues and models can be used to, to assist people in detecting online deception and to increase public awareness a...
Article
Online deception is disrupting our daily life, organizational process, and even national security. Existing approaches to online deception detection follow a traditional paradigm by using a set of cues as antecedents for deception detection, which may be hindered by ineffective cue identification. Motivated by the strength of statistical language m...
Article
Web service composition can enhance the efficiency and agility of knowledge management by composing individual Web services together for complex business requirements. There are two main research streams in knowledge representation for Web service composition: the syntactic-based approach and the semantic-based approach. Despite the promises brough...
Article
Full-text available
Globalization has led to the increasing use of organizational teams comprised of individuals with diverse cultural backgrounds. Existing research suggests that collaborative software may benefit multicultural teams. However, most prior studies are limited by their focus on U.S. and Western cultures. We explore this issue by comprehensively examinin...
Conference Paper
Software is developed in a dynamic context where team structure, requirements, and processes evolve together with the product. Although researchers have been studying the evolution of software systems since the early 70s, the study on the evolution of software development teams remains rare. Such evolutionary patterns and their impact on software q...
Chapter
Web service composition can enhance the efficiency and agility of knowledge management by composing individual Web services together for complex business requirements. There are two main research streams in knowledge representation for Web service composition: the syntactic-based approach and the semantic-based approach. Despite the promises brough...
Article
Osteoarthritis is a common locomotor disorder affecting many older people and has become a growing public health problem. Adherence to exercise is a key to the successful recovery of patients but is often a major problem for older adults with osteoarthritis. The proposed pilot study is aimed to explore the feasibility and acceptance of an interacti...
Article
Motivated by the practical significance of deception detection to both organizations and individuals and the recent surge of research interests in deception in computer-mediated communication (CMC), this study examines whether and how the modality of communication media can influence deception detection in CMC. The results of empirical evaluations...
Article
The importance of research on misinformation has received wide recognition. Two major challenges faced by this research community are the lack of theoretical models and the scarcity of misinformation in support of such research. This paper aims to address the aforementioned challenges by conceptualizing misinformation and enabling the interoperabil...
Conference Paper
Full-text available
Context-aware computing is aimed to make mobile devices smarter by giving them the ability to recognize and interpret the surrounding environment and react proactively and intelligently. However, the development and deployment of context-aware mobile artifacts are still at their infancy, with few theories and little empirical evidence about how to...
Conference Paper
Full-text available
Quality is becoming increasingly important with the continuous adoption of open-source software. Previous research has found that there is generally a positive relationship between module size and defect proneness. Therefore, in open-source software development, it is important to monitor module size and understand its impact on defect proneness. H...
Conference Paper
Full-text available
Full Text at Springer, may require registration or fee
Article
Full-text available
Majority influence is the attempt by a majority of group members to impose their common position on group dissenters during group decision making. Because of globalization, the use of cross-cultural teams in group tasks is becoming increasingly common. The objective of this study was to investigate how national culture, social presence, and group d...
Article
Collaborative commerce (C-Commerce) is a set of technologies and business practices that allows companies to build stronger relationships with their trading partners through integrating complex and cross-enterprise processes governed by business logic and rules, as well as workflows. Business Process Management (BPM) is a key element of C-Commerce...
Article
The World Wide Web Consortium (W3C) has announced the launch of a new Mobile Web Initiative (MWI), aiming to address the interoperability and usability problems in order to make Web access from a mobile device simple, easy, and convenient. Various summarization and visualization techniques have been used in content presentation adaptation for mobil...
Conference Paper
As globalization increases, firms that rely on intellectual assets have realized that their competitive advantage depends on the development and effective use of collaboration technologies. Today, teams within or across organizations often consist of individuals with diverse cultural backgrounds and skills, creating a pressing need to better unders...
Conference Paper
In this empirical study we examine the impact of national culture and social presence on interpersonal trust in both culturally homogeneous and heterogeneous groups. Results demonstrate that interpersonal trust is higher in homogeneous, low-individualism groups (represented by Chinese participants) than that in homogeneous, high-individualism group...
Article
ABATRACT Since the late 1990s, online shopping has taken off as an increasing number of consumers purchase increasingly diversified products on the Internet. Given that how to attract and retain consumers is critical to the success of online retailers, research on the antecedents of consumer acceptance of online shopping has attracted widespread at...
Article
Collaborative Filtering (CF) systems generate recommendations for a user by aggregating item ratings of other like-minded users. The memory-based approach is a common technique used in CF. This approach first uses statistical methods such as Pearson's Correlation Coefficient to measure user similarities based on their previous ratings on different...
Chapter
Web service composition can enhance the efficiency and agility of knowledge management by composing individual Web services together for complex business requirements. There are two main research streams in knowledge representation for Web service composition: the syntactic-based approach and the semantic-based approach. Despite the promises brough...
Article
Full-text available
We describe our findings and experiences from our technical review of vote verification systems for the Maryland State Board of Elections (SBE). The review included the following four systems for possible use together with Maryland's existing Diebold AccuVote-TS (touch screen) voting system: VoteHere Sentinel; SCYTL Pnyx.DRE; MIT-Selker audio syste...
Conference Paper
Full-text available
The small screen size of handheld mobile devices poses an inherent problem in visualizing data: very often it is too difficult and unpleasant to navigate through the plethora of presented information. This paper presents a novel approach to personalized and adaptive content presentation for handheld devices, which has been implemented in a mobile f...
Article
The great potential of speech recognition systems in freeing users' hands while interacting with computers has inspired a variety of promising applications. However, given the performance of the state-of-the-art speech recognition technology today, widespread acceptance of speech recognition technology would not be realistic without designing and d...
Article
Deception can be detrimental to individual and organizational decision mak- ing. Existing research on behavioral cues to deception has focused mainly on monologue and dyadic interaction. No studies have empirically examined the impact of group size on behavioral cues to deception. This study is the first attempt to investigate whether deceivers beh...
Article
Full-text available
Interactive video in an e-learning system allows proactive and random access to video content. Our empirical study examined the influence of interactive video on learning outcome and learner satisfaction in e-learning environments. Four different settings were studied: three were e-learning environments—with interactive video, with non-interactive...
Article
Web stores, where buyers place orders over the Internet, have emerged to become a prevalent sales channel. In this research, we developed neural network models, which are known for their capability of modeling noncompensatory decision processes, to predict and explain consumer choice between web and traditional stores. We conducted an empirical sur...
Article
Web service composition can enhance the efficiency and agility of knowledge management by composing individual Web services together for complex business requirements. There are two main research streams in knowledge representation for Web service composition: the syntactic-based approach and the semantic-based approach. Despite the promises brough...
Conference Paper
Presently, there is an increasing demand of accessing Web from mobile handheld devices. However, due to the small screen of handheld devices, mobile users often suffer from the poor presentation that seriously hinders the usability of mobile applications. In addition, users have different information needs and preferences. They prefer to receive co...
Conference Paper
Full-text available
The purpose of this study is to address questions on how collectivistic and individualistic cultures affect majority influence in a group decision making task when there are differences in media richness. We developed a theory that explains and predicts these phenomena, and tested hypotheses using 112 four-person groups that consisted of Chinese an...
Conference Paper
The popularity of distributed learning and the continued growth in the number of colleges and universities offering courses delivered entirely via asynchronous learning networks (ALN) are unquestioned. There is little agreement on what constitutes the ...
Article
Instant Messaging (IM) features informal writing styles such as the omission of punctuation. Punctuation plays an important role in representing prosody and facilitating syntactic processing during communication. The discrepancy between the recognized importance and actual inadequate usage of punctuation in IM calls for establishing punctuation con...
Article
With the rapid advance of mobile technologies and the widely use of handheld mobile devices, there is an increasing demand of accessing web information from mobile devices. However, a variety of inherent constraints of mobile devices and wireless environments pose challenges to users for navigating or locating the desirable information on small scr...
Article
Usability testing of software applications developed for mobile devices is an emerging research area that faces a variety of challenges due to unique features of mobile devices, limited bandwidth, unreliability of wireless networks, as well as the changing context (environmental factors). Traditional guidelines and methods used in usability testing...
Article
Building composite Web services can save significant time and cost for developing new applications and enhancing the interoperability and collaboration among E-business partners. This article proposes a framework for dynamic and personalized composition of Web services using an approach that integrates not only functional attributes of Web services...
Article
In order to reduce costs and gain competitive advantages, many companies are offering web services that enable software components to be accessed by their customers and trading partners over the internet. With the latest advances in mobile computing and communication technologies, web services are increasingly used to expose functionalities of many...
Conference Paper
The rapid growth of mobile technology has expedited ubiquitous information access via handheld devices. However, the fundamental natures of mobile information systems are different from those of desktop applications in terms of purpose of use, device features, communication networks, and working environments. This poses various challenges to mobile...
Conference Paper
Interface design is arguably one of the most important issues in the development of mobile applications. Mobile users often suffer from the poor interface design that seriously hinders the usability of those mobile applications. The major challenge in the interface design of mobile applications is caused by the unique features of mobile devices, su...
Article
Business process management (BPM) includes the capability to discover, design, deploy, execute, interact with, operate, optimize, and analyze business processes. It is critical for businesses in the current intensive and competitive market. Traditional BPM has problems in interoperability, agility, and flexibility. This research investigates the ro...
Article
With the increase of economic globalization and evolution of information technology, financial data are being generated and accumulated at an unprecedented pace. As a result, there has been a critical need for automated approaches to effective and efficient utilization of massive amount of financial data to support companies and individuals in stra...
Conference Paper
Natural language interface (NLI) facilitates the human use of computers. In this paper, we review the state-of-the-art NLI application. Based on the extant literature, we design process flow of an NLI system enabling easy information access via mobile devices. Full Text at Springer, may require registration or fee
Conference Paper
The importance of misinformation research has received wide recognition. However, one major challenge facing the research community is the lack of misinformation data and the difficulty in managing such data. Motivated by the role of ontology in information sharing and reuse, we propose a misinformation ontology and its representation based on the...
Article
As a powerful and expressive nontextual media that can capture and present information, instructional videos are extensively used in e-Learning (Web-based distance learning). Since each video may cover many subjects, it is critical for an e-Learning environment to have content-based video searching capabilities to meet diverse individual learning n...
Article
The advantages of electeronic learning technology over the traditional class room learning system are discussed. In comparison with the traditional class room learning that centres on instructors, electronic learning offers a learner-centered self-paced learning environment. More multimedia based e-learning systems are becoming available to integra...
Article
Dominance is not only a complicated social phenomenon that involves interpersonal dynamics, but also an effective strategy used in various applications such as deception detection, negotiation, and online community. The extensive literature on dominance has primarily focused on the personality traits and socio-biological influence, as well as vario...
Conference Paper
Deception has been extensively studied in many disciplines in social science. With the increasing use of instant messaging (IM) in both informal communication and performing tasks in work place, deception in IM is emerging as an important issue. In this study, we aimed to explore the online behavior of deception in a group IM setting. The empirical...
Conference Paper
Network-aware Applications is a promising new concept in which applications are aware of network conditions and thus can adapt to the varying environment to achieve acceptable and predictable performance. This paper reviews the current research on network-aware applications, with a focus on their appliance on mobile multimedia applications. First,...
Conference Paper
Network traffic monitoring is critical for wireless applications to ensure the QoS while streaming multimedia content. The high rate of traffic monitoring is likely to obtain the high accuracy of the network traffic. However, using a high monitoring rate has a tradeoff due to the extra bandwidth consumption. In a wireless network environment with l...
Conference Paper
Mobile computing has become an interesting field of research due to the advancement of wireless technology. With the rapidly increasing bandwidth of wireless networks and demand of acquiring information anytime, anywhere, delivering content to mobile devices in an effective, efficient, and personalized manner has been recognized as one of the impor...
Article
Nowadays, multimedia-based e-Learning systems have become widely available. Many systems, however, provide little interactivity to learners. E-Learners do not have much control over learning content and process to meet their individual needs. Therefore, we face challenges of how to integrate instructional material in different media and how to prov...
Article
Full-text available
In today's new economy characterized by industrial change, globalization, increased intensive competition, knowl-edge sharing and transfer, and information technology revolu-tion, traditional classroom education or training does not always satisfy all the needs of the new world of lifelong learning. Learn-ing is shifting from instructor-centered to...
Article
The role of information retrieval (IR) in support of decision making and knowledge management has become increasingly significant. Confronted by various problems in traditional keyword-based IR, many researchers have been investigating the potential of natural language processing (NLP) technologies. Despite widespread application of NLP in IR and h...
Article
The major challenge in current humanitarian assistance/disaster relief (HA/DR) efforts is that diverse information and knowledge are widely distributed and owned by different organizations. These resources are not efficiently organized and utilized during HA/DR operations. We present a knowledge management framework that integrates multiple informa...

Network