About
50
Publications
10,421
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
708
Citations
Current institution
Additional affiliations
August 2003 - present
Publications
Publications (50)
Purpose
Online games are widely adopted electronic applications that facilitate flow experiences, which is a highly enjoyable experience for players, thus motivating further engagement in online gameplay. During gameplay, players set gaming goals, and they must make cognitive efforts to achieve these goals. However, we do not know how goal-setting...
Online games are one of the most popular information systems in the world, with over 2 billion users worldwide. Most users follow the social norms and standards of behavior in online games, but some violate social norms, negatively affecting others’ gameplay experiences and weakening loyalty to the game. The social norms in games and other online e...
Purpose
Online games are popular applications of Internet technology, with over 2.8 billion users worldwide. Many players engage in team gameplay, indicating that online games are suitable media through which players connect with their friends. However, past studies have not examined the ability of games to assist players in connecting with their f...
Online communities (OCs) have historically focused on building knowledge repositories, but as OCs add more synchronous communication, it is important to understand how different communication capabilities influence user commitment, individual growth, and knowledge contribution. We studied 452 members of a popular OC in Taiwan and found that both co...
Online games are popular digital technologies that enable gamers to engage in competitive play. However, little is known about how competitive engagement satisfies gamer needs and builds their loyalty and game usage. This lack of knowledge prevents game makers from properly designing in-game competition functions. Our research aim is to theorize th...
Lack of user participation and contribution has been a long-standing problem for online communities. We proposed and examined new strategies for cultivating opinion leadership and enabling users to post articles outside of the community theme. We used social role theory to propose that online communities should encourage highly committed users to t...
Players' game commitment is relevant and important to game makers. Hence, we need to know how to strengthen players’ game commitment. The literature pointed out that two theories (flow theory and goal gradient theory) may be effective perspectives. However, we do not know how to trigger both theoretical pathways, indicating a gap. Hence, the aim of...
Aims:
To examine the relationships among effort ensuring robots' smooth operation (EERSO), time pressure, missed care, and nurses' turnover intention, and how robot performance moderates such relations.
Background:
Robots may reduce nurses' workload, but typically still require some effort of nurses for robots' smooth operation. However, the neg...
Online shopping, amassive information technology (IT)-mediated industry, is vulnerable to the risks of personal information leaks, credit card fraud, and nonreceipt of goods. These risks can cause shoppers to discontinue their use of ashopping website. To mitigate the risks, we propose that shopping websites develop risk-reducing mechanisms to enha...
Past research has identified some positive impacts of game escapism, but has not explored what drives gamers to escape into games. Research filling this gap will provide game makers with knowledge on ways to attract gamers and foster continued playing intention, motivating our study. We theorize how types of real-world frustration—namely autonomy f...
Aims and Objectives
To test how the three components of professional commitment (i.e. affective, continuance and normative professional commitment) are associated with nurse-reported patient-centred care and care quality.
Background
Patient-centred care and care quality are the two critical care outcomes. However, no study has yet examined how the...
Orthokeratology (OK) lens wear is an effective modality to inhibit axial elongation in myopic children. Willingness for commitment from both parents and children contributes to the success of OK treatment. We aimed to develop and assess the usability of a mobile application on OK lens wear by quantitatively and qualitatively evaluating parents with...
BACKGROUND
Myopia is an underappreciated but profound public health problem. Orthokeratology (OK) lens wear is an effective modality to inhibit axial elongation in children with myopia. Willingness for a commitment from both parents and children contributes significantly to the success of the OK treatment and decreases the chance of complications d...
Purpose
Online games are prevalent internet applications and are known for satisfying the various needs of users. Nonetheless, little is known about whether online games could be a resort for users encountering workplace frustration. Explaining how workplace frustration and users' need satisfaction affect loyalty of online gamers, this study aims t...
Online game research has explained the sources of gamer loyalty, but has not discussed the role of gaming team competition, i.e., who would engage in gaming team functions and what gaming team functions would foster members' loyalty. A lack of answers to these member-retaining questions keeps game providers in the dark about making game design deci...
Purpose
Relational cohesion theory posits that relational cohesion helps build relationships among communication partners, implying that users would expect a growth in relations or making more friends in the future. However, little is known about expectancy of a better future state of relations, i.e. expectancy of relational growth, and its impact...
Purpose
Online gamers form communities and offer game makers various revenue sources. Gamers' continual revenue contributions should depend on their commitment to gaming communities (CGC), where they rely heavily on communication media that carry rich information or provide enhanced media richness. However, no study has yet examined how to use the...
Social networks are known to influence users of online information systems, including online games. However, the mechanism underlying the impact of social networks on online gamer loyalty has remained insufficiently understood. Grounded in weak/strong tie theory, we construct a research model to explore the mechanism. We collect responses from 1,87...
Online games are popular electronic commerce applications that have a business model of selling gaming items to gamers. Such a business model helps gamers attain gaming goals while cultivating their gaming habits. Gaming habits can lead gamers to play games automatically, indicating their impact on gamers. However, little is known about how gaming...
Online games are highly popular applications. While online gamers actively participate in gaming teams, no study has yet explored whether gamers have sufficient teamwork knowledge and have accumulated sufficient team participation experience. These likely strengthen team commitment, but we do not know, indicating a research gap. Research filling th...
Online games are known for fulfilling computer users' various needs. However, little is known about whether real-world need satisfaction (not gaming satisfaction) motivates users to play online games. Grounded in self-affirmation theory (SAT), we develop a framework and formulate hypotheses to explain how aspects of real-world need satisfaction aff...
Purpose
Avatars are known to be influential in gaming communication. However, little is known about how avatar attractiveness and customization impact online gamers’ flow, i.e., the experience of total concentration with intrinsic enjoyment and loyalty. Grounded in social identity and flow theories, the purpose of this paper is to construct a mode...
Online games can frustrate their gamers, but little was known about how such frustration impacts gamer loyalty. Because novice and experienced gamers may respond differently to frustration, this study investigates how gamers' frustration influences their loyalty and how this influence may differ between novice and experienced gamers. Because of the...
Online games have demonstrated dramatic growth both in revenue and user base, proving their value to electronic commerce managers. Online gamers are strongly motivated by their expectancy for growth, or anticipation of an increase in game level. However, the relevant literature has not yet explained how expectancy for growth impacts online gamer lo...
Background
Physical activity is important for middle-agers to maintain health both in middle age and in old age. Although thousands of exercise-promotion mobile phone apps are available for download, current literature offers little understanding regarding which design features can enhance middle-aged adults’ quality perception toward exercise-prom...
Disconfirmation is the difference between actual and expected performance. Higher actual performance creates positive disconfirmation, while lower actual performance creates negative disconfirmation. Positive disconfirmation is key to creating satisfaction and positive psychological responses. However, none studies have examined the relationship be...
Online game providers frequently encounter a dilemma, i.e., should they design games that offer only a limited challenge or ones that are highly challenging which will likely inspire gamers but may also create frustration. This study contributes to efforts to solve this dilemma by establishing when frustration does not reduce continuance intention...
Variant product design is critical to the continued survival of a product in the demand-changing market. As variant product design involves numerous and concurrent attempts at requirement and product modification, a change impact analysis (CIA) becomes essential in order to capture both the potential and contextual impacts of a change proposal, and...
Prior to accepting and executing an online transaction, e-commerce systems must allow the consumer to express an informed and deliberate consent to the transaction. Currently, a widely accepted way of letting the consumer express his consent to execute a transaction is the Short Message Service-based One-Time Password (SMS-based OTP) scheme. In thi...
Goal-oriented requirements engineering can facilitate the elicitation and representation of various types of requirements, including organizational and security requirements. This paper applies the Bunge-Wand-Weber ontological model to analyze and evaluate the security concepts in the extended i* modeling language that has been considered as one of...
This research creates flexibility into the RSA and the split-private-key RSA cryptography. In the split-private-key RSA, the user can select, at his/her discretion, a password to derive the first of two private key portions. This paper provides an extension that further allows the user to change the password without resorting to a regeneration of t...
Although information security knowledge is spreading and management tools are improving, information security incidents remain widely heard. Studies have investigated information security behaviors through motivational theories like the Theory of Planned Behavior. Since implementation intentions are considered as a behavior changing technique that...
Language, both written and spoken, plays an important role in human culture. The internet, as a new medium, has changed the evolution of today's language in certain ways. Martian Language (ML), as net lingo is called in Taiwan, has been viewed with disdain, but it may contain cues to future cultural development. This study looks into how communitie...
Modern nuclear power plants have been adopting open standards in their digital networks to enhance extensibility and interoperability. This also opens another possibility for an attacker to intrude into the networks. To prevent digital networks from being attacked, the U.S. Nuclear Regulatory Commission provides guidelines regarding achieving high...
The power systems relying on the Modbus protocol for distributed control render their facilities vulnerable since there is no security consideration in the protocol. An intruder, without being authenticated, may harm the system by issuing malicious commands. This letter presents a cryptographic scheme that aims to enhance the Modbus protocol with a...
The traffic analysis problem is one in which the communication partners of Internet users are learned by unrelated parties. Few works have been devoted to evaluating the effectiveness of the proposed anonymity designs. This paper proposes a unique adversary model to quantitatively measure how much precise information an attacker can obtain while su...
An Attack Graph is a graphical representation of possible ways that an intruder can attack a network system through atomic attacks. Based on such graphs, Jha, Sheyner and Wing have formulated a problem of adopting a minimum set M' of measures to ensure that the network system won't be attacked. They decompose the problem into two subproblems and so...
The Internet creates an efficient environment for businesses to conduct transactions, while also creating a channel for outsiders to access organizational assets. To determine the reasonable amount of security investment, security officers would conduct risk assessment to evaluate the risk values in existing systems. In traditional risk assessment...
Although the Internet has been a potential channel for conducting sealed bid auctions, difficulties exist in verifying if the auctioneer over the Internet honestly follows the auction policy. If the auctioneer leaks bid prices to a collusive bidder before the bidder bids, fairness will be infringed. Current literature has proposed auction protocols...
Describes a novel Internet auction model achieving verifiable fairness, a requirement aimed at enhancing the trust of bidders in auctioneers. Distrust in remote auctioneers prevents bidders from participating in Internet auctioning. According to proposed survey reports, this study presents four characteristics that render the Internet untrustworthy...