Hsin-yi Sandy Tsai
Hsin-yi Sandy Tsai
Assistant Professor
Geverifieerd e-mailadres voor g2.nctu.edu.tw - Homepage
Geciteerd door
Geciteerd door
Understanding online safety behaviors: A protection motivation theory perspective
HS Tsai, M Jiang, S Alhabash, R LaRose, NJ Rifon, SR Cotten
Computers & Security 59, 138-150, 2016
Understanding the physical and economic consequences of attacks on control systems
YL Huang, AA Cárdenas, S Amin, ZS Lin, HY Tsai, S Sastry
International Journal of Critical Infrastructure Protection 2 (3), 73-83, 2009
Getting grandma online: are tablets the answer for increasing digital inclusion for older adults in the US?
HS Tsai, R Shillair, SR Cotten, V Winstead, E Yost
Educational gerontology 41 (10), 695-709, 2015
Online safety begins with you and me: Convincing Internet users to protect themselves
R Shillair, SR Cotten, HYS Tsai, S Alhabash, R LaRose, NJ Rifon
Computers in Human Behavior 48, 199-207, 2015
Threat as a service?: Virtualization's impact on cloud security
HY Tsai, M Siebenhaar, A Miede, Y Huang, R Steinmetz
IT professional 14 (1), 32-37, 2011
Social support and “playing around” an examination of how older adults acquire digital literacy with tablet computers
HS Tsai, R Shillair, SR Cotten
Journal of Applied Gerontology 36 (1), 29-55, 2017
Completion rates and non-response error in online surveys: Comparing sweepstakes and pre-paid cash incentives in studies of online behavior
R LaRose, HS Tsai
Computers in Human Behavior 34, 110-119, 2014
A graph approach to quantitative analysis of control-flow obfuscating transformations
HY Tsai, YL Huang, D Wagner
IEEE Transactions on Information Forensics and Security 4 (2), 257-267, 2009
Broadband adoption| measuring sustainable broadband adoption: an innovative approach to understanding broadband adoption and use
R LaRose, K DeMaagd, HE Chew, HS Tsai, C Steinfield, SS Wildman, ...
International Journal of Communication 6, 25, 2012
An analytic hierarchy process-based risk assessment method for wireless networks
HY Tsai, YL Huang
IEEE Transactions on Reliability 60 (4), 801-816, 2011
Broadband Internet adoption and utilization in the inner city: A comparison of competing theories
HS Tsai, R LaRose
Computers in human behavior 51, 344-355, 2015
Are you what your avatar eats? Health-behavior effects of avatar-manifested self-concept
YJ Sah, R Ratan, HYS Tsai, W Peng, I Sarinopoulos
Media Psychology 20 (4), 632-657, 2017
Not so lonely surfers: Loneliness, social support, internet use and life satisfaction in older adults
RJ Shillair, RV Rikard, SR Cotten, HY Tsai
Iconference 2015 proceedings, 2015
Generational differences in online safety perceptions, knowledge, and practices
M Jiang, HS Tsai, SR Cotten, NJ Rifon, R LaRose, S Alhabash
Educational Gerontology 42 (9), 621-634, 2016
Dude, where’s my avacar? A mixed-method examination of communication in the driving context
RR Ratan, HS Tsai
Pervasive and Mobile Computing 14, 112-128, 2014
Yu-Lun Huang, Ralf Steinmetz,“Threat as a Service? Virtualization’s impact on Cloud Security”
HY Tsai, M Siebenhaar, A Miede
IEEE, IT Pro, 32-37, 2012
Senior technology exploration, learning, and acceptance (STELA) model: from exploration to use–a longitudinal randomized controlled trial
HYS Tsai, RV Rikard, SR Cotten, R Shillair
Educational Gerontology 45 (12), 728-743, 2019
High tension lines: Negative social exchange and psychological well-being in the context of instant messaging
HS Tsai, PJ Hsu, CL Chang, CC Huang, HF Ho, R LaRose
Computers in Human Behavior 93, 326-332, 2019
A framework for quantitative evaluation of parallel control-flow obfuscation
YL Huang, HY Tsai
computers & security 31 (8), 886-896, 2012
Threat as a service
HY Tsai, M Siebenhaar, A Miede, YL Huang, R Steinmetz
Virtualization's Impact On Cloud Security, Issue No, 32-37, 0
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20