Understanding online safety behaviors: A protection motivation theory perspective HS Tsai, M Jiang, S Alhabash, R LaRose, NJ Rifon, SR Cotten Computers & Security 59, 138-150, 2016 | 178 | 2016 |
Understanding the physical and economic consequences of attacks on control systems YL Huang, AA Cárdenas, S Amin, ZS Lin, HY Tsai, S Sastry International Journal of Critical Infrastructure Protection 2 (3), 73-83, 2009 | 166 | 2009 |
Getting grandma online: are tablets the answer for increasing digital inclusion for older adults in the US? HS Tsai, R Shillair, SR Cotten, V Winstead, E Yost Educational gerontology 41 (10), 695-709, 2015 | 142 | 2015 |
Online safety begins with you and me: Convincing Internet users to protect themselves R Shillair, SR Cotten, HYS Tsai, S Alhabash, R LaRose, NJ Rifon Computers in Human Behavior 48, 199-207, 2015 | 135 | 2015 |
Threat as a service?: Virtualization's impact on cloud security HY Tsai, M Siebenhaar, A Miede, Y Huang, R Steinmetz IT professional 14 (1), 32-37, 2011 | 105 | 2011 |
Social support and “playing around” an examination of how older adults acquire digital literacy with tablet computers HS Tsai, R Shillair, SR Cotten Journal of Applied Gerontology 36 (1), 29-55, 2017 | 102 | 2017 |
Completion rates and non-response error in online surveys: Comparing sweepstakes and pre-paid cash incentives in studies of online behavior R LaRose, HS Tsai Computers in Human Behavior 34, 110-119, 2014 | 84 | 2014 |
A graph approach to quantitative analysis of control-flow obfuscating transformations HY Tsai, YL Huang, D Wagner IEEE Transactions on Information Forensics and Security 4 (2), 257-267, 2009 | 47 | 2009 |
Broadband adoption| measuring sustainable broadband adoption: an innovative approach to understanding broadband adoption and use R LaRose, K DeMaagd, HE Chew, HS Tsai, C Steinfield, SS Wildman, ... International Journal of Communication 6, 25, 2012 | 46 | 2012 |
An analytic hierarchy process-based risk assessment method for wireless networks HY Tsai, YL Huang IEEE Transactions on Reliability 60 (4), 801-816, 2011 | 39 | 2011 |
Broadband Internet adoption and utilization in the inner city: A comparison of competing theories HS Tsai, R LaRose Computers in human behavior 51, 344-355, 2015 | 26 | 2015 |
Are you what your avatar eats? Health-behavior effects of avatar-manifested self-concept YJ Sah, R Ratan, HYS Tsai, W Peng, I Sarinopoulos Media Psychology 20 (4), 632-657, 2017 | 18 | 2017 |
Not so lonely surfers: Loneliness, social support, internet use and life satisfaction in older adults RJ Shillair, RV Rikard, SR Cotten, HY Tsai Iconference 2015 proceedings, 2015 | 16 | 2015 |
Generational differences in online safety perceptions, knowledge, and practices M Jiang, HS Tsai, SR Cotten, NJ Rifon, R LaRose, S Alhabash Educational Gerontology 42 (9), 621-634, 2016 | 15 | 2016 |
Dude, where’s my avacar? A mixed-method examination of communication in the driving context RR Ratan, HS Tsai Pervasive and Mobile Computing 14, 112-128, 2014 | 9 | 2014 |
Yu-Lun Huang, Ralf Steinmetz,“Threat as a Service? Virtualization’s impact on Cloud Security” HY Tsai, M Siebenhaar, A Miede IEEE, IT Pro, 32-37, 2012 | 8 | 2012 |
Senior technology exploration, learning, and acceptance (STELA) model: from exploration to use–a longitudinal randomized controlled trial HYS Tsai, RV Rikard, SR Cotten, R Shillair Educational Gerontology 45 (12), 728-743, 2019 | 5 | 2019 |
High tension lines: Negative social exchange and psychological well-being in the context of instant messaging HS Tsai, PJ Hsu, CL Chang, CC Huang, HF Ho, R LaRose Computers in Human Behavior 93, 326-332, 2019 | 4 | 2019 |
A framework for quantitative evaluation of parallel control-flow obfuscation YL Huang, HY Tsai computers & security 31 (8), 886-896, 2012 | 4 | 2012 |
Threat as a service HY Tsai, M Siebenhaar, A Miede, YL Huang, R Steinmetz Virtualization's Impact On Cloud Security, Issue No, 32-37, 0 | 3 | |