Charles Liu - Academia.edu (original) (raw)

Papers by Charles Liu

Research paper thumbnail of An Agent-Aware Computing Based Mixed Reality Information System

International Journal of Virtual Reality, 2017

In this paper, we present an agent- aware computing based collaborative information sys- tem sche... more In this paper, we present an agent- aware computing based collaborative information sys- tem scheme for MR applications. The HCI issues in VR, AR, and MR, have been discussed firstly. Besides the equipment, the lack of understanding of users also ac- counts for a significant bottleneck of improving user ex- perience and immersion during the interaction. Aiming at the issues, an agent-aware computing based scheme is proposed and implemented. The corresponding sys- tematic scheme is presented in the views of functional- ity, modules and system workflow and discussed in de- sign, implementation, and system synthesis. By means of the human-aware computing, system-aware comput- ing and human-system aware computing, issues such as mixed reality fusion, QoE-QoS management, confiden- tiality, and security, are addressed by the applying agent- aware computing based scheme into an implementation of the collaborative information system for mixed real- ity. Related modules along with their func...

Research paper thumbnail of A data-aware confidential tunnel for wireless sensor media networks

Multimedia Tools and Applications, 2017

A Wireless Sensor Media Network (WSMN) provides an economical and feasible solution to microscopi... more A Wireless Sensor Media Network (WSMN) provides an economical and feasible solution to microscopic visual monitoring in real time. Compared to macrographic monitoring (e.g. aerial photography), it can also provide a flexible solution by means of the facility of setup and integration of microscopic data. Security is one of the significant issues for the applications of monitoring due to the visuality of the content in a WSMN. Besides the visual data, the confidentiality of the communication is also important since a WSMN serves as both a media network and a sensor network. Impersonation and key recovery attack are two particular harmful threats to the sensor networks. A spying agent masquerades as a normal node in the network, overhearing the data and signaling. In this paper, we present a data-aware scheme for a wireless sensor media network (WSMN) to guarantee the security of information system against both the impersonation and key recovery attacks during communication. With the consideration of the characteristics of visual data regarding both volatility and correlation, a chaos-driven strategy is used to design the protocol for tunnel establishment. The data-aware scheme is proposed to enhance the security for confidential communication by public key cryptography based attack detection. A simulation and related analysis are presented in this paper. The robustness against anti-attack is also discussed. The results show that the scheme is able to protect the system against both the impersonal intrusion and key recovery attack simultaneously based on data-aware attack-detection.

Research paper thumbnail of Mixed Reality with a Collaborative Information System

Lecture Notes in Computer Science, 2016

In this paper, we present a mixed reality environment (MIXER) for immersive interactions. MIXER i... more In this paper, we present a mixed reality environment (MIXER) for immersive interactions. MIXER is an agent based collaborative information system displaying hybrid reality merging interactive computer graphics and real objects. MIXER is an agent based collaborative information system displaying hybrid reality merging interactive computer graphics and real objects. The system comprises a sensor subsystem, a network subsystem and an interaction subsystem. Related issues to the concept of mixed interaction, including human aware computing, mixed reality fusion, agent based systems, collaborative scalable learning in distributed systems, QoE-QoS balanced management and information security, are discussed. We propose a system architecture to perform networked mixed reality fusion for Ambient Interaction. The components of the mixed reality suit to perform human aware interaction are Interaction Space, Motion Monitoring, Action and Scenario Synthesisers, Script Generator, Knowledge Assistant Systems, Scenario Display, and a Mixed Reality Module. Thus, MIXER as an integrated system can provide a comprehensive human-centered mixed reality suite for advanced Virtual Reality and Augmented Reality applications such as therapy, training, and driving simulations.

Research paper thumbnail of Extensions of principle component analysis with applications on vision based computing

Multimedia Tools and Applications, 2015

This paper mainly focuses on the principle component analysis (PCA) and its applications on visio... more This paper mainly focuses on the principle component analysis (PCA) and its applications on vision based computing. The underlying mechanism of PCA given and several significant factors, involved with subspace training are discussed theoretically in detail including principle components energy, residuals assessment, and decomposition computation. The typical extensions, including probabilistic PCA (PPCA), kernel PCA (KPCA), multi-dimensional PCA and robust PCA (RPCA), have been presented with critical analysis on both mechanisms and computations. Combining with the studies on, such as, image compression, visual tracking, image recognition and super-resolution image reconstruction, PCA and its extensions applied to computer vision are critically reviewed and evaluated on the targeted issues in each application as well as the role they played at specific tasks to the characteristics, cost and suitable situations of each PCA based vision processing technique.

Research paper thumbnail of Assessment of Human Brain Water Content by Cerebral Bioelectrical Impedance Analysis: A New Technique and Its Application to Cerebral Pathological Conditions

Neurosurgery, 2002

OBJECTIVE: Total brain water content changes in several cerebral pathological conditions and the ... more OBJECTIVE: Total brain water content changes in several cerebral pathological conditions and the measurement of brain water content are important for the selection of appropriate therapeutic procedures. We present a quantitative, in vivo, bioelectrical impedance analysis (BIA) method and propose its use for the accurate assessment of brain water content among human subjects. METHODS: Cerebral BIA is based on the conduction of an applied current in the brain parenchyma. Application of an excitatory current of 800 A at 50 kHz, via two electrodes placed on the eyelids with the eyes closed, and detection of the voltage drop with two electrodes placed in the suboccipital region allow brain resistance and reactance to be measured. By means of an equation that considers cranial circumference and resistance, it is possible to quantify the total brain water content, expressed as the bioelectrical volume. Cerebral BIA was performed with a series of healthy volunteers (n ‫؍‬ 100), for determination of average brain water content values. The method was then applied to 50 patients with brain tumors (n ‫؍‬ 20), intracranial hemorrhage (n ‫؍‬ 16), or hydrocephalus (n ‫؍‬ 14), for assessment of changes in global brain water contents. Data were compared with those obtained for healthy volunteers. RESULTS: Statistically significant differences (P < 0.001) were observed between the two groups. Mean brain water content values (expressed as bioelectrical volume values) were 38.2 ؎ 3.9 cm 2 /⍀ for healthy volunteers and 67.7 ؎ 13.1 cm 2 /⍀ for patients with cerebral pathological conditions. Statistically significant differences (P < 0.05) were also observed among patients with cerebral pathological conditions. CONCLUSION: The results of this study suggest that BIA, applied to the cerebral parenchyma, is a valid method for the prediction of brain water contents under both normal and pathological conditions. However, further studies are needed to establish whether it is sensitive and reliable enough for future clinical applications.

Research paper thumbnail of A Social Network Perspective on the Success of Open Source Software: The Case of R Packages

Proceedings of the Annual Hawaii International Conference on System Sciences, 2020

In this paper, we seek to identify the factors that influence the impact of open source software ... more In this paper, we seek to identify the factors that influence the impact of open source software (OSS) on users community through the analysis of the evolution of the OSS network. Based on longitudinal data collected from the comprehensive R archive network (CRAN), we empirically examine how the network of R packages evolves over time and exert its influence on the scientific community. We find that critical network features derived from CRAN, such as pagerank, closeness, and betweenness centralities, play a significant role in determining the impact of each package on the research and publication activities in the scientific community. Furthermore, the performance of R packages can be explained as a flow of information from the core to the periphery that exhibits strong spillover effects.

Research paper thumbnail of An Empirical Analysis of User Participation on Crowdsourcing Platform: A Two-sided Network Market Perspective

Crowdsourcing has recently emerged as a new platform for matching the demand and supply between p... more Crowdsourcing has recently emerged as a new platform for matching the demand and supply between professionals and businesses who seek external expertise for business task execution. Driven by the unique features of the two-sided crowdsourcing markets (such as auction-style competition on quality by professionals), this study seeks to examine how the dynamics of the two-sided crowdsourcing platform affect customers’ and professionals’ strategic behaviors and market outcomes. Using longitudinal transaction data from a crowdsourcing websites, we plan to empirically examine how the participation of professionals and customers, task reward and task completion rate are affected by the characteristics of the professionals such as distribution of the winning professionals and their reputation. The results of our study are expected to contribute to the growing literature on crowdsourcing and provide important insights on the design and assessment of the sustainability and profitability of th...

Research paper thumbnail of Network Effects and Data Breaches: Investigating the Impact of Information Sharing and the Cyber Black Market

This paper was motivated by the growing data breach activities confronting organizations. Buildin... more This paper was motivated by the growing data breach activities confronting organizations. Building on the literature on information sharing and network effects, we attempt to empirically examine how the number of security breaches may change as a result of two opposing network effects in the data breach battlefield, namely, the positive network effects driven by industry-wide information sharing efforts, and the negative network effects driven by the supply and demand changes in the underground cybercrime ecosystem, and whether a feedback loop can be formed so that the information sharing efforts can influence the costs and availability of malicious tools and suppress their demand. As one of the first studies to empirically examine the dynamics in the cybercrime economy, our research will provide important policy guidance to improve collaborative mechanisms to enhance industry wide information security, and illuminate a new way to monitor and curtail the flow of cyber-criminal activ...

Research paper thumbnail of An Agent-Based Intelligent HCI Information System in Mixed Reality

ArXiv, 2019

This paper presents a design of agent-based intelligent HCI (iHCI) system using collaborative inf... more This paper presents a design of agent-based intelligent HCI (iHCI) system using collaborative information for MR to improve user experience and information security based on context-aware computing. In order to implement target awareness system, we propose the use of non-parameter stochastic adaptive learning and a kernel learning strategy for improving the adaptivity of the recognition. The proposed design involves the use of a context-aware computing strategy to recognize patterns for simulating human awareness and processing of stereo pattern analysis. It provides a flexible customization method for scene creation and manipulation. It also enables several types of awareness related to the interactive target, user-experience, system performance, confidentiality, and agent identification by applying several strategies, such as context pattern analysis, scalable learning, data-aware confidential computing.

Research paper thumbnail of Exploring the Propagation of Fake Cyber News: An Experimental Approach

Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

The rising trend of fake news in cyberspace has escalated with increasing velocity of information... more The rising trend of fake news in cyberspace has escalated with increasing velocity of information exchange and an explosion of information sources. Combating fake news in the cyber security context is important due to its use as a content-based social engineering attack, or weaponization of information to compromise corporate information assets. This research aims to explore the proliferation of this type of threat through initial empirical analysis of propagation of cyber news with particular emphasis on potential for generation of weaponized information in the form of fake cyber news. Antecedents of the propagation of cyber news were examined using the Theory of Engagement. An exploratory experiment was conducted with 84 subjects in the field of cyber security on a social network platform. An analysis of the data showed that aesthetics and readability were important factors at the point of entry, but after initial engagement with the news, only novelty influenced propagation.

Research paper thumbnail of Canalization or Increased Diffusion? An Empirical Analysis on the Impact of the Recommendation System in the Mobile App Market

Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Online retailers have increasingly adopted product recommendation systems as an effective tool to... more Online retailers have increasingly adopted product recommendation systems as an effective tool to improve product visibility and promote sales. This study examines the impact of the recommendation system in the popular Google Play mobile app store. By analyzing a 60-day panel dataset with 235,638 observations from 9,735 apps, we investigate how the characteristics of the recommended apps relative to those of the focal apps affect the adoption of mobile apps in this volatile market. Our results show that the relative strength of the recommended apps over the focal app plays a key role in influencing the outcome of recommendations. Moreover, the heterogeneity of the recommendations as represented by the diversity of the popularity of the recommended apps is positively associated with a more even distribution of revenue in the market. These findings provide insights for mobile app market operators to enhance the design of their recommendation systems.

Research paper thumbnail of Rethinking FS-ISAC: An IT Security Information Sharing Network Model for the Financial Services Sector

Communications of the Association for Information Systems, 2014

This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing ... more This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing alliance in the financial services industry). Failure to encourage members to share their IT security-related information has seriously undermined the founding rationale of FS-ISAC. Our analysis shows that many information sharing alliances' membership policies are plagued with the incentive misalignment issue and may result in a "free-riding" or "no information sharing" equilibrium. To address this issue, we propose a new information sharing membership policy that incorporates an insurance option and show that the proposed policy can align members' incentives and lead to a socially optimal outcome. Moreover, when a transfer payment mechanism is implemented, all member firms will be better off joining the insurance network. These results are demonstrated in a simulation in which IT security breach losses are compared both with and without participating in the proposed information sharing insurance plan.

Research paper thumbnail of Sizing Up Pluto

Research paper thumbnail of System and method for gathering information from users of mobile audiovisual broadcast content

Research paper thumbnail of On the definition of the galactic coordinate system

Publications of the Shaanxi Astronomy Observatory, 1987

Research paper thumbnail of Operating ad-hoc wireless local area networks using network identifiers and application keys

Research paper thumbnail of MAXBAND-86. Program for optimizing left-turn phase sequence in multiarterial closed networks

Research paper thumbnail of Synthesis and characterization of novel mesostructured tungsten sulfides

Studies in Surface Science and Catalysis, 2000

ABSTRACT

Research paper thumbnail of Hazard perception abilities of experienced and novice motorcyclists: An interactive simulator experiment

Transportation Research Part F: Traffic Psychology and Behaviour, 2009

... He concluded that there was little evidence of a training benefit, because the subsequent on-... more ... He concluded that there was little evidence of a training benefit, because the subsequent on-road accident rates for both groups were ... To date, rider training programs have generally neglected the important skill of hazard perception: the ability to identify potentially dangerous ...

Research paper thumbnail of The Sky Is Not the Limit: Adventures of an Urban Astrophysicist and One Universe: At Home in the Cosmos

Research paper thumbnail of An Agent-Aware Computing Based Mixed Reality Information System

International Journal of Virtual Reality, 2017

In this paper, we present an agent- aware computing based collaborative information sys- tem sche... more In this paper, we present an agent- aware computing based collaborative information sys- tem scheme for MR applications. The HCI issues in VR, AR, and MR, have been discussed firstly. Besides the equipment, the lack of understanding of users also ac- counts for a significant bottleneck of improving user ex- perience and immersion during the interaction. Aiming at the issues, an agent-aware computing based scheme is proposed and implemented. The corresponding sys- tematic scheme is presented in the views of functional- ity, modules and system workflow and discussed in de- sign, implementation, and system synthesis. By means of the human-aware computing, system-aware comput- ing and human-system aware computing, issues such as mixed reality fusion, QoE-QoS management, confiden- tiality, and security, are addressed by the applying agent- aware computing based scheme into an implementation of the collaborative information system for mixed real- ity. Related modules along with their func...

Research paper thumbnail of A data-aware confidential tunnel for wireless sensor media networks

Multimedia Tools and Applications, 2017

A Wireless Sensor Media Network (WSMN) provides an economical and feasible solution to microscopi... more A Wireless Sensor Media Network (WSMN) provides an economical and feasible solution to microscopic visual monitoring in real time. Compared to macrographic monitoring (e.g. aerial photography), it can also provide a flexible solution by means of the facility of setup and integration of microscopic data. Security is one of the significant issues for the applications of monitoring due to the visuality of the content in a WSMN. Besides the visual data, the confidentiality of the communication is also important since a WSMN serves as both a media network and a sensor network. Impersonation and key recovery attack are two particular harmful threats to the sensor networks. A spying agent masquerades as a normal node in the network, overhearing the data and signaling. In this paper, we present a data-aware scheme for a wireless sensor media network (WSMN) to guarantee the security of information system against both the impersonation and key recovery attacks during communication. With the consideration of the characteristics of visual data regarding both volatility and correlation, a chaos-driven strategy is used to design the protocol for tunnel establishment. The data-aware scheme is proposed to enhance the security for confidential communication by public key cryptography based attack detection. A simulation and related analysis are presented in this paper. The robustness against anti-attack is also discussed. The results show that the scheme is able to protect the system against both the impersonal intrusion and key recovery attack simultaneously based on data-aware attack-detection.

Research paper thumbnail of Mixed Reality with a Collaborative Information System

Lecture Notes in Computer Science, 2016

In this paper, we present a mixed reality environment (MIXER) for immersive interactions. MIXER i... more In this paper, we present a mixed reality environment (MIXER) for immersive interactions. MIXER is an agent based collaborative information system displaying hybrid reality merging interactive computer graphics and real objects. MIXER is an agent based collaborative information system displaying hybrid reality merging interactive computer graphics and real objects. The system comprises a sensor subsystem, a network subsystem and an interaction subsystem. Related issues to the concept of mixed interaction, including human aware computing, mixed reality fusion, agent based systems, collaborative scalable learning in distributed systems, QoE-QoS balanced management and information security, are discussed. We propose a system architecture to perform networked mixed reality fusion for Ambient Interaction. The components of the mixed reality suit to perform human aware interaction are Interaction Space, Motion Monitoring, Action and Scenario Synthesisers, Script Generator, Knowledge Assistant Systems, Scenario Display, and a Mixed Reality Module. Thus, MIXER as an integrated system can provide a comprehensive human-centered mixed reality suite for advanced Virtual Reality and Augmented Reality applications such as therapy, training, and driving simulations.

Research paper thumbnail of Extensions of principle component analysis with applications on vision based computing

Multimedia Tools and Applications, 2015

This paper mainly focuses on the principle component analysis (PCA) and its applications on visio... more This paper mainly focuses on the principle component analysis (PCA) and its applications on vision based computing. The underlying mechanism of PCA given and several significant factors, involved with subspace training are discussed theoretically in detail including principle components energy, residuals assessment, and decomposition computation. The typical extensions, including probabilistic PCA (PPCA), kernel PCA (KPCA), multi-dimensional PCA and robust PCA (RPCA), have been presented with critical analysis on both mechanisms and computations. Combining with the studies on, such as, image compression, visual tracking, image recognition and super-resolution image reconstruction, PCA and its extensions applied to computer vision are critically reviewed and evaluated on the targeted issues in each application as well as the role they played at specific tasks to the characteristics, cost and suitable situations of each PCA based vision processing technique.

Research paper thumbnail of Assessment of Human Brain Water Content by Cerebral Bioelectrical Impedance Analysis: A New Technique and Its Application to Cerebral Pathological Conditions

Neurosurgery, 2002

OBJECTIVE: Total brain water content changes in several cerebral pathological conditions and the ... more OBJECTIVE: Total brain water content changes in several cerebral pathological conditions and the measurement of brain water content are important for the selection of appropriate therapeutic procedures. We present a quantitative, in vivo, bioelectrical impedance analysis (BIA) method and propose its use for the accurate assessment of brain water content among human subjects. METHODS: Cerebral BIA is based on the conduction of an applied current in the brain parenchyma. Application of an excitatory current of 800 A at 50 kHz, via two electrodes placed on the eyelids with the eyes closed, and detection of the voltage drop with two electrodes placed in the suboccipital region allow brain resistance and reactance to be measured. By means of an equation that considers cranial circumference and resistance, it is possible to quantify the total brain water content, expressed as the bioelectrical volume. Cerebral BIA was performed with a series of healthy volunteers (n ‫؍‬ 100), for determination of average brain water content values. The method was then applied to 50 patients with brain tumors (n ‫؍‬ 20), intracranial hemorrhage (n ‫؍‬ 16), or hydrocephalus (n ‫؍‬ 14), for assessment of changes in global brain water contents. Data were compared with those obtained for healthy volunteers. RESULTS: Statistically significant differences (P < 0.001) were observed between the two groups. Mean brain water content values (expressed as bioelectrical volume values) were 38.2 ؎ 3.9 cm 2 /⍀ for healthy volunteers and 67.7 ؎ 13.1 cm 2 /⍀ for patients with cerebral pathological conditions. Statistically significant differences (P < 0.05) were also observed among patients with cerebral pathological conditions. CONCLUSION: The results of this study suggest that BIA, applied to the cerebral parenchyma, is a valid method for the prediction of brain water contents under both normal and pathological conditions. However, further studies are needed to establish whether it is sensitive and reliable enough for future clinical applications.

Research paper thumbnail of A Social Network Perspective on the Success of Open Source Software: The Case of R Packages

Proceedings of the Annual Hawaii International Conference on System Sciences, 2020

In this paper, we seek to identify the factors that influence the impact of open source software ... more In this paper, we seek to identify the factors that influence the impact of open source software (OSS) on users community through the analysis of the evolution of the OSS network. Based on longitudinal data collected from the comprehensive R archive network (CRAN), we empirically examine how the network of R packages evolves over time and exert its influence on the scientific community. We find that critical network features derived from CRAN, such as pagerank, closeness, and betweenness centralities, play a significant role in determining the impact of each package on the research and publication activities in the scientific community. Furthermore, the performance of R packages can be explained as a flow of information from the core to the periphery that exhibits strong spillover effects.

Research paper thumbnail of An Empirical Analysis of User Participation on Crowdsourcing Platform: A Two-sided Network Market Perspective

Crowdsourcing has recently emerged as a new platform for matching the demand and supply between p... more Crowdsourcing has recently emerged as a new platform for matching the demand and supply between professionals and businesses who seek external expertise for business task execution. Driven by the unique features of the two-sided crowdsourcing markets (such as auction-style competition on quality by professionals), this study seeks to examine how the dynamics of the two-sided crowdsourcing platform affect customers’ and professionals’ strategic behaviors and market outcomes. Using longitudinal transaction data from a crowdsourcing websites, we plan to empirically examine how the participation of professionals and customers, task reward and task completion rate are affected by the characteristics of the professionals such as distribution of the winning professionals and their reputation. The results of our study are expected to contribute to the growing literature on crowdsourcing and provide important insights on the design and assessment of the sustainability and profitability of th...

Research paper thumbnail of Network Effects and Data Breaches: Investigating the Impact of Information Sharing and the Cyber Black Market

This paper was motivated by the growing data breach activities confronting organizations. Buildin... more This paper was motivated by the growing data breach activities confronting organizations. Building on the literature on information sharing and network effects, we attempt to empirically examine how the number of security breaches may change as a result of two opposing network effects in the data breach battlefield, namely, the positive network effects driven by industry-wide information sharing efforts, and the negative network effects driven by the supply and demand changes in the underground cybercrime ecosystem, and whether a feedback loop can be formed so that the information sharing efforts can influence the costs and availability of malicious tools and suppress their demand. As one of the first studies to empirically examine the dynamics in the cybercrime economy, our research will provide important policy guidance to improve collaborative mechanisms to enhance industry wide information security, and illuminate a new way to monitor and curtail the flow of cyber-criminal activ...

Research paper thumbnail of An Agent-Based Intelligent HCI Information System in Mixed Reality

ArXiv, 2019

This paper presents a design of agent-based intelligent HCI (iHCI) system using collaborative inf... more This paper presents a design of agent-based intelligent HCI (iHCI) system using collaborative information for MR to improve user experience and information security based on context-aware computing. In order to implement target awareness system, we propose the use of non-parameter stochastic adaptive learning and a kernel learning strategy for improving the adaptivity of the recognition. The proposed design involves the use of a context-aware computing strategy to recognize patterns for simulating human awareness and processing of stereo pattern analysis. It provides a flexible customization method for scene creation and manipulation. It also enables several types of awareness related to the interactive target, user-experience, system performance, confidentiality, and agent identification by applying several strategies, such as context pattern analysis, scalable learning, data-aware confidential computing.

Research paper thumbnail of Exploring the Propagation of Fake Cyber News: An Experimental Approach

Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

The rising trend of fake news in cyberspace has escalated with increasing velocity of information... more The rising trend of fake news in cyberspace has escalated with increasing velocity of information exchange and an explosion of information sources. Combating fake news in the cyber security context is important due to its use as a content-based social engineering attack, or weaponization of information to compromise corporate information assets. This research aims to explore the proliferation of this type of threat through initial empirical analysis of propagation of cyber news with particular emphasis on potential for generation of weaponized information in the form of fake cyber news. Antecedents of the propagation of cyber news were examined using the Theory of Engagement. An exploratory experiment was conducted with 84 subjects in the field of cyber security on a social network platform. An analysis of the data showed that aesthetics and readability were important factors at the point of entry, but after initial engagement with the news, only novelty influenced propagation.

Research paper thumbnail of Canalization or Increased Diffusion? An Empirical Analysis on the Impact of the Recommendation System in the Mobile App Market

Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Online retailers have increasingly adopted product recommendation systems as an effective tool to... more Online retailers have increasingly adopted product recommendation systems as an effective tool to improve product visibility and promote sales. This study examines the impact of the recommendation system in the popular Google Play mobile app store. By analyzing a 60-day panel dataset with 235,638 observations from 9,735 apps, we investigate how the characteristics of the recommended apps relative to those of the focal apps affect the adoption of mobile apps in this volatile market. Our results show that the relative strength of the recommended apps over the focal app plays a key role in influencing the outcome of recommendations. Moreover, the heterogeneity of the recommendations as represented by the diversity of the popularity of the recommended apps is positively associated with a more even distribution of revenue in the market. These findings provide insights for mobile app market operators to enhance the design of their recommendation systems.

Research paper thumbnail of Rethinking FS-ISAC: An IT Security Information Sharing Network Model for the Financial Services Sector

Communications of the Association for Information Systems, 2014

This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing ... more This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing alliance in the financial services industry). Failure to encourage members to share their IT security-related information has seriously undermined the founding rationale of FS-ISAC. Our analysis shows that many information sharing alliances' membership policies are plagued with the incentive misalignment issue and may result in a "free-riding" or "no information sharing" equilibrium. To address this issue, we propose a new information sharing membership policy that incorporates an insurance option and show that the proposed policy can align members' incentives and lead to a socially optimal outcome. Moreover, when a transfer payment mechanism is implemented, all member firms will be better off joining the insurance network. These results are demonstrated in a simulation in which IT security breach losses are compared both with and without participating in the proposed information sharing insurance plan.

Research paper thumbnail of Sizing Up Pluto

Research paper thumbnail of System and method for gathering information from users of mobile audiovisual broadcast content

Research paper thumbnail of On the definition of the galactic coordinate system

Publications of the Shaanxi Astronomy Observatory, 1987

Research paper thumbnail of Operating ad-hoc wireless local area networks using network identifiers and application keys

Research paper thumbnail of MAXBAND-86. Program for optimizing left-turn phase sequence in multiarterial closed networks

Research paper thumbnail of Synthesis and characterization of novel mesostructured tungsten sulfides

Studies in Surface Science and Catalysis, 2000

ABSTRACT

Research paper thumbnail of Hazard perception abilities of experienced and novice motorcyclists: An interactive simulator experiment

Transportation Research Part F: Traffic Psychology and Behaviour, 2009

... He concluded that there was little evidence of a training benefit, because the subsequent on-... more ... He concluded that there was little evidence of a training benefit, because the subsequent on-road accident rates for both groups were ... To date, rider training programs have generally neglected the important skill of hazard perception: the ability to identify potentially dangerous ...

Research paper thumbnail of The Sky Is Not the Limit: Adventures of an Urban Astrophysicist and One Universe: At Home in the Cosmos