Hsin-yi Sandy Tsai
Hsin-yi Sandy Tsai
Assistant Professor
Verified email at g2.nctu.edu.tw - Homepage
Cited by
Cited by
Understanding online safety behaviors: A protection motivation theory perspective
HS Tsai, M Jiang, S Alhabash, R LaRose, NJ Rifon, SR Cotten
Computers & Security 59, 138-150, 2016
Understanding the physical and economic consequences of attacks on control systems
YL Huang, AA Cárdenas, S Amin, ZS Lin, HY Tsai, S Sastry
International Journal of Critical Infrastructure Protection 2 (3), 73-83, 2009
Getting grandma online: are tablets the answer for increasing digital inclusion for older adults in the US?
HS Tsai, R Shillair, SR Cotten, V Winstead, E Yost
Educational gerontology 41 (10), 695-709, 2015
Online safety begins with you and me: Convincing Internet users to protect themselves
R Shillair, SR Cotten, HYS Tsai, S Alhabash, R LaRose, NJ Rifon
Computers in Human Behavior 48, 199-207, 2015
Threat as a service?: Virtualization's impact on cloud security
HY Tsai, M Siebenhaar, A Miede, Y Huang, R Steinmetz
IT professional 14 (1), 32-37, 2011
Social support and “playing around” an examination of how older adults acquire digital literacy with tablet computers
HS Tsai, R Shillair, SR Cotten
Journal of Applied Gerontology 36 (1), 29-55, 2017
Completion rates and non-response error in online surveys: Comparing sweepstakes and pre-paid cash incentives in studies of online behavior
R LaRose, HS Tsai
Computers in Human Behavior 34, 110-119, 2014
A graph approach to quantitative analysis of control-flow obfuscating transformations
HY Tsai, YL Huang, D Wagner
IEEE Transactions on Information Forensics and Security 4 (2), 257-267, 2009
Broadband adoption| measuring sustainable broadband adoption: an innovative approach to understanding broadband adoption and use
R LaRose, K DeMaagd, HE Chew, HS Tsai, C Steinfield, SS Wildman, ...
International Journal of Communication 6, 25, 2012
An analytic hierarchy process-based risk assessment method for wireless networks
HY Tsai, YL Huang
IEEE Transactions on Reliability 60 (4), 801-816, 2011
Broadband Internet adoption and utilization in the inner city: A comparison of competing theories
HS Tsai, R LaRose
Computers in human behavior 51, 344-355, 2015
Are you what your avatar eats? Health-behavior effects of avatar-manifested self-concept
YJ Sah, R Ratan, HYS Tsai, W Peng, I Sarinopoulos
Media Psychology 20 (4), 632-657, 2017
Generational differences in online safety perceptions, knowledge, and practices
M Jiang, HS Tsai, SR Cotten, NJ Rifon, R LaRose, S Alhabash
Educational Gerontology 42 (9), 621-634, 2016
Not so lonely surfers: Loneliness, social support, internet use and life satisfaction in older adults
RJ Shillair, RV Rikard, SR Cotten, HY Tsai
Iconference 2015 proceedings, 2015
Dude, where’s my avacar? A mixed-method examination of communication in the driving context
RR Ratan, HS Tsai
Pervasive and Mobile Computing 14, 112-128, 2014
Yu-Lun Huang, Ralf Steinmetz,“Threat as a Service? Virtualization’s impact on Cloud Security”
HY Tsai, M Siebenhaar, A Miede
IEEE, IT Pro, 32-37, 2012
Not so lonely surfers: Loneliness, social support, internet use and life satisfaction in older adults. iConference 2015 Proceedings
RJ Shillair, RV Rikard, SR Cotten, HY Tsai
Senior technology exploration, learning, and acceptance (STELA) model: from exploration to use–a longitudinal randomized controlled trial
HYS Tsai, RV Rikard, SR Cotten, R Shillair
Educational Gerontology 45 (12), 728-743, 2019
A framework for quantitative evaluation of parallel control-flow obfuscation
YL Huang, HY Tsai
computers & security 31 (8), 886-896, 2012
High tension lines: Negative social exchange and psychological well-being in the context of instant messaging
HS Tsai, PJ Hsu, CL Chang, CC Huang, HF Ho, R LaRose
Computers in Human Behavior 93, 326-332, 2019
The system can't perform the operation now. Try again later.
Articles 1–20