Heng Xu

ORCID: 0000-0001-5642-6543
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy, Security, and Data Protection
  • Technology Adoption and User Behaviour
  • Sexuality, Behavior, and Technology
  • Privacy-Preserving Technologies in Data
  • Digital Marketing and Social Media
  • Social Media and Politics
  • Impact of Technology on Adolescents
  • Child Development and Digital Technology
  • Cybercrime and Law Enforcement Studies
  • Information and Cyber Security
  • Sharing Economy and Platforms
  • Ethics and Social Impacts of AI
  • Internet Traffic Analysis and Secure E-voting
  • Customer Service Quality and Loyalty
  • Digital Platforms and Economics
  • Bullying, Victimization, and Aggression
  • Consumer Behavior in Brand Consumption and Identification
  • Advanced Malware Detection Techniques
  • Consumer Retail Behavior Studies
  • Industrial Technology and Control Systems
  • Access Control and Trust
  • Collaboration in agile enterprises
  • Spam and Phishing Detection
  • Knowledge Management and Sharing
  • Conflict Management and Negotiation

American University
2018-2024

Hebei Finance University
2024

University of Technology Sydney
2024

Henan University of Technology
2008-2024

University of Florida
2023-2024

Beijing Jiaotong University
2024

Hoseo University
2023

Sichuan University
2020

Pennsylvania State University
2009-2018

Beijing University of Posts and Telecommunications
2016

Location-based services (LBS) use positioning technologies to provide individual users with reachability and accessibility that would otherwise not be available in the conventional commercial realm. While LBS confer greater connectivity personalization on consumers, they also threaten users' information privacy through granular tracking of their preferences, behaviors, identity. To address concerns context, this study extends calculus model explore role delivery mechanisms (pull push)...

10.2753/mis0742-1222260305 article EN Journal of Management Information Systems 2009-12-01

Organizational information practices can result in a variety of privacy problems that increase consumers’ concerns for privacy. To explore the link between individuals and organizations regarding privacy, we study how institutional assurances such as policies industry self-regulation contribute to reducing individual concerns. Drawing on Communication Privacy Management (CPM) theory, develop research model suggesting an individual’s form through cognitive process involving perceived risk,...

10.17705/1jais.00281 article EN Journal of the Association for Information Systems 2011-12-01

Since the textual contents on online social media are highly unstructured, informal, and often misspelled, existing research message-level offensive language detection cannot accurately detect content. Meanwhile, user-level offensiveness seems a more feasible approach but it is an under researched area. To bridge this gap, we propose Lexical Syntactic Feature (LSF) architecture to content identify potential users in media. We distinguish contribution of pejoratives/profanities obscenities...

10.1109/socialcom-passat.2012.55 article EN 2012-09-01

Four studies support the development and validation of a framework for understanding range social psychological outcomes valued subjectively as consequences negotiations. Study 1 inductively elicited coded elements subjective value among students, community members, practitioners, revealing 20 categories that theorists in 2 sorted into 4 underlying subconstructs: Feelings About Instrumental Outcome, Self, Negotiation Process, Relationship. 3 proposed new Subjective Value Inventory (SVI)...

10.1037/0022-3514.91.3.493 article EN Journal of Personality and Social Psychology 2006-08-28

This study seeks to clarify the nature of control in context information privacy generate insights into effects different assurance approaches on context-specific concerns for privacy. We theorize that such are exhibited through mediation by perceived over personal and develop arguments support interaction involving (individual self-protection, industry self-regulation, government legislation). test research model location-based services using data obtained from 178 individuals Singapore. In...

10.1287/isre.1120.0416 article EN Information Systems Research 2012-04-19

The effect of situational factors is largely ignored by current studies on information privacy. This paper theorized and empirically tested how an individual's decision-making disclosure driven competing benefits risk factors. results this study indicate that, in the context e-commerce transaction with unfamiliar vendor, result influences exchange two types privacy beliefs (privacy protection belief belief). In addition, monetary rewards dependent upon fairness exchange. Monetary could...

10.1080/08874417.2010.11645450 article EN Journal of Computer Information Systems 2015-12-11

The emergence of mobile communication and positioning technologies has presented advertisers marketers with a radically innovative advertising channel: Location-Based Advertising (LBA). Despite the growing attention given to LBA, little is understood about differential effects text multimedia formats on consumer perceptions behaviours. This exploratory study empirically examines advertisements vis-a-vis text-based behaviours in simulated LBA environment. A structural model was formulated...

10.1504/ijmc.2009.022440 article EN International Journal of Mobile Communications 2009-01-01

We conducted a structured, qualitative feature analysis of 75 Android mobile apps designed for the purpose promoting adolescent online safety. Through this we identified 42 unique features that mapped to theoretically derived conceptual framework teen safety strategies balanced between parental control (through monitoring, restriction, and active mediation) self-regulation self-monitoring, impulse control, risk-coping). found strongly favored promote through monitoring restricting teens'...

10.1145/2998181.2998352 article EN 2017-02-14

We cannot fully protect adolescents from experiencing online risks; however, we can aim to better understand how risk experiences impact teens, factors that contribute or prevent teens exposure risk, as well psychological harm in spite of exposure. Through a web-based survey study 75 the US, develop and empirically validate theoretical model adolescent resilience presence risks. show evidence is key factor protecting risks, even when exhibit high levels Internet addiction. Resilience also...

10.1145/2702123.2702240 article EN 2015-04-17

Through an empirical, secondary analysis of 588 teens (ages 12 - 17) and one their parents living in the USA, we present useful insights into how parental privacy concerns for different mediation strategies (direct intervention versus active mediation) influence teen risk-taking risk-coping behaviors social media. Our results suggest that use direct by itself may have a suppressive effect on teens, reducing exposure to online risks but also ability engage with others learn effectively cope...

10.1145/2675133.2675293 article EN 2015-02-24

In our study, 68 teens spend two months reflecting on their weekly online experiences and report 207 separate risk events involving information breaches, harassment, sexual solicitations, exposure to explicit content. We conduct a structured, qualitative analysis characterize the salient dimensions of experiences, such as severity, level agency, coping strategies, whether felt like situation had been resolved. Overall, we found that can potentially benefit from lower situations, which allow...

10.1145/2858036.2858317 article EN 2016-05-05

Little research examines the privacy threats associated with use of third-party apps on Facebook. To address this gap in literature, we systematically study apps' current practices for notice and consent by: i) collecting data from 1800 most popular Facebook to record their collection concerning users friends, ii) developing our own app conduct a number tests identify problems that exist design authentication dialogs these problems, propose two new interface designs to: increase user control...

10.1145/2076444.2076448 article EN 2011-12-04

Abstract Online Social Networks (OSNs) facilitate the creation and maintenance of interpersonal online relationships. Unfortunately, availability personal data on social networks may unwittingly expose users to numerous privacy risks. As a result, establishing effective methods control maintain within these OSNs have become increasingly important. This research extends current access mechanisms employed by protect private information shared among OSNs. The proposed approach presents system...

10.1002/asi.21473 article EN Journal of the American Society for Information Science and Technology 2011-01-25

The increasing popularity of the Internet and social media is creating new unique challenges for parents adolescents regarding boundaries between parental control adolescent autonomy in virtual spaces. Drawing on developmental psychology C ommunication P rivacy M anagement ( CPM ) theory, we conduct a qualitative study to examine challenge concern online safety teens' desire independently regulate their own experiences. Analysis 12 parent–teen pairs revealed five distinct challenges: (a)...

10.1002/asi.23450 article EN Journal of the Association for Information Science and Technology 2015-04-29
Coming Soon ...