
This is software (AWS) generated transcription and it is not perfect.
I lived in Asia most of my childhood, I lived in Taiwan, Singapore, Hong Kong and Manila as well as Seattle and Salt Lake City. When I’m asked about home, I think of Hong Kong as home.What do I enjoy doing? I'm not that into sports, but I do like hiking. I particularly enjoy a night hike because I enjoy the darkness and the lack of distractions that come with the kind, you get chance to meditate.Music, I'm a little bit of an academic stereotype, I like Jam Bands. I still enjoy listening to the Grateful Dead, Phish and if it's a live venue- it doesn’t matter. Seeing artists in action is wonderful. I have a very strong preference for authentic Asian food. Going to a Chinese restaurant in America is hard for me because it is really American, cornstarch wasn't part of my diet as a child, or corn syrup for that matter. So, that's a little bit about myselfOne of my students ask me about arts and movies or reading or what not. So after one of my classes, we were chatting and he was like, 'Dude, you're really a nerd' and in a way I am. I really enjoy Science fiction ranging from the classics in the fifties like Highland Forward or to the present.
My research interests are divided roughly into three separate areas: The primary thing I am interested in is how the individual makes decisions about what they do with technology. I look at that at in a couple different contexts like, I look at that in terms of innovation, what are the beliefs about the self, or the technology that we needed a new and interesting thing to create value for myself, my friends or my employer organization in one broad piece. In that broad piece, I'd look at -Cyber security issues - so how do I decide whether I'm going to comply with cyber security request or not -How are the attributes of messages in that interaction, the attributes of messages shape decisions that I make? -How do I design good training programs, so that they interact appropriately with technology in cyber context.Then the other piece I look at in that space, decision making about social media use, particularly the information that I disclosed to the public audiences, how do I create value? how do I lose firm value? then how do I create value for myself as a broad way as I tie these three different parts together. But they all really converge around the notion that I’m introduced to a technology. And then I choose not to contact technology, I choose the value that I create from it. The other pieces that I look at are IT workforce issues. How do I attract, retain the workers or employees. It's a little bit of human resource-ish and not information systems but when I get to interact with managers and ask what they are working on, almost everyone say they are working on hiring new people. So that's a great way of getting into an organization, to work with them on a few projects.Then the second piece I look at, how do CEOs and CIOs think about how to strategically deploy technology and firms? These are the kind of three major threads that I work on.In terms of major research projects, I'm involved in a series of experimental studies that are manipulating features of cyber security training. They are training programs to see how that affects if you fall prey to the phishing messages in the field. The first set of experiments, we found that if we, through message design we could double the hit rate of typical phishers, we made them better and we felt a little guilt. The second round of experiments have largely been around, how do we have quick and effective training programs so that users won't kept be caught by the messages we train people to create.The other major piece, I'm going back to that social media, how to create value for myself. I'm looking at how the conversations you have with each other in different forms, be it in Facebook, LinkedIn, Twitter, shape people's perceptions of will I be a good coworker, can I do more skilled work and what not, which I think is pretty interesting. So these are the two things I have got going on right now.
There’s a little bit of serendipity. The cyber security piece, I had a collaborator and we are working on this idea of mindfulness and were mindful people better at using technology? He's a cyber security researcher and he was like, you know, this mindfulness stuff is really relevant to cyber. So, we started working on a phishing experiment where we manipulated whether people receive mindfulness training or not. I had a good friend and collaborator who brought the idea that made sense to me. That to me is one of the most powerful places. That's why you go to workshops and conferences and just kind of hang out and listen. Other people come to me with ideas and then if we like each other, it's fun to collaborate.The other part of it, the social media research, came from industry. I ran an Analytics Institute where we brought together Computer Scientists and Technologists from business and we interacted. We did over eighty executive interviews and focus group. We asked them, what are you using social media for and we thought they were going to answer business intelligence, like ideas for many products. Like Jeep Rubicon, a customer suggested an affordable jeep and they made it. But we actually found out that most of them were looking at social media pages, again, to hire people. So, it was really rooted in practice and what they were telling us was that social media had made hiring much harder and much more complicated. They expressed concerns particularly about college students, about the things they were talking about. There were these things that made them desirable employees. So, there are those two factors. Then of course, there's that time you wake up in the middle of the night and you like, oh, that would be really interesting. I have those or you interact with the technology and you go, why is that happening or why am I behaving this way with it, so I've done some research on why people instantaneously trust each other and then that part because I had a server and it kept crashing and I never felt good about that server ever again. And my coauthors were like - well you know people don't trust technologies and I'm like, I know they really do. Because look at me, at the back of my head, it's like I talk to this computer and I like to beg it to please work and that led to a research in that area.