Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Cathy S. Lin is active.

Publication


Featured researches published by Cathy S. Lin.


hawaii international conference on system sciences | 2006

Exploring Knowledge Sharing in Virtual Teams: A Social Exchange Theory Perspective

Sheng Wu; Cathy S. Lin; Tung-Ching Lin

In the Knowledge Economics Age, knowledge is seen as a critical resource. To enhance the knowledge value, businesses have to promote knowledge sharing as the path to gaining competitive advantages. Further, with the rapid progress in network technology, new business models have emerged to adapt to the changing environment; the virtual team, a kind of new business style, has become prevalent for many businesses in emerging information technologies. In this study, we study how the virtual team members effectively share their knowledge through the network technology. Based on the Social Exchange Theory and a model of shared knowledge, we explore the critical factors and causal relationships among knowledge sharing on virtual team. The findings show that the total eight hypotheses have been confirmed and are valid. Thus, these findings could be good references for both academics and in practice. Based upon the research findings, implications and limitations are discussed.


international conference on electronic commerce | 2009

Constructing an ARP attack detection system with SNMP traffic data mining

Han-Wei Hsiao; Cathy S. Lin; Ssu-Yang Chang

With the prevalent of Internet, network security plays a very important role as an infrastructural foundation to establish a successful e-Commerce environment. Especially when the Internet transmission technique progresses, network attack becomes prevalent and threaten to Internet users than ever before. While many kinds of network intrusion techniques and sniffing tools are generated, ARP (Address Resolution Protocol) spoofing is one of the serious network attacks. The ARP spoofing attack seizes the defect of protocol design cheating the victims to hijack the transformation package to sniff the important information or embedding some malicious software to those victim hosts. This study aims at construct an ARP spoofing attack detection system with SNMP (Simple Network Management Protocol) traffic data mining techniques of Naïve Bayesian, Decision Tree (C4.5) and Support Vector Machine (SVM). The performance is evaluated by accuracy, missing rate, and false alarm rate. The results show that C4.5 has a best accuracy; and SVM has a very low false alarm rate of 0.7% yet has a high missing rate of 39.6%. Both C4.5 and SVM have better performance than Naïve Bayesian. Therefore, the system is expected to be of help facilitating the detection of abnormal traffic data pattern and building a more secure e-Commerce ecosystem.


International Conference, MISNC | 2014

Data Quality Assessment on Taiwan’s Open Data Sites

Cathy S. Lin; Hsin-Chang Yang

Open data has emerged to be a hot topic recently and attracted lots of attention from both researchers and practitioners. Many governments around the world are publishing government open data for public well-being, information disclosure, service innovation, and so on. Enormous amount of data and applications have been released and built in recent years. In accordance to such trend, authorities of Taiwan government are also striving to establish platforms for users to access and employ open data. However, the status and usage of these platforms are still unclear. This study conducts an exploratory investigation on the open data platforms in Taiwan to reveal their feasibility. Besides, we also try to assess the data quality of these platforms by examining medical facilities datasets published in these platforms. We hope that this research can provide a step stone for building better open datasets as well as platforms in Taiwan.


Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, Data Science 2016 | 2016

Toward Construction of Open Election Data Model: A Case Study of Taiwan's Election Data

Hsin-Chang Yang; Cathy S. Lin; Han-Wei Hsiao; Wen-Sheng Chen; Mei-Li Kao; Yuh-Tay Lin; Leon Shyue-Liang Wang

Open election data is an emerged domain in open data for it reflects the maturity of governance and democracy. On this regard, a standardized approach for building open election data will significantly reduce the time and effort for publishing election data to the public for easy access. In this work, we will develop an initial step for building open election data, namely building election data model. The procedure and preliminary result of such task on Taiwans election data will be described. We believe the process on building election data model could be beneficial to other authorities which intend to publicize their election data.


International Conference on Multidisciplinary Social Networks Research | 2015

Exploring Multidimensional Conceptualization of Online Learned Capabilities

Cathy S. Lin; Han-Wei Hsaio

Internet has changed the way of learning, it has become an important part of the adolescents’ life, online social networking has become particularly popular with adolescents, yet it is relatively unclear what capabilities the teenagers have learned and developed from the social media. While the most teenagers have their digital life, many parents of the teens have a range of concerns about what do their children do on the Internet. For many parents and teachers, they are anxious about their children’s spending much time on the Internet might be risky, wasting time, having effects on their real life and academic performance. Therefore this study tries to close the gap to understand what the teenagers learn from their online activities. The purpose of this study is to propose a multidimensional conceptualization of “Online learned capabilities”, and exploring the relationships between positive/negative emotions of teenagers and their online learned capabilities. Based on the empirical study, a field survey was conducted to senior high schools in Taiwan. The paper-and-pencil version questionnaire was distributed to students through teachers after class. A totally 383 valid surveys were collected. The statistical analyses helped validated the proposed second-order “online learned capabilities” and would strengthen explanations of teenagers’ multi-dimensional learned from the cyber society.


International Conference on Multidisciplinary Social Networks Research | 2015

Toward Automatic Assessment of the Categorization Structure of Open Data Portals

Hsin-Chang Yang; Cathy S. Lin; Po-Han Yu

Governments worldwide have been releasing their owned data recently for public usage and arising lots of novel applications and services. Issues on open data were also intensively discussed from researchers and practitioners. One of the key issues in adopting open data is the accessibility of the data, which are generally collectively provided in open data portals. Open data portals categorize open datasets according to their domains, providers, formats, and other properties for better accessibility of the data. However, these portals did not follow a conforming standard in establishing their categorization structures. In this work, we try to assess the goodness of categorization structures of open data portals automatically by investigating the coherence of the datasets in the same category. The detailed methodology is described but preliminary experiments on Taiwan’s open data portals are still undergoing.


Archive | 2013

Introspection of Unauthorized Sharing on Social Networking Sites

Cathy S. Lin; Ting-Yi Lin

The digital content industry is a remarkable market in the information era. Yet the various types of piracy such as software, music, e-book, comic, animation, and movie piracy always threaten the digital content industries and cause enormous losses in revenue. Especially the emerging social networks play a dramatic role in disseminating much unauthorized sharing on the net. Previous studies and practicians have paying close attention in how to diminish piracy. Recently, the experiences from Swiss and Dutch governments have told that there is another way to view piracy. While the sharing behaviours is quite common on social networking context, this study is an introspection of digital content industries and tries to propose the positive viewpoint that drive users eventually spend the money on those digital content products.


Archive | 2013

Guanxi Buying in the Social Media Environment

Cathy S. Lin; Shin Yan Lu

In the online marketspace, social media has played an indispensably role in changing the way of online shopping and auctioning. Previous studies have found the interpersonal relationship is the key factor to a success social media business. This study aims at exploring group buying in social commerce environment from the Chinese “guanxi” perspective. Guanxi is a kind of interpersonal interaction that individuals tend to interact through the ren-quin (favor), and individuals have to give and save face for their friends to show their social friendship. Chinese culture is differentiated from Western culture in many aspects. Therefore exploring the impact of Chinese guanxi factors in affecting consumer participating in the group buying decision making has its research originality to bring the Chinese interpersonal relationships Guanxi into social media context.


Information & Management | 2005

Integrating perceived playfulness into expectation-confirmation model for web portal context

Cathy S. Lin; Sheng Wu; Ray J. Tsai


Online Information Review | 2011

An empirical investigation of online users' keyword ads search behaviours

Sheng Wu; Cathy S. Lin; Jean Lin

Collaboration


Dive into the Cathy S. Lin's collaboration.

Top Co-Authors

Avatar

Sheng Wu

National Sun Yat-sen University

View shared research outputs
Top Co-Authors

Avatar

Han-Wei Hsiao

National University of Kaohsiung

View shared research outputs
Top Co-Authors

Avatar

Hsin-Chang Yang

National University of Kaohsiung

View shared research outputs
Top Co-Authors

Avatar

Feng-Yang Kuo

National Sun Yat-sen University

View shared research outputs
Top Co-Authors

Avatar

Jean Lin

National University of Kaohsiung

View shared research outputs
Top Co-Authors

Avatar

Han-Wei Hsaio

National University of Kaohsiung

View shared research outputs
Top Co-Authors

Avatar

Leon Shyue-Liang Wang

National University of Kaohsiung

View shared research outputs
Top Co-Authors

Avatar

Meng Hsiang Hsu

National Kaohsiung First University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Po-Han Yu

National University of Kaohsiung

View shared research outputs
Top Co-Authors

Avatar

Shin Yan Lu

National University of Kaohsiung

View shared research outputs
Researchain Logo
Decentralizing Knowledge