default search action
Eun-Ju Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i2]Mahjabin Nahar, Haeseung Seo, Eun-Ju Lee, Aiping Xiong, Dongwon Lee:
Fakes of Varying Shades: How Warning Affects Human Perception and Engagement Regarding LLM Hallucinations. CoRR abs/2404.03745 (2024) - 2023
- [j32]Roselyn J. Lee-Won, Eun-Ju Lee, Jung Ah Lee:
Nostalgic Social Media Use and Psychological Well-Being During the COVID-19 Pandemic. Cyberpsychology Behav. Soc. Netw. 26(2): 90-97 (2023) - [j31]Eun-Ju Lee, Wonjae Lee, Inhwan Bae:
What Is the Draw of the Metaverse? Personality Correlates of Zepeto Use Motives and Their Associations With Psychological Well-Being. Cyberpsychology Behav. Soc. Netw. 26(3): 161-168 (2023) - [c19]Hwaran Lee, Seokhee Hong, Joonsuk Park, Takyoung Kim, Meeyoung Cha, Yejin Choi, Byoung Pil Kim, Gunhee Kim, Eun-Ju Lee, Yong Lim, Alice Oh, Sangchul Park, Jung-Woo Ha:
SQuARe: A Large-Scale Dataset of Sensitive Questions and Acceptable Responses Created through Human-Machine Collaboration. ACL (1) 2023: 6692-6712 - [i1]Hwaran Lee, Seokhee Hong, Joonsuk Park, Takyoung Kim, Meeyoung Cha, Yejin Choi, Byoung Pil Kim, Gunhee Kim, Eun-Ju Lee, Yong Lim, Alice Oh, Sangchul Park, Jung-Woo Ha:
SQuARe: A Large-Scale Dataset of Sensitive Questions and Acceptable Responses Created Through Human-Machine Collaboration. CoRR abs/2305.17696 (2023) - 2022
- [j30]Eun-Ju Lee, Hyun Suk Kim, Yoo Ji Suh, Jin Won Park:
Something's Fishy About It: How Opinion Congeniality and Explainability Affect Motivated Attribution to Artificial Intelligence Versus Human Comment Moderators. Cyberpsychology Behav. Soc. Netw. 25(8): 496-503 (2022) - 2021
- [j29]Eun-Ju Lee, Hyun Suk Kim, Soonwook Choi:
Violent Video Games and Aggression: Stimulation or Catharsis or Both? Cyberpsychology Behav. Soc. Netw. 24(1): 41-47 (2021) - 2020
- [j28]Eun-Ju Lee, Hye-Yon Lee, Sukyoung Choi:
Is the message the medium? How politicians' Twitter blunders affect perceived authenticity of Twitter communication. Comput. Hum. Behav. 104: 106188 (2020) - [j27]Eun-Ju Lee:
Authenticity Model of (Mass-Oriented) Computer-Mediated Communication: Conceptual Explorations and Testable Propositions. J. Comput. Mediat. Commun. 25(1): 60-73 (2020)
2010 – 2019
- 2019
- [j26]Jeong-woo Jang, Eun-Ju Lee, Soo Yun Shin:
What Debunking of Misinformation Does and Doesn't. Cyberpsychology Behav. Soc. Netw. 22(6): 423-427 (2019) - 2018
- [j25]Eun-Ju Lee, Eugene Cho:
When Using Facebook to Avoid Isolation Reduces Perceived Social Support. Cyberpsychology Behav. Soc. Netw. 21(1): 32-39 (2018) - 2017
- [c18]Mihwa Lee, Jee-Hyun Rho, Eun-Ju Lee, Yoon Kyung Choi:
The Development of Application Profile for the OAK Institutional Repository. Dublin Core Conference 2017: 100-103 - [c17]Changbeom Choi, Eun-Young Kim, Eun-Ju Lee, Sang-Min Kim, Na-Gyum Lee:
Pohang living lab: Utilizing modeling and simulation as a collaboration method. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - 2016
- [j24]Eun-Ju Lee, Ye Weon Kim:
Effects of infographics on news elaboration, acquisition, and evaluation: Prior knowledge and issue involvement as moderators. New Media Soc. 18(8): 1579-1598 (2016) - [c16]Joon Young Kwak, Eun-Ju Lee, ByoungChul Ko, Mira Jeong:
Pedestrian's Intention Prediction Based on Fuzzy Finite Automata and Spatial-temporal Features. Video Surveillance and Transportation Imaging Applications 2016: 1-6 - [c15]Hyeon Park, Eun-Ju Lee, Dae-Heon Park, Jee-Sook Eun, Se-Han Kim:
PaaS offering for the big data analysis of each individual APC. ICTC 2016: 30-32 - 2015
- [c14]Hyeon Park, Dae-Heon Park, Eun-Ju Lee, Se-Han Kim:
Hybrid Clustering Framework for Multi-dimensional Array Data. BigDAS 2015: 225-228 - [c13]Eun-Ju Lee, Kyung-Chan Jin:
Comparative analysis of sinogram interpolation methods for computer tomographic images. ISCE 2015: 1-2 - 2014
- [j23]Eun-Ju Lee, Soo Yun Shin:
When do consumers buy online product reviews? Effects of review quality, product type, and reviewer's photo. Comput. Hum. Behav. 31: 356-366 (2014) - [j22]Eun-Ju Lee, Ye Weon Kim:
How social is Twitter use? Affiliative tendency and communication competence as predictors. Comput. Hum. Behav. 39: 296-305 (2014) - [j21]Eun-Ju Lee, Soo Yun Shin:
When the Medium Is the Message. Commun. Res. 41(8): 1088-1110 (2014) - [c12]Eun-Ju Lee, Ihn-Han Bae:
A Reputation-Based Adaptive Trust Management System for Vehicular Clouds. TRIDENTCOM 2014: 77-86 - 2013
- [j20]Eun-Ju Lee, Jeong-woo Jang:
Not So Imaginary Interpersonal Contact With Public Figures on Social Network Sites. Commun. Res. 40(1): 27-51 (2013) - 2012
- [j19]Eun-Ju Lee, Soo Yun Shin:
Are They Talking to Me? Cognitive and Affective Effects of Interactivity in Politicians' Twitter Communication. Cyberpsychology Behav. Soc. Netw. 15(10): 515-520 (2012) - [j18]Eun-Ju Lee:
That's Not the Way It Is: How User-Generated Comments on the News Affect Perceived Media Bias. J. Comput. Mediat. Commun. 18(1): 32-45 (2012) - 2011
- [j17]Eun-Ju Lee, Lu Lee, Jeong-woo Jang:
Internet for the Internationals: Effects of Internet Use Motivations on International Students' College Adjustment. Cyberpsychology Behav. Soc. Netw. 14(7-8): 433-437 (2011) - 2010
- [j16]Eun-Ju Lee:
The more humanlike, the better? How speech type and users' cognitive style affect social responses to computers. Comput. Hum. Behav. 26(4): 665-672 (2010) - [j15]Eun-Ju Lee, Jeong-woo Jang:
Profiling good Samaritans in online knowledge forums: Effects of affiliative tendency, self-esteem, and public individuation on knowledge sharing. Comput. Hum. Behav. 26(6): 1336-1344 (2010) - [j14]Eun-Ju Lee:
What Triggers Social Responses to Flattering Computers? Experimental Tests of Anthropomorphism and Mindlessness Explanations. Commun. Res. 37(2): 191-214 (2010) - [j13]Eun-Ju Lee, Yoon Jae Jang:
What Do Others' Reactions to News on Internet Portal Sites Tell Us? Effects of Presentation Format and Readers' Need for Cognition on Reality Perception. Commun. Res. 37(6): 825-846 (2010)
2000 – 2009
- 2009
- [j12]Eun-Ju Lee:
I like you, but I won't listen to you: Effects of rationality on affective and behavioral responses to computers that flatter. Int. J. Hum. Comput. Stud. 67(8): 628-638 (2009) - [c11]Jae-Whoan Lee, Jee-Hyun Rho, Yong Wan Cho, Eun-Ju Lee, Ichiro Ohba, Yu-ra Yoon:
Nationality and information behavior: Comparing Koreans and Japanese. ASIST 2009: 1-16 - [c10]Kyu Il Kim, Won Gil Choi, Eun-Ju Lee, Ung-Mo Kim:
RBAC-based access control for privacy protection in pervasive environments. ICUIMC 2009: 255-259 - [c9]Kyu Il Kim, Won Gil Choi, Eun-Ju Lee, Ung-Mo Kim:
A Secure Delegation Model Based on Multi-agent in Pervasive Environments. KES-AMSTA 2009: 304-313 - 2008
- [j11]Eun-Ju Lee:
When Are Strong Arguments Stronger Than Weak Arguments? Commun. Res. 35(5): 646-665 (2008) - [j10]Eun-Ju Lee:
Flattery may get computers somewhere, sometimes: The moderating role of output modality, computer gender, and user gender. Int. J. Hum. Comput. Stud. 66(11): 789-800 (2008) - [c8]Eunyoung Kang, Moon Jeong Kim, Eun-Ju Lee, Ung-Mo Kim:
DHT-Based Mobile Service Discovery Protocol for Mobile Ad Hoc Networks. ICIC (1) 2008: 610-619 - [c7]Joo Chang Lee, Hyuk Jin Ko, Eun-Ju Lee, Won Gil Choi, Ung-Mo Kim:
A Data Sanitization Method for Privacy Preserving Data Re-publication. NCM (2) 2008: 28-31 - [c6]Seung-Cheol Lee, Eun-Ju Lee, Wongil Choi, Ung-Mo Kim:
Extracting Temporal Behavior Patterns of Mobile User. NCM (2) 2008: 455-462 - 2007
- [j9]Charles R. Berger, Eun-Ju Lee:
Dynamic Representations of Threatening Trends: The Role of Rationality and Experientiality in Potentiating Trepidation. Commun. Res. 34(1): 53-72 (2007) - [j8]Kyu Il Kim, Joo Chang Lee, Won Gil Choi, Eun-Ju Lee, Ung-Mo Kim:
A Delegation Model based on Agent in Distributed Systems. J. Inf. Process. Syst. 3(2): 82-88 (2007) - 2006
- [j7]Eun-Ju Lee:
When and How Does Depersonalization Increase Conformity to Group Norms in Computer-Mediated Communication? Commun. Res. 33(6): 423-447 (2006) - [c5]Eun-Ju Lee, Chang-Nam Kang, DoHyung Han, Doo-Yeong Yang, JeongWoo Jwa:
A Tone Dual-Channel DMAC Protocol in Location Unaware Ad Hoc Networks. Communications in Computing 2006: 91-96 - 2005
- [j6]Eun-Ju Lee:
Effects of the Influence Agent's Sex and Self-Confidence on Informational Social Influence in Computer-Mediated Communication. Commun. Res. 32(1): 29-58 (2005) - [j5]Eun-Ju Lee:
When Placebic Information Differs From Real Information. Commun. Res. 32(5): 615-645 (2005) - 2004
- [j4]Eun-Ju Lee:
Effects of gendered character representation on person perception and informational social influence in computer-mediated communication. Comput. Hum. Behav. 20(6): 779-799 (2004) - [c4]Hyeon-Ju Yoon, Eun-Ju Lee, Hyunku Jeong, Jin-Soo Kim:
Proximity-Based Overlay Routing for Service Discovery in Mobile Ad Hoc Networks. ISCIS 2004: 176-186 - 2003
- [j3]Charles R. Berger, Joel T. Johnson, Eun-Ju Lee:
Antidotes for Anthrax Anecdotes. Commun. Res. 30(2): 198-223 (2003) - [j2]Charles R. Berger, Eun-Ju Lee, Joel T. Johnson:
Gender, Rationality, and Base-Rate Explanations for Increasing Trends. Commun. Res. 30(6): 737-765 (2003) - [j1]Eun-Ju Lee:
Effects of "gender" of the computer on informational social influence: the moderating role of task type. Int. J. Hum. Comput. Stud. 58(4): 347-362 (2003) - 2000
- [c3]Eun-Ju Lee, Clifford Nass, Scott Brave:
Can computer-generated speech have gender?: an experimental test of gender stereotype. CHI Extended Abstracts 2000: 289-290
1990 – 1999
- 1999
- [c2]Eun-Ju Lee, Clifford Nass:
Effects of the form of representation and number of computer agents on conformity. CHI Extended Abstracts 1999: 238-239 - 1998
- [c1]Clifford Nass, Eun-Young Kim, Eun-Ju Lee:
When My Face Is the Interface: An Experimental Comparison of Interacting With One's Own Face or Someone Else's Face. CHI 1998: 148-154
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint