Skip to main content

Hsia-Ching Chang

Title: Associate Professor

Department: Information Science

College: College of Information

Curriculum Vitae

Curriculum Vitae Link

Education

  • PhD, University at Albany, State University of New York, 2011
    Major: Information Science
    Dissertation: "Rehashing Information Architecture: Exploring Human-Information Interaction of Collaborative Tagging Using Twitter Hashtags"
  • MS, University at Albany, State University of New York, 2006
    Major: Information Science
    Specialization: Information Management & Policy
  • MA, National Taipei University, Taiwan, 1997
    Major: Public Policy / Thesis: "Real Estate Developer Regulatory Policy in Taiwan: A Planning Evaluation Research Approach"
  • BA, National Taipei University, Taiwan, 1995
    Major: Real Estate & Built Environment

Current Scheduled Teaching

INFO 5737.401Information and Cyber SecuritySpring 2025
INFO 5040.401Information BehaviorSpring 2025
INFO 6950.021Doctoral DissertationFall 2024
INFO 5737.401Information and Cyber SecurityFall 2024
INFO 6940.020Research Methodology in Information ScienceFall 2024
INFO 6940.501Research Methodology in Information ScienceFall 2024

Previous Scheduled Teaching

INFO 5900.705Special ProblemsSummer 10W 2024
INFO 6900.703Special ProblemsSummer 10W 2024
INFO 6950.703Doctoral DissertationSpring 2024
INFO 5737.003Information and Cyber SecuritySpring 2024 SPOT
INFO 5040.001Information BehaviorSpring 2024 SPOT
INFO 6660.028Readings in Information ScienceSpring 2024
INFO 6900.021Special ProblemsSpring 2024
INFO 6910.024Special ProblemsSpring 2024
INFO 6950.021Doctoral DissertationFall 2023
INFO 5737.001Information and Cyber SecurityFall 2023 SPOT
INFO 6940.020Research Methodology in Information ScienceFall 2023 SPOT
INFO 6940.501Research Methodology in Information ScienceFall 2023 SPOT
INFO 6950.703Doctoral DissertationSpring 2023
INFO 5737.001Information and Cyber SecuritySpring 2023 SPOT
INFO 5040.001Information BehaviorSpring 2023 SPOT
INFO 6950.021Doctoral DissertationFall 2022
INFO 5737.001Information and Cyber SecurityFall 2022 SPOT
INFO 6660.021Readings in Information ScienceFall 2022
INFO 6940.020Seminar in Research and Research MethodologyFall 2022 SPOT
INFO 6940.501Seminar in Research and Research MethodologyFall 2022 SPOT
INFO 5900.001Special ProblemsFall 8W2 2022
INFO 6900.021Special ProblemsFall 2022
INFO 6950.703Doctoral DissertationSpring 2022
INFO 5737.001Information and Cyber SecuritySpring 2022 SPOT
INFO 5040.001Information BehaviorSpring 2022 SPOT
INFO 6950.716Doctoral DissertationFall 2021
INFO 5737.001Information and Cyber SecurityFall 2021 SPOT
INFO 5737.005Information and Cyber SecurityFall 2021 SPOT
INFO 6940.001Seminar in Research and Research MethodologyFall 2021 SPOT
INFO 6940.501Seminar in Research and Research MethodologyFall 2021 SPOT
INFO 6950.006Doctoral DissertationSummer 10W 2021
INFO 6950.711Doctoral DissertationSpring 2021
INFO 5737.001Information and Cyber SecuritySpring 2021
INFO 5737.003Information and Cyber SecuritySpring 2021
INFO 5737.005Information and Cyber SecuritySpring 2021
INFO 6660.008Readings in Information ScienceSpring 2021
INFO 6900.709Special ProblemsSpring 2021
INFO 6950.716Doctoral DissertationFall 2020
INFO 5737.001Information and Cyber SecurityFall 2020 SPOT
INFO 5737.005Information and Cyber SecurityFall 2020 SPOT
INFO 5737.202Information and Cyber SecurityFall 2020 SPOT
INFO 5307.001Knowledge Management Tools and TechnologiesFall 2020 SPOT
INFO 5307.005Knowledge Management Tools and TechnologiesFall 2020 SPOT
INFO 6660.709Readings in Information ScienceFall 2020
INFO 6900.703Special ProblemsSummer 10W 2020
INFO 6950.711Doctoral DissertationSpring 2020
INFO 5737.001Information and Cyber SecuritySpring 2020
INFO 5737.005Information and Cyber SecuritySpring 2020
INFO 5040.001Information BehaviorSpring 2020
INFO 5040.005Information BehaviorSpring 2020
INFO 6900.709Special ProblemsSpring 2020
INFO 5737.001Information and Cyber SecurityFall 2019 SPOT
INFO 5307.001Knowledge Management Tools and TechnologiesFall 2019 SPOT
INFO 5307.002Knowledge Management Tools and TechnologiesFall 2019 SPOT
INFO 6660.709Readings in Information ScienceFall 2019
INFO 5737.001Information and Cyber SecuritySpring 2019 SPOT
INFO 5737.005Information and Cyber SecuritySpring 2019 SPOT
INFO 5040.001Information BehaviorSpring 2019 SPOT
INFO 5040.005Information BehaviorSpring 2019 SPOT
INFO 5737.001Information and Cyber SecurityFall 2018 SPOT
INFO 5737.005Information and Cyber SecurityFall 2018 SPOT
INFO 5000.001Information and Knowledge ProfessionsFall 2018 SPOT
INFO 5000.005Information and Knowledge ProfessionsFall 2018 SPOT
INFO 5737.001Information and Cyber SecuritySpring 2018 SPOT
INFO 5737.005Information and Cyber SecuritySpring 2018 SPOT
INFO 5040.001Information BehaviorSpring 2018 SPOT
INFO 5040.002Information BehaviorSpring 2018 SPOT
INFO 5040.006Information BehaviorSpring 2018 SPOT
INFO 5737.001Information and Cyber SecurityFall 2017 SPOT
INFO 5737.005Information and Cyber SecurityFall 2017 SPOT
INFO 5307.001Knowledge Management Tools and TechnologiesFall 2017 SPOT
INFO 5307.005Knowledge Management Tools and TechnologiesFall 2017 SPOT
INFO 6900.704Special ProblemsFall 2017
INFO 5737.001Information and Cyber SecuritySpring 2017 SPOT
INFO 5040.001Information BehaviorSpring 2017 SPOT
INFO 5040.002Information BehaviorSpring 2017 SPOT
INFO 5040.006Information BehaviorSpring 2017 SPOT
INFO 6900.702Special ProblemsSpring 2017
INFO 5737.001Information and Cyber SecurityFall 2016 SPOT
INFO 5737.005Information and Cyber SecurityFall 2016
INFO 5307.001Knowledge Management Tools and TechnologiesFall 2016 SPOT
INFO 5307.005Knowledge Management Tools and TechnologiesFall 2016 SPOT
INFO 4910.703Special ProblemsFall 2016
INFO 5900.705Special ProblemsFall 2016
INFO 5737.001Information and Cyber SecuritySpring 2016 SPOT
INFO 5040.001Information BehaviorSpring 2016 SPOT
INFO 5040.002Information BehaviorSpring 2016 SPOT
INFO 5040.006Information BehaviorSpring 2016 SPOT
INFO 5910.706Special ProblemsSpring 2016
INFO 6900.708Special ProblemsSpring 2016
INFO 5737.001Information and Cyber SecurityFall 2015 SPOT
INFO 5737.002Information and Cyber SecurityFall 2015 SPOT
INFO 5737.005Information and Cyber SecurityFall 2015 SPOT
INFO 6000.001Seminar in Information ScienceFall 2015 SPOT
SLIS 5000.010Information and Knowledge ProfessionsSummer 10W 2015 SPOT
SLIS 5000.002Information and Knowledge ProfessionsSpring 2015
SLIS 5000.007Information and Knowledge ProfessionsSpring 2015
SLIS 6900.707Special ProblemsSpring 2015

Published Intellectual Contributions

    Abstracts and Proceedings

  • Hajian, F., Prybutok, V.R., Koh, C.E., Chang, H., Prybutok, G.L. (2023). A Text Mining Approach in Blockchain-Based Information Sharing Systems: Machine Learning Algorithms in Theory Development. The 54th Annual Conference of the Decision Sciences Institute.
  • Hajian, A., Prybutok, V.R., Chang, H. (2020). How do Morning and Friendly Advertisements relate to Purchase Intention?.
  • Awojobi, B., Chang, H. (2017). Security and Privacy Issues with Smart Thermostats: A First Look. The 13th International Conference on Knowledge Management (ICKM 2017).
  • Book

  • Chang, H., Hawamdeh, S.M. (2020). Cybersecurity for Information Professionals: Concepts and Applications. 334. Boca Raton, FL, CRC Press, Taylor & Francis Group.
  • Hawamdeh, S., Chang, H.C. (2018). Analytics and Knowledge Management. NY, NY, CRC Press - Taylor & Francis Group.
  • Book Chapter

  • Hajian, F., Chang, H. (2023). A Blockchain-Based Smart Grid to Build Resilience Through Zero-Trust Cybersecurity. Handbook of Smart Energy Systems. Springer, Cham..
  • Wang, C., Lin, Y., Chang, H., Chou, S. (2020). Consumer Sentiment in Tweets and Coupon Information-Sharing Behavior: An Initial Exploration. Information Diffusion Management and Knowledge Sharing: Breakthroughs in Research and Practice. IGI Global.
  • Chang, H., Jim, C., Hawamdeh, S.M. (2020). Bridging the Cybersecurity Talent Gap: Cybersecurity Education in iSchools. Cybersecurity for Information Professionals: Concepts and Applications. 334. Denton, CRC Press, Taylor & Francis Group.
  • Chang, H. (2020). Mobile Cybersecurity: A Socio-Technical Perspective. Cybersecurity for Information Professionals. CRC Press, Taylor & Francis Group.
  • Chong, M., Chang, H. (2018). Social Media Analytics. Analytics and Knowledge Management.
  • Conference Proceeding

  • Atolagbe-Olaoye, A., Chang, H. (2023). A Scoping Review of Collaborative Information Behavior: Definitions and Collaborative Tools. Proceedings of the Association for Library and Information Science Education (ALISE) 2023 Annual Conference.
  • Dunn Rawlings, E., Chang, H. (2023). The Metaverse as Information Grounds: A Case Study of Metaversities. Proceedings of the Association for Library and Information Science Education (ALISE) 2023 Annual Conference.
  • Bernot, J., Chang, H. (2020). Knowledge Management in Cybersecurity Education Using Concept Maps. Durham, North Carolina, The 16th International Conference on Knowledge Management (ICKM 2020).
  • Chang, H., Zimmerman, T. (2019). Navigating the Role of Mobile Technologies in Shaping Information Behavior: A Meta-synthesis. Proceedings of the Association for Library and Information Science Education (ALISE) 2019.
  • Jim, C., Chang, H. (2018). The Current State of Data Governance in Higher Education. American Society for Information Science and Technology (ASIS&T 2018) Annual Meeting. https://www.asist.org/wp-content/uploads/2018/12/Final-81st-Annual-Meeting-Proceedings.pdf
  • Khan, H., Chang, H., Kim, J. (2018). Toward an understanding of data literacy. Transforming Digital Worlds: Proceedings of the 13th International Conference on Transforming Digital Worlds, iConference 2018.
  • Zhang, Y., Chang, H. (2018). Selfies of Twitter Data Stream through the Lens of Information Theory: A Comparative Case Study of Tweet-trails with Healthcare Hashtags. Proceedings of the 51st Hawaii International Conference on System Sciences (HICSS 2018).
  • Wang, X., Chang, H., Chen, J., Yang, J. (2017). Data Analytics Applied in CNKI Databases Search Log: Using data analytics techniques to understand Chinese content users’ interest and interaction patterns. The 13th International Conference on Knowledge Management (ICKM 2017).
  • Zhang, Y., Chang, H. (2017). Decomposing and Visualizing the Twitter Data Stream with Healthcare Hashtags: An Information Theoretical Perspective. The 13th International Conference on Knowledge Management (ICKM 2017).
  • Chang, H. (2010). A New Perspective on Twitter Hashtag Use: Diffusion of Innovation Theory. American Society for Information Science and Technology (ASIS&T 2010) Annual Meeting, Pittsburgh, PA.
  • Wang, C., Chou, S.T., Chang, H. (2010). Exploring an Individual's Intention to Use Blogs: The Roles of Social, Motivational and Individual Factors. Proceedings of the 14th Pacific Asia Conference on Information Systems (PACIS 2010), Taipei, Taiwan.
  • Chang, H. (2009). ACM Conference On Human Factors In Computing Systems (CHI 2009). Student Research Competition, Boston, MA.
  • Wang, C.Y., Chou, S.T. and Chang, H.-C.. (2009). Examining the Impacts of Perceived Value and Perceived Quality on Users' Intention to Join Web 2.0 Communities.
  • Journal Article

  • Hajian, F., Prybutok, V.R., Chang, H. (2023). An Empirical Study for Blockchain-Based Information Sharing Systems in Electronic Health Records: A Mediation Perspective. Computers in Human Behavior. 138 107471.
  • Hajian, A., Prybutok, V.R., Chang, H. (2022). An empirical study for blockchain-based information sharing systems in electronic health records: A mediation perspective. Computers in Human Behavior. 138 (2023) 107471 https://doi.org/10.1016/j.chb.2022.107471
  • Hajian, F., Prybutok, V.R., Chang, H. How Do Morning and Friendly Ads Influence Mobile Advertising? A Mediation Perspective Using Appraisal Theory. Journal of Marketing Communications. 29 (5) 510-532.
  • Wang, C., Chang, H. (2019). Choice Modeling of Enterprise Social Media Adoptions. 11 (1) 12-24. https://www.igi-global.com/article/choice-modeling-of-enterprise-social-media-adoptions/223143
  • Chang, H., Wang, C., Hawamdeh, S.M. (2019). Emerging Trends in Data Analytics and Knowledge Management Job Market: Extending KSA Framework. Journal of Knowledge Management. 23 (4) 664-686. https://www.emerald.com/insight/content/doi/10.1108/JKM-02-2018-0088/full/html
  • Chang, H., Wang, C. (2019). The Choice Architecture of E-Memory: Modeling the Use Diffusion of Twitter Archiving System. 9 (1) 24-37. https://www.igi-global.com/article/e-memory-choice-architecture/218179
  • Zhang, Y., Chang, H. (2018). Structural Analysis of Collections of Tweets with Medical-Terminology versus Lay-Language Hashtags: An Information Theoretical Method with Entropy Matrix. http://www.editorialmanager.com/dim/default.aspx
  • Wang, C., Lin, Y., Chang, H., Chou, S. (2017). Consumer Sentiment in Tweets and Coupon Information-Sharing Behavior: An Initial Exploration. 7 (3) 1-19.
  • Squires, S.E., Chang, H. (2016). Using Trace Ethnography to Compare Perceived Cyber-Threats of IT to Non-IT Professionals,. Proceedings of he 22nd Americas Conference on Information Systems.
  • Chang, H. (2016). The Synergy of Scientometric Analysis and Knowledge Mapping with Topic Models: Modeling the Development Trajectories of Information Security and Cyber Security Research. Journal of Information & Knowledge Management. http://dx.doi.org/10.1142/S0219649216500441
  • Chang, H., Wang, C. (2015). Unveiling the Co-word Structures among Mobile Computing, Mobile Commerce and Mobile Application Research: A Science Mapping Analysis. International Journal of Electronic Commerce Studies. 6 (2) 243-258. http://academic-pub.org/ojs/index.php/ijecs/article/view/1330/295
  • Chang, H., Iyer, H. (2012). Trends in Twitter Hashtag Applications: Design Features for ValueAdded Dimensions to Future Library Catalogs. Library Trends. 61 (1) 248-258. https://muse.jhu.edu/article/485537/pdf
  • Chang, H., Maxwell, T.A. (2007). A synergistic alternative to readers' advisory services: managing customer knowledge. Information Research. 12 (4) http://www.informationr.net/ir/12-4/colis/colis08.html
  • Magazine/Trade Publication

  • Jim, C., Chang, H. (2019). Beyond Social Media Safety: What Teens Need to Know About Online Privacy and Security Issues. 41 (6) 22-24.
  • Panel

  • Alemneh, D.G., Hawamdeh, S.M., Chang, H., Rorissa, A., Assefa, S., Helge, K. (2020). Open Access in the Age of a Pandemic. American Society for Information Science and Technology (ASIS&T 2020).
  • Alemneh, D.G., Hawamdeh, S.M., Chang, H., Rorissa, A., Assefa, S., Helge, K. (2020). Open Access in the Age of a Pandemic. American Society for Information Science and Technology (ASIS&T 2020).
  • Poster

  • Zimmerman, T., Chang, H. (2018). Getting Smarter: Definition, Scope, and Implications of Smart Libraries. Proceedings of the 18th ACM/IEEE Joint Conference on Digital Libraries.
  • Khan, H., Chang, H., Kim, J. (2018). Unfolding Research Data Services: An Information Architecture Perspective. Proceedings of the 18th ACM/IEEE Joint Conference on Digital Libraries.
  • Zhang, Y., Chang, H. (2017). Decomposing and Visualizing the Twitter Data Stream with Healthcare Hashtags: An Information Theoretical Perspective. ASIS&T 2017.
  • Chang, H., Wang, C., Zhang, Y. (2017). Better Together? A Scoping Review of Integrating Knowledge Mapping Tools in Teaching and Learning. iConference 2017.

Contracts, Grants and Sponsored Research

    Grant - Research

  • Chang, H., "Understanding Cybersecurity Governance and Data Breach Incidents through the Lens of Data Analytics," sponsored by Office for Faculty Success, University of North Texas, $1479 Funded. (2021).
  • Hossain, G. (Principal), Chang, H. (Co-Principal), Lund, B. (Co-Principal), Hossain, T. (Co-Principal), Hawamdeh, S.M. (Co-Principal), "Cyber-CREWS: Minority Community Cybersecurity Research, Educational Engagement, Workforce Development, and Security Best Practices," sponsored by Department of Homeland Security, Federal, $999688 Funded. (2023 - 2028).
  • Chang, H., "Navigating the Role of Mobile Technologies in Shaping Information Behavior," sponsored by University of North Texas, University of North Texas, $8000 Funded. (2019 - 2019).
  • Chang, H., "Making Sense of Internet of Things (IoT) Data Breach with a Topic Map," sponsored by University of North Texas, University of North Texas, $6310 Funded. (2018 - 2019).
  • Chang, H. (Principal), "Modeling Privacy and Cybersecurity Decision-Making of the Consumer Internet of Things: The Smart Home and Wearable Scenarios," sponsored by College of Information, University of North Texas, $5000 Funded. (2017 - 2018).
  • Chang, H. (Principal), "Privacy and Cybersecurity Decision-Making Challenges of the Internet of Things," sponsored by Department of Information Science, University of North Texas, $8000 Funded. (2017 - 2017).
  • Chang, H. (Principal), "Faculty Summer Research Grant," sponsored by Department of Library and Information Sciences, University of North Texas, $5000 Funded. (2015 - 2015).
,
Overall
Summative Rating
Challenge and
Engagement Index
Response Rate

out of 5

out of 7
%
of
students responded
  • Overall Summative Rating (median):
    This rating represents the combined responses of students to the four global summative items and is presented to provide an overall index of the class’s quality. Overall summative statements include the following (response options include a Likert scale ranging from 5 = Excellent, 3 = Good, and 1= Very poor):
    • The course as a whole was
    • The course content was
    • The instructor’s contribution to the course was
    • The instructor’s effectiveness in teaching the subject matter was
  • Challenge and Engagement Index:
    This rating combines student responses to several SPOT items relating to how academically challenging students found the course to be and how engaged they were. Challenge and Engagement Index items include the following (response options include a Likert scale ranging from 7 = Much higher, 4 = Average, and 1 = Much lower):
    • Do you expect your grade in this course to be
    • The intellectual challenge presented was
    • The amount of effort you put into this course was
    • The amount of effort to succeed in this course was
    • Your involvement in course (doing assignments, attending classes, etc.) was
CLOSE