IS

Burgoon, Judee K.

Topic Weight Topic Terms
1.299 detection deception assessment credibility automated fraud fake cues detecting results screening study detect design indicators
0.303 data classification statistical regression mining models neural methods using analysis techniques performance predictive networks accuracy
0.276 research information systems science field discipline researchers principles practice core methods area reference relevance conclude
0.227 communication media computer-mediated e-mail richness electronic cmc mail medium message performance convergence used communications messages
0.219 development systems methodology methodologies information framework approach approaches paper analysis use presented applied assumptions based
0.212 response responses different survey questions results research activities respond benefits certain leads two-stage interactions study
0.168 results study research experiment experiments influence implications conducted laboratory field different indicate impact effectiveness future
0.167 theory theories theoretical paper new understanding work practical explain empirical contribution phenomenon literature second implications
0.158 perceptions attitudes research study impacts importance perceived theory results perceptual perceive perception impact relationships basis
0.148 systems information objectives organization organizational development variety needs need efforts technical organizations developing suggest given
0.135 outcomes theory nature interaction theoretical paradox versus interpersonal literature provides individual levels understanding dimensions addition
0.126 information systems paper use design case important used context provide presented authors concepts order number
0.122 processes interaction new interactions temporal structure research emergent process theory address temporally core discussion focuses
0.110 research study different context findings types prior results focused studies empirical examine work previous little
0.108 interface user users interaction design visual interfaces human-computer navigation human need cues studies guidelines laboratory

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Nunamaker, Jr., Jay F. 4 Twyman, Nathan W 2 Artemio Ramjrez, Jr. 1 Bonito, Joseph A. 1
Bengtsson, Bjorn 1 Cao, Jinwei 1 Crews, Janna M. 1 Dunbar, Norah E. 1
Deokar, Amit 1 Elkins, Aaron C. 1 Lin, Ming 1 Lowry, Paul Benjamin 1
Miczo, Nathan 1 QIN, TIANTIAN 1 TWITCHELL, DOUGLAS P. 1 Zhou, Lina 1
deception detection 3 concealed information test 2 credibility assessment 2 automated interviewing systems 1
automated screening kiosk 1 autonomous scientifically controlled screening system 1 collaborative work 1 communication interfaces 1
computer-mediated communication 1 classification methods 1 computer vision 1 decision making 1
deception 1 defensive response 1 design science 1 eye-tracking measures 1
freeze response 1 human-computer interaction 1 interactivity 1 IS research framework 1
kinesic rigidity 1 linguistic cues 1 orienting response 1 physical security 1
research activity 1 research method 1 research paradigm 1

Articles (5)

A Rigidity Detection System for Automated Credibility Assessment (Journal of Management Information Systems, 2014)
Authors: Abstract:
    Credibility assessment is an area in which information systems research can make a major impact. This paper reports on two studies investigating a system solution for automatic, noninvasive detection of rigidity for automated interviewing. Kinesic rigidity has long been a phenomenon of interest in the credibility assessment literature, but until now was infeasible as a veracity indicator in practical use cases. An initial study unexpectedly revealed the occurrence of rigidity in a highly controlled concealed information test setting, prompting the design and implementation of an automated rigidity detection system for interviewing. A unique experimental evaluation supported the system concept. The results of the second study confirmed the kinesic rigidity found in the first, and provided further theoretical insights explaining the rigidity phenomenon. Although additional research is needed, the evidence from this investigation suggests that credibility assessment can benefit from a rigidity detection system.
Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals (Journal of Management Information Systems, 2014)
Authors: Abstract:
    Screening individuals for concealed information has traditionally been the purview of professional interrogators investigating crimes. However, the ability to detect when a person is hiding important information would have high value in many other applications if results could be reliably obtained using an automated and rapid interviewing system. Unfortunately, this ideal has thus far been stymied by practical limitations and inadequate scientific control in current interviewing systems. This study proposes a new class of systems, termed autonomous scientifically controlled screening systems (ASCSS), designed to detect individuals’ purposely hidden information about target topics of interest. These hidden topics of interest could cover a wide range, including knowledge of concealed weapons, privacy violations, fraudulent organizational behavior, organizational security policy violations, preemployment behavioral intentions, organizational insider threat, leakage of classified information, or even consumer product use information. ASCSS represent a systematic synthesis of structured interviewing, orienting theory, defensive response theory, noninvasive psychophysiological measurement, and behavioral measurement. To evaluate and enhance the design principles, we built a prototype automated screening kiosk system and configured it for a physical security screening scenario in which participants constructed and attempted to smuggle a fake improvised explosive device. The positive results provide support for the proposition that ASCSS may afford more widespread application of credibility assessment screening systems.
Interactions Between System Evaluation and Theory Testing: A Demonstration of the Power of a Multifaceted Approach to Information Systems Research. (Journal of Management Information Systems, 2006)
Authors: Abstract:
    Historically, information systems (IS) researchers have questioned which research paradigms, activities, and methods IS research should follow. In this paper, we argue that different research methods and activities may interact with each other, different research paradigms may complement each other due to such interactions, and therefore, a multimethodological, cross-paradigm research approach may result in better IS research than a singular approach. Three existing multimethodological IS research frameworks are reviewed and summarized into an integrated approach. Two types of interactions between different research methods across system evaluation and theory testing research activities are identified. A three-year research study about a computer-based training system for deception detection (Agent99 Trainer) provides a concrete example to demonstrate the existence and research benefits of these two types of interactions, as well as the benefits of a multimethodological, cross-paradigm IS research approach.
A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication. (Journal of Management Information Systems, 2004)
Authors: Abstract:
    The increased chance of deception in computer-mediated communication and the potential risk of taking action based on deceptive information calls for automatic detection of deception. To achieve the ultimate goal of automatic prediction of deception, we selected four common classification methods and empirically compared their performance in predicting deception. The deception and truth data were collected during two experimental studies. The results suggest that all of the four methods were promising for predicting deception with cues to deception. Among them, neural networks exhibited consistent performance and were robust across test settings. The comparisons also highlighted the importance of selecting important input variables and removing noise in an attempt to enhance the performance of classification methods. The selected cues offer both methodological and theoretical contributions to the body of deception and information systems research.
Testing the Interactivity Model: Communication Processes, Partner Assessments, and the Quality of Collaborative Work. (Journal of Management Information Systems, 1999)
Authors: Abstract:
    A major consideration in designing and adopting new communication technologies is their impact on communication processes and outcomes. One way to understand this impact is according to the principle of interpersonal interactivity. Findings from two investigations are reported here that address how properties of task-related communication conducted with differing interfaces relate to perceptions of interaction partners and the outcomes of their collaborative work. Study 1 manipulated the interface affordances of mediation, contingency, and modality richness. Study 2 examined the affordance of mediation. Results show that interfaces that promote higher mutuality and involvement lead to more favorable perceptions of partners' credibility and attraction, and those perceptions are systematically related to higher-quality decisions and more influence. Discussion focuses on the relation between user perceptions, design features, and task outcomes in human-computer interaction and computer-mediated communication.