IS

Zhou, Lina

Topic Weight Topic Terms
0.450 detection deception assessment credibility automated fraud fake cues detecting results screening study detect design indicators
0.406 research study influence effects literature theoretical use understanding theory using impact behavior insights examine influences
0.337 group gss support groups systems brainstorming research process electronic members results paper effects individual ebs
0.304 data classification statistical regression mining models neural methods using analysis techniques performance predictive networks accuracy
0.166 web site sites content usability page status pages metrics browsing design use web-based guidelines results
0.166 analysis techniques structured categories protocol used evolution support methods protocols verbal improve object-oriented difficulties analyses
0.152 information presentation graphics format systems graphical graphs design recall representation comprehension experimental presentations experiment presented
0.145 errors error construction testing spreadsheet recovery phase spreadsheets number failures inspection better studies modules rate
0.135 decision making decisions decision-making makers use quality improve performance managers process better results time managerial
0.126 taxonomy systems different concept isd alternative generalization mechanistic distinction types generalizability theoretical speech richer induction
0.117 mobile telecommunications devices wireless application computing physical voice phones purchases ubiquitous applications conceptualization secure pervasive
0.113 applications application reasoning approach cases support hypertext case-based prototype problems consistency developed benchmarking described efficient
0.106 intelligence business discovery framework text knowledge new existing visualization based analyzing mining genetic algorithms related
0.104 users user new resistance likely benefits potential perspective status actual behavior recognition propose user's social

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Zhang, Dongsong 2 Adipat, Boonlit 1 Burgoon, Judee K. 1 FU, XIAOLAN 1
Lowry, Paul Benjamin 1 Nunamaker, Jr., Jay F. 1 QIN, TIANTIAN 1 Shi, Yongmei 1
Sears, Andrew 1 TWITCHELL, DOUGLAS P. 1 Zhang, Dongson 1
classification methods 1 cues to error detection 1 CMC 1 computer-mediated communication 1
culture 1 deception 1 deception detection 1 group decision making 1
group decision systems 1 group diversity 1 interface design 1 linguistic cues 1
mobile handheld device 1 majority influence 1 Presentation adaptation 1 speech recognition 1
social presence 1 taxonomy 1 usability testing 1 verbal protocol analysis 1
virtual teams 1 Web browsing and searching 1

Articles (4)

THE EFFECTS OF TREE-VIEW BASED PRESENTATION ADAPTATION ON MOBILE WEB BROWSING. (MIS Quarterly, 2011)
Authors: Abstract:
    Accessing the Web from mobile handheld devices has become increasingly common. However, accomplishing that task remains challenging mainly due to the physical constraints of handheld devices and the static presentation of Web pages. Adapting the presentation of Web pages is, therefore, critical to enabling effective mobile Web browsing and information searching. Based on cognitive fit theory and information foraging theory, we propose a novel hybrid approach to adapting Web page presentation that integrates three types of adaptation techniques, namely tree-view, hierarchical text summarization, and colored keyword highlighting. By following the design science research framework, we implemented the proposed approach on handheld devices and empirically evaluated the effects of presentation adaptation on mobile Web browsing. The results show that presentation adaptation significantly improves user performance and perception of mobile Web browsing. We also discover that the positive impact of presentation adaptation is moderated by the complexity of an information search task. The findings have significant theoretical and practical implications for the design and implementation of mobile Web applications.
The Impact of Individualism--Collectivism, Social Presence, and Group Diversity on Group Decision Making Under Majority Influence. (Journal of Management Information Systems, 2007)
Authors: Abstract:
    Majority influence is the attempt by a majority of group members to impose their common position on group dissenters during group decision making. Because of globalization, the use of cross-cultural teams in group tasks is becoming increasingly common. The objective of this study was to investigate how national culture, social presence, and group diversity may affect majority influence in a group decision-making context. A total of 183 groups participated in a large-scale empirical experiment at multiple sites. The results show that the national culture of group minorities has a significant impact on majority influence and that the use of computer-mediated communication can reduce majority influence. The findings have both theoretical and practical implications for improving the outcome and the effectiveness of group decision making in cross-cultural environments.
Discovering Cues to Error Detection in Speech Recognition Output: A User-Centered Approach. (Journal of Management Information Systems, 2006)
Authors: Abstract:
    The great potential of speech recognition systems in freeing users' hands while interacting with computers has inspired a variety of promising applications. However, given the performance of the state-of-the-art speech recognition technology today, widespread acceptance of speech recognition technology would not be realistic without designing and developing new approaches to detecting and correcting recognition errors effectively. In seeking solutions to the above problem, identifying cues to error detection (CERD) is central. Our survey of the extant literature on the detection and correction of speech recognition errors reveals that the system-initiated, data-driven approach is dominant, but that heuristics from human users have been largely overlooked. This may have hindered the advance of speech technology. In this research, we propose a user-centered approach to discovering CERD. User studies are carried out to implement the approach. Content analysis of the collected verbal protocols lends itself to a taxonomy of CERD. The CERD discovered in this study can improve our knowledge on CERD by not only validating CERD from a user's perspective but also suggesting promising new CERD for detecting speech recognition errors. Moreover, the analysis of CERD in relation to error types and other CERD provides new insights into the context where specific CERD are effective. The findings of this study can be used to not only improve speech recognition output but also to provide context-aware support for error detection. This will help break the barrier for mainstream adoption of speech technology in a variety of information systems and applications.
A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication. (Journal of Management Information Systems, 2004)
Authors: Abstract:
    The increased chance of deception in computer-mediated communication and the potential risk of taking action based on deceptive information calls for automatic detection of deception. To achieve the ultimate goal of automatic prediction of deception, we selected four common classification methods and empirically compared their performance in predicting deception. The deception and truth data were collected during two experimental studies. The results suggest that all of the four methods were promising for predicting deception with cues to deception. Among them, neural networks exhibited consistent performance and were robust across test settings. The comparisons also highlighted the importance of selecting important input variables and removing noise in an attempt to enhance the performance of classification methods. The selected cues offer both methodological and theoretical contributions to the body of deception and information systems research.