default search action
Judee K. Burgoon
Person information
- affiliation: University of Arizona, Center for the Management of Information, Tucson, AZ, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j33]Judee K. Burgoon, Aaron C. Elkins, Douglas C. Derrick, Bradley Walls, Dimitris N. Metaxas:
The future of automated capture of social kinesic signals for psychiatric purposes. Frontiers Comput. Sci. 5 (2023) - [j32]Lee Spitzley, Xinran Wang, Xunyu Chen, Steven J. Pentland, Jay F. Nunamaker Jr., Judee K. Burgoon, Norah E. Dunbar:
Non-Invasive Measurement of Trust in Group Interactions. IEEE Trans. Affect. Comput. 14(3): 2389-2401 (2023) - 2021
- [c58]Norah E. Dunbar, Judee K. Burgoon, Ken Fujiwara:
Automated Methods to Examine Nonverbal Synchrony in Dyads. DYAD@ICCV 2021: 204-217 - 2020
- [j31]Nathan W. Twyman, Jeffrey Gainer Proudfoot, Ann-Frances Cameron, J. Eric Case, Judee K. Burgoon, Douglas P. Twitchell:
Too Busy to Be Manipulated: How Multitasking with Technology Improves Deception Detection in Collaborative Teamwork. J. Manag. Inf. Syst. 37(2): 377-395 (2020)
2010 – 2019
- 2019
- [c57]Lezi Wang, Chongyang Bai, Maksim Bolonkin, Judee K. Burgoon, Norah E. Dunbar, V. S. Subrahmanian, Dimitris N. Metaxas:
Attention-based Facial Behavior Analytics inSocial Communication. BMVC 2019: 271 - [c56]Chongyang Bai, Maksim Bolonkin, Judee K. Burgoon, Chao Chen, Norah E. Dunbar, Bharat Singh, V. S. Subrahmanian, Zhe Wu:
Automatic Long-Term Deception Detection in Group Interaction Videos. ICME 2019: 1600-1605 - [c55]Chongyang Bai, Maksim Bolonkin, Srijan Kumar, Jure Leskovec, Judee K. Burgoon, Norah E. Dunbar, V. S. Subrahmanian:
Predicting dominance in multi-person videos. IJCAI 2019: 4643-4650 - [i1]Chongyang Bai, Maksim Bolonkin, Judee K. Burgoon, Chao Chen, Norah E. Dunbar, Bharat Singh, V. S. Subrahmanian, Zhe Wu:
Automatic Long-Term Deception Detection in Group Interaction Videos. CoRR abs/1905.08617 (2019) - 2017
- [j30]Norah E. Dunbar, Matthew L. Jensen, Claude H. Miller, Elena Bessarabova, Yu-Hao Lee, Scott N. Wilson, Javier Elizondo, Bradley J. Adame, Joseph S. Valacich, Sara K. Straub, Judee K. Burgoon, Brianna Lane, Cameron W. Piercy, David W. Wilson, Shawn King, Cindy Vincent, Ryan M. Schuetzler:
Mitigation of Cognitive Bias with a Serious Game: Two Experiments Testing Feedback Timing and Source. Int. J. Game Based Learn. 7(4): 86-100 (2017) - [j29]Steven J. Pentland, Nathan W. Twyman, Judee K. Burgoon, Jay F. Nunamaker Jr., Christopher B. R. Diller:
A Video-Based Screening System for Automated Risk Assessment Using Nuanced Facial Features. J. Manag. Inf. Syst. 34(4): 970-993 (2017) - [p3]Judee K. Burgoon, Norah E. Dunbar, Howard Giles:
Interaction Coordination and Adaptation. Social Signal Processing 2017: 78-96 - [p2]Judee K. Burgoon, Dimitris N. Metaxas, Thirimachos Bourlai, Aaron Elkins:
Social Signals of Deception and Dishonesty. Social Signal Processing 2017: 404-428 - [e1]Judee K. Burgoon, Nadia Magnenat-Thalmann, Maja Pantic, Alessandro Vinciarelli:
Social Signal Processing. Cambridge University Press 2017, ISBN 9781316676202 [contents] - 2016
- [j28]Matthew L. Jensen, Yu-Hao Lee, Cameron W. Piercy, Norah E. Dunbar, Javier Elizondo, Elena Bessarabova, Nathan W. Twyman, Judee K. Burgoon, Joseph S. Valacich, Bradley J. Adame, Claude H. Miller, Scott N. Wilson:
Exploring Failure and Engagement in a Complex Digital Training Game: A Multi-method Examination. AIS Trans. Hum. Comput. Interact. 8(1): 2 (2016) - [j27]Elena Bessarabova, Cameron W. Piercy, Shawn King, Cindy Vincent, Norah E. Dunbar, Judee K. Burgoon, Claude H. Miller, Matthew L. Jensen, Aaron C. Elkins, David W. Wilson, Scott N. Wilson, Yu-Hao Lee:
Mitigating bias blind spot via a serious video game. Comput. Hum. Behav. 62: 452-466 (2016) - [j26]Judee K. Burgoon, Joseph A. Bonito, Paul Benjamin Lowry, Sean L. Humpherys, Gregory D. Moody, James E. Gaskin, Justin Scott Giboney:
Application of Expectancy Violations Theory to communication with and judgments about embodied agents during a decision-making task. Int. J. Hum. Comput. Stud. 91: 24-36 (2016) - [j25]Jay F. Nunamaker Jr., Judee K. Burgoon, Justin Scott Giboney:
Special Issue: Information Systems for Deception Detection. J. Manag. Inf. Syst. 33(2): 327-331 (2016) - [j24]Jeffrey Gainer Proudfoot, Jeffrey L. Jenkins, Judee K. Burgoon, Jay F. Nunamaker Jr.:
More Than Meets the Eye: How Oculometric Behaviors Evolve Over the Course of Automated Deception Detection Interactions. J. Manag. Inf. Syst. 33(2): 332-360 (2016) - [c54]David W. Wilson, Jeffrey L. Jenkins, Nathan W. Twyman, Matthew L. Jensen, Joe S. Valacich, Norah E. Dunbar, Scott N. Wilson, Claude H. Miller, Bradley J. Adame, Yu-Hao Lee, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Serious Games: An Evaluation Framework and Case Study. HICSS 2016: 638-647 - [c53]Aaron C. Elkins, Jeffrey Gainer Proudfoot, Nathan W. Twyman, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Embodied Conversational Agent-Based Deception Detection: Concealed Information Test Using Automated Electrodermal, Vocal, and Oculmentric Measurements. IntelliSys (2) 2016: 294-307 - [c52]Björn W. Schuller, Stefan Steidl, Anton Batliner, Julia Hirschberg, Judee K. Burgoon, Alice Baird, Aaron C. Elkins, Yue Zhang, Eduardo Coutinho, Keelan Evanini:
The INTERSPEECH 2016 Computational Paralinguistics Challenge: Deception, Sincerity & Native Language. INTERSPEECH 2016: 2001-2005 - [c51]Björn W. Schuller, Stefan Steidl, Anton Batliner, Julia Hirschberg, Judee K. Burgoon, Alice Baird, Aaron C. Elkins, Yue Zhang, Eduardo Coutinho, Keelan Evanini:
The Deception Sub-Challenge: The Data. INTERSPEECH 2016 - [c50]Björn W. Schuller, Stefan Steidl, Anton Batliner, Julia Hirschberg, Judee K. Burgoon, Alice Baird, Aaron Elkins, Yue Zhang, Eduardo Coutinho, Keelan Evanini:
The Sincerity Sub-Challenge: The Data. INTERSPEECH 2016 - [c49]Björn W. Schuller, Stefan Steidl, Anton Batliner, Julia Hirschberg, Judee K. Burgoon, Alice Baird, Aaron Elkins, Yue Zhang, Eduardo Coutinho, Keelan Evanini:
The Native Language Sub-Challenge: The Data. INTERSPEECH 2016 - [c48]Björn W. Schuller, Stefan Steidl, Anton Batliner, Julia Hirschberg, Judee K. Burgoon, Alice Baird, Aaron Elkins, Yue Zhang, Eduardo Coutinho, Keelan Evanini:
The INTERSPEECH 2016 Computational Paralinguistics Challenge: A Summary of Results. INTERSPEECH 2016 - [c47]Björn W. Schuller, Stefan Steidl, Anton Batliner, Julia Hirschberg, Judee K. Burgoon, Alice Baird, Aaron Elkins, Yue Zhang, Eduardo Coutinho, Keelan Evanini:
Discussion. INTERSPEECH 2016 - 2015
- [j23]Norah E. Dunbar, Matthew L. Jensen, Judee K. Burgoon, Katherine M. Kelley, Kylie J. Harrison, Bradley J. Adame, Daniel Rex Bernard:
Effects of Veracity, Modality, and Sanctioning on Credibility Assessment During Mediated and Unmediated Interviews. Commun. Res. 42(5): 649-674 (2015) - [j22]Xiang Yu, Shaoting Zhang, Zhennan Yan, Fei Yang, Junzhou Huang, Norah E. Dunbar, Matthew L. Jensen, Judee K. Burgoon, Dimitris N. Metaxas:
Is Interactional Dissynchrony a Clue to Deception? Insights From Automated Analysis of Nonverbal Visual Cues. IEEE Trans. Cybern. 45(3): 506-520 (2015) - [c46]Sashi K. Saripalle, Spandana Vemulapalli, Gregory W. King, Judee K. Burgoon, Reza Derakhshani:
Machine learning methods for credibility assessment of interviewees based on posturographic data. EMBC 2015: 6708-6711 - [c45]Malcolm Dcosta, Dvijesh J. Shastri, Ricardo Vilalta, Judee K. Burgoon, Ioannis T. Pavlidis:
Perinasal indicators of deceptive behavior. FG 2015: 1-8 - [c44]Jeffrey Gainer Proudfoot, Jeffrey L. Jenkins, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews. ISI 2015: 97-102 - 2014
- [j21]Norah E. Dunbar, Claude H. Miller, Bradley J. Adame, Javier Elizondo, Scott N. Wilson, Brianna Lane, Abigail Allums Kauffman, Elena Bessarabova, Matthew L. Jensen, Sara K. Straub, Yu-Hao Lee, Judee K. Burgoon, Joseph S. Valacich, Jeffrey L. Jenkins, Jun Zhang:
Implicit and explicit training in the mitigation of cognitive bias through the use of a serious game. Comput. Hum. Behav. 37: 307-318 (2014) - [j20]Norah E. Dunbar, Matthew L. Jensen, Elena Bessarabova, Judee K. Burgoon, Daniel Rex Bernard, Kylie J. Harrison, Katherine M. Kelley, Bradley J. Adame, Jacqueline M. Eckstein:
Empowered by Persuasive Deception. Commun. Res. 41(6): 852-876 (2014) - [j19]Matthew D. Pickard, Judee K. Burgoon, Douglas C. Derrick:
Toward an Objective Linguistic-Based Measure of Perceived Embodied Conversational Agent Power and Likeability. Int. J. Hum. Comput. Interact. 30(6): 495-516 (2014) - [j18]Nathan W. Twyman, Aaron C. Elkins, Judee K. Burgoon, Jay F. Nunamaker Jr.:
A Rigidity Detection System for Automated Credibility Assessment. J. Manag. Inf. Syst. 31(1): 173-202 (2014) - [j17]Nathan W. Twyman, Paul Benjamin Lowry, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals. J. Manag. Inf. Syst. 31(3): 106-137 (2014) - [c43]Norah E. Dunbar, Matthew L. Jensen, Claude H. Miller, Elena Bessarabova, Sara K. Straub, Scott N. Wilson, Javier Elizondo, Judee K. Burgoon, Joseph S. Valacich, Bradley J. Adame, Yu-Hao Lee, Brianna Lane, Cameron W. Piercy, David W. Wilson, Shawn King, Cindy Vincent, Ryan Scheutzler:
Mitigating Cognitive Bias through the Use of Serious Games: Effects of Feedback. PERSUASIVE 2014: 92-105 - 2013
- [j16]Norah E. Dunbar, Scott N. Wilson, Bradley J. Adame, Javier Elizondo, Matthew L. Jensen, Claude H. Miller, Abigail Allums Kauffman, Toby Seltsam, Elena Bessarabova, Cindy Vincent, Sara K. Straub, Ryan Ralston, Christopher L. Dulawan, Dennis Ramirez, Kurt Squire, Joseph S. Valacich, Judee K. Burgoon:
MACBETH: Development of a Training Game for the Mitigation of Cognitive Bias. Int. J. Game Based Learn. 3(4): 7-26 (2013) - [j15]Douglas C. Derrick, Thomas O. Meservy, Jeffrey L. Jenkins, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Detecting Deceptive Chat-Based Communication Using Typing Behavior and Message Cues. ACM Trans. Manag. Inf. Syst. 4(2): 9:1-9:21 (2013) - [c42]Xiang Yu, Shaoting Zhang, Yang Yu, Norah E. Dunbar, Matthew L. Jensen, Judee K. Burgoon, Dimitris N. Metaxas:
Automated analysis of interactional synchrony using robust facial tracking and expression recognition. FG 2013: 1-6 - 2012
- [c41]Judee K. Burgoon, Lauren Hamel, Tiantian Qin:
Predicting Veracity from Linguistic Indicators. EISIC 2012: 323-328 - [c40]Jeffrey Gainer Proudfoot, Nathan W. Twyman, Judee K. Burgoon:
A Comparison of Invasive and Noninvasive Sensors in the Concealed Information Test. EISIC 2012: 346-349 - [c39]Senya Polikovsky, Maria Alejandra Quiros-Ramirez, Yoshinari Kameda, Yuichi Ohta, Judee K. Burgoon:
Benchmark Driven Framework for Development of Emotion Sensing Support Systems. EISIC 2012: 353-355 - [c38]Aaron C. Elkins, Douglas C. Derrick, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Predicting Users' Perceived Trust in Embodied Conversational Agents Using Vocal Dynamics. HICSS 2012: 579-588 - [c37]Jay F. Nunamaker Jr., Judee K. Burgoon, Nathan W. Twyman, Jeffrey Gainer Proudfoot, Ryan M. Schuetzler, Justin Scott Giboney:
Establishing a foundation for automated human credibility screening. ISI 2012: 202-211 - 2011
- [j14]Sean L. Humpherys, Kevin C. Moffitt, Mary B. Burns, Judee K. Burgoon, William F. Felix:
Identification of fraudulent financial statements using linguistic credibility analysis. Decis. Support Syst. 50(3): 585-594 (2011) - [j13]Jay F. Nunamaker Jr., Douglas C. Derrick, Aaron C. Elkins, Judee K. Burgoon, Mark W. Patton:
Embodied Conversational Agent - Based Kiosk for Automated Interviewing. J. Manag. Inf. Syst. 28(1): 17-48 (2011) - 2010
- [j12]Douglas C. Derrick, Aaron C. Elkins, Judee K. Burgoon, Jay F. Nunamaker Jr., Daniel Dajun Zeng:
Border Security Credibility Assessments via Heterogeneous Sensor Fusion. IEEE Intell. Syst. 25(3): 41-49 (2010) - [j11]Matthew L. Jensen, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Judging the Credibility of Information Gathered from Face-to-Face Interactions. ACM J. Data Inf. Qual. 2(1): 3:1-3:20 (2010) - [j10]Matthew L. Jensen, Paul Benjamin Lowry, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Technology Dominance in Complex Decision Making: The Case of Aided Credibility Assessment. J. Manag. Inf. Syst. 27(1): 175-202 (2010) - [c36]Nicholas Michael, Mark Dilsizian, Dimitris N. Metaxas, Judee K. Burgoon:
Motion Profiles for Deception Detection Using Visual Cues. ECCV (6) 2010: 462-475
2000 – 2009
- 2009
- [j9]Judee K. Burgoon, Douglas P. Twitchell, Matthew L. Jensen, Thomas O. Meservy, Mark Adkins, John Kruse, Amit V. Deokar, Gabriel Tsechpenakis, Shan Lu, Dimitris N. Metaxas, Jay F. Nunamaker Jr., Robert Younger:
Detecting Concealment of Intent in Transportation Screening: A Proof of Concept. IEEE Trans. Intell. Transp. Syst. 10(1): 103-112 (2009) - 2008
- [j8]Jinwei Cao, Janna M. Crews, Ming Lin, Judee K. Burgoon, Jay F. Nunamaker Jr.:
An empirical investigation of virtual Interaction in supporting learning. Data Base 39(3): 51-68 (2008) - [j7]Joey F. George, David P. Biros, Judee K. Burgoon, Jay F. Nunamaker Jr., Janna M. Crews, Jinwei Cao, Kent Marett, Mark Adkins, John Kruse, Ming Lin:
The Role of E-Training in Protecting Information Assets Against Deception Attacks. MIS Q. Executive 7(2): 5 (2008) - [p1]Matthew L. Jensen, Thomas O. Meservy, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Video-Based Deception Detection. Intelligence and Security Informatics 2008: 425-441 - 2007
- [c35]Matthew L. Jensen, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Computer-aided Credibility Assessment by Novice Lie-Catchers. AMCIS 2007: 159 - [c34]Tiantian Qin, Judee K. Burgoon:
An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering. ISI 2007: 152-159 - 2006
- [j6]Jinwei Cao, Janna M. Crews, Ming Lin, Amit V. Deokar, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Interactions Between System Evaluation and Theory Testing: A Demonstration of the Power of a Multifaceted Approach to Information Systems Research. J. Manag. Inf. Syst. 22(4): 207-235 (2006) - [c33]Christie M. Fuller, David P. Biros, Douglas P. Twitchell, Judee K. Burgoon, Mark Adkins:
An Analysis of Text-Based Deception Detection Tools. AMCIS 2006: 418 - [c32]Douglas P. Twitchell, David P. Biros, Mark Adkins, Nicole Forsgren, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Automated Determination of the Veracity of Interview Statements from People of Interest to an Operational Security Force. HICSS 2006 - [c31]Christie M. Fuller, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr., Steven Coulon:
Detecting Deception in Person-of-Interest Statements. ISI 2006: 504-509 - 2005
- [j5]Thomas O. Meservy, Matthew L. Jensen, John Kruse, Douglas P. Twitchell, Judee K. Burgoon, Dimitris N. Metaxas, Jay F. Nunamaker Jr.:
Deception Detection through Automatic, Unobtrusive Analysis of Nonverbal Behavior. IEEE Intell. Syst. 20(5): 36-43 (2005) - [c30]David P. Biros, Michael C. Hass, Karl Wiers, Douglas P. Twitchell, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Task Performance Under Deceptive Conditions: Using Military Scenarios in Deception Detection Research. HICSS 2005 - [c29]David P. Biros, Jachin Sakamoto, Joey F. George, Mark Adkins, John Kruse, Judee K. Burgoon, Jay F. Nunamaker Jr.:
A Quasi-experiment to Determine the Impact of a Computer Based Deception Detection Training System: The Use of Agent99 Trainer in the U.S. Military. HICSS 2005 - [c28]Judee K. Burgoon, Mark Adkins, John Kruse, Matthew L. Jensen, Thomas O. Meservy, Douglas P. Twitchell, Amit V. Deokar, Jay F. Nunamaker Jr., Shan Lu, Gabriel Tsechpenakis, Dimitris N. Metaxas, Robert Younger:
An Approach for Intent Identification by Building on Deception Detection. HICSS 2005 - [c27]Judee K. Burgoon, J. P. Blair, Renee E. Strom:
Heuristics and Modalities in Determining Truth Versus Deception. HICSS 2005 - [c26]Tiantian Qin, Judee K. Burgoon, J. P. Blair, Jay F. Nunamaker Jr.:
Modality Effects in Deception Detection and Applications in Automatic-Deception-Detection. HICSS 2005 - [c25]Douglas P. Twitchell, Karl Wiers, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr.:
StrikeCOM: A Multi-Player Online Strategy Game for Researching and Teaching Group Dynamics. HICSS 2005 - [c24]Jinwei Cao, Ming Lin, Janna M. Crews, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Virtual Interaction for Effective E-Learning. ICIS 2005 - [c23]Gabriel Tsechpenakis, Dimitris N. Metaxas, Mark Adkins, John Kruse, Judee K. Burgoon, Matthew L. Jensen, Thomas O. Meservy, Douglas P. Twitchell, Amit V. Deokar, Jay F. Nunamaker Jr.:
HMM-Based Deception Recognition from Visual Cues. ICME 2005: 824-827 - [c22]Thomas O. Meservy, Matthew L. Jensen, John Kruse, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Automatic Extraction of Deceptive Behavioral Cues from Video. ISI 2005: 198-208 - [c21]Douglas P. Twitchell, Nicole Forsgren, Karl Wiers, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling. ISI 2005: 471-478 - [c20]Tiantian Qin, Judee K. Burgoon:
An Empirical Study on Dynamic Effects on Deception Detection. ISI 2005: 597-599 - 2004
- [j4]Lina Zhou, Judee K. Burgoon, Dongsong Zhang, Jay F. Nunamaker Jr.:
Language dominance in interpersonal deception in computer-mediated communication. Comput. Hum. Behav. 20(3): 381-402 (2004) - [j3]Lina Zhou, Judee K. Burgoon, Douglas P. Twitchell, Tiantian Qin, Jay F. Nunamaker Jr.:
A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication. J. Manag. Inf. Syst. 20(4): 139-165 (2004) - [c19]Jinwei Cao, Janna M. Crews, Jay F. Nunamaker Jr., Judee K. Burgoon, Ming Lin:
User Experience with Agent99 Trainer: A Usability Study. HICSS 2004 - [c18]Joey F. George, Kent Marett, Judee K. Burgoon, Janna M. Crews, Jinwei Cao, Ming Lin, David P. Biros:
Training to Detect Deception: An Experimental Investigation. HICSS 2004 - [c17]Tiantian Qin, Judee K. Burgoon, Jay F. Nunamaker Jr.:
An Exploratory Study on Promising Cues in Deception Detection and Application of Decision Tree. HICSS 2004 - [c16]Jinwei Cao, Ming Lin, Janna M. Crews, Amit V. Deokar, Judee K. Burgoon:
The Interaction of Research Methods for System Evaluation and Theory Testing: A New Vision of the Benefits of Multi-Methodological Information Systems Research. ICIS 2004: 277-282 - [c15]Jinwei Cao, Ming Lin, Amit V. Deokar, Judee K. Burgoon, Janna M. Crews, Mark Adkins:
Computer-Based Training for Deception Detection: What Users Want? ISI 2004: 163-175 - [c14]Douglas P. Twitchell, Jay F. Nunamaker Jr., Judee K. Burgoon:
Using Speech Act Profiling for Deception Detection. ISI 2004: 403-410 - [c13]Joey F. George, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Testing Various Modes of Computer-Based Training for Deception Detection. ISI 2004: 411-417 - 2003
- [j2]Frank A. Biocca, Chad Harms, Judee K. Burgoon:
Towards A More Robust Theory and Measure of Social Presence: Review and Suggested Criteria. Presence Teleoperators Virtual Environ. 12(5): 456-480 (2003) - [c12]Jinwei Cao, Janna M. Crews, Ming Lin, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Can People Be Trained to Better Detect Deception? Instructor-Led vs. Web-Based Training. AMCIS 2003: 76 - [c11]Ming Lin, Janna M. Crews, Jinwei Cao, Jay F. Nunamaker Jr., Judee K. Burgoon:
AGENT99 Trainer: Designing a Web-Based Multimedia Training System for Deception Detection Knowledge Transfer. AMCIS 2003: 334 - [c10]Judee K. Burgoon, Gates Matthew Stoner, Joseph A. Bonito, Norah E. Dunbar:
Trust and Deception in Mediated Communication. HICSS 2003: 44 - [c9]Lina Zhou, Douglas P. Twitchell, Tiantian Qin, Judee K. Burgoon, Jay F. Nunamaker Jr.:
An Exploratory Study into Deception Detection in Text-Based Computer-Mediated Communication. HICSS 2003: 44 - [c8]Judee K. Burgoon, J. P. Blair, Tiantian Qin, Jay F. Nunamaker Jr.:
Detecting Deception through Linguistic Analysis. ISI 2003: 91-101 - [c7]Lina Zhou, Judee K. Burgoon, Douglas P. Twitchell:
A Longitudinal Analysis of Language Behavior of Deception in E-mail. ISI 2003: 102-110 - [c6]Jinwei Cao, Janna M. Crews, Ming Lin, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection. ISI 2003: 358-365 - [c5]Joey F. George, David P. Biros, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Training Professionals to Detect Deception. ISI 2003: 366-370 - 2000
- [j1]Judee K. Burgoon, Joseph A. Bonito, Björn Bengtsson, Artemio Ramirez, Norah E. Dunbar, Nathan Miczo:
Testing the Interactivity Model: Communication Processes, Partner Assessments, and the Quality of Collaborative Work. J. Manag. Inf. Syst. 16(3): 33-56 (2000)
1990 – 1999
- 1999
- [c4]Joseph A. Bonito, Judee K. Burgoon, Björn Bengtsson:
The role of expectations in human-computer interaction. GROUP 1999: 229-238 - [c3]Judee K. Burgoon, Björn Bengtsson, Joseph A. Bonito, Artemio Ramirez, Norah E. Dunbar:
Designing Interfaces to Maximize the Quality of Collaborative Work. HICSS 1999 - [c2]Judee K. Burgoon, Björn Bengtsson, Carl Cederberg, Joseph A. Bonito, Magnus Lundeberg:
The Impact of Anthropomorphic Interfaces on Influence, Understanding, and Credibility. HICSS 1999 - 1997
- [c1]Jay F. Nunamaker Jr., Judee K. Burgoon, Kenneth R. Walsh, Melissa Sue Glynn:
A Vision for a New Discipline. HICSS (2) 1997: 3-11
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint