Volgen
Douglas Twitchell
Douglas Twitchell
Geverifieerd e-mailadres voor boisestate.edu
Titel
Geciteerd door
Geciteerd door
Jaar
Automating linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communications
L Zhou, JK Burgoon, JF Nunamaker, D Twitchell
Group decision and negotiation 13, 81-106, 2004
6332004
A comparison of classification methods for predicting deception in computer-mediated communication
L Zhou, JK Burgoon, DP Twitchell, T Qin, JF Nunamaker Jr
Journal of Management Information Systems 20 (4), 139-166, 2004
3552004
An exploratory study into deception detection in text-based computer-mediated communication
L Zhou, DP Twitchell, T Qin, JK Burgoon, JF Nunamaker
36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003
2212003
Deception detection through automatic, unobtrusive analysis of nonverbal behavior
TO Meservy, ML Jensen, J Kruse, JK Burgoon, JF Nunamaker, ...
IEEE Intelligent Systems 20 (5), 36-43, 2005
1662005
A longitudinal analysis of language behavior of deception in e-mail
L Zhou, JK Burgoon, DP Twitchell
International Conference on Intelligence and Security Informatics, 102-110, 2003
922003
Deception and its detection under synchronous and asynchronous computer-mediated communication
JK Burgoon, F Chen, DP Twitchell
Group Decision and Negotiation 19, 345-366, 2010
702010
Detecting concealment of intent in transportation screening: A proof of concept
JK Burgoon, DP Twitchell, ML Jensen, TO Meservy, M Adkins, J Kruse, ...
IEEE Transactions on Intelligent Transportation Systems 10 (1), 103-112, 2009
702009
An Examination of Deception in Virtual Teams: Effects of Deception on Task Performance, Mutuality, and Trust
CM Fuller, K Marett, DP Twitchell
Professional Communication, IEEE Transactions on 55 (1), 20-35, 2012
682012
Social engineering in information assurance curricula
DP Twitchell
Proceedings of the 3rd annual conference on Information security curriculum …, 2006
652006
Using speech act theory to model conversations for automated classification and retrieval
DP Twitchell, M Adkins, JF Nunamaker, JK Burgoon
Proceedings of the International Working Conference Language Action …, 2004
632004
An approach for intent identification by building on deception detection
J Burgoon, M Adkins, J Kruse, ML Jensen, T Meservy, DP Twitchell, ...
Proceedings of the 38th Annual Hawaii International Conference on System …, 2005
572005
Using speech act profiling for deception detection
DP Twitchell, JF Nunamaker Jr, JK Burgoon
International Conference on Intelligence and Security Informatics, 403-410, 2004
502004
Speech act profiling: A probabilistic method for analyzing persistent conversations and their participants
DP Twitchell, JF Nunamaker
37th Annual Hawaii International Conference on System Sciences, 2004 …, 2004
492004
StrikeCOM: A multi-player online strategy game for researching and teaching group dynamics
DP Twitchell, K Wiers, M Adkins, JK Burgoon, JF Nunamaker
Proceedings of the 38th Annual Hawaii International Conference on System …, 2005
382005
HMM-based deception recognition from visual cues
G Tsechpenakis, D Metaxas, M Adkins, J Kruse, JK Burgoon, ML Jensen, ...
2005 IEEE International Conference on Multimedia and Expo, 824-827, 2005
302005
Negotiation Outcome Classification Using Language Features
DP Twitchell, ML Jensen, DC Derrick, JK Burgoon, JF Nunamaker
Group Decision and Negotiation, 1-17, 2012
292012
An analysis of text-based deception detection tools
C Fuller, D Biros, D Twitchell, J Burgoon, M Adkins
AMCIS 2006 Proceedings, 418, 2006
282006
Social engineering and its countermeasures
DP Twitchell
Handbook of research on social and organizational liabilities in information …, 2009
222009
Advances in automated deception detection in text-based computer-mediated communication
M Adkins, DP Twitchell, JK Burgoon, JF Nunamaker Jr
Enabling Technologies for Simulation Science VIII 5423, 122-129, 2004
222004
SecurityCom: a multi-player game for researching and teaching information security teams
DP Twitchell
Journal of Digital Forensics, Security and Law 2 (4), 1, 2007
212007
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20