default search action
Douglas P. Twitchell
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j11]Douglas P. Twitchell, Christie M. Fuller:
Expressing uncertainty in information systems analytics research: A demonstration of Bayesian analysis applied to binary classification problems. Inf. Process. Manag. 60(1): 103132 (2023) - 2020
- [j10]Nathan W. Twyman, Jeffrey Gainer Proudfoot, Ann-Frances Cameron, J. Eric Case, Judee K. Burgoon, Douglas P. Twitchell:
Too Busy to Be Manipulated: How Multitasking with Technology Improves Deception Detection in Collaborative Teamwork. J. Manag. Inf. Syst. 37(2): 377-395 (2020)
2010 – 2019
- 2019
- [j9]Douglas P. Twitchell, Christie M. Fuller:
Advancing the assessment of automated deception detection systems: Incorporating base rate and cost into system evaluation. Inf. Syst. J. 29(3): 738-761 (2019) - [c19]Steven J. Pentland, Lee Spitzley, Christie M. Fuller, Douglas P. Twitchell:
Data Quality Relevance in Linguistic Analysis: The Impact of Transcription Errors on Multiple Methods of Linguistic Analysis. AMCIS 2019 - 2018
- [j8]David Sikolia, Douglas P. Twitchell, Glen W. Sagers:
Protection Motivation and Deterrence: Evidence from a Fortune 100 Company. AIS Trans. Replication Res. 4: 7 (2018) - 2016
- [c18]Glen W. Sagers, Douglas P. Twitchell:
A Response to the AIS Bright ICT Initiative. AMCIS 2016 - [c17]David Sikolia, Douglas P. Twitchell, Glen W. Sagers:
Employees' Adherence to Information Security Policies: A Partial Replication. AMCIS 2016 - 2015
- [j7]Christie M. Fuller, David P. Biros, Douglas P. Twitchell, Rick L. Wilson:
Real-World Deception and the Impact of Severity. J. Comput. Inf. Syst. 55(2): 59-67 (2015) - [c16]Glen W. Sagers, Bryan Hosack, R. J. Rowley, Douglas P. Twitchell, Ranjitha Nagaraj:
Where's the Security in WiFi? An Argument for Industry Awareness. HICSS 2015: 5453-5461 - 2013
- [c15]Amit Shesh, Douglas P. Twitchell:
Interplay of Desktop and Mobile Apps with Web Services in an Introductory Programming Course. AMCIS 2013 - 2012
- [j6]Christie M. Fuller, Douglas P. Twitchell, Kent Marett, A. J. Burns:
The Impact of Ability and Participation on Trustworthiness and Task Performance in Virtual Teams. Int. J. Soc. Organ. Dyn. IT 2(2): 1-17 (2012) - [j5]Christie M. Fuller, Kent Marett, Douglas P. Twitchell:
An Examination of Deception in Virtual Teams: Effects of Deception on Task Performance, Mutuality, and Trust. IEEE Trans. Prof. Commun. 55(1): 20-35 (2012)
2000 – 2009
- 2009
- [j4]Judee K. Burgoon, Douglas P. Twitchell, Matthew L. Jensen, Thomas O. Meservy, Mark Adkins, John Kruse, Amit V. Deokar, Gabriel Tsechpenakis, Shan Lu, Dimitris N. Metaxas, Jay F. Nunamaker Jr., Robert Younger:
Detecting Concealment of Intent in Transportation Screening: A Proof of Concept. IEEE Trans. Intell. Transp. Syst. 10(1): 103-112 (2009) - [c14]Douglas P. Twitchell, Christie M. Fuller, David P. Biros, Julia Graham:
A Model for the Impact of Task Complexity on Deception in a Group Decision Making Task. AMCIS 2009: 206 - 2007
- [j3]Douglas P. Twitchell:
SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams. J. Digit. Forensics Secur. Law 2(4): 9-18 (2007) - [c13]Douglas P. Twitchell:
SecurityCom: a multi-player game for researching and teaching information security teams. InfoSecCD 2007: 10:1 - 2006
- [c12]Christie M. Fuller, David P. Biros, Douglas P. Twitchell, Judee K. Burgoon, Mark Adkins:
An Analysis of Text-Based Deception Detection Tools. AMCIS 2006: 418 - [c11]Douglas P. Twitchell, David P. Biros, Mark Adkins, Nicole Forsgren, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Automated Determination of the Veracity of Interview Statements from People of Interest to an Operational Security Force. HICSS 2006 - [c10]Douglas P. Twitchell:
Social engineering in information assurance curricula. InfoSecCD 2006: 191-193 - 2005
- [j2]Thomas O. Meservy, Matthew L. Jensen, John Kruse, Douglas P. Twitchell, Judee K. Burgoon, Dimitris N. Metaxas, Jay F. Nunamaker Jr.:
Deception Detection through Automatic, Unobtrusive Analysis of Nonverbal Behavior. IEEE Intell. Syst. 20(5): 36-43 (2005) - [c9]David P. Biros, Michael C. Hass, Karl Wiers, Douglas P. Twitchell, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Task Performance Under Deceptive Conditions: Using Military Scenarios in Deception Detection Research. HICSS 2005 - [c8]Judee K. Burgoon, Mark Adkins, John Kruse, Matthew L. Jensen, Thomas O. Meservy, Douglas P. Twitchell, Amit V. Deokar, Jay F. Nunamaker Jr., Shan Lu, Gabriel Tsechpenakis, Dimitris N. Metaxas, Robert Younger:
An Approach for Intent Identification by Building on Deception Detection. HICSS 2005 - [c7]Douglas P. Twitchell, Karl Wiers, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr.:
StrikeCOM: A Multi-Player Online Strategy Game for Researching and Teaching Group Dynamics. HICSS 2005 - [c6]Gabriel Tsechpenakis, Dimitris N. Metaxas, Mark Adkins, John Kruse, Judee K. Burgoon, Matthew L. Jensen, Thomas O. Meservy, Douglas P. Twitchell, Amit V. Deokar, Jay F. Nunamaker Jr.:
HMM-Based Deception Recognition from Visual Cues. ICME 2005: 824-827 - [c5]Douglas P. Twitchell, Nicole Forsgren, Karl Wiers, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling. ISI 2005: 471-478 - 2004
- [j1]Lina Zhou, Judee K. Burgoon, Douglas P. Twitchell, Tiantian Qin, Jay F. Nunamaker Jr.:
A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication. J. Manag. Inf. Syst. 20(4): 139-165 (2004) - [c4]Douglas P. Twitchell, Jay F. Nunamaker Jr.:
Speech Act Pro.ling: A Probabilistic Method for Analyzing Persistent Conversations and Their Participants. HICSS 2004 - [c3]Douglas P. Twitchell, Jay F. Nunamaker Jr., Judee K. Burgoon:
Using Speech Act Profiling for Deception Detection. ISI 2004: 403-410 - 2003
- [c2]Lina Zhou, Douglas P. Twitchell, Tiantian Qin, Judee K. Burgoon, Jay F. Nunamaker Jr.:
An Exploratory Study into Deception Detection in Text-Based Computer-Mediated Communication. HICSS 2003: 44 - [c1]Lina Zhou, Judee K. Burgoon, Douglas P. Twitchell:
A Longitudinal Analysis of Language Behavior of Deception in E-mail. ISI 2003: 102-110
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint