Douglas P. Twitchell

Orcid: 0000-0003-2431-5616

According to our database1, Douglas P. Twitchell authored at least 29 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Expressing uncertainty in information systems analytics research: A demonstration of Bayesian analysis applied to binary classification problems.
Inf. Process. Manag., 2023

2020
Too Busy to Be Manipulated: How Multitasking with Technology Improves Deception Detection in Collaborative Teamwork.
J. Manag. Inf. Syst., 2020

2019
Advancing the assessment of automated deception detection systems: Incorporating base rate and cost into system evaluation.
Inf. Syst. J., 2019

Data Quality Relevance in Linguistic Analysis: The Impact of Transcription Errors on Multiple Methods of Linguistic Analysis.
Proceedings of the 25th Americas Conference on Information Systems, 2019

2018
Protection Motivation and Deterrence: Evidence from a Fortune 100 Company.
AIS Trans. Replication Res., 2018

2016
Employees' Adherence to Information Security Policies: A Partial Replication.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

A Response to the AIS Bright ICT Initiative.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
Real-World Deception and the Impact of Severity.
J. Comput. Inf. Syst., 2015

Where's the Security in WiFi? An Argument for Industry Awareness.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

2013
Interplay of Desktop and Mobile Apps with Web Services in an Introductory Programming Course.
Proceedings of the 19th Americas Conference on Information Systems, 2013

2012
An Examination of Deception in Virtual Teams: Effects of Deception on Task Performance, Mutuality, and Trust.
IEEE Trans. Prof. Commun., 2012

The Impact of Ability and Participation on Trustworthiness and Task Performance in Virtual Teams.
Int. J. Soc. Organ. Dyn. IT, 2012

2009
Detecting Concealment of Intent in Transportation Screening: A Proof of Concept.
IEEE Trans. Intell. Transp. Syst., 2009

A Model for the Impact of Task Complexity on Deception in a Group Decision Making Task.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2007
SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams.
J. Digit. Forensics Secur. Law, 2007

2006
Social engineering in information assurance curricula.
Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, 2006

Automated Determination of the Veracity of Interview Statements from People of Interest to an Operational Security Force.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

An Analysis of Text-Based Deception Detection Tools.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2005
Deception Detection through Automatic, Unobtrusive Analysis of Nonverbal Behavior.
IEEE Intell. Syst., 2005

Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling.
Proceedings of the Intelligence and Security Informatics, 2005

HMM-Based Deception Recognition from Visual Cues.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

StrikeCOM: A Multi-Player Online Strategy Game for Researching and Teaching Group Dynamics.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

An Approach for Intent Identification by Building on Deception Detection.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Task Performance Under Deceptive Conditions: Using Military Scenarios in Deception Detection Research.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

2004
A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication.
J. Manag. Inf. Syst., 2004

Using Speech Act Profiling for Deception Detection.
Proceedings of the Intelligence and Security Informatics, 2004

Speech Act Pro.ling: A Probabilistic Method for Analyzing Persistent Conversations and Their Participants.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2003
A Longitudinal Analysis of Language Behavior of Deception in E-mail.
Proceedings of the Intelligence and Security Informatics, First NSF/NIJ Symposium, 2003

An Exploratory Study into Deception Detection in Text-Based Computer-Mediated Communication.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003


  Loading...