Matthew L. Jensen, Ph.D. - Publications

Affiliations: 
2007 Management Information Systems University of Arizona, Tucson, AZ 
Area:
Management Business Administration, Artificial Intelligence

27 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2018 Dunbar NE, Miller CH, Lee Y, Jensen ML, Anderson C, Adams AS, Elizondo J, Thompson W, Massey Z, Nicholls SB, Ralston R, Donovan J, Mathews E, Roper B, Wilson SN. Reliable deception cues training in an interactive video game Computers in Human Behavior. 85: 74-85. DOI: 10.1016/J.Chb.2018.03.027  0.313
2017 Dunbar NE, Jensen ML, Harvell-Bowman LA, Kelley KM, Burgoon JK. The Viability of Using Rapid Judgments as a Method of Deception Detection Communication Methods and Measures. 11: 121-136. DOI: 10.1080/19312458.2016.1276893  0.386
2017 Ault MK, Ness AM, Taylor WD, Johnson G, Connelly S, Jensen ML, Dunbar NE. Ideological lens matters: Credibility heuristics, pre-existing attitudes, and reactions to messages on ideological websites Computers in Human Behavior. 68: 315-325. DOI: 10.1016/J.Chb.2016.11.053  0.301
2015 Yu X, Zhang S, Yan Z, Yang F, Huang J, Dunbar NE, Jensen ML, Burgoon JK, Metaxas DN. Is interactional dissynchrony a clue to deception? Insights from automated analysis of nonverbal visual cues. Ieee Transactions On Cybernetics. 45: 506-20. PMID 24988600 DOI: 10.1109/Tcyb.2014.2329673  0.377
2015 Taylor WD, Johnson G, Ault MK, Griffith JA, Rozzell B, Connelly S, Jensen ML, Dunbar NE, Ness AM. Ideological group persuasion: A within-person study of how violence, interactivity, and credibility features influence online persuasion Computers in Human Behavior. 51: 448-460. DOI: 10.1016/J.Chb.2015.04.071  0.312
2014 Dunbar NE, Miller CH, Adame BJ, Elizondo J, Wilson SN, Lane BL, Kauffman AA, Bessarabova E, Jensen ML, Straub SK, Lee YH, Burgoon JK, Valacich JJ, Jenkins J, Zhang J. Implicit and explicit training in the mitigation of cognitive bias through the use of a serious game Computers in Human Behavior. 37: 307-318. DOI: 10.1016/J.Chb.2014.04.053  0.324
2014 Dunbar NE, Jensen ML, Tower DC, Burgoon JK. Synchronization of Nonverbal Behaviors in Detecting Mediated and Non-mediated Deception Journal of Nonverbal Behavior. 38: 355-376. DOI: 10.1007/S10919-014-0179-Z  0.314
2014 Jensen ML, Chidambaram L. Leveraging ICT Capabilities in Potentially Deceptive Interactions: An Integrated Theoretical Model to Improve Detectability Group Decision and Negotiation. DOI: 10.1007/S10726-014-9389-3  0.356
2014 Dunbar NE, Jensen ML, Miller CH, Bessarabova E, Straub SK, Wilson SN, Elizondo J, Burgoon JK, Valacich JS, Adame B, Lee YH, Lane B, Piercy C, Wilson D, King S, et al. Mitigating cognitive bias through the use of serious games: Effects of feedback Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8462: 92-105. DOI: 10.1007/978-3-319-07127-5_9  0.498
2013 Dunbar NE, Wilson SN, Adame BJ, Elizondo J, Jensen ML, Miller CH, Kauffman AA, Seltsam T, Bessarabova E, Vincent C, Straub SK, Ralston R, Dulawan CL, Ramirez D, Squire K, et al. MACBETH: Development of a training game for the mitigation of cognitive bias International Journal of Game-Based Learning. 3: 7-26. DOI: 10.4018/ijgbl.2013100102  0.492
2013 Twitchell DP, Jensen ML, Derrick DC, Burgoon JK, Nunamaker JF. Negotiation Outcome Classification Using Language Features Group Decision and Negotiation. 22: 135-151. DOI: 10.1007/S10726-012-9301-Y  0.712
2012 Lowry PB, Moody GD, Vance A, Jensen M, Jenkins JL, Wells TM. Using an Elaboration Likelihood Approach to Better Understand the Persuasiveness of Website Privacy Assurance Cues for Online Consumers Journal of the Association For Information Science and Technology. 63: 755-776. DOI: 10.1002/Asi.21705  0.343
2011 Jensen M, Lowry P, Jenkins J. Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment The Missouri Review. 28: 201-234. DOI: 10.2753/Mis0742-1222280107  0.337
2010 Jensen ML, Lowry PB, Burgoon JK, Nunamaker JF. Technology dominance in complex decision making: The case of aided credibility assessment Journal of Management Information Systems. 27: 175-201. DOI: 10.2753/Mis0742-1222270108  0.5
2010 Jensen ML, Burgoon JK, Nunamaker JF. Judging the credibility of information gathered from face-to-face interactions Journal of Data and Information Quality. 2. DOI: 10.1145/1805286.1805289  0.504
2010 Jensen ML, Meservy TO, Burgoon JK, Nunamaker JF. Automatic, multimodal evaluation of human interaction Group Decision and Negotiation. 19: 367-389. DOI: 10.1007/S10726-009-9171-0  0.562
2009 Burgoon JK, Twitchell DP, Jensen ML, Meservy TO, Adkins M, Kruse J, Deokar AV, Tsechpenakis G, Lu S, Metaxas DN, Nunamaker JF, Younger RE. Detecting concealment of intent in transportation screening: A proof of concept Ieee Transactions On Intelligent Transportation Systems. 10: 103-112. DOI: 10.1109/Tits.2008.2011700  0.703
2008 Burgoon JK, Derrick DC, Elkins AC, Humphreys SL, Jensen ML, Diller CBR, Nunamaker JF. Potential noncontact tools for rapid credibility assessment from physiological and behavioral cues Proceedings - International Carnahan Conference On Security Technology. 150-157. DOI: 10.1109/CCST.2008.4751294  0.52
2008 Jensen ML, Burgoon JK, Nunamaker JF. User experiences with an unobtrusive decision aid for deception detection Proceedings - International Carnahan Conference On Security Technology. 131-134. DOI: 10.1109/CCST.2008.4751291  0.526
2008 Jensen ML, Meservy TO, Burgoon JK, Nunamaker JF. Video-based deception detection Studies in Computational Intelligence. 135: 425-441. DOI: 10.1007/978-3-540-69209-6_22  0.519
2007 Jensen ML, Burgoon JK, Nunamaker JF. Computer-aided credibility assessment by novice lie-catchers Association For Information Systems - 13th Americas Conference On Information Systems, Amcis 2007: Reaching New Heights. 5: 3032-3042.  0.462
2005 Meservy TO, Jensen ML, Kruse J, Burgoon JK, Nunamaker JF, Twitchell DP, Tsechpenakis G, Metaxas DN. Deception detection through automatic, unobtrusive analysis of nonverbal behavior Ieee Intelligent Systems. 20: 36-43. DOI: 10.1109/Mis.2005.85  0.711
2005 Jensen ML, Meservy TO, Kruse J, Burgoon JK, Nunamaker JF. Identification of deceptive behavioral cues extracted from video Ieee Conference On Intelligent Transportation Systems, Proceedings, Itsc. 2005: 1135-1140. DOI: 10.1109/ITSC.2005.1520211  0.523
2005 Tsechpenakis G, Metaxas D, Adkins M, Kruse J, Burgoon JK, Jensen ML, Meservy T, Twitchell DP, Deokar A, Nunamaker JF. Hmm-based deception recognition from visual cues Ieee International Conference On Multimedia and Expo, Icme 2005. 2005: 824-827. DOI: 10.1109/ICME.2005.1521550  0.696
2005 Meservy TO, Jensen ML, Kruse J, Burgoon JK, Nunamaker JF. Automatic extraction of deceptive behavioral cues from video Lecture Notes in Computer Science. 3495: 198-208.  0.512
2005 Burgoon J, Adkins M, Kruse J, Jensen ML, Meservy T, Twitchell DP, Deokar A, Nunamaker JF, Lu S, Tsechpenakis G, Metaxas DN, Younger RE. An approach for intent identification by building on deception detection Proceedings of the Annual Hawaii International Conference On System Sciences. 21.  0.711
2004 Twitchell DP, Jensen ML, Burgoon JK, Nunamaker JF. Detecting deception in secondary screening interviews using linguistic analysis Ieee Conference On Intelligent Transportation Systems, Proceedings, Itsc. 118-123.  0.728
Show low-probability matches.