Year |
Citation |
Score |
2018 |
Dunbar NE, Miller CH, Lee Y, Jensen ML, Anderson C, Adams AS, Elizondo J, Thompson W, Massey Z, Nicholls SB, Ralston R, Donovan J, Mathews E, Roper B, Wilson SN. Reliable deception cues training in an interactive video game Computers in Human Behavior. 85: 74-85. DOI: 10.1016/J.Chb.2018.03.027 |
0.313 |
|
2017 |
Dunbar NE, Jensen ML, Harvell-Bowman LA, Kelley KM, Burgoon JK. The Viability of Using Rapid Judgments as a Method of Deception Detection Communication Methods and Measures. 11: 121-136. DOI: 10.1080/19312458.2016.1276893 |
0.386 |
|
2017 |
Ault MK, Ness AM, Taylor WD, Johnson G, Connelly S, Jensen ML, Dunbar NE. Ideological lens matters: Credibility heuristics, pre-existing attitudes, and reactions to messages on ideological websites Computers in Human Behavior. 68: 315-325. DOI: 10.1016/J.Chb.2016.11.053 |
0.301 |
|
2015 |
Yu X, Zhang S, Yan Z, Yang F, Huang J, Dunbar NE, Jensen ML, Burgoon JK, Metaxas DN. Is interactional dissynchrony a clue to deception? Insights from automated analysis of nonverbal visual cues. Ieee Transactions On Cybernetics. 45: 506-20. PMID 24988600 DOI: 10.1109/Tcyb.2014.2329673 |
0.377 |
|
2015 |
Taylor WD, Johnson G, Ault MK, Griffith JA, Rozzell B, Connelly S, Jensen ML, Dunbar NE, Ness AM. Ideological group persuasion: A within-person study of how violence, interactivity, and credibility features influence online persuasion Computers in Human Behavior. 51: 448-460. DOI: 10.1016/J.Chb.2015.04.071 |
0.312 |
|
2014 |
Dunbar NE, Miller CH, Adame BJ, Elizondo J, Wilson SN, Lane BL, Kauffman AA, Bessarabova E, Jensen ML, Straub SK, Lee YH, Burgoon JK, Valacich JJ, Jenkins J, Zhang J. Implicit and explicit training in the mitigation of cognitive bias through the use of a serious game Computers in Human Behavior. 37: 307-318. DOI: 10.1016/J.Chb.2014.04.053 |
0.324 |
|
2014 |
Dunbar NE, Jensen ML, Tower DC, Burgoon JK. Synchronization of Nonverbal Behaviors in Detecting Mediated and Non-mediated Deception Journal of Nonverbal Behavior. 38: 355-376. DOI: 10.1007/S10919-014-0179-Z |
0.314 |
|
2014 |
Jensen ML, Chidambaram L. Leveraging ICT Capabilities in Potentially Deceptive Interactions: An Integrated Theoretical Model to Improve Detectability Group Decision and Negotiation. DOI: 10.1007/S10726-014-9389-3 |
0.356 |
|
2014 |
Dunbar NE, Jensen ML, Miller CH, Bessarabova E, Straub SK, Wilson SN, Elizondo J, Burgoon JK, Valacich JS, Adame B, Lee YH, Lane B, Piercy C, Wilson D, King S, et al. Mitigating cognitive bias through the use of serious games: Effects of feedback Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8462: 92-105. DOI: 10.1007/978-3-319-07127-5_9 |
0.498 |
|
2013 |
Dunbar NE, Wilson SN, Adame BJ, Elizondo J, Jensen ML, Miller CH, Kauffman AA, Seltsam T, Bessarabova E, Vincent C, Straub SK, Ralston R, Dulawan CL, Ramirez D, Squire K, et al. MACBETH: Development of a training game for the mitigation of cognitive bias International Journal of Game-Based Learning. 3: 7-26. DOI: 10.4018/ijgbl.2013100102 |
0.492 |
|
2013 |
Twitchell DP, Jensen ML, Derrick DC, Burgoon JK, Nunamaker JF. Negotiation Outcome Classification Using Language Features Group Decision and Negotiation. 22: 135-151. DOI: 10.1007/S10726-012-9301-Y |
0.712 |
|
2012 |
Lowry PB, Moody GD, Vance A, Jensen M, Jenkins JL, Wells TM. Using an Elaboration Likelihood Approach to Better Understand the Persuasiveness of Website Privacy Assurance Cues for Online Consumers Journal of the Association For Information Science and Technology. 63: 755-776. DOI: 10.1002/Asi.21705 |
0.343 |
|
2011 |
Jensen M, Lowry P, Jenkins J. Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment The Missouri Review. 28: 201-234. DOI: 10.2753/Mis0742-1222280107 |
0.337 |
|
2010 |
Jensen ML, Lowry PB, Burgoon JK, Nunamaker JF. Technology dominance in complex decision making: The case of aided credibility assessment Journal of Management Information Systems. 27: 175-201. DOI: 10.2753/Mis0742-1222270108 |
0.5 |
|
2010 |
Jensen ML, Burgoon JK, Nunamaker JF. Judging the credibility of information gathered from face-to-face interactions Journal of Data and Information Quality. 2. DOI: 10.1145/1805286.1805289 |
0.504 |
|
2010 |
Jensen ML, Meservy TO, Burgoon JK, Nunamaker JF. Automatic, multimodal evaluation of human interaction Group Decision and Negotiation. 19: 367-389. DOI: 10.1007/S10726-009-9171-0 |
0.562 |
|
2009 |
Burgoon JK, Twitchell DP, Jensen ML, Meservy TO, Adkins M, Kruse J, Deokar AV, Tsechpenakis G, Lu S, Metaxas DN, Nunamaker JF, Younger RE. Detecting concealment of intent in transportation screening: A proof of concept Ieee Transactions On Intelligent Transportation Systems. 10: 103-112. DOI: 10.1109/Tits.2008.2011700 |
0.703 |
|
2008 |
Burgoon JK, Derrick DC, Elkins AC, Humphreys SL, Jensen ML, Diller CBR, Nunamaker JF. Potential noncontact tools for rapid credibility assessment from physiological and behavioral cues Proceedings - International Carnahan Conference On Security Technology. 150-157. DOI: 10.1109/CCST.2008.4751294 |
0.52 |
|
2008 |
Jensen ML, Burgoon JK, Nunamaker JF. User experiences with an unobtrusive decision aid for deception detection Proceedings - International Carnahan Conference On Security Technology. 131-134. DOI: 10.1109/CCST.2008.4751291 |
0.526 |
|
2008 |
Jensen ML, Meservy TO, Burgoon JK, Nunamaker JF. Video-based deception detection Studies in Computational Intelligence. 135: 425-441. DOI: 10.1007/978-3-540-69209-6_22 |
0.519 |
|
2007 |
Jensen ML, Burgoon JK, Nunamaker JF. Computer-aided credibility assessment by novice lie-catchers Association For Information Systems - 13th Americas Conference On Information Systems, Amcis 2007: Reaching New Heights. 5: 3032-3042. |
0.462 |
|
2005 |
Meservy TO, Jensen ML, Kruse J, Burgoon JK, Nunamaker JF, Twitchell DP, Tsechpenakis G, Metaxas DN. Deception detection through automatic, unobtrusive analysis of nonverbal behavior Ieee Intelligent Systems. 20: 36-43. DOI: 10.1109/Mis.2005.85 |
0.711 |
|
2005 |
Jensen ML, Meservy TO, Kruse J, Burgoon JK, Nunamaker JF. Identification of deceptive behavioral cues extracted from video Ieee Conference On Intelligent Transportation Systems, Proceedings, Itsc. 2005: 1135-1140. DOI: 10.1109/ITSC.2005.1520211 |
0.523 |
|
2005 |
Tsechpenakis G, Metaxas D, Adkins M, Kruse J, Burgoon JK, Jensen ML, Meservy T, Twitchell DP, Deokar A, Nunamaker JF. Hmm-based deception recognition from visual cues Ieee International Conference On Multimedia and Expo, Icme 2005. 2005: 824-827. DOI: 10.1109/ICME.2005.1521550 |
0.696 |
|
2005 |
Meservy TO, Jensen ML, Kruse J, Burgoon JK, Nunamaker JF. Automatic extraction of deceptive behavioral cues from video Lecture Notes in Computer Science. 3495: 198-208. |
0.512 |
|
2005 |
Burgoon J, Adkins M, Kruse J, Jensen ML, Meservy T, Twitchell DP, Deokar A, Nunamaker JF, Lu S, Tsechpenakis G, Metaxas DN, Younger RE. An approach for intent identification by building on deception detection Proceedings of the Annual Hawaii International Conference On System Sciences. 21. |
0.711 |
|
2004 |
Twitchell DP, Jensen ML, Burgoon JK, Nunamaker JF. Detecting deception in secondary screening interviews using linguistic analysis Ieee Conference On Intelligent Transportation Systems, Proceedings, Itsc. 118-123. |
0.728 |
|
Show low-probability matches. |