The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Judee K. Burgoon: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Joseph A. Bonito, Judee K. Burgoon, Björn Bengtsson
    The role of expectations in human-computer interaction. [Citation Graph (0, 0)][DBLP]
    GROUP, 1999, pp:229-238 [Conf]
  2. David P. Biros, Michael C. Hass, Karl Wiers, Douglas P. Twitchell, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr.
    Task Performance Under Deceptive Conditions: Using Military Scenarios in Deception Detection Research. [Citation Graph (0, 0)][DBLP]
    HICSS, 2005, pp:- [Conf]
  3. David P. Biros, Jachin Sakamoto, Joey F. George, Mark Adkins, John Kruse, Judee K. Burgoon, Jay F. Nunamaker Jr.
    A Quasi-experiment to Determine the Impact of a Computer Based Deception Detection Training System: The Use of Agent99 Trainer in the U.S. Military. [Citation Graph (0, 0)][DBLP]
    HICSS, 2005, pp:- [Conf]
  4. Judee K. Burgoon, Mark Adkins, John Kruse, Matthew L. Jensen, Thomas O. Meservy, Douglas P. Twitchell, Amit V. Deokar, Jay F. Nunamaker, Shan Lu, Gabriel Tsechpenakis, Dimitris N. Metaxas, Robert Younger
    An Approach for Intent Identification by Building on Deception Detection. [Citation Graph (0, 0)][DBLP]
    HICSS, 2005, pp:- [Conf]
  5. Judee K. Burgoon, Björn Bengtsson, Joseph A. Bonito, Artemio Ramirez, Norah E. Dunbar
    Designing Interfaces to Maximize the Quality of Collaborative Work. [Citation Graph (0, 0)][DBLP]
    HICSS, 1999, pp:- [Conf]
  6. Judee K. Burgoon, Björn Bengtsson, Carl Cederberg, Joseph A. Bonito, Magnus Lundeberg
    The Impact of Anthropomorphic Interfaces on Influence, Understanding, and Credibility. [Citation Graph (0, 0)][DBLP]
    HICSS, 1999, pp:- [Conf]
  7. Judee K. Burgoon, J. P. Blair, Renee E. Strom
    Heuristics and Modalities in Determining Truth Versus Deception. [Citation Graph (0, 0)][DBLP]
    HICSS, 2005, pp:- [Conf]
  8. Judee K. Burgoon, Gates Matthew Stoner, Joseph A. Bonito, Norah E. Dunbar
    Trust and Deception in Mediated Communication. [Citation Graph (0, 0)][DBLP]
    HICSS, 2003, pp:44- [Conf]
  9. Jinwei Cao, Janna M. Crews, Jay F. Nunamaker Jr., Judee K. Burgoon, Ming Lin
    User Experience with Agent99 Trainer: A Usability Study. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  10. Joey F. George, Kent Marett, Judee K. Burgoon, Janna M. Crews, Jinwei Cao, Ming Lin, David P. Biros
    Training to Detect Deception: An Experimental Investigation. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  11. Tiantian Qin, Judee K. Burgoon, J. P. Blair, Jay F. Nunamaker Jr.
    Modality Effects in Deception Detection and Applications in Automatic-Deception-Detection. [Citation Graph (0, 0)][DBLP]
    HICSS, 2005, pp:- [Conf]
  12. Tiantian Qin, Judee K. Burgoon, Jay F. Nunamaker Jr.
    An Exploratory Study on Promising Cues in Deception Detection and Application of Decision Tree. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  13. Douglas P. Twitchell, David P. Biros, Mark Adkins, Nicole Forsgren, Judee K. Burgoon, Jay F. Nunamaker Jr.
    Automated Determination of the Veracity of Interview Statements from People of Interest to an Operational Security Force. [Citation Graph (0, 0)][DBLP]
    HICSS, 2006, pp:- [Conf]
  14. Douglas P. Twitchell, Karl Wiers, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr.
    StrikeCOM: A Multi-Player Online Strategy Game for Researching and Teaching Group Dynamics. [Citation Graph (0, 0)][DBLP]
    HICSS, 2005, pp:- [Conf]
  15. Lina Zhou, Douglas P. Twitchell, Tiantian Qin, Judee K. Burgoon, Jay F. Nunamaker
    An Exploratory Study into Deception Detection in Text-Based Computer-Mediated Communication. [Citation Graph (0, 0)][DBLP]
    HICSS, 2003, pp:44- [Conf]
  16. Jinwei Cao, Ming Lin, Janna M. Crews, Judee K. Burgoon, Jay F. Nunamaker Jr.
    Virtual Interaction for Effective E-Learning. [Citation Graph (0, 0)][DBLP]
    ICIS, 2005, pp:- [Conf]
  17. Jinwei Cao, Ming Lin, Janna M. Crews, Amit V. Deokar, Judee K. Burgoon
    The Interaction of Research Methods for System Evaluation and Theory Testing: A New Vision of the Benefits of Multi-Methodological Information Systems Research. [Citation Graph (0, 0)][DBLP]
    ICIS, 2004, pp:277-282 [Conf]
  18. Christie Fuller, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker, Steven Coulon
    Detecting Deception in Person-of-Interest Statements. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:504-509 [Conf]
  19. Judee K. Burgoon, J. P. Blair, Tiantian Qin, Jay F. Nunamaker
    Detecting Deception through Linguistic Analysis. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:91-101 [Conf]
  20. Jinwei Cao, Janna M. Crews, Ming Lin, Judee K. Burgoon, Jay F. Nunamaker
    Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:358-365 [Conf]
  21. Joey F. George, David P. Biros, Judee K. Burgoon, Jay F. Nunamaker
    Training Professionals to Detect Deception. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:366-370 [Conf]
  22. Thomas O. Meservy, Matthew L. Jensen, John Kruse, Judee K. Burgoon, Jay F. Nunamaker
    Automatic Extraction of Deceptive Behavioral Cues from Video. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:198-208 [Conf]
  23. Tiantian Qin, Judee K. Burgoon
    An Empirical Study on Dynamic Effects on Deception Detection. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:597-599 [Conf]
  24. Douglas P. Twitchell, Nicole Forsgren, Karl Wiers, Judee K. Burgoon, Jay F. Nunamaker
    Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:471-478 [Conf]
  25. Lina Zhou, Judee K. Burgoon, Douglas P. Twitchell
    A Longitudinal Analysis of Language Behavior of Deception in E-mail. [Citation Graph (0, 0)][DBLP]
    ISI, 2003, pp:102-110 [Conf]
  26. Thomas O. Meservy, Matthew L. Jensen, John Kruse, Douglas P. Twitchell, Judee K. Burgoon, Dimitris N. Metaxas, Jay F. Nunamaker Jr.
    Deception Detection through Automatic, Unobtrusive Analysis of Nonverbal Behavior. [Citation Graph (0, 0)][DBLP]
    IEEE Intelligent Systems, 2005, v:20, n:5, pp:36-43 [Journal]
  27. Frank Biocca, Chad Harms, Judee K. Burgoon
    Towards A More Robust Theory and Measure of Social Presence: Review and Suggested Criteria. [Citation Graph (0, 0)][DBLP]
    Presence, 2003, v:12, n:5, pp:456-480 [Journal]
  28. Tiantian Qin, Judee K. Burgoon
    An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:152-159 [Conf]
  29. Jinwei Cao, Ming Lin, Amit V. Deokar, Judee K. Burgoon, Janna M. Crews, Mark Adkins
    Computer-Based Training for Deception Detection: What Users Want? [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:163-175 [Conf]
  30. Joey F. George, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker
    Testing Various Modes of Computer-Based Training for Deception Detection. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:411-417 [Conf]
  31. Douglas P. Twitchell, Jay F. Nunamaker, Judee K. Burgoon
    Using Speech Act Profiling for Deception Detection. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:403-410 [Conf]

  32. HMM-Based Deception Recognition from Visual Cues. [Citation Graph (, )][DBLP]


  33. An empirical investigation of virtual Interaction in supporting learning. [Citation Graph (, )][DBLP]


Search in 1.481secs, Finished in 1.483secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002