Elkins, A. C., Dunbar, N. (2012). Are Deception Detection Experts Threatened by Artificial Intelligence Based Credibility Assessment Systems? Improving Assisted Detection Accuracy and Objectivity. Forty-Fifth Annual Hawaii International Conference on System Sciences, January 4-7, 2012, Maui, Hawaii.
Giboney, J.S., Brown, S. A., Nunamaker, J. F., User acceptance of knowledge-based system recommendations: Explanations, arguments, and fit-research in progress. Proceedings of the 45th Annual Hawaii International Conference on System Sciences. (2012 01 04 – 2012 01 07 Maui Hawaii USA) 3719-3727.
Luna-Reyes, L., Andersen, D. F., Andersen, D. L., Derrick, D. C., & Jarman, H. (2012). Full Information Product Pricing (FIPP) Regimes: Policy Implications for US-Mexico Sustainable Commerce. Presented at the Puentes Consortium Annual Conference, April 26, 2012, Houston, TX.
Elkins, A. C., Derrick, D. C., Gariup, M. (2012). The Voice and Eye Gaze Behavior of an Imposter: Automated Interviewing and Detection for Rapid Screening at the Border. European Chapter of the Association for Computational Linguistics (EACL), Apr 23-27, 2012, Avignon, France.
Oh, O., Nguyen, C., de Vreede, G. J., Derrick, D. C. (2012). Collaboration Science in the Age of Social Media: A Crowdsourcing View. Group Decision and Negotiation Conference, May 21-24, 2012, Recife, Brazil.
Jay F. Nunamaker Jr., Judee K. Burgoon, Nathan W. Twyman, Jeffrey G. Proudfoot, Ryan Schuetzler, and Justin S. Giboney (2012). “Establishing a Foundation for Automated Human Credibility Screening.” Developing Technologies and Tools for Border Security Applications workshop at the IEEE International Conference on Intelligence and Security Informatics (ISI), Washington, D.C., June 11.
Nunamaker Jr., J. F., Elkins, A. C., Twyman, N., & Derrick, D. C. (2012). AVATAR System for Automated Credibility Assessment and Interviewing. Presented at the IEEE International Conference on Intelligence and Security Informatics, Jun 11-14, 2012, Washington, D.C.
Alipour, H., Zeng, D. D., & Derrick, D. C. (2012). AdaBoost-based Sensor Fusion for Credibility Assessment. Presented at the IEEE International Conference on Intelligence and Security Informatics, Jun 11-14, 2012, Washington, D.C.
Jeffrey G. Proudfoot, Nathan W. Twyman, and Judee K. Burgoon (2012). “A Comparison of Invasive and Noninvasive Sensors in the Concealed Information Test.” The Workshop on Innovation in Border Control (WIBC) at the European Intelligence and Security Informatics Conference (EISIC), Odense, Denmark, August 22-24.
Marquardson, J. (2012). Password Policy Effects on Entropy and Recall: Research in Progress. Paper presented at the 18th Americas Conference on Information Systems, Seattle, WA.