Search For:

Displaying 1-7 out of 7 total
An Exploratory Study into Deception Detection in Text-Based Computer-Mediated Communication
Found in: Hawaii International Conference on System Sciences
By Lina Zhou, Douglas P. Twitchell, Tiantian Qin, Judee K. Burgoon, Jay F. Nunamaker, Jr.
Issue Date:January 2003
pp. 44b
Deception is an everyday occurrence across all communication media. The expansion of the Internet has significantly increased the amount of textual communication received and stored by individuals and organizations. Inundated with massive amounts of textua...
   
Automated Determination of the Veracity of Interview Statements from People of Interest to an Operational Security Force
Found in: Hawaii International Conference on System Sciences
By Douglas P. Twitchell, David P. Biros, Mark Adkins, Nicole Forsgren, Judee K. Burgoon, Jay F. Nunamaker Jr.
Issue Date:January 2006
pp. 17a
In deception detection research validity issues have been raised when subjects are used in controlled laboratory experiments. Studying real-life deception detection is a complicated endeavor because researchers do not have the control in field studies that...
   
StrikeCOM: A Multi-Player Online Strategy Game for Researching and Teaching Group Dynamics
Found in: Hawaii International Conference on System Sciences
By Douglas P. Twitchell, Karl Wiers, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker, Jr.
Issue Date:January 2005
pp. 45b
StrikeCOM is a multi-player online strategy game designed to create discourse to aid in the examination of the development of group processes, shared awareness, and communication in distributed and face-to-face groups. The game mimics C3ISR (Command, Contr...
   
Deception Detection through Automatic, Unobtrusive Analysis of Nonverbal Behavior
Found in: IEEE Intelligent Systems
By Thomas O. Meservy, Matthew L. Jensen, John Kruse, Douglas P. Twitchell, Gabriel Tsechpenakis, Judee K. Burgoon, Dimitris N. Metaxas, Jay F. Nunamaker Jr.
Issue Date:September 2005
pp. 36-43
Accurately and consistently detecting deception is a daunting and persistent challenge for security personnel. Biases and human cognitive limitations make accurately and reliably detecting deception more difficult. An unobtrusive system for detecting decep...
 
An Approach for Intent Identification by Building on Deception Detection
Found in: Hawaii International Conference on System Sciences
By Judee Burgoon, Mark Adkins, John Kruse, Matthew L. Jensen, Thomas Meservy, Douglas P. Twitchell, Amit Deokar, Jay F. Nunamaker, Shan Lu, Gabriel Tsechpenakis, Dimitris N. Metaxas, Robert E. Younger
Issue Date:January 2005
pp. 21a
Past research in deception detection at the University of Arizona has guided the investigation of intent detection. A theoretical foundation and model for the analysis of intent detection is proposed. Available test beds for intent analysis are discussed a...
   
SecurityCom: a multi-player game for researching and teaching information security teams
Found in: Proceedings of the 4th annual conference on Information security curriculum development (InfoSecCD '07)
By Douglas P. Twitchell
Issue Date:September 2007
pp. 1-2
A major portion of government and business organizations' attempts to counteract information security threats is teams of security personnel. These teams often consist of personnel of diverse backgrounds in specific specialties such as network administrati...
     
Social engineering in information assurance curricula
Found in: Proceedings of the 3rd annual conference on Information security curriculum development (InfoSecCD '06)
By Douglas P. Twitchell
Issue Date:September 2006
pp. 191-193
With the increasing use of security technology, technical attacks should become more difficult leading attackers to employ social engineering as a means to obtaining unauthorized access to information. Therefore, social engineering is a potentially dangero...
     
 1