Search Results - "Nunamaker, Jr"

Refine Results
  1. 1

    Enhancing Vulnerability Prioritization in Cloud Computing Using Multi-View Representation Learning by Ullman, Steven, Samtani, Sagar, Zhu, Hongyi, Lazarine, Ben, Chen, Hsinchun, Nunamaker, Jay F.

    Published in Journal of management information systems (02-07-2024)
    “…Cybersecurity is a present and growing concern that needs to be addressed with both behavioral and design-oriented research. Public cloud providers such as…”
    Get full text
    Journal Article
  2. 2
  3. 3

    Enhancing Predictive Analytics for Anti-Phishing by Exploiting Website Genre Information by Abbasi, Ahmed, Zahedi, Fatemeh "Mariam", Zeng, Daniel, Chen, Yan, Chen, Hsinchun, Nunamaker, Jay F.

    Published in Journal of management information systems (01-01-2015)
    “…Phishing websites continue to successfully exploit user vulnerabilities in household and enterprise settings. Existing anti-phishing tools lack the accuracy…”
    Get full text
    Journal Article
  4. 4

    Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals by Twyman, Nathan W., Lowry, Paul Benjamin, Burgoon, Judee K., Nunamaker, Jay F.

    Published in Journal of management information systems (03-07-2014)
    “…Screening individuals for concealed information has traditionally been the purview of professional interrogators investigating crimes. However, the ability to…”
    Get full text
    Journal Article
  5. 5

    Embodied Conversational Agent-Based Kiosk for Automated Interviewing by Nunamaker, Jay F., Derrick, Douglas C., Elkins, Aaron C., Burgoon, Judee K., Patton, Mark W.

    Published in Journal of management information systems (01-07-2011)
    “…We have created an automated kiosk that uses embodied intelligent agents to interview individuals and detect changes in arousal, behavior, and cognitive effort…”
    Get full text
    Journal Article
  6. 6
  7. 7

    IS 2010: Curriculum Guidelines for Undergraduate Degree Programs in Information Systems by Topi, Heikki, Valacich, Joseph S., Wright, Ryan T., Kaiser, Kate, Nunamaker, Jr, Sipior, Janice C., de Vreede, Gert Jan

    “…IS 2010 is the latest in a series of model curricula for undergraduate degrees in Information Systems. It builds on the foundation formed by this earlier work,…”
    Get full text
    Journal Article
  8. 8

    Multiple dimensions of value in information systems by Briggs, Robert O, Nunamaker, Jr., Jay F.

    Published in Journal of management information systems (01-04-2013)
    “…INFORMATION SYSTEMS (IS) IN ORGANIZATIONS often target economic value-increasing efficiency, improving service to build customer loyalty, optimizing the value…”
    Get full text
    Journal Article
  9. 9

    Are Users Threatened by Credibility Assessment Systems? by Elkins, Aaron C., Dunbar, Norah E., Adame, Bradley, Nunamaker, Jay F.

    Published in Journal of management information systems (01-04-2013)
    “…Despite the improving accuracy of agent-based expert systems, human expert users aided by these systems have not improved their accuracy. Self-affirmation…”
    Get full text
    Journal Article
  10. 10

    A Rigidity Detection System for Automated Credibility Assessment by Twyman, Nathan W., Elkins, Aaron C., Burgoon, Judee K., Nunamaker, Jay F.

    Published in Journal of management information systems (01-07-2014)
    “…Credibility assessment is an area in which information systems research can make a major impact. This paper reports on two studies investigating a system…”
    Get full text
    Journal Article
  11. 11

    A Visual Framework for Knowledge Discovery on the Web: An Empirical Study of Business Intelligence Exploration by CHUNG, WINGYAN, CHEN, HSINCHUN, NUNAMAKER Jr, JAY F.

    Published in Journal of management information systems (01-04-2005)
    “…Information overload often hinders knowledge discovery on the Web. Existing tools lack analysis and visualization capabilities. Search engine displays often…”
    Get full text
    Journal Article
  12. 12

    A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication by ZHOU, LINA, BURGOON, JUDEE K., TWITCHELL, DOUGLAS P., QIN, TIANTIAN, NUNAMAKER Jr, JAY F.

    Published in Journal of management information systems (01-03-2004)
    “…The increased chance of deception in computer-mediated communication and the potential risk of taking action based on deceptive information calls for automatic…”
    Get full text
    Journal Article
  13. 13
  14. 14

    Theory-Informed Design and Evaluation of an Advanced Search and Knowledge Mapping System in Nanotechnology by Dang, Yan, Zhang, Yulei, Chen, Hsinchun, Brown, Susan A., Hu, Paul Jen-Hwa, Nunamaker, Jay F.

    Published in Journal of management information systems (01-04-2012)
    “…Effective search support is an important tool for helping individuals deal with the problem of information overload. This is particularly true in the field of…”
    Get full text
    Journal Article
  15. 15

    Border Security Credibility Assessments via Heterogeneous Sensor Fusion by Derrick, Douglas C, Elkins, Aaron C, Burgoon, Judee K, Nunamaker, Jay F, Zeng, Daniel Dajun

    Published in IEEE intelligent systems (01-05-2010)
    “…A heterogeneous network of sensors that measure physiological and behavioral indicators of arousal, cognitive effort, and stress can facilitate deception…”
    Get full text
    Journal Article
  16. 16
  17. 17
  18. 18

    Information Technology for Negotiating Groups: Generating Options for Mutual Gain by Nunamaker, J. F., Jr, Dennis, Alan R, Valacich, Joseph S, Vogel, Douglas R

    Published in Management science (01-10-1991)
    “…The study of negotiating groups, whether distributive between competing parties (i.e., "win-lose") or integrative between essentially friendly parties from the…”
    Get full text
    Journal Article
  19. 19

    Collegial Mentorship by Nunamaker, Jr

    “…Mentoring is typically thought of as a top-down process, but it can also be based on collegial mentorship. This article describes an example of peer-to-peer…”
    Get full text
    Journal Article
  20. 20