1
|
Dando CJ. Sorting Insiders From Co-Workers: Remote Synchronous Computer-Mediated Triage for Investigating Insider Attacks. HUMAN FACTORS 2024; 66:145-157. [PMID: 35249401 PMCID: PMC10756022 DOI: 10.1177/00187208211068292] [Citation(s) in RCA: 2] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/25/2021] [Accepted: 11/27/2021] [Indexed: 06/14/2023]
Abstract
OBJECTIVE Develop and investigate the potential of a remote, computer-mediated and synchronous text-based triage, which we refer to as InSort, for quickly highlighting persons of interest after an insider attack. BACKGROUND Insiders maliciously exploit legitimate access to impair the confidentiality and integrity of organizations. The globalisation of organisations and advancement of information technology means employees are often dispersed across national and international sites, working around the clock, often remotely. Hence, investigating insider attacks is challenging. However, the cognitive demands associated with masking insider activity offer opportunities. Drawing on cognitive approaches to deception and understanding of deception-conveying features in textual responses, we developed InSort, a remote computer-mediated triage. METHOD During a 6-hour immersive simulation, participants worked in teams, examining password protected, security sensitive databases and exchanging information during an organized crime investigation. Twenty-five percent were covertly incentivized to act as an 'insider' by providing information to a provocateur. RESULTS Responses to InSort questioning revealed insiders took longer to answer investigation relevant questions, provided impoverished responses, and their answers were less consistent with known evidence about their behaviours than co-workers. CONCLUSION Findings demonstrate InSort has potential to expedite information gathering and investigative processes following an insider attack. APPLICATION InSort is appropriate for application by non-specialist investigators and can be quickly altered as a function of both environment and event. InSort offers a clearly defined, well specified, approach for use across insider incidents, and highlights the potential of technology for supporting complex time critical investigations.
Collapse
Affiliation(s)
- Coral J. Dando
- Department of Psychology, University of Westminster, London
| |
Collapse
|
2
|
Elshan E, Ebel P, Söllner M, Leimeister JM. Leveraging Low Code Development of Smart Personal Assistants: An Integrated Design Approach with the SPADE Method. J MANAGE INFORM SYST 2023. [DOI: 10.1080/07421222.2023.2172776] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 04/03/2023]
|
3
|
Maar D, Besson E, Kefi H. Fostering positive customer attitudes and usage intentions for scheduling services via chatbots. JOURNAL OF SERVICE MANAGEMENT 2022. [DOI: 10.1108/josm-06-2021-0237] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
PurposeThis article draws on a reasoned action perspective and the two fundamental dimensions (i.e. warmth and competence) of the Stereotype Content Model (SCM) to analyze customers' chatbot-related attitudes and usage intentions in service retailing. The authors investigate how chatbot, customer, and contextual characteristics, along with perceptions of chatbot warmth and competence, shape customers' chatbot-related attitudes. Furthermore, the authors analyze whether the customer generation or the service context moderates the relationship between chatbot-related attitudes and usage intentions.Design/methodology/approachThe results are based on two studies (N = 807). Study 1 relies on a 2 (chatbot communication style: high vs low social orientation) × 2 (customer generation: generation X [GenX] vs generation Z [GenZ]) × 2 (service context: restaurant vs medical) between-subjects design. Study 2 relies on a similar number of respondents from GenX and GenZ who answered questions on scheduling a service with either the dentist or the favorite restaurant of the respondents.FindingsGenZ shows more positive attitudes toward chatbots than GenX, due to higher perceptions of warmth and competence. While GenZ has similar attitudes toward chatbots with a communication style that is high or low in social orientation, GenX perceives chatbots with a high social orientation as warmer and has more favorable attitudes toward chatbots. Furthermore, the positive effect of chatbot-related attitudes on usage intentions is stronger for GenX than GenZ. These effects do not significantly differ between the considered contexts.Originality/valueThis research formulates future directions to stimulate debate on factors that service retailers should consider when employing chatbots.
Collapse
|
4
|
Lin CL, Chen Z, Jiang X, Chen GL, Jin P. Roles and Research Trends of Neuroscience on Major Information Systems Journal: A Bibliometric and Content Analysis. Front Neurosci 2022; 16:872532. [PMID: 35992932 PMCID: PMC9382099 DOI: 10.3389/fnins.2022.872532] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/09/2022] [Accepted: 05/20/2022] [Indexed: 11/20/2022] Open
Abstract
Over the past decade, neuroscience has been integrated into information systems as a new methodology and perspective to study and solve related problems. Therefore, NeuroIS has emerged as a new cutting-edge research field. This review aimed to identify, summarize, and classify existing NeuroIS publications through knowledge mapping and bibliometric analysis. To effectively understand the development trend of NeuroIS, this study referred to the journal selection index of the Association of Business Schools in 2021 and journals above three stars in the field of information management as the main selection basis. A total of 99 neuroscience papers and their citation data were included from 19 major information systems journals of SCI/SSCI. This study analyzed bibliometric data from 2010 to 2021 to identify the most productive countries, universities, authors, journals, and prolific publications in NeuroIS. To this end, VOSviewer was used to visualize mapping based on co-citation, bibliographic coupling, and co-occurrence. Keywords with strong citation bursts were also identified in this study. This signifies the evolution of this research field and may reveal potential research directions in the near future. In selecting research methods and analysis tools for NeuroIS, content analysis was used to further conclude and summarize the relevant trends. Moreover, a co-citation network analysis was conducted to help understand how the papers, journals, and authors in the field were connected and related, and to identify the seminal or pioneering major literature. For researchers, network maps visualized mainstream research and provided a structural understanding of NeuroIS. The review concludes by discussing potential research topics in this field.
Collapse
Affiliation(s)
- Chien-Liang Lin
- College of Science and Technology, Ningbo University, Ningbo, China
- Research Center for Ningbo Bay Area Development, Ningbo University, Cixi City, China
| | - Zezhou Chen
- School of Economics, Zhejiang University of Technology, Hangzhou, China
- *Correspondence: Zezhou Chen,
| | - Xinyue Jiang
- College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou, China
| | - Guan Lin Chen
- Department of Distribution Management, Shu-Te University, Kaohsiung, Taiwan
- Guan Lin Chen,
| | - Peiqi Jin
- School of Foreign Language, Zhejiang University of Technology, Hangzhou, China
| |
Collapse
|
5
|
Armando M, Ochs M, Régner I. The Impact of Pedagogical Agents' Gender on Academic Learning: A Systematic Review. Front Artif Intell 2022; 5:862997. [PMID: 35795011 PMCID: PMC9251372 DOI: 10.3389/frai.2022.862997] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/26/2022] [Accepted: 05/19/2022] [Indexed: 12/03/2022] Open
Abstract
Virtual learning environments often use virtual characters to facilitate and improve the learning process. These characters, known as pedagogical agents, can take on different roles, such as tutors or companions. Research has highlighted the importance of various characteristics of virtual agents, including their voice or non-verbal behaviors. Little attention has been paid to the gender-specific design of pedagogical agents, although gender has an important influence on the educational process. In this article, we perform an extensive review of the literature regarding the impact of the gender of pedagogical agents on academic outcomes. Based on a detailed review of 59 articles, we analyze the influence of pedagogical agents' gender on students' academic self-evaluations and achievements to answer the following questions: (1) Do students perceive virtual agents differently depending on their own gender and the gender of the agent? (2) Does the gender of pedagogical agents influence students' academic performance and self-evaluations? (3) Are there tasks or academic situations to which a male virtual agent is better suited than a female virtual agent, and vice versa, according to empirical evidence? (4) How do a virtual agent's pedagogical roles impact these results? (5) How do a virtual agent's appearance and interactive capacities impact these results? (6) Are androgynous virtual agents a potential solution to combatting gender stereotypes? This review provides important insight to researchers on how to approach gender when designing pedagogical agents in virtual learning environments.
Collapse
Affiliation(s)
- Marjorie Armando
- Aix Marseille Univ, CNRS, LIS UMR 7020, Marseille, France
- Aix Marseille Univ, CNRS, LPC, Marseille, France
- Pôle pilote Ampiric, Institut National Supérieur du Professorat et de l'Éducation, Aix-Marseille Université, Marseille, France
| | - Magalie Ochs
- Aix Marseille Univ, CNRS, LIS UMR 7020, Marseille, France
| | | |
Collapse
|
6
|
Weinert C, Maier C, Laumer S, Weitzel T. Repeated IT Interruption: Habituation and Sensitization of User Responses. J MANAGE INFORM SYST 2022. [DOI: 10.1080/07421222.2021.2023411] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
Affiliation(s)
- Christoph Weinert
- Information Systems and Services, University of Bamberg, Bamberg, Germany
| | - Christian Maier
- Information Systems and Services, University of Bamberg, Bamberg, Germany
| | - Sven Laumer
- Digitalization in Business and Society, Friedrich-Alexander-Universität Erlangen-Nürnberg, Nürnberg, Germany
| | - Tim Weitzel
- Information Systems and Services, University of Bamberg, Bamberg, Germany
| |
Collapse
|
7
|
Basu S, Majumdar B, Mukherjee K, Munjal S, Palaksha C. The role of artificial intelligence in HRM: A systematic review and future research direction. HUMAN RESOURCE MANAGEMENT REVIEW 2022. [DOI: 10.1016/j.hrmr.2022.100893] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/04/2022]
|
8
|
Elshan E, Zierau N, Engel C, Janson A, Leimeister JM. Understanding the Design Elements Affecting User Acceptance of Intelligent Agents: Past, Present and Future. INFORMATION SYSTEMS FRONTIERS : A JOURNAL OF RESEARCH AND INNOVATION 2022; 24:699-730. [PMID: 36033346 PMCID: PMC9402481 DOI: 10.1007/s10796-021-10230-9] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Accepted: 11/24/2021] [Indexed: 06/15/2023]
Abstract
Intelligent agents (IAs) are permeating both business and society. However, interacting with IAs poses challenges moving beyond technological limitations towards the human-computer interface. Thus, the knowledgebase related to interaction with IAs has grown exponentially but remains segregated and impedes the advancement of the field. Therefore, we conduct a systematic literature review to integrate empirical knowledge on user interaction with IAs. This is the first paper to examine 107 Information Systems and Human-Computer Interaction papers and identified 389 relationships between design elements and user acceptance of IAs. Along the independent and dependent variables of these relationships, we span a research space model encompassing empirical research on designing for IA user acceptance. Further we contribute to theory, by presenting a research agenda along the dimensions of the research space, which shall be useful to both researchers and practitioners. This complements the past and present knowledge on designing for IA user acceptance with potential pathways into the future of IAs.
Collapse
Affiliation(s)
- Edona Elshan
- Institute of Information Management, University of St. Gallen, St.Gallen, Switzerland
| | - Naim Zierau
- Institute of Information Management, University of St. Gallen, St.Gallen, Switzerland
| | - Christian Engel
- Institute of Information Management, University of St. Gallen, St.Gallen, Switzerland
| | - Andreas Janson
- Institute of Information Management, University of St. Gallen, St.Gallen, Switzerland
| | - Jan Marco Leimeister
- Institute of Information Management, University of St. Gallen, St.Gallen, Switzerland
- Information Systems, Research Center for IS Design (ITeG), University of Kassel, Kassel, Germany
| |
Collapse
|
9
|
Shiau WL, Wang X, Zheng F, Tsang YP. Cognition and emotion in the information systems field: a review of twenty-four years of literature. ENTERP INF SYST-UK 2021. [DOI: 10.1080/17517575.2021.1992675] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/27/2023]
Affiliation(s)
- Wen-Lung Shiau
- Department of Business Administration, Zhejiang University of Technology, Hangzhou, China
| | - Xiaoqun Wang
- Department of Business Administration, Zhejiang University of Technology, Hangzhou, China
| | - Fei Zheng
- Department of Business Administration, Zhejiang University of Technology, Hangzhou, China
| | - Yung Po Tsang
- Department of Industrial and Systems Engineering, The Hong Kong Polytechnic University, Hung Hom, Hong Kong
| |
Collapse
|
10
|
Collins C, Dennehy D, Conboy K, Mikalef P. Artificial intelligence in information systems research: A systematic literature review and research agenda. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2021. [DOI: 10.1016/j.ijinfomgt.2021.102383] [Citation(s) in RCA: 73] [Impact Index Per Article: 24.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/04/2023]
|
11
|
Mozafari N, Weiger WH, Hammerschmidt M. Trust me, I'm a bot – repercussions of chatbot disclosure in different service frontline settings. JOURNAL OF SERVICE MANAGEMENT 2021. [DOI: 10.1108/josm-10-2020-0380] [Citation(s) in RCA: 18] [Impact Index Per Article: 6.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
PurposeChatbots are increasingly prevalent in the service frontline. Due to advancements in artificial intelligence, chatbots are often indistinguishable from humans. Regarding the question whether firms should disclose their chatbots' nonhuman identity or not, previous studies find negative consumer reactions to chatbot disclosure. By considering the role of trust and service-related context factors, this study explores how negative effects of chatbot disclosure for customer retention can be prevented.Design/methodology/approachThis paper presents two experimental studies that examine the effect of disclosing the nonhuman identity of chatbots on customer retention. While the first study examines the effect of chatbot disclosure for different levels of service criticality, the second study considers different service outcomes. The authors employ analysis of covariance and mediation analysis to test their hypotheses.FindingsChatbot disclosure has a negative indirect effect on customer retention through mitigated trust for services with high criticality. In cases where a chatbot fails to handle the customer's service issue, disclosing the chatbot identity not only lacks negative impact but even elicits a positive effect on retention.Originality/valueThe authors provide evidence that customers will react differently to chatbot disclosure depending on the service frontline setting. They show that chatbot disclosure does not only have undesirable consequences as previous studies suspect but can lead to positive reactions as well. By doing so, the authors draw a more balanced picture on the consequences of chatbot disclosure.
Collapse
|
12
|
Twyman NW, Pentland SJ, Spitzley L. Design Principles for Signal Detection in Modern Job Application Systems: Identifying Fabricated Qualifications. J MANAGE INFORM SYST 2020. [DOI: 10.1080/07421222.2020.1790201] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
Affiliation(s)
- Nathan W. Twyman
- Department of Information Systems, Marriott School of Business, Brigham Young University , Provo, UT, USA
| | - Steven J. Pentland
- Information Technology and Supply Chain Management, College of Business and Economics, Boise State University , Boise, ID, USA
| | - Lee Spitzley
- Information Security and Digital Forensics, School of Business,University at Albany, State University of New York , Albany, NY, USA
| |
Collapse
|
13
|
Riedl R, Fischer T, Léger PM, Davis FD. A Decade of NeuroIS Research. DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS 2020. [DOI: 10.1145/3410977.3410980] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
Abstract
NeuroIS is a field in Information Systems (IS) that makes use of neuroscience and neurophysiological tools and knowledge to better understand the development, adoption, and impact of information and communication technologies. The fact that NeuroIS now exists for more than a decade motivated us to comprehensively review the academic literature. Investigation of the field's development provides insights into the status of NeuroIS, thereby contributing to identity development in the NeuroIS field. Based on a review of N=200 papers published in 55 journals and 13 conference proceedings in the period 2008-2017, we addressed the following four research questions: Which NeuroIS topics were investigated? What kind of NeuroIS research was published? How was the empirical NeuroIS research conducted? Who published NeuroIS research? Based on a discussion of the findings and their implications for future research, which considers results of a recent NeuroIS survey (N=60 NeuroIS scholars), we conclude that today NeuroIS can be considered an established research field in the IS discipline. However, our review also indicates that further efforts are necessary to advance the field, both from a theoretical and methodological perspective.
Collapse
Affiliation(s)
- René Riedl
- University of Applied Sciences Upper Austria & University of Linz
| | | | | | | |
Collapse
|
14
|
Twyman NW, Proudfoot JG, Cameron AF, Case E, Burgoon JK, Twitchell DP. Too Busy to Be Manipulated: How Multitasking with Technology Improves Deception Detection in Collaborative Teamwork. J MANAGE INFORM SYST 2020. [DOI: 10.1080/07421222.2020.1759938] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
Affiliation(s)
- Nathan W. Twyman
- Department of Information Systems, Marriott School of Business, Brigham Young University, Provo, UT, USA
| | - Jeffrey G. Proudfoot
- Information and Process Management Department, Bentley University, Waltham, MA, USA
| | | | - Eric Case
- Ira A. Fulton Schools of Engineering, Arizona State University, Tucson, AZ, USA
- Information Security, TuSimple, Inc., Tucson, AZ, USA
| | - Judee K. Burgoon
- Center for the Management of Information, Eller College of Management, University of Arizona, Tucson, AZ, USA
| | - Douglas P. Twitchell
- Information Technology Management, College of Business and Economics, Boise State University, Boise, ID, USA
| |
Collapse
|
15
|
Diederich S, Brendel AB, Kolbe LM. Designing Anthropomorphic Enterprise Conversational Agents. BUSINESS & INFORMATION SYSTEMS ENGINEERING 2020. [DOI: 10.1007/s12599-020-00639-y] [Citation(s) in RCA: 23] [Impact Index Per Article: 5.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
Abstract
AbstractThe increasing capabilities of conversational agents (CAs) offer manifold opportunities to assist users in a variety of tasks. In an organizational context, particularly their potential to simulate a human-like interaction via natural language currently attracts attention both at the customer interface as well as for internal purposes, often in the form of chatbots. Emerging experimental studies on CAs look into the impact of anthropomorphic design elements, so-called social cues, on user perception. However, while these studies provide valuable prescriptive knowledge of selected social cues, they neglect the potential detrimental influence of the limited responsiveness of present-day conversational agents. In practice, many CAs fail to continuously provide meaningful responses in a conversation due to the open nature of natural language interaction, which negatively influences user perception and often led to CAs being discontinued in the past. Thus, designing a CA that provides a human-like interaction experience while minimizing the risks associated with limited conversational capabilities represents a substantial design problem. This study addresses the aforementioned problem by proposing and evaluating a design for a CA that offers a human-like interaction experience while mitigating negative effects due to limited responsiveness. Through the presentation of the artifact and the synthesis of prescriptive knowledge in the form of a nascent design theory for anthropomorphic enterprise CAs, this research adds to the growing knowledge base for designing human-like assistants and supports practitioners seeking to introduce them into their organizations.
Collapse
|
16
|
|
17
|
King TC, Aggarwal N, Taddeo M, Floridi L. Artificial Intelligence Crime: An Interdisciplinary Analysis of Foreseeable Threats and Solutions. SCIENCE AND ENGINEERING ETHICS 2020; 26:89-120. [PMID: 30767109 PMCID: PMC6978427 DOI: 10.1007/s11948-018-00081-0] [Citation(s) in RCA: 23] [Impact Index Per Article: 5.8] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/10/2018] [Accepted: 12/16/2018] [Indexed: 05/03/2023]
Abstract
Artificial intelligence (AI) research and regulation seek to balance the benefits of innovation against any potential harms and disruption. However, one unintended consequence of the recent surge in AI research is the potential re-orientation of AI technologies to facilitate criminal acts, term in this article AI-Crime (AIC). AIC is theoretically feasible thanks to published experiments in automating fraud targeted at social media users, as well as demonstrations of AI-driven manipulation of simulated markets. However, because AIC is still a relatively young and inherently interdisciplinary area-spanning socio-legal studies to formal science-there is little certainty of what an AIC future might look like. This article offers the first systematic, interdisciplinary literature analysis of the foreseeable threats of AIC, providing ethicists, policy-makers, and law enforcement organisations with a synthesis of the current problems, and a possible solution space.
Collapse
Affiliation(s)
- Thomas C King
- Oxford Internet Institute, University of Oxford, 1 St Giles, Oxford, OX1 3JS, UK
| | - Nikita Aggarwal
- Oxford Internet Institute, University of Oxford, 1 St Giles, Oxford, OX1 3JS, UK
- Faculty of Law, University of Oxford, St Cross Building St. Cross Rd, Oxford, OX1 3UL, UK
| | - Mariarosaria Taddeo
- Oxford Internet Institute, University of Oxford, 1 St Giles, Oxford, OX1 3JS, UK
- The Alan Turing Institute, 96 Euston Road, London, NW1 2DB, UK
| | - Luciano Floridi
- Oxford Internet Institute, University of Oxford, 1 St Giles, Oxford, OX1 3JS, UK.
- The Alan Turing Institute, 96 Euston Road, London, NW1 2DB, UK.
| |
Collapse
|
18
|
Abstract
Abstract
Intelligent agents built on the basis of the BDI (belief–desire–intention) architecture are known as BDI agents. Currently, due to the increasing importance given to the affective capacities, they have evolved giving way to the BDI emotional agents. These agents are generally characterized by affective states such as emotions, mood or personality but sometimes also by affective capacities such as empathy or emotional regulation. In the paper, a review of the most relevant proposals to include emotional aspects in the design of BDI agents is presented. Both BDI formalizations and BDI architecture extensions are covered. From the review, common findings and good practices modeling affect, empathy and regulatory capacities in BDI agents, are extracted. In spite of the great advance in the area several, open questions remain and are also discussed in the paper.
Collapse
|
19
|
Schuetzler RM, Grimes GM, Giboney JS. The effect of conversational agent skill on user behavior during deception. COMPUTERS IN HUMAN BEHAVIOR 2019. [DOI: 10.1016/j.chb.2019.03.033] [Citation(s) in RCA: 26] [Impact Index Per Article: 5.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
|
20
|
|
21
|
Cho E, Molina MD, Wang J. The Effects of Modality, Device, and Task Differences on Perceived Human Likeness of Voice-Activated Virtual Assistants. CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING 2019; 22:515-520. [PMID: 31314579 DOI: 10.1089/cyber.2018.0571] [Citation(s) in RCA: 21] [Impact Index Per Article: 4.2] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/12/2022]
Abstract
Paying attention to the rising popularity of virtual assistants (VAs) that offer unique user experiences through voice-centered interaction, this study examined the effects of modality, device, and task differences on perceived human likeness of, and attitudes toward, voice-activated VAs. To do so, a 2 (modality: voice vs. text) × 2 (device: mobile vs. laptop) × 2 (task type: hedonic vs. utilitarian) mixed factorial experimental design was employed. Findings suggest that voice (vs. text) interaction leads to more positive attitudes toward the VA system mediated by heightened perceived human likeness of the VA, but only with utilitarian (vs. hedonic) tasks. Interestingly, laptop (vs. mobile phone) interaction also enhanced perceived human likeness of the VA. This study offers theoretical and practical implications for VA research by exploring the combinational effects of modality, device, and task differences on user perceptions through human-like interactions.
Collapse
Affiliation(s)
- Eugene Cho
- Donald P. Bellisario College of Communications, Pennsylvania State University, University Park, Pennsylvania
| | - Maria D Molina
- Donald P. Bellisario College of Communications, Pennsylvania State University, University Park, Pennsylvania
| | - Jinping Wang
- Donald P. Bellisario College of Communications, Pennsylvania State University, University Park, Pennsylvania
| |
Collapse
|
22
|
|
23
|
Benlian A, Klumpe J, Hinz O. Mitigating the intrusive effects of smart home assistants by using anthropomorphic design features: A multimethod investigation. INFORMATION SYSTEMS JOURNAL 2019. [DOI: 10.1111/isj.12243] [Citation(s) in RCA: 46] [Impact Index Per Article: 9.2] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/05/2023]
Affiliation(s)
- Alexander Benlian
- Chair of Information Systems and Electronic Services Technische Universität Darmstadt (TU Darmstadt) Hochschulstr. 1 64289 Darmstadt Germany
| | - Johannes Klumpe
- Chair of Information Systems and Electronic Services Technische Universität Darmstadt (TU Darmstadt) Hochschulstr. 1 64289 Darmstadt Germany
| | - Oliver Hinz
- Chair of Information Systems and Information Management Goethe University Frankfurt Theodor‐W.‐Adorno‐Platz 4 60323 Frankfurt Germany
| |
Collapse
|
24
|
Abstract
We present artificial intelligent (AI) agents that act as interviewers to engage with a user in a text-based conversation and automatically infer the user's personality traits. We investigate how the personality of an AI interviewer and the inferred personality of a user influences the user's trust in the AI interviewer from two perspectives: the user's willingness to confide in and listen to an AI interviewer. We have developed two AI interviewers with distinct personalities and deployed them in a series of real-world events. We present findings from four such deployments involving 1,280 users, including 606 actual job applicants. Notably, users are more willing to confide in and listen to an AI interviewer with a serious, assertive personality in a high-stakes job interview. Moreover, users’ personality traits, inferred from their chat text, along with interview context, influence their perception of and their willingness to confide in and listen to an AI interviewer. Finally, we discuss the design implications of our work on building hyper-personalized, intelligent agents.
Collapse
|
25
|
Boyle RJ, Clements JA, Proudfoot JG. Measuring Deception: A Look at Antecedents to Deceptive Intent. AMERICAN JOURNAL OF PSYCHOLOGY 2018. [DOI: 10.5406/amerjpsyc.131.3.0347] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/06/2022]
Abstract
Abstract
A Deceptive Belief Inventory scale is developed and validated using 10 first-order factors to represent 3 second-order constructs (deception confidence, duping delight, and guiltless deception). A new theoretical model describing how deception confidence, duping delight, and guiltless deception may influence a person’s intent to deceive others is also tested. Traditional deceptive communication research has focused on situation-specific factors surrounding deception. This study focuses on understanding and assessing a person’s propensity to deceive others. The findings of this study can be used to better understand the factors that may influence a person’s reported propensity to deceive and ultimately be used to improve security procedures designed to protect critical information systems.
Collapse
|
26
|
Gorbacheva E, Beekhuyzen J, vom Brocke J, Becker J. Directions for research on gender imbalance in the IT profession. EUR J INFORM SYST 2018. [DOI: 10.1080/0960085x.2018.1495893] [Citation(s) in RCA: 12] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/28/2022]
Affiliation(s)
- Elena Gorbacheva
- European Research Center for Information Systems, University of Muenster, Muenster, Germany
| | - Jenine Beekhuyzen
- Institute for Integrated and Intelligent Systems, Griffith University, Nathan, Queensland, Australia
| | - Jan vom Brocke
- Institute of Information Systems, University of Liechtenstein, Vaduz, Liechtenstein
| | - Jörg Becker
- European Research Center for Information Systems, University of Muenster, Muenster, Germany
| |
Collapse
|
27
|
Pentland SJ, Twyman NW, Burgoon JK, Nunamaker JF, Diller CB. A Video-Based Screening System for Automated Risk Assessment Using Nuanced Facial Features. J MANAGE INFORM SYST 2018. [DOI: 10.1080/07421222.2017.1393304] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
|
28
|
Reiter-Palmon R, Sinha T, Gevers J, Odobez JM, Volpe G. Theories and Models of Teams and Groups. SMALL GROUP RESEARCH 2017. [DOI: 10.1177/1046496417722841] [Citation(s) in RCA: 21] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
|
29
|
Lai K, Kanich O, Dvořák M, Drahanský M, Yanushkevich S, Shmerko V. Biometric‐enabled watchlists technology. IET BIOMETRICS 2017. [DOI: 10.1049/iet-bmt.2017.0036] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022] Open
Affiliation(s)
- Kenneth Lai
- Biometric Technologies Laboratory, Department of Electrical and Computer EngineeringUniversity of Calgary2500 University Dr NWCalgaryCanada
| | - Ondřej Kanich
- Security Technology Research and Development group, Department of Intelligent Systems, Faculty of Information TechnologyBrno University of TechnologyBožetěchova 1/2BrnoCzech Republic
| | - Michal Dvořák
- Security Technology Research and Development group, Department of Intelligent Systems, Faculty of Information TechnologyBrno University of TechnologyBožetěchova 1/2BrnoCzech Republic
| | - Martin Drahanský
- Security Technology Research and Development group, Department of Intelligent Systems, Faculty of Information TechnologyBrno University of TechnologyBožetěchova 1/2BrnoCzech Republic
| | - Svetlana Yanushkevich
- Biometric Technologies Laboratory, Department of Electrical and Computer EngineeringUniversity of Calgary2500 University Dr NWCalgaryCanada
| | - Vlad Shmerko
- Biometric Technologies Laboratory, Department of Electrical and Computer EngineeringUniversity of Calgary2500 University Dr NWCalgaryCanada
| |
Collapse
|
30
|
Li W, Chen H, Nunamaker JF. Identifying and Profiling Key Sellers in Cyber Carding Community: AZSecure Text Mining System. J MANAGE INFORM SYST 2017. [DOI: 10.1080/07421222.2016.1267528] [Citation(s) in RCA: 25] [Impact Index Per Article: 3.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
|
31
|
Lai K, Yanushkevich SN, Shmerko VP, Eastwood SC. Bridging the Gap Between Forensics and Biometric-Enabled Watchlists for e-Borders. IEEE COMPUT INTELL M 2017. [DOI: 10.1109/mci.2016.2627668] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/06/2022]
|
32
|
Ho SM, Hancock JT, Booth C, Liu X. Computer-Mediated Deception: Strategies Revealed by Language-Action Cues in Spontaneous Communication. J MANAGE INFORM SYST 2016. [DOI: 10.1080/07421222.2016.1205924] [Citation(s) in RCA: 20] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
|
33
|
Proudfoot JG, Jenkins JL, Burgoon JK, Nunamaker JF. More Than Meets the Eye: How Oculometric Behaviors Evolve Over the Course of Automated Deception Detection Interactions. J MANAGE INFORM SYST 2016. [DOI: 10.1080/07421222.2016.1205929] [Citation(s) in RCA: 12] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
|
34
|
Stevens CJ, Pinchbeck B, Lewis T, Luerssen M, Pfitzner D, Powers DMW, Abrahamyan A, Leung Y, Gibert G. Mimicry and expressiveness of an ECA in human-agent interaction: familiarity breeds content! ACTA ACUST UNITED AC 2016; 2:1. [PMID: 27980890 PMCID: PMC5125404 DOI: 10.1186/s40469-016-0008-2] [Citation(s) in RCA: 15] [Impact Index Per Article: 1.9] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/15/2015] [Accepted: 05/29/2016] [Indexed: 11/18/2022]
Abstract
Background Two experiments investigated the effect of features of human behaviour on the quality of interaction with an Embodied Conversational Agent (ECA). Methods In Experiment 1, visual prominence cues (head nod, eyebrow raise) of the ECA were manipulated to explore the hypothesis that likeability of an ECA increases as a function of interpersonal mimicry. In the context of an error detection task, the ECA either mimicked or did not mimic a head nod or brow raise that humans produced to give emphasis to a word when correcting the ECA’s vocabulary. In Experiment 2, presence versus absence of facial expressions on comprehension accuracy of two computer-driven ECA monologues was investigated. Results In Experiment 1, evidence for a positive relationship between ECA mimicry and lifelikeness was obtained. However, a mimicking agent did not elicit more human gestures. In Experiment 2, expressiveness was associated with greater comprehension and higher ratings of humour and engagement. Conclusion Influences from mimicry can be explained by visual and motor simulation, and bidirectional links between similarity and liking. Cue redundancy and minimizing cognitive load are potential explanations for expressiveness aiding comprehension. Electronic supplementary material The online version of this article (doi:10.1186/s40469-016-0008-2) contains supplementary material, which is available to authorized users.
Collapse
Affiliation(s)
- Catherine J Stevens
- MARCS Institute for Brain, Behaviour & Development, Western Sydney University, Locked Bag 1797, Penrith, NSW 2751 Australia ; School of Social Sciences & Psychology, Western Sydney University, Penrith, Australia
| | - Bronwyn Pinchbeck
- MARCS Institute for Brain, Behaviour & Development, Western Sydney University, Locked Bag 1797, Penrith, NSW 2751 Australia ; School of Social Sciences & Psychology, Western Sydney University, Penrith, Australia
| | - Trent Lewis
- Informatics and Engineering, Flinders University, Adelaide, Australia
| | - Martin Luerssen
- Informatics and Engineering, Flinders University, Adelaide, Australia
| | - Darius Pfitzner
- School of Business, Charles Darwin University, Darwin, Australia
| | - David M W Powers
- Informatics and Engineering, Flinders University, Adelaide, Australia
| | - Arman Abrahamyan
- MARCS Institute for Brain, Behaviour & Development, Western Sydney University, Locked Bag 1797, Penrith, NSW 2751 Australia ; Psychology Department, Neurosciences Institute, Stanford University, Stanford, USA
| | - Yvonne Leung
- MARCS Institute for Brain, Behaviour & Development, Western Sydney University, Locked Bag 1797, Penrith, NSW 2751 Australia
| | - Guillaume Gibert
- MARCS Institute for Brain, Behaviour & Development, Western Sydney University, Locked Bag 1797, Penrith, NSW 2751 Australia ; INSERM, U846, 18 avenue Doyen Lépine, 69500 Bron, France ; Université de Lyon, Université Lyon 1, 69003 Lyon, France
| |
Collapse
|
35
|
Ströfer S, Ufkes EG, Bruijnes M, Giebels E, Noordzij ML. Interviewing Suspects with Avatars: Avatars Are More Effective When Perceived as Human. Front Psychol 2016; 7:545. [PMID: 27148150 PMCID: PMC4838610 DOI: 10.3389/fpsyg.2016.00545] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/04/2016] [Accepted: 04/01/2016] [Indexed: 11/13/2022] Open
Abstract
It has been consistently demonstrated that deceivers generally can be discriminated from truth tellers by monitoring an increase in their physiological response. But is this still the case when deceivers interact with a virtual avatar? The present research investigated whether the mere “belief” that the virtual avatar is computer or human operated forms a crucial factor for eliciting physiological cues to deception. Participants were interviewed about a transgression they had been seduced to commit, by a human-like virtual avatar. In a between-subject design, participants either deceived or told the truth about this transgression. During the interviews, we measured the physiological responses assessing participants' electrodermal activity (EDA). In line with our hypothesis, EDA differences between deceivers and truth tellers only were significant for participants who believed they interacted with a human operated (compared to a computer operated) avatar. These results have theoretical as well as practical implications which we will discuss.
Collapse
Affiliation(s)
- Sabine Ströfer
- Department of Psychology of Conflict, Risk and Safety, University of Twente Enschede, Netherlands
| | - Elze G Ufkes
- Department of Psychology of Conflict, Risk and Safety, University of Twente Enschede, Netherlands
| | - Merijn Bruijnes
- Department of Human Media Interaction, University of Twente Enschede, Netherlands
| | - Ellen Giebels
- Department of Psychology of Conflict, Risk and Safety, University of Twente Enschede, Netherlands
| | - Matthijs L Noordzij
- Department of Cognitive Psychology and Ergonomics, University of Twente Enschede, Netherlands
| |
Collapse
|
36
|
Twyman NW, Proudfoot JG, Schuetzler RM, Elkins AC, Derrick DC. Robustness of Multiple Indicators in Automated Screening Systems for Deception Detection. J MANAGE INFORM SYST 2016. [DOI: 10.1080/07421222.2015.1138569] [Citation(s) in RCA: 13] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
|
37
|
Prat N, Comyn-Wattiau I, Akoka J. A Taxonomy of Evaluation Methods for Information Systems Artifacts. J MANAGE INFORM SYST 2015. [DOI: 10.1080/07421222.2015.1099390] [Citation(s) in RCA: 43] [Impact Index Per Article: 4.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
|
38
|
Conrad FG, Schober MF, Jans M, Orlowski RA, Nielsen D, Levenstein R. Comprehension and engagement in survey interviews with virtual agents. Front Psychol 2015; 6:1578. [PMID: 26539138 PMCID: PMC4611966 DOI: 10.3389/fpsyg.2015.01578] [Citation(s) in RCA: 18] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/08/2015] [Accepted: 09/29/2015] [Indexed: 12/05/2022] Open
Abstract
This study investigates how an onscreen virtual agent's dialog capability and facial animation affect survey respondents' comprehension and engagement in “face-to-face” interviews, using questions from US government surveys whose results have far-reaching impact on national policies. In the study, 73 laboratory participants were randomly assigned to respond in one of four interviewing conditions, in which the virtual agent had either high or low dialog capability (implemented through Wizard of Oz) and high or low facial animation, based on motion capture from a human interviewer. Respondents, whose faces were visible to the Wizard (and videorecorded) during the interviews, answered 12 questions about housing, employment, and purchases on the basis of fictional scenarios designed to allow measurement of comprehension accuracy, defined as the fit between responses and US government definitions. Respondents answered more accurately with the high-dialog-capability agents, requesting clarification more often particularly for ambiguous scenarios; and they generally treated the high-dialog-capability interviewers more socially, looking at the interviewer more and judging high-dialog-capability agents as more personal and less distant. Greater interviewer facial animation did not affect response accuracy, but it led to more displays of engagement—acknowledgments (verbal and visual) and smiles—and to the virtual interviewer's being rated as less natural. The pattern of results suggests that a virtual agent's dialog capability and facial animation differently affect survey respondents' experience of interviews, behavioral displays, and comprehension, and thus the accuracy of their responses. The pattern of results also suggests design considerations for building survey interviewing agents, which may differ depending on the kinds of survey questions (sensitive or not) that are asked.
Collapse
Affiliation(s)
- Frederick G Conrad
- Michigan Program in Survey Methodology, Institute for Social Research, University of Michigan Ann Arbor, MI, USA ; Joint Program in Survey Methodology, University of Maryland College Park, MD, USA
| | - Michael F Schober
- Department of Psychology, New School for Social Research New York, NY, USA
| | - Matt Jans
- Center for Health Policy Research, University of California at Los Angeles Los Angeles, CA, USA
| | - Rachel A Orlowski
- Department of Epidemiology, School of Public Health, University of Michigan Ann Arbor, MI, USA
| | - Daniel Nielsen
- Department of Biostatistics, Center for Cancer Biostatistics, University of Michigan Medical School Ann Arbor, MI, USA
| | - Rachel Levenstein
- University of Chicago Consortium on Chicago School Research, Urban Education Institute, University of Chicago Chicago, IL, USA
| |
Collapse
|
39
|
Corti K, Gillespie A. A truly human interface: interacting face-to-face with someone whose words are determined by a computer program. Front Psychol 2015; 6:634. [PMID: 26042066 PMCID: PMC4434916 DOI: 10.3389/fpsyg.2015.00634] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/25/2015] [Accepted: 04/30/2015] [Indexed: 11/13/2022] Open
Abstract
We use speech shadowing to create situations wherein people converse in person with a human whose words are determined by a conversational agent computer program. Speech shadowing involves a person (the shadower) repeating vocal stimuli originating from a separate communication source in real-time. Humans shadowing for conversational agent sources (e.g., chat bots) become hybrid agents (“echoborgs”) capable of face-to-face interlocution. We report three studies that investigated people’s experiences interacting with echoborgs and the extent to which echoborgs pass as autonomous humans. First, participants in a Turing Test spoke with a chat bot via either a text interface or an echoborg. Human shadowing did not improve the chat bot’s chance of passing but did increase interrogators’ ratings of how human-like the chat bot seemed. In our second study, participants had to decide whether their interlocutor produced words generated by a chat bot or simply pretended to be one. Compared to those who engaged a text interface, participants who engaged an echoborg were more likely to perceive their interlocutor as pretending to be a chat bot. In our third study, participants were naïve to the fact that their interlocutor produced words generated by a chat bot. Unlike those who engaged a text interface, the vast majority of participants who engaged an echoborg did not sense a robotic interaction. These findings have implications for android science, the Turing Test paradigm, and human–computer interaction. The human body, as the delivery mechanism of communication, fundamentally alters the social psychological dynamics of interactions with machine intelligence.
Collapse
Affiliation(s)
- Kevin Corti
- Department of Social Psychology, London School of Economics and Political Science , London, UK
| | - Alex Gillespie
- Department of Social Psychology, London School of Economics and Political Science , London, UK
| |
Collapse
|
40
|
Twyman NW, Lowry PB, Burgoon JK, Nunamaker JF. Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals. J MANAGE INFORM SYST 2015. [DOI: 10.1080/07421222.2014.995535] [Citation(s) in RCA: 23] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
|
41
|
Astor PJ, Adam MTP, Jerčić P, Schaaff K, Weinhardt C. Integrating Biosignals into Information Systems: A NeuroIS Tool for Improving Emotion Regulation. J MANAGE INFORM SYST 2014. [DOI: 10.2753/mis0742-1222300309] [Citation(s) in RCA: 64] [Impact Index Per Article: 6.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
Affiliation(s)
| | - Marc T. P. Adam
- b Institute of Information Systems and Marketing, Karlsruhe Institute of Technology
| | | | | | - Christof Weinhardt
- e Institute for Information Systems and Marketing, Karlsruhe Institute of Technology
| |
Collapse
|
42
|
Riedl R, Mohr PNC, Kenning PH, Davis FD, Heekeren HR. Trusting Humans and Avatars: A Brain Imaging Study Based on Evolution Theory. J MANAGE INFORM SYST 2014. [DOI: 10.2753/mis0742-1222300404] [Citation(s) in RCA: 65] [Impact Index Per Article: 6.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
Affiliation(s)
- René Riedl
- a University of Applied Sciences Upper Austria
| | | | | | - Fred D. Davis
- d Information Systems at the Sam M. Walton College of Business, University of Arkansas
| | - Hauke R. Heekeren
- e Cluster of Excellence "Languages of Emotion", Freie Universität Berlin
| |
Collapse
|
43
|
Elkins AC, Dunbar NE, Adame B, Nunamaker JF. Are Users Threatened by Credibility Assessment Systems? J MANAGE INFORM SYST 2014. [DOI: 10.2753/mis0742-1222290409] [Citation(s) in RCA: 31] [Impact Index Per Article: 3.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
Affiliation(s)
| | - Norah E. Dunbar
- b Center for Applied Social Research, University of Oklahoma
| | - Bradley Adame
- b Center for Applied Social Research, University of Oklahoma
| | - Jay F. Nunamaker
- c Center for the Management of Information and the National Center for Border Security, University of Arizona
| |
Collapse
|
44
|
Li M, Jiang Q, Tan CH, Wei KK. Enhancing User-Game Engagement Through Software Gaming Elements. J MANAGE INFORM SYST 2014. [DOI: 10.2753/mis0742-1222300405] [Citation(s) in RCA: 34] [Impact Index Per Article: 3.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
Affiliation(s)
- Mengxiang Li
- a School of Information Systems and Technology, Faculty of Engineering and Information Sciences, University of Wollongong
| | - Qiqi Jiang
- b School of Economics and Management, Tongji University
| | | | - Kwok-Kee Wei
- d College of Business, City University of Hong Kong
| |
Collapse
|
45
|
Twyman NW, Elkins AC, Burgoon JK, Nunamaker JF. A Rigidity Detection System for Automated Credibility Assessment. J MANAGE INFORM SYST 2014. [DOI: 10.2753/mis0742-1222310108] [Citation(s) in RCA: 22] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
Affiliation(s)
| | | | - Judee K. Burgoon
- c Center for Identification Technology Research, University of Arizona
| | - Jay F. Nunamaker
- d Center for the Management of Information and the National Center for Border Security and Immigration, University of Arizona
| |
Collapse
|
46
|
Derrick DC, Ligon GS. The affective outcomes of using influence tactics in embodied conversational agents. COMPUTERS IN HUMAN BEHAVIOR 2014. [DOI: 10.1016/j.chb.2013.12.027] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
|
47
|
|