• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4604544)   Today's Articles (5404)   Subscriber (49371)
For: Elkins AC, Dunbar NE, Adame B, Nunamaker JF. Are Users Threatened by Credibility Assessment Systems? J MANAGE INFORM SYST 2014. [DOI: 10.2753/mis0742-1222290409] [Citation(s) in RCA: 31] [Impact Index Per Article: 3.1] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
Number Cited by Other Article(s)
1
Pilacinski A, Pinto A, Oliveira S, Araújo E, Carvalho C, Silva PA, Matias R, Menezes P, Sousa S. The robot eyes don't have it. The presence of eyes on collaborative robots yields marginally higher user trust but lower performance. Heliyon 2023;9:e18164. [PMID: 37520993 PMCID: PMC10382291 DOI: 10.1016/j.heliyon.2023.e18164] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/02/2023] [Revised: 06/21/2023] [Accepted: 07/10/2023] [Indexed: 08/01/2023]  Open
2
Algorithmic Management. BUSINESS & INFORMATION SYSTEMS ENGINEERING 2022. [DOI: 10.1007/s12599-022-00764-w] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/02/2022]
3
Jain R, Garg N, Khera SN. Adoption of AI-Enabled Tools in Social Development Organizations in India: An Extension of UTAUT Model. Front Psychol 2022;13:893691. [PMID: 35795409 PMCID: PMC9251489 DOI: 10.3389/fpsyg.2022.893691] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/10/2022] [Accepted: 05/16/2022] [Indexed: 11/16/2022]  Open
4
Unlocking the value of artificial intelligence in human resource management through AI capability framework. HUMAN RESOURCE MANAGEMENT REVIEW 2022. [DOI: 10.1016/j.hrmr.2022.100899] [Citation(s) in RCA: 6] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
5
Jussupow E, Spohrer K, Heinzl A, Gawlitza J. Augmenting Medical Diagnosis Decisions? An Investigation into Physicians’ Decision-Making Process with Artificial Intelligence. INFORMATION SYSTEMS RESEARCH 2021. [DOI: 10.1287/isre.2020.0980] [Citation(s) in RCA: 25] [Impact Index Per Article: 8.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
6
Canhoto AI. Leveraging machine learning in the global fight against money laundering and terrorism financing: An affordances perspective. JOURNAL OF BUSINESS RESEARCH 2021;131:441-452. [PMID: 33100427 PMCID: PMC7568127 DOI: 10.1016/j.jbusres.2020.10.012] [Citation(s) in RCA: 11] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/31/2019] [Revised: 10/01/2020] [Accepted: 10/03/2020] [Indexed: 05/31/2023]
7
Chen Y, Zahedi FM, Abbasi A, Dobolyi D. Trust calibration of automated security IT artifacts: A multi-domain study of phishing-website detection tools. INFORMATION & MANAGEMENT 2021. [DOI: 10.1016/j.im.2020.103394] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
8
Berger B, Adam M, Rühr A, Benlian A. Watch Me Improve—Algorithm Aversion and Demonstrating the Ability to Learn. BUSINESS & INFORMATION SYSTEMS ENGINEERING 2020. [DOI: 10.1007/s12599-020-00678-5] [Citation(s) in RCA: 21] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/31/2022]
9
Twyman NW, Proudfoot JG, Cameron AF, Case E, Burgoon JK, Twitchell DP. Too Busy to Be Manipulated: How Multitasking with Technology Improves Deception Detection in Collaborative Teamwork. J MANAGE INFORM SYST 2020. [DOI: 10.1080/07421222.2020.1759938] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
10
Seeber I, Bittner E, Briggs RO, de Vreede T, de Vreede GJ, Elkins A, Maier R, Merz AB, Oeste-Reiß S, Randrup N, Schwabe G, Söllner M. Machines as teammates: A research agenda on AI in team collaboration. INFORMATION & MANAGEMENT 2020. [DOI: 10.1016/j.im.2019.103174] [Citation(s) in RCA: 67] [Impact Index Per Article: 16.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/26/2022]
11
Dunbar NE, Miller CH, Lee YH, Jensen ML, Anderson C, Adams AS, Elizondo J, Thompson W, Massey Z, Nicholls SB, Ralston R, Donovan J, Mathews E, Roper B, Wilson SN. Reliable deception cues training in an interactive video game. COMPUTERS IN HUMAN BEHAVIOR 2018. [DOI: 10.1016/j.chb.2018.03.027] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/17/2022]
12
Ho SM, Hancock JT, Booth C, Liu X. Computer-Mediated Deception: Strategies Revealed by Language-Action Cues in Spontaneous Communication. J MANAGE INFORM SYST 2016. [DOI: 10.1080/07421222.2016.1205924] [Citation(s) in RCA: 20] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
13
Proudfoot JG, Jenkins JL, Burgoon JK, Nunamaker JF. More Than Meets the Eye: How Oculometric Behaviors Evolve Over the Course of Automated Deception Detection Interactions. J MANAGE INFORM SYST 2016. [DOI: 10.1080/07421222.2016.1205929] [Citation(s) in RCA: 12] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
14
Ludwig S, van Laer T, de Ruyter K, Friedman M. Untangling a Web of Lies: Exploring Automated Detection of Deception in Computer-Mediated Communication. J MANAGE INFORM SYST 2016. [DOI: 10.1080/07421222.2016.1205927] [Citation(s) in RCA: 15] [Impact Index Per Article: 1.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
15
Adame BJ. Training in the mitigation of anchoring bias: A test of the consider-the-opposite strategy. LEARNING AND MOTIVATION 2016. [DOI: 10.1016/j.lmot.2015.11.002] [Citation(s) in RCA: 24] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
16
Li X, Sun SX, Chen K, Fung T, Wang H. Design Theory for Market Surveillance Systems. J MANAGE INFORM SYST 2015. [DOI: 10.1080/07421222.2015.1063312] [Citation(s) in RCA: 11] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
17
Twyman NW, Lowry PB, Burgoon JK, Nunamaker JF. Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals. J MANAGE INFORM SYST 2015. [DOI: 10.1080/07421222.2014.995535] [Citation(s) in RCA: 23] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA