Taking ‘fun and games’ seriously: Proposing the hedonic-motivation system adoption model (HMSAM) PB Lowry, J Gaskin, N Twyman, B Hammer, T Roberts Journal of the association for information systems 14 (11), 617-671, 2012 | 647 | 2012 |
Creating high-value real-world impact through systematic programs of research JF Nunamaker, NW Twyman, JS Giboney, RO Briggs MIS Quarterly 41 (2), 335-352, 2017 | 70 | 2017 |
Autonomous scientifically controlled screening systems for detecting information purposely concealed by individuals NW Twyman, PB Lowry, JK Burgoon, JF Nunamaker Jr Journal of Management Information Systems 31 (3), 106-137, 2014 | 62 | 2014 |
Robustness of multiple indicators in automated screening systems for deception detection NW Twyman, JG Proudfoot, RM Schuetzler, AC Elkins, DC Derrick Journal of Management Information Systems 32 (4), 215-245, 2015 | 43 | 2015 |
A video-based screening system for automated risk assessment using nuanced facial features SJ Pentland, NW Twyman, JK Burgoon, JF Nunamaker Jr, CBR Diller Journal of Management Information Systems 34 (4), 970-993, 2017 | 39 | 2017 |
A rigidity detection system for automated credibility assessment NW Twyman, AC Elkins, JK Burgoon, JF Nunamaker Journal of Management Information Systems 31 (1), 173-202, 2014 | 38 | 2014 |
Proposing the Affect-Trust Infusion Model (ATIM) to explain and predict the influence of high and low affect infusion on Web vendor trust PB Lowry, NW Twyman, M Pickard, JL Jenkins Information & management 51 (5), 579-594, 2014 | 32 | 2014 |
Establishing a foundation for automated human credibility screening JF Nunamaker, JK Burgoon, NW Twyman, JG Proudfoot, R Schuetzler, ... 2012 IEEE International Conference on Intelligence and Security Informatics …, 2012 | 28 | 2012 |
Exploring failure and engagement in a complex digital training game: A multi-method examination ML Jensen, YH Lee, CW Piercy, NE Dunbar, J Elizondo, E Bessarabova, ... AIS Transactions on Human-Computer Interaction 8 (1), 1-20, 2016 | 27 | 2016 |
Serious games: an evaluation framework and case study DW Wilson, J Jenkins, N Twyman, M Jensen, J Valacich, N Dunbar, ... 2016 49th Hawaii International Conference on System Sciences (HICSS), 638-647, 2016 | 24 | 2016 |
Proposing the Hedonic Affect Model (HAM) to explain how stimuli and performance expectations predict affect in individual and group hedonic systems use PB Lowry, JL Jenkins, J Gaskin, B Hammer, N Twyman, M Hassell Proceedings of the Journal of the Association for Information Systems Theory …, 2013 | 21 | 2013 |
Breaking out of the design science box: High-value impact through multidisciplinary design science programs of research JF Nunamaker Jr, NW Twyman, JS Giboney | 20 | 2013 |
A rigidity detection system for the guilty knowledge test NW Twyman, A Elkins, JK Burgoon HICSS-44 Symposium on Credibility Assessment and Information Quality in …, 2011 | 14 | 2011 |
Cognitive checkpoint: Emerging technologies for biometric-enabled watchlist screening SN Yanushkevich, KW Sundberg, NW Twyman, RM Guest, VP Shmerko Computers & Security 85, 372-385, 2019 | 13 | 2019 |
Proposing the Interactivity-Stimulus-Attention Model (ISAM) to explain and predict enjoyment, immersion, and adoption of purely hedonic systems PB Lowry, N Twyman, J Gaskin, B Hammer, A Bailey, T Roberts Special Interest Group on Human-Computer Interaction Pre-ICIS Workshop (best …, 2007 | 12 | 2007 |
Too busy to be manipulated: How multitasking with technology improves deception detection in collaborative teamwork NW Twyman, JG Proudfoot, AF Cameron, E Case, JK Burgoon, ... Journal of Management Information Systems 37 (2), 377-395, 2020 | 11 | 2020 |
Automated Scientifically Controlled Screening Systems (ASCSS) NW Twyman, JF Nunamaker US Patent App. 15/306,083, 2017 | 11 | 2017 |
Using Eye Tracking Technology as a Concealed Information Test NW Twyman, K Moffitt, JK Burgoon, F Marchak HICSS-43 Symposium on Credibility Assessment and Information Quality in …, 2010 | 10 | 2010 |
Design principles for signal detection in modern job application systems: Identifying fabricated qualifications NW Twyman, SJ Pentland, L Spitzley Journal of Management Information Systems 37 (3), 849-874, 2020 | 9 | 2020 |
Eye Tracking and the CIT: Utilizing Oculometric Cues to Identify Familiarity with Wanted Persons JG Proudfoot, NW Twyman, JK Burgoon HICSS-46 Proceedings of the Rapid Screening Technologies, Deception …, 2013 | 9 | 2013 |