Nathan W. Twyman
Title
Cited by
Cited by
Year
Taking ‘fun and games’ seriously: Proposing the hedonic-motivation system adoption model (HMSAM)
PB Lowry, J Gaskin, N Twyman, B Hammer, T Roberts
Journal of the association for information systems 14 (11), 617-671, 2012
393*2012
Autonomous scientifically controlled screening systems for detecting information purposely concealed by individuals
NW Twyman, PB Lowry, JK Burgoon, JF Nunamaker Jr
Journal of Management Information Systems 31 (3), 106-137, 2014
512014
Creating High-Value Real-World Impact through Systematic Programs of Research.
JF Nunamaker Jr, NW Twyman, JS Giboney, RO Briggs
MIS Q. 41 (2), 335-351, 2017
462017
A rigidity detection system for automated credibility assessment
NW Twyman, AC Elkins, JK Burgoon, JF Nunamaker
Journal of Management Information Systems 31 (1), 173-202, 2014
322014
Robustness of multiple indicators in automated screening systems for deception detection
NW Twyman, JG Proudfoot, RM Schuetzler, AC Elkins, DC Derrick
Journal of Management Information Systems 32 (4), 215-245, 2015
272015
A video-based screening system for automated risk assessment using nuanced facial features
SJ Pentland, NW Twyman, JK Burgoon, JF Nunamaker Jr, CBR Diller
Journal of Management Information Systems 34 (4), 970-993, 2017
252017
Establishing a foundation for automated human credibility screening
JF Nunamaker, JK Burgoon, NW Twyman, JG Proudfoot, R Schuetzler, ...
2012 IEEE International Conference on Intelligence and Security Informatics …, 2012
252012
Proposing the Affect-Trust Infusion Model (ATIM) to explain and predict the influence of high and low affect infusion on Web vendor trust
PB Lowry, NW Twyman, M Pickard, JL Jenkins
Information & Management 51 (5), 579-594, 2014
242014
Exploring failure and engagement in a complex digital training game: a multi-method examination
ML Jensen, YH Lee, CW Piercy, NE Dunbar, J Elizondo, E Bessarabova, ...
AIS Transactions on Human-Computer Interaction 8 (1), 1-20, 2016
182016
Breaking out of the design science box: High-value impact through multidisciplinary design science programs of research
JF Nunamaker, NW Twyman, JS Giboney
19th Americas Conference on Information Systems, AMCIS 2013, 575-585, 2013
172013
Proposing the Hedonic Affect Model (HAM) to explain how stimuli and performance expectations predict affect in individual and group hedonic systems use
PB Lowry, JL Jenkins, J Gaskin, B Hammer, N Twyman, M Hassell
Proceedings of the Journal of the Association for Information Systems Theory …, 2013
172013
A rigidity detection system for the guilty knowledge test
NW Twyman, A Elkins, JK Burgoon
HICSS-44 Symposium on Credibility Assessment and Information Quality in …, 2011
132011
Serious games: an evaluation framework and case study
DW Wilson, J Jenkins, N Twyman, M Jensen, J Valacich, N Dunbar, ...
2016 49th Hawaii International Conference on System Sciences (HICSS), 638-647, 2016
122016
Proposing the Interactivity-Stimulus-Attention Model (ISAM) to explain and predict enjoyment, immersion, and adoption of purely hedonic systems
PB Lowry, N Twyman, J Gaskin, B Hammer, A Bailey, T Roberts
Special Interest Group on Human-Computer Interaction Pre-ICIS Workshop (best …, 2007
112007
Alternative Cues in Concealed Information Testing
NW Twyman, JK Burgoon, AC Elkins, JG Proudfoot
HICSS-46 Proceedings of the Rapid Screening Technologies, Deception …, 2013
92013
Using Eye Tracking Technology as a Concealed Information Test
NW Twyman, K Moffitt, JK Burgoon, F Marchak
HICSS-43 Symposium on Credibility Assessment and Information Quality in …, 2010
92010
Cognitive checkpoint: Emerging technologies for biometric-enabled watchlist screening
SN Yanushkevich, KW Sundberg, NW Twyman, RM Guest, VP Shmerko
Computers & Security 85, 372-385, 2019
82019
Eye Tracking and the CIT: Utilizing Oculometric Cues to Identify Familiarity with Wanted Persons
JG Proudfoot, NW Twyman, JK Burgoon
HICSS-46 Proceedings of the Rapid Screening Technologies, Deception …, 2013
82013
Automated human screening for detecting concealed knowledge
NW Twyman
The University of Arizona, 2012
82012
Automated Kinesic Analysis for Deception Detection
JK Burgoon, M Jensen, NW Twyman, TO Meservy, DN Metaxas, ...
HICSS-43 Symposium on Credibility Assessment and Information Quality in …, 2010
72010
The system can't perform the operation now. Try again later.
Articles 1–20