Follow
Nathan W. Twyman
Title
Cited by
Cited by
Year
Taking ‘fun and games’ seriously: Proposing the hedonic-motivation system adoption model (HMSAM)
PB Lowry, J Gaskin, N Twyman, B Hammer, T Roberts
Journal of the association for information systems 14 (11), 617-671, 2012
626*2012
Creating high-value real-world impact through systematic programs of research
JF Nunamaker, NW Twyman, JS Giboney, RO Briggs
MIS Quarterly 41 (2), 335-352, 2017
652017
Autonomous scientifically controlled screening systems for detecting information purposely concealed by individuals
NW Twyman, PB Lowry, JK Burgoon, JF Nunamaker Jr
Journal of Management Information Systems 31 (3), 106-137, 2014
612014
Robustness of multiple indicators in automated screening systems for deception detection
NW Twyman, JG Proudfoot, RM Schuetzler, AC Elkins, DC Derrick
Journal of Management Information Systems 32 (4), 215-245, 2015
432015
A video-based screening system for automated risk assessment using nuanced facial features
SJ Pentland, NW Twyman, JK Burgoon, JF Nunamaker Jr, CBR Diller
Journal of Management Information Systems 34 (4), 970-993, 2017
382017
A rigidity detection system for automated credibility assessment
NW Twyman, AC Elkins, JK Burgoon, JF Nunamaker
Journal of Management Information Systems 31 (1), 173-202, 2014
372014
Proposing the Affect-Trust Infusion Model (ATIM) to explain and predict the influence of high and low affect infusion on Web vendor trust
PB Lowry, NW Twyman, M Pickard, JL Jenkins
Information & Management 51 (5), 579-594, 2014
312014
Establishing a foundation for automated human credibility screening
JF Nunamaker, JK Burgoon, NW Twyman, JG Proudfoot, R Schuetzler, ...
2012 IEEE International Conference on Intelligence and Security Informatics …, 2012
282012
Exploring failure and engagement in a complex digital training game: A multi-method examination
ML Jensen, YH Lee, CW Piercy, NE Dunbar, J Elizondo, E Bessarabova, ...
AIS Transactions on Human-Computer Interaction 8 (1), 1-20, 2016
272016
Serious games: an evaluation framework and case study
DW Wilson, J Jenkins, N Twyman, M Jensen, J Valacich, N Dunbar, ...
2016 49th Hawaii International Conference on System Sciences (HICSS), 638-647, 2016
242016
Proposing the Hedonic Affect Model (HAM) to explain how stimuli and performance expectations predict affect in individual and group hedonic systems use
PB Lowry, JL Jenkins, J Gaskin, B Hammer, N Twyman, M Hassell
Proceedings of the Journal of the Association for Information Systems Theory …, 2013
202013
Breaking out of the design science box: High-value impact through multidisciplinary design science programs of research
JF Nunamaker Jr, NW Twyman, JS Giboney
192013
A rigidity detection system for the guilty knowledge test
NW Twyman, A Elkins, JK Burgoon
HICSS-44 Symposium on Credibility Assessment and Information Quality in …, 2011
142011
Cognitive checkpoint: Emerging technologies for biometric-enabled watchlist screening
SN Yanushkevich, KW Sundberg, NW Twyman, RM Guest, VP Shmerko
Computers & Security 85, 372-385, 2019
132019
Proposing the Interactivity-Stimulus-Attention Model (ISAM) to explain and predict enjoyment, immersion, and adoption of purely hedonic systems
PB Lowry, N Twyman, J Gaskin, B Hammer, A Bailey, T Roberts
Special Interest Group on Human-Computer Interaction Pre-ICIS Workshop (best …, 2007
122007
Too busy to be manipulated: How multitasking with technology improves deception detection in collaborative teamwork
NW Twyman, JG Proudfoot, AF Cameron, E Case, JK Burgoon, ...
Journal of Management Information Systems 37 (2), 377-395, 2020
112020
Automated Scientifically Controlled Screening Systems (ASCSS)
NW Twyman, JF Nunamaker
US Patent App. 15/306,083, 2017
102017
Using Eye Tracking Technology as a Concealed Information Test
NW Twyman, K Moffitt, JK Burgoon, F Marchak
HICSS-43 Symposium on Credibility Assessment and Information Quality in …, 2010
102010
Design principles for signal detection in modern job application systems: Identifying fabricated qualifications
NW Twyman, SJ Pentland, L Spitzley
Journal of Management Information Systems 37 (3), 849-874, 2020
92020
Eye Tracking and the CIT: Utilizing Oculometric Cues to Identify Familiarity with Wanted Persons
JG Proudfoot, NW Twyman, JK Burgoon
HICSS-46 Proceedings of the Rapid Screening Technologies, Deception …, 2013
92013
The system can't perform the operation now. Try again later.
Articles 1–20