Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Douglas C. Derrick is active.

Publication


Featured researches published by Douglas C. Derrick.


Journal of Management Information Systems | 2011

Embodied Conversational Agent-Based Kiosk for Automated Interviewing

Jay F. Nunamaker; Douglas C. Derrick; Aaron C. Elkins; Judee K. Burgoon; Mark W. Patton

We have created an automated kiosk that uses embodied intelligent agents to interview individuals and detect changes in arousal, behavior, and cognitive effort by using psychophysiological information systems. In this paper, we describe the system and propose a unique class of intelligent agents, which are described as Special Purpose Embodied Conversational Intelligence with Environmental Sensors (SPECIES). SPECIES agents use heterogeneous sensors to detect human physiology and behavior during interactions, and they affect their environment by influencing human behavior using various embodied states (i.e., gender and demeanor), messages, and recommendations. Based on the SPECIES paradigm, we present three studies that evaluate different portions of the model, and these studies are used as foundational research for the development of the automated kiosk. The first study evaluates human-computer interaction and how SPECIES agents can change perceptions of information systems by varying appearance and demeanor. Instantiations that had the agents embodied as males were perceived as more powerful, while female embodied agents were perceived as more likable. Similarly, smiling agents were perceived as more likable than neutral demeanor agents. The second study demonstrated that a single sensor measuring vocal pitch provides SPECIES with environmental awareness of human stress and deception. The final study ties the first two studies together and demonstrates an avatar-based kiosk that asks questions and measures the responses using vocalic measurements.


IEEE Intelligent Systems | 2010

Border Security Credibility Assessments via Heterogeneous Sensor Fusion

Douglas C. Derrick; Aaron C. Elkins; Judee K. Burgoon; Jay F. Nunamaker; Daniel Dajun Zeng

A heterogeneous network of sensors that measure physiological and behavioral indicators of arousal, cognitive effort, and stress can facilitate deception detection, while limiting subjective judgments and improper profiling.


acm transactions on management information systems | 2013

Detecting Deceptive Chat-Based Communication Using Typing Behavior and Message Cues

Douglas C. Derrick; Thomas O. Meservy; Jeffrey L. Jenkins; Judee K. Burgoon; Jay F. Nunamaker

Computer-mediated deception is prevalent and may have serious consequences for individuals, organizations, and society. This article investigates several metrics as predictors of deception in synchronous chat-based environments, where participants must often spontaneously formulate deceptive responses. Based on cognitive load theory, we hypothesize that deception influences response time, word count, lexical diversity, and the number of times a chat message is edited. Using a custom chatbot to conduct interviews in an experiment, we collected 1,572 deceitful and 1,590 truthful chat-based responses. The results of the experiment confirm that deception is positively correlated with response time and the number of edits and negatively correlated to word count. Contrary to our prediction, we found that deception is not significantly correlated with lexical diversity. Furthermore, the age of the participant moderates the influence of deception on response time. Our results have implications for understanding deceit in chat-based communication and building deception-detection decision aids in chat-based systems.


Journal of Management Information Systems | 2015

The Last Research Mile: Achieving Both Rigor and Relevance in Information Systems Research

Jay F. Nunamaker; Robert O. Briggs; Douglas C. Derrick; Gerhard Schwabe

Abstract From our desk chairs it may be tempting to work up an idea, build a quick prototype, test it in a lab, and say, “Our work here is done; the rest is merely details.” More scholarly knowledge awaits discovery, however, by researchers who shepherd an information systems (IS) solution through the last research mile, that is, through successful transition to the workplace. Going the last research mile means using scientific knowledge and methods to address important unsolved classes of problems for real people with real stakes in the outcomes. The last research mile proceeds in three stages: proof-of-concept research to demonstrate the functional feasibility of a solution; proof-of-value research to investigate whether a solution can create value across a variety of conditions; and proof-of-use research to address complex issues of operational feasibility. The last research mile ends only when practitioners routinely use a solution in the field. We argue that going the last research mile negates the assumption that one must trade off rigor and relevance, showing it to be it a false dilemma. Systems researchers who take their solutions through the last research mile may ultimately have the greatest impact on science and society. We demonstrate the last research mile with cases from our own work and the work of others spanning more than forty years.


Journal of Strategic Security | 2015

Lethal Brands: How VEOs Build Reputations

Gina Scott Ligon; Mackenzie Harms; Douglas C. Derrick

ISIS has run the most effective social media marketing campaign in history. In fact, violent extremist organizations (VEOs) market their ideology and organizations to a global audience in ways that rival even the savviest of conventional organizations. However, applying marketing theory and methodology to study VEOs has not been done to date for the security community. Thus, the goal of the present effort is to use a novel lens used to apply the marketing strategies of conventional, for-profit organizations to examine the impact of VEO reputation and legitimacy on VEO performance. We coded tactics used by VEOs such as ISIS to establish a strong brand reputation, and examined the relationship between branding strategies and markers of performance (e.g., recruitment and fundraising) using a sample of 60 historically notable VEOs spanning a variety of ideologies, cultures, and periods of peak performance. The primary contribution of studying such a diverse sample of VEOs is the identification of how branding strategies can predict recruitment of talented personnel, financial sources, and organizational capacity for violence. Two key findings discussed are (1) VEOs market and differentiate themselves via malevolently innovative attacks, and (2) even negatively-toned media coverage is related to their long-term fundraising viability. Acknowledgements We would like to thank Drs. Erin Pleggenkuhle-Miles and Michael Breazeale for initial contributions to the framing of this research project. In addition, this research was supported by the Department of Homeland Science and Technology Directorate’s Office of University Programs through Award Number 2012-ST-061-CS0001, Center for the Study of Terrorism and Behavior (CSTAB 1.12) made to START to investigate THEME: 1 the role of social, behavioral, cultural, and economic factors on radicalization and violent extremism. The views and conclusions contained in this document are those of the authors and should not be This article is available in Journal of Strategic Security: http://scholarcommons.usf.edu/jss/vol8/iss1/3 interpreted as necessarily representing the official policies, either expressed or implied, of the U.S. Department of Homeland Security or START. This article is available in Journal of Strategic Security: http://scholarcommons.usf.edu/jss/vol8/iss1/3


Journal of Management Information Systems | 2015

Robustness of Multiple Indicators in Automated Screening Systems for Deception Detection

Nathan W. Twyman; Jeffrey Gainer Proudfoot; Ryan M. Schuetzler; Aaron C. Elkins; Douglas C. Derrick

Abstract This study investigates the effectiveness of an automatic system for detection of deception by individuals with the use of multiple indicators of such potential deception. Deception detection research in the information systems discipline has postulated increased accuracy through a new class of screening systems that automatically conduct interviews and track multiple indicators of deception simultaneously. Understanding the robustness of this new class of systems and the limitations of its theoretical improved performance is important for refinement of the conceptual design. The design science proof-of-concept study presented here implemented and evaluated the robustness of these systems for automated screening for deception detection. A large experiment was used to evaluate the effectiveness of a constructed multiple-indicator system, both under normal conditions and with the presence of common types of countermeasures (mental and physical). The results shed light on the relative strength and robustness of various types of deception indicators within this new context. The findings further suggest the possibility of increased accuracy through the measurement of multiple indicators if classification algorithms can compensate for human attempts to counter effectiveness.


international carnahan conference on security technology | 2008

Potential noncontact tools for rapid credibility assessment from physiological and behavioral cues

Judee K. Burgoon; Douglas C. Derrick; Aaron C. Elkins; S. LaMarc Humphreys; Matthew L. Jensen; Christopher B. R. Diller; Jay F. Nunamaker

Credibility assessment is a perennial and increasingly urgent problem in light of escalating international security threats. New tools such are needed for rapid, noninvasive and possibly unobtrusive detection of deception and hostile intent. This paper reports five novel instrumented approaches to credibility assessment being investigated in a multi-institution research program. These instruments do not require physical contact with humans and can reliably measure veracity from physiological and behavioral indicators. Data were collected via an experiment, which required participants to commit a mock crime and then be interviewed by a trained interviewer. During and following the interviews, multiple instruments measured physiological, cognitive and behavioral responses of interviewees to determine which automatable features accurately differentiate truthtellers from deceivers. Details concerning the instruments and the experimental method used to test them are shared.


hawaii international conference on system sciences | 2014

Developing Entrepreneurial Skills in IT Courses: The Role of Agile Software Development Practices in Producing Successful Student Initiated Products

Aaron Read; Douglas C. Derrick; Gina Scott Ligon

Universities are under increasing pressure to provide real world experience to students. Entrepreneurial courses are prevalent in business schools and have been shown to develop entrepreneurial skills. Entrepreneurial skills are equally important in the development of IT innovations. The research in this area of education is not as prevalent. We argue that Agile Software development methods, along with other key course characteristics enable students to learn entrepreneurial skills related to IT product development and do so in an environment where innovation can flourish. We present some preliminary data, which demonstrates some success in the course in developing entrepreneurial skills, with a particular focus on the use of Agile Development and mentoring methods in developing those skills.


hawaii international conference on system sciences | 2012

Predicting Users' Perceived Trust in Embodied Conversational Agents Using Vocal Dynamics

Aaron C. Elkins; Douglas C. Derrick; Judee K. Burgoon; Jay F. Nunamaker

One of the major challenges facing neurophysiological HCI design is to determine the systems and sensors that accurately and noninvasively measure human cognitive processes. Specifically, it is a significant undertaking to integrate sensors and measurements into an information system and accurately measure and interpret the human state. Using an experimental design this study explores the use of unobtrusive sensors based on behavioral and neurophysiological responses to predict human trust using the voice. Participants (N=88) completed a face-to-face interview with an Embodied Conversational Agent (ECA) and reported their perceptions of the ECA. They reported three dimensions consistent with the Mayer model of perceived trustworthiness. During the interaction, the demeanor and gender of the avatar was manipulated and these manipulations affected the reported measures of trustworthiness. Using growth modeling and multilevel analysis of covariance methods, a model was developed that could predict human trust during the interaction using the voice, time, and demographics.


Dynamics of Asymmetric Conflict | 2016

Ideological rationality and violence: An exploratory study of ISIL’s cyber profile

Douglas C. Derrick; Karyn Sporer; Sam Church; Gina Scott Ligon

Abstract This exploratory study examines the narrative space of the Islamic State in Iraq and the Levant (ISIL). Specifically, we developed a methodology to gather, archive, and analyze ISIL’s online presence in social media. Our sample was drawn from transient websites (N = 8308) collected between August 2015 and October 2015. From this pool, we coded a random sample of 100 English-only articles for violent, pragmatic, and ideological themes. Exploratory factor analyses revealed two constructs: violence and ideological rationality. Our findings offer insight into the messaging and organizational dynamics of ISIL. We conclude with implications and future directions.

Collaboration


Dive into the Douglas C. Derrick's collaboration.

Top Co-Authors

Avatar

Gina Scott Ligon

University of Nebraska Omaha

View shared research outputs
Top Co-Authors

Avatar

Aaron C. Elkins

San Diego State University

View shared research outputs
Top Co-Authors

Avatar

Jay F. Nunamaker

Hong Kong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Judee K. Burgoon

Oklahoma State University–Stillwater

View shared research outputs
Top Co-Authors

Avatar

Leif Lundmark

University of Nebraska Omaha

View shared research outputs
Top Co-Authors

Avatar

Aaron Read

Arizona State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge