Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mark Adkins is active.

Publication


Featured researches published by Mark Adkins.


Journal of Management Information Systems | 1998

A technology transition model derived from field investigation of GSS use aboard the U.S.S. CORONADO

Robert O. Briggs; Mark Adkins; Daniel D. Mittleman; John Kruse; Scott Miller; Jay F. Nunamaker

There are several thousand group support systems (GSS) installations worldwide, and, while that number is growing, GSS has not yet achieved critical mass. One reason may be that it can take one to three years for an organization to complete a transition to GSS. Studying GSS transition in the field could yield insights that would allow for faster, lower-risk transitions elsewhere. This article presents a thirty-two-month qualitative field investigation of an effort to introduce GSS into the daily work of the staff of the U.S. Navys Commander, Third Fleet. Using the principles of action research, the project began with interventions based on the precepts of the Technology Acceptance Model (TAM). The goal of the interventions was to engender sufficient acceptance for GSS to create a self-sustaining, growing community of GSS users.Throughout the study, building on a base of experience developed in other private-and public-sector transition projects, we revised and extended TAM based on insights that emerged in the field. The resulting model, the Technology Transition Model (TTM), frames acceptance as a multiplicative function of the magnitude and frequency of the perceived net value of a proposed change, moderated by the perceived net value associated with the transition period itself. TTM frames net value as having a number of dimensions, including cognitive, economic, political, social, affective, and physical. It posits that cognitive net value derives from at least three sources: changes in access, technical, and conceptual attention loads.GSS transition proceeded at different speeds in different segments of the Third Fleet; the intelligence and battle staffs became self-sustaining within weeks, while others are still not self-sustaining. TTM appears to explain the differences that emerged in the Navy community.The article presents TAM, then argues the propositions of TTM. It then presents background information about Third Fleet, and describes critical incidents in the transition effort that gave rise to the model. It summarizes the lessons learned in the field by comparing the differing transition trajectories among Fleet staff segments in light of the model.


decision support systems | 2003

Using group support systems for strategic planning with the United States Air Force

Mark Adkins; Michael Burgoon; Jay F. Nunamaker

Abstract Strategic planning is a critical part of establishing an organizations direction. Although strategic planning is utilized throughout the United States Air Force today in various forms, group sessions can become time-consuming without structured planning and a focus on group communication. Computer-supported strategic planning, making effective use of technology, is one way to improve the strategic planning process. This research implements a group support system (GSS) as a communication tool to facilitate the strategic planning process. The researchers investigate effects of a facilitators using technology to structure verbal and electronic communication, with the goal of increasing quality output and improving group member satisfaction. This project was completed at Mountain Home Air Force Base with the support of the 366th Wing. As predicted, a GSS facilitators structuring verbal and electronic communication improved the quality of the strategic plan, reduced time to complete a strategic plan, and increased satisfaction with the strategic planning process. The results did not indicate increased commitment to implement the strategic plans developed by a group using GSS facilitation.


hawaii international conference on system sciences | 2005

An Approach for Intent Identification by Building on Deception Detection

Judee K. Burgoon; Mark Adkins; John Kruse; Matthew L. Jensen; Thomas O. Meservy; Douglas P. Twitchell; Amit V. Deokar; Jay F. Nunamaker; Shan Lu; Gabriel Tsechpenakis; Dimitris N. Metaxas; Robert Younger

Past research in deception detection at the University of Arizona has guided the investigation of intent detection. A theoretical foundation and model for the analysis of intent detection is proposed. Available test beds for intent analysis are discussed and two proof-of-concept studies exploring nonverbal communication within the context of deception detection and intent analysis are shared.


hawaii international conference on system sciences | 1999

GSS collaboration in document development: using GroupWriter to improve the process

Mark Adkins; Jeannette Q. Reinig; John Kruse; Daniel D. Mittleman

Research was conducted on the application of GroupWriter, to support the development, editing, sharing, and modification of government documents. One of the major advantages of using GroupWriter is the support of collaborative writing and the manipulation of documents in a manner unconstrained by time and place. At this time various groups from government agencies and the University of Arizonas Center for the Management of Information (CMI) are involved in GroupWriter sessions. Development of the tool has revealed the need for preset protocols, which explain the requirements, definitions, and uses pertaining to the system and software. Achievements were made in tailoring the technologies to fit the needs of specific groups. This paper focuses on the development of both facilitation processes and GroupWriter as a collaborative writing fool. Lessons learned in this area call for the reduction of system and process ambiguity to support both synchronous and asynchronous distributed users.


hawaii international conference on system sciences | 2005

StrikeCOM: A Multi-Player Online Strategy Game for Researching and Teaching Group Dynamics

Douglas P. Twitchell; Karl Wiers; Mark Adkins; Judee K. Burgoon; Jay F. Nunamaker

StrikeCOM is a multi-player online strategy game designed to create discourse to aid in the examination of the development of group processes, shared awareness, and communication in distributed and face-to-face groups. The game mimics C3ISR (Command, Control, Communication, Intelligence, Surveillance, Reconnaissance) scenarios and information gathering in group activities. The game is most commonly used to create group communication and interaction in multiple communication modes. Built using a Java-based collaborative server platform the game is available for use in almost any computing environment. StrikeCOM has been used as a research tool to study leadership and deception in group decision making. The U.S. Department of Defense is using the tool to teach Network Centric Warfare to battle commanders. Use of StrikeCOM over the last two years has resulted in a number of lessons-learned, including using simple, familiar game interfaces, utilizing full and immediate feedback, and creating a flexible technical design to meet shifting research and teaching needs.


hawaii international conference on system sciences | 2008

Participant-Driven Collaborative Convergence

Joel H. Helquist; John Kruse; Mark Adkins

Traditional GSS workflow leverages the abilities of an expert facilitator to lead groups through the convergence activities. This dependence on a facilitator creates a bottleneck that is difficult to resolve in asynchronous and distributed groups. This paper presents a new framework, participant-driven convergence, which enables the participants to perform the convergence work in parallel. The goal of this approach is to enable each participant to work in parallel and anonymously to drive the group toward some level of convergence consensus.


hawaii international conference on system sciences | 2002

Ubiquitous computing: omnipresent technology in support of Network Centric Warfare

Mark Adkins; John Kruse; Robert Younger

The US military is in the midst of a transformation. While business leaders moved quickly to put computing power in the hands of individuals, the military establishment has been less responsive. Network Centric Warfare is a current US Navy initiative to leverage the power of the computer to restructure forces from the bottom up. Instead of a strict hierarchy where decisions are pushed down, networked warfighters will cooperatively pursue the strategic goals of the commander in a much more decentralized fashion. Essential to the idea of Network Centric Warfare is the proliferation of ever-present information systems, or ubiquitous computing capabilities, where the computer (or rather, the networked computing capability) is no longer the focus of human attention, but rather, becomes invisible. The paper summarizes the introduction of CommandNet, a group support system, into a large-scale wargaming environment to create networks of concerted actors and develop ubiquitous computing relationships.


Enabling technologies for simulation science. Conference | 2004

Advances in automated deception detection in text-based computer-mediated communication

Mark Adkins; Douglas P. Twitchell; Judee K. Burgoon; Jay F. Nunamaker

The Internet has provided criminals, terrorists, spies, and other threats to national security a means of communication. At the same time it also provides for the possibility of detecting and tracking their deceptive communication. Recent advances in natural language processing, machine learning and deception research have created an environment where automated and semi-automated deception detection of text-based computer-mediated communication (CMC, e.g. email, chat, instant messaging) is a reachable goal. This paper reviews two methods for discriminating between deceptive and non-deceptive messages in CMC. First, Document Feature Mining uses document features or cues in CMC messages combined with machine learning techniques to classify messages according to their deceptive potential. The method, which is most useful in asynchronous applications, also allows for the visualization of potential deception cues in CMC messages. Second, Speech Act Profiling, a method for quantifying and visualizing synchronous CMC, has shown promise in aiding deception detection. The methods may be combined and are intended to be a part of a suite of tools for automating deception detection.


international conference on multimedia and expo | 2005

HMM-Based Deception Recognition from Visual Cues

Gabriel Tsechpenakis; Dimitris N. Metaxas; Mark Adkins; John Kruse; Judee K. Burgoon; Matthew L. Jensen; Thomas O. Meservy; Douglas P. Twitchell; Amit V. Deokar; Jay F. Nunamaker

Behavioral indicators of deception and behavioral state are extremely difficult for humans to analyze. This research effort attempts to leverage automated systems to augment humans in detecting deception by analyzing nonverbal behavior on video. By tracking faces and hands of an individual, it is anticipated that objective behavioral indicators of deception can be isolated, extracted and synthesized to create a more accurate means for detecting human deception. Blob analysis, a method for analyzing the movement of the head and hands based on the identification of skin color is presented. A proof-of-concept study is presented that uses Blob analysis to extract visual cues and events, throughout the examined videos. The integration of these cues is done using a hierarchical hidden Markov model to explore behavioral state identification in the detection of deception, mainly involving the detection of agitated and over-controlled behaviors


intelligence and security informatics | 2004

Testing various modes of computer-based training for deception detection

Joey F. George; David P. Biros; Mark Adkins; Judee K. Burgoon; Jay F. Nunamaker

People are not very good at detecting deception in normal communication, and past efforts to train them to become better detectors have been mixed. This paper reports on a training study involving 177 military officers. In addition to developing and testing a training program to improve deception detection, this study also aimed to test different versions of a computer-based training system. Participants received training on deception generally and on specific indicators. The training program was delivered via a videotaped lecture or via one of four versions of Agent99, the computer-based training system. Participants completed pre- and post-tests on their knowledge of deception and on their ability to detect it. Detection accuracy was measured by asking participants to judge if behavior in video, audio and text examples was deceptive or honest. Agent99 users and video lecture viewers all improved their knowledge of deception and their ability to detect it.

Collaboration


Dive into the Mark Adkins's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge