Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nathan W. Twyman is active.

Publication


Featured researches published by Nathan W. Twyman.


Journal of Management Information Systems | 2014

Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals

Nathan W. Twyman; Paul Benjamin Lowry; Judee K. Burgoon; Jay F. Nunamaker

Abstract Screening individuals for concealed information has traditionally been the purview of professional interrogators investigating crimes. However, the ability to detect when a person is hiding important information would have high value in many other applications if results could be reliably obtained using an automated and rapid interviewing system. Unfortunately, this ideal has thus far been stymied by practical limitations and inadequate scientific control in current interviewing systems. This study proposes a new class of systems, termed autonomous scientifically controlled screening systems (ASCSS), designed to detect individuals’ purposely hidden information about target topics of interest. These hidden topics of interest could cover a wide range, including knowledge of concealed weapons, privacy violations, fraudulent organizational behavior, organizational security policy violations, preemployment behavioral intentions, organizational insider threat, leakage of classified information, or even consumer product use information. ASCSS represent a systematic synthesis of structured interviewing, orienting theory, defensive response theory, noninvasive psychophysiological measurement, and behavioral measurement. To evaluate and enhance the design principles, we built a prototype automated screening kiosk system and configured it for a physical security screening scenario in which participants constructed and attempted to smuggle a fake improvised explosive device. The positive results provide support for the proposition that ASCSS may afford more widespread application of credibility assessment screening systems.


Journal of Management Information Systems | 2014

A Rigidity Detection System for Automated Credibility Assessment

Nathan W. Twyman; Aaron C. Elkins; Judee K. Burgoon; Jay F. Nunamaker

Credibility assessment is an area in which information systems research can make a major impact. This paper reports on two studies investigating a system solution for automatic, noninvasive detection of rigidity for automated interviewing. Kinesic rigidity has long been a phenomenon of interest in the credibility assessment literature, but until now was infeasible as a veracity indicator in practical use cases. An initial study unexpectedly revealed the occurrence of rigidity in a highly controlled concealed information test setting, prompting the design and implementation of an automated rigidity detection system for interviewing. A unique experimental evaluation supported the system concept. The results of the second study confirmed the kinesic rigidity found in the first, and provided further theoretical insights explaining the rigidity phenomenon. Although additional research is needed, the evidence from this investigation suggests that credibility assessment can benefit from a rigidity detection system.


intelligence and security informatics | 2012

Establishing a foundation for automated human credibility screening

Jay F. Nunamaker; Judee K. Burgoon; Nathan W. Twyman; Jeffrey Gainer Proudfoot; Ryan M. Schuetzler; Justin Scott Giboney

Automated human credibility screening is an emerging research area that has potential for high impact in fields as diverse as homeland security and accounting fraud detection. Systems that conduct interviews and make credibility judgments can provide objectivity, improved accuracy, and greater reliability to credibility assessment practices, need to be built. This study establishes a foundation for developing automated systems for human credibility screening.


Management Information Systems Quarterly | 2017

Creating High-Value Real-World Impact through Systematic Programs of Research

Jay F. Nunamaker; Nathan W. Twyman; Justin Scott Giboney; Robert O. Briggs

ISSUES AND OPINIONS Creating High-Value Real-World Impact through Systematic Programs of Research Jay F. Nunamaker, Nathan W. Twyman, Justin Scott Giboney, and Robert O. Briggs . . . . . . . . . . . . . . . . . . . . . . . . . . . No. 2, pg. 335 METHODS ARTICLE A Multicollinearity and Measurement Error Statistical Blind Spot: Correcting for Excessive False Positives in Regression and PLS Dale L. Goodhue, William Lewis, and Ron Thompson . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . No. 3, pg. 667 Grounded Theory Methodology in Information Systems Research Manuel Wiesche, Marlen C. Jurisch, Philip W. Yetton, and Helmut Krcmar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . No. 3, pg. 685 RESEARCH COMMENTARY Toward Meaningful Engagement: A Framework for Design and Research of Gamified Information Systems De Liu, Radhika Santhanam, and Jane Webster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . No. 4, pg. 1011 RESEARCH ARTICLES How Is Your User Feeling? Inferring Emotion Through Human–Computer Interaction Devices Martin Hibbeln, Jeffrey L. Jenkins, Christoph Schneider, Joseph S. Valacich, and Markus Weinmann . . . . . . . . . . . . . . . . No. 1, pg. 1 Is Voluntary Profiling Welfare Enhancing? Byungwan Koh, Srinivasan Raghunathan, and Barrie R. Nault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . No. 1, pg. 23 A Configural Approach to Coordinating Expertise in Software Development Teams Srinivas Kudaravalli, Samer Faraj, and Steven L. Johnson . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . No. 1, pg. 43 Using Forum and Search Data for Sales Prediction of High-Involvement Projects Tomer Geva, Gal Oestreicher-Singer, Niv Efron, and Yair Shimshoni . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . No. 1, pg. 65 Design and Evaluation of Auto-ID Enabled Shopping Asssistance Artifacts in Customers’ Mobile Phones: Two Retail Store Laboratory Experiments Viswanath Venkatesh, John A. Aloysius, Hartmut Hoehle, and Scot Burton . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . No. 1, pg. 83 Trust and the Strength of Ties in Online Social Networks: An Exploratory Field Experiment Ravi Bapna, Alok Gupta, Sarah Rice, and Arun Sundararajan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . No. 1, pg. 115 An Empirical Analysis of Intellectual Property Rights Sharing in Software Development Outsourcing Yuanyuan Chen, Anandhi Bharadwaj, and Khim-Yong Goh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . No. 1, pg. 131 Show Me the Way to Go Home: An Empirical Investigation of Ride-Sharing and Alcohol Related Motor Vehicle Fatalities Brad N. Greenwood and Sunil Wattal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . No. 1, pg. 163 Effects of Competition Among Internet Service Providers and Content Providers on the Net Neutrality Debate Hong Guo, Subhajyoti Bandyopadhyay, Arthur Lim, Yu-Chen Yang, and Hsing Kenneth Cheng . . . . . . . . . . . . . . . . . . No. 2, pg. 353


Journal of Management Information Systems | 2015

Robustness of Multiple Indicators in Automated Screening Systems for Deception Detection

Nathan W. Twyman; Jeffrey Gainer Proudfoot; Ryan M. Schuetzler; Aaron C. Elkins; Douglas C. Derrick

Abstract This study investigates the effectiveness of an automatic system for detection of deception by individuals with the use of multiple indicators of such potential deception. Deception detection research in the information systems discipline has postulated increased accuracy through a new class of screening systems that automatically conduct interviews and track multiple indicators of deception simultaneously. Understanding the robustness of this new class of systems and the limitations of its theoretical improved performance is important for refinement of the conceptual design. The design science proof-of-concept study presented here implemented and evaluated the robustness of these systems for automated screening for deception detection. A large experiment was used to evaluate the effectiveness of a constructed multiple-indicator system, both under normal conditions and with the presence of common types of countermeasures (mental and physical). The results shed light on the relative strength and robustness of various types of deception indicators within this new context. The findings further suggest the possibility of increased accuracy through the measurement of multiple indicators if classification algorithms can compensate for human attempts to counter effectiveness.


Information & Management | 2014

Proposing the Affect-Trust Infusion Model (ATIM) to Explain and Predict the Influence of High- and Low-Affect Infusion on Web Vendor Trust

Paul Benjamin Lowry; Nathan W. Twyman; Matthew D. Pickard; Jeffrey L. Jenkins; Quang Neo Bui

Trust is just as essential to online business as it is to offline transactions but can be more difficult to achieve - especially for newer websites with unknown web vendors. Research on web-based trust development explains that web vendor trust can be created by both cognitive and affective (e.g., emotion-based) influences. But under what circumstances will emotion or cognition be more dominate in trust establishment? Theory-based answers to these questions can help online web vendors design better websites that account for unleveraged factors that will increase trust in the web vendor. To this end, we use the Affect Infusion Model and trust transference to propose the Affect-Trust Infusion Model (ATIM) that explains and predicts how and when cognition, through perceived website performance (PwP), and positive emotion (PEmo) each influence web vendor trust. ATIM explains the underlying causal mechanisms that determine the degree of affect infusion and the subsequent processing strategy that a user adopts when interacting with a new website. Under high-affect infusion, PEmo acts as a mediator between PwP and vendor trust; under low-affect infusion, PwP primarily impacts trust and PEmo is dis-intermediated. We review two distinct, rigorously validated experiments that empirically support ATIM. To further extend the contributions of ATIM, we demonstrate how use of specific contextual features-rooted in theory and that drive ones choice of affect infusion and cognitive processing-can be leveraged into a methodology that we propose to further enhance user-centered design (UCD). We further detail several exciting research opportunities that can leverage ATIM.


Proceedings of the Sixth Annual Workshop on Human-Computer Interaction Research in MIS (2007, Montreal, Canada) | 2007

Proposing the Interactivity-Stimulus-Attention Model (ISAM) to Explain and Predict Enjoyment, Immersion, and Adoption of Purely Hedonic Systems

Paul Benjamin Lowry; Nathan W. Twyman; James Eric Gaskin; Bryan I. Hammer; Aaron Bailey; Tom L. Roberts

Traditional TAM research primarily focuses on utilitarian systems where extrinsic motivations chiefly explain and predict acceptance. We propose a theoretical model, ISAM, which explains the role of intrinsic motivations in building the user attention that leads to hedonic system acceptance. ISAM combines several theories with TAM to explain how interactivity acts as a stimulus in hedonic contexts — fostering curiosity, enjoyment, and the full immersion of cognitive resources. Two experiments involving over 700 participants validated ISAM as a useful model for explaining and predicting hedonic system acceptance. Immersion and PE are shown to be the primary predictors of behavioral intention to use hedonic systems. Unlike traditional utilitarian adoption research, PEOU does not directly impact BIU, and extrinsic motivations are virtually non-existent. The implications of this study extend beyond hedonic contexts, as users of utilitarian systems continue to demand more hedonic features and enjoyment is often more important than PEOU.


Journal of Management Information Systems | 2017

A Video-Based Screening System for Automated Risk Assessment Using Nuanced Facial Features

Steven J. Pentland; Nathan W. Twyman; Judee K. Burgoon; Jay F. Nunamaker; Christopher B.R. Diller

Abstract This study investigates the development of an automated interviewing system that uses facial behavior as an indicator of the risk of given illicit behavior. Traditional facial emotion indicators of risk in semistructured dialogue may have limitations in an automated approach. However, an initial analysis of mock crime interviews suggests that the face may exhibit some form of rigidity during highly structured interviews. An interviewing system design using facial rigidity analysis was implemented and experimentally evaluated, the results of which further reveal that the rigidity is fairly generalized across the face. Whereas existing theory traditionally focuses on leakage of facial expressions, this study provides evidence that neutralization of facial expression may be a valuable alternative for automated interviewing systems. The proof-of-concept system in this study may help human risk assessment move beyond traditional boundaries, into fields such as auditing, emergency room management, and security screening.


european intelligence and security informatics conference | 2012

A Comparison of Invasive and Noninvasive Sensors in the Concealed Information Test

Jeffrey Gainer Proudfoot; Nathan W. Twyman; Judee K. Burgoon

Rapid screening requires identifying individuals concealing information promptly and noninvasively. The standard Concealed Information Test (CIT) is not conducive to a rapid screening context, however, researchers are investigating the ability to conduct adaptations of the CIT using noninvasive sensors. The purpose of this paper is to propose a study that will investigate and compare the accuracy rates of electro dermal, oculometric, and vocalic measures in identifying concealed information. The ability to detect criminals and high-risk individuals rapidly and with stand-off methods during security screening has implications for a wide variety of applications.


international conference on hci in business | 2017

Dueling for Trust in the Online Fantasy Sports Industry: Fame, Fortune, and Pride for the Winners

Craig C. Claybaugh; Peter Haried; Langtao Chen; Nathan W. Twyman

Trust is a necessary condition for many industries. However, trust may not be the most important factor driving participation in online fantasy sports gambling. In this research we examine how different classifications of gamblers (i.e., passive gamblers, problem gamblers, and pathological gamblers) perceive their participation in fantasy sports. We argue that trust is not commonly a primary consideration and that trust does not need to be present in these types of online transactions. To prove this relationship, a trust model is proposed to be tested in the context of online fantasy sports with a focus on the market leader in the industry: fanduel.com.

Collaboration


Dive into the Nathan W. Twyman's collaboration.

Top Co-Authors

Avatar

Judee K. Burgoon

Oklahoma State University–Stillwater

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Aaron C. Elkins

San Diego State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge