Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

    Jay Nunamaker

    Past research in deception detection at the University of Arizona has guided the investigation of intent detection. A theoretical foundation and model for the analysis of intent detection is proposed. Available test beds for intent... more
    Past research in deception detection at the University of Arizona has guided the investigation of intent detection. A theoretical foundation and model for the analysis of intent detection is proposed. Available test beds for intent analysis are discussed and two proof-of-concept studies exploring nonverbal communication within the context of intent detection are shared.
    This research project investigates a novel approach for deriving behavioral deception cues from videotaped interactions. Researchers utilized inputs extracted from video to construct a set of two-dimensional spatial features. The features... more
    This research project investigates a novel approach for deriving behavioral deception cues from videotaped interactions. Researchers utilized inputs extracted from video to construct a set of two-dimensional spatial features. The features for thirty-eight video interactions were then analyzed using discriminant analysis and logistic regression. Through this exploratory study, the team has identified a number of promising features that help discriminate
    This symposium offers a stimulating forum among academic researchers, local, state and federal law enforcement, intelligence experts and information security workers who are interested in assessing credibility and deception detection. New... more
    This symposium offers a stimulating forum among academic researchers, local, state and federal law enforcement, intelligence experts and information security workers who are interested in assessing credibility and deception detection. New tools, technologies, processes and procedures will be discussed and debated concerning the efficiency, effectiveness and usefulness for aiding in credibility assessment and deception detection. Screening individuals at ports of entry, check points, transportation hubs, etc. is a challenging and sometimes daunting task. Screeners face the difficult task of identifying the few individuals who may pose a security threat from the numerous individuals who pose no threat, all the while maintaining consistent and efficient flow of traffic. Assessing the credibility of information is critical in many venues (e.g., law enforcement scenarios, fraud investigations, identification of corruption, intelligence gathering, etc.). Novel research involving new metho...
    The Center for the Management of Information (CMI) at The University of Arizona engaged in a joint research project with the U.S. Navy's Commander Third Fleet (Third Fleet) and The MITRE Corporation... more
    The Center for the Management of Information (CMI) at The University of Arizona engaged in a joint research project with the U.S. Navy's Commander Third Fleet (Third Fleet) and The MITRE Corporation (MITRE) to use and evaluate collaborative technology during Strong Angel, a humanitarian assistance/disaster relief (HA/DR) exercise. Strong Angel was a part of RIMPAC 2000, a five-week multinational exercise that involved seven nations with over 22,000 people, fifty ships, and 200 aircraft. RIMPAC 2000's Strong Angel set out to satisfy three goals: (1) Develop a mutual understanding of respective capabilities, limitations and expectations among multinational militaries and the main United Nations relief agencies; (2) Create a replicable system for the safe conduct of Strong Angel and subsequent exercises in civil-military interaction for humanitarian support; and (3) Deliver a coordinated response to a population in crisis. CMI, Third Fleet, and MITRE teamed to achieve four objectives: (1) provide a collaborative environment both at sea and ashore within an austere environment; (2) use collaborative technology to establish a forum for the exchange of relevant information between civilian humanitarian organizations and the military; (3) document the flux of combined activities each day; and (4) evaluate the utility of collaborative technology during a civil-military exercise in humanitarian relief. The team met each objective and reports the results in this paper.
    Research Interests:
    This paper demonstrates the viability of a rule-based consultation system as a mechanism for effective resource management through integration of knowledge about users, business problems, and resources. The specific domain within which... more
    This paper demonstrates the viability of a rule-based consultation system as a mechanism for effective resource management through integration of knowledge about users, business problems, and resources. The specific domain within which the expert system will be tested is the Information Center (IC), which deals with end-user computing resources. In the last decade, the information center concept has been proposed repeatedly as an organizational solution to resource management problems related to end user computing. The research hypothesis is that the knowledge and methodologies of IC consultants, as well as institutional policies, can be represented in a knowledge base. The system will then draw conclusions about appropriate software or training solutions based on the interaction of user and resource profiles with the problem definition. The output of the model should be identical to the situation which it is modeling.Currently, a rule-based ES is being developed at the University o...
    ABSTRACT
    This paper outlines and further specifies the key points articulated in an IS Model Curriculum panel presentation at the Americas Conference for Information Systems (AMCIS) 2008. This presentation centered on the major changes to the IS... more
    This paper outlines and further specifies the key points articulated in an IS Model Curriculum panel presentation at the Americas Conference for Information Systems (AMCIS) 2008. This presentation centered on the major changes to the IS Model Curriculum that is currently being proposed by the joint Association for Computing Machinery (ACM) and the Association for Information Systems (AIS) task force.
    This paper summarizes the key elements of a panel presentation at the Americas Conference for Information Systems (AMCIS) 2007 that reviewed the current status of the joint Association for Computing Machinery (ACM)/Association for... more
    This paper summarizes the key elements of a panel presentation at the Americas Conference for Information Systems (AMCIS) 2007 that reviewed the current status of the joint Association for Computing Machinery (ACM)/Association for Information Systems (AIS) undergraduate information systems model curriculum revision project. After providing a brief historical overview of IS model curricula and describing the reasons why a revision is overdue, the paper focuses on three main aspects of the current revision proposal. These ...
    The objective of this research is to study and build a prototype of an Integrated Office Information System (IOIS). The need for this system is derived from problems in existing automated office systems including: the lack of standard... more
    The objective of this research is to study and build a prototype of an Integrated Office Information System (IOIS). The need for this system is derived from problems in existing automated office systems including: the lack of standard software tool user interfaces, excessive use of paper to transmit information, redundant and inconsistent information in common databases, and haphazard coordination and control of information exchange. The proposed IOIS will address these problems by providing the means to accomplish a variety of office tasks while maintaining data integrity, reducing the flow of paper, improving communication, and standardizing user interfaces and software protocols. Keywords: Information systems, Information retrieval.
    A vast wealth of lab and field research shows that when the right group support system (GSS) tool is applied to the right task, team productivity can be significantly enhanced. Until recently, no clear pattern emerged to explain why one... more
    A vast wealth of lab and field research shows that when the right group support system (GSS) tool is applied to the right task, team productivity can be significantly enhanced. Until recently, no clear pattern emerged to explain why one GSS installation would succeed when another would not. The results were unpredictable. The paper considers the case of the U.S. Navy's Third Fleet aboard the U.S.S. Coronado. The Fleet's J2 Intelligence community adopted GSS for situational awareness and analysis after only four 1-hour training sessions.
    Research Interests:
    Research Interests:
    This paper presents findings from an eye tracker experiment based on the guilty knowledge test (GKT) paradigm. We conducted a two-group, posttest-only, randomized initial experiment in which the guilty group constructed an improvised... more
    This paper presents findings from an eye tracker experiment based on the guilty knowledge test (GKT) paradigm. We conducted a two-group, posttest-only, randomized initial experiment in which the guilty group constructed an improvised explosive device (IED) and then was screened by an embodied conversational agent (ECA). Participants in the control condition went straight to screening. During the screening interview, participants were shown three images. The second image was a modified picture of an IED similar to the one constructed by the guilty participants. Eye gaze behavior was dramatically different between the groups. A classification algorithm correctly classified 100% of the participants as either part of the guilty or control group.
    ... JF, Jr.; Romano, NC, Jr.; and Briggs, RO Increasing intellectual bandwidth: Generating value from intellectual ... Ryan, G., and Weisner, T. Analyzing words in brief descriptions: Fathers and mothers describe their children. ... In J.... more
    ... JF, Jr.; Romano, NC, Jr.; and Briggs, RO Increasing intellectual bandwidth: Generating value from intellectual ... Ryan, G., and Weisner, T. Analyzing words in brief descriptions: Fathers and mothers describe their children. ... In J. Liebowitz (ed.), Knowledge Management Handbook. ...
    Research Interests:
    Research has long recognized that humans have many biases and shortcomings that severely limit our ability to accurately detect deception. How can we improve our deception detection ability? One possible method is to train individuals to... more
    Research has long recognized that humans have many biases and shortcomings that severely limit our ability to accurately detect deception. How can we improve our deception detection ability? One possible method is to train individuals to recognize cues of deception. To do this, we need to create effective training curricula and educational tools. This paper describes how we used existing
    Multimedia, especially video, is widely used in educational applications. More and more universities and corporations now provide videotaped lectures online for knowledge sharing and learning. However, people often have difficulties in... more
    Multimedia, especially video, is widely used in educational applications. More and more universities and corporations now provide videotaped lectures online for knowledge sharing and learning. However, people often have difficulties in finding specific information in these lecture videos because of the unstructured and linear nature of video. Segmenting the videos into short clips based on topic transition and organizing these video segments into well-formed browsing structures will facilitate information searching and may further enhance learning. In this paper, we present the design and implementation of a Web-based multimedia learning system with automatically generated browsing structures such as hierarchical tables of contents, index and hyperlink. A pilot study was conducted to evaluate the effectiveness of the system in supporting learning. .
    Abstract In this panel, the joint AIS/ACM Information Systems undergraduate model curriculum task force members together with other curriculum experts will be presenting and discussing the IS 2009 Curriculum Guidelines for Undergraduate... more
    Abstract In this panel, the joint AIS/ACM Information Systems undergraduate model curriculum task force members together with other curriculum experts will be presenting and discussing the IS 2009 Curriculum Guidelines for Undergraduate Degree Programs in Information Systems document and soliciting IS community feedback regarding ongoing IS curriculum development efforts. As such, the panel discussion will center on the significant components embedded in the newly revised curriculum document. This includes: 1) an ...
    Abstract Dramatic changes in technology and how it affects people demand that we rethink how we teach and conduct research in the information and communication sciences. Technology is changing in kind rather than just in magnitude and... more
    Abstract Dramatic changes in technology and how it affects people demand that we rethink how we teach and conduct research in the information and communication sciences. Technology is changing in kind rather than just in magnitude and demands new ...
    ... have not explicity exam-ined the topic of social context, one EMS field study found that groupsusing an EMS were ... generic group activities such as the management of group sessions, idea generation, idea organization, deci-sion... more
    ... have not explicity exam-ined the topic of social context, one EMS field study found that groupsusing an EMS were ... generic group activities such as the management of group sessions, idea generation, idea organization, deci-sion making, and policy ... EMS for Strategic Decisions ...
    ABSTRACT

    And 106 more