research projects overview thomas meservy brigham young university

13
Research Projects Overview Thomas Meservy Brigham Young University

Upload: jewel-goodwin

Post on 30-Dec-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

Research Projects Overview

Thomas MeservyBrigham Young University

Automated Deception Detection Using Non-verbal Behavior

(with Judee Burgoon and Jay F. Nunamaker, Jr)

• Creation of a deception detection system based on non-verbal behavioral cues (body language and voice)

• Data collected at the US/Mexico border• System achieves 20-25% higher accuracy

than humans• Foundation for much of the work being

conducted at Univ. Arizona - CMI

Overview

C

Di

...

D1

D2

Pj

...

P1

P2 A

Utilizationcoefficients

Associationcoefficients

Representationcoefficients

Trait/State Distal Indicator Cues Proximal Percepts Attribution

Inferentialutilization

Externalization Perceptualrepresentation

Phe

nom

enal

leve

lO

pera

tiona

l lev

el

Functional validity

Accuracy coefficient

Controlled Semi-Controlled Natural

Environment

Lo

wM

ed

ium

Hig

h

Au

tom

ata

bili

ty

Brain Activity AnalysisPolygraph

Near Infrared Spectroscopy

Micro-momentary Expressions

Statement Validity Assessment

$$$ -

$$$ -

$$ -

$$$ -

$$ - $$$

$$$

- Thermal Scanning

- Linguistic Analysis- Vocal Analysis- Movement Analysis

Segment into meaningful units

(questions)

Extract low-level features

Compute higher-level features

Summarize features across meaningful unit

Classify using most

discriminatory cues

Audio Files

Input Processing Output

Deceptive

Truthful

Head

Right Hand

Left Hand

Right Hand to Head Distance

Left Hand to Head

Distance

Right Hand to Left Hand

Distance

Discriminant AnalysisLogistic Regression

Multi-layer PerceptronSupport Vector Machine

Decision TreeLinear Regression

Discriminant AnalysisLogistic Regression

Multi-layer PerceptronSupport Vector Machine

Decision TreeLinear Regression

Video Files

Inte

rvie

we

r F

lags

Su

bjec

t Fla

gs

Response Latency Interruption

Subject TurnInterviewer

Turn

Silent Pause

Evaluation of Competing Candidate Solutions in Electronic Networks of Practice

(with Matt Jensen & Kelly Fadel; ISR)

• What information influences knowledge seekers to select solutions when searching online?

• Elaboration Likelihood Model• Used eye-tracker to capture elaboration• 60 experienced software developers

were participants in field study

Overview

Evaluation of Competing Candidate Solutions in Electronic Networks of Practice

(with Matt Jensen & Kelly Fadel; ISR)

• Peripheral cues matter; especially validation• Validation is most salient cue• Even under intense elaboration, peripheral cues don’t

loose their power• Only under intense elaboration does content quality matter

Result

Exploring Knowledge Filtering Processes in Electronic Networks of Practice

(with Matt Jensen & Kelly Fadel; JMIS)

    Directionality

  Alternative-based processing Attribute-based processing

Constancy

Constant

(same # of attributes evaluated

across all solutions)

Individuals look at all attributes of the first solution, then move to the second solution and look at all attributes until all solutions have been considered; e.g., Additive model

Individuals look at one attribute across all solutions, then look at the second attribute across all solutions; all attributes for all solutions are evaluated; e.g., Additive difference model

Variable

(different # of attributes evaluated

across all solutions)

Individuals look at all attributes for a

single solution; select first solution

that satisfies all attribute thresholds;

e.g., Conjunctive model

Individuals look at one attribute

across all solutions and eliminate

from consideration any solution that

doesn’t satisfy the threshold for that

attribute;

e.g., Elimination by aspects model

    Directionality

  Alternative-based processing Attribute-based processing

Constancy

Constant

(same # of attributes evaluated

across all solutions)

Individuals look at all attributes of the first solution, then move to the second solution and look at all attributes until all solutions have been considered; e.g., Additive model

Individuals look at one attribute across all solutions, then look at the second attribute across all solutions; all attributes for all solutions are evaluated; e.g., Additive difference model

Variable

(different # of attributes evaluated

across all solutions)

Individuals look at all attributes for a

single solution; select first solution

that satisfies all attribute thresholds;

e.g., Conjunctive model

Individuals look at one attribute

across all solutions and eliminate

from consideration any solution that

doesn’t satisfy the threshold for that

attribute;

e.g., Elimination by aspects model

• Are there differences in filtering patterns for different levels of performance in an information seeking task?

Overview

    Directionality

  Alternative-based processing Attribute-based processing

Constancy

Constant (same # of attributes evaluated across all solutions)

Individuals look at all attributes of the first solution, then move to the second solution and look at all attributes until all solutions have been considered; e.g., Additive model

Individuals look at one attribute across all solutions, then look at the second attribute across all solutions; all attributes for all solutions are evaluated; e.g., Additive difference model

Variable(different # of attributes evaluated across all solutions)

Individuals look at all attributes for a single solution; select first solution that satisfies all attribute thresholds; e.g., Conjunctive model

Individuals look at one attribute across all solutions and eliminate from consideration any solution that doesn’t satisfy the threshold for that attribute; e.g., Elimination by aspects model

Exploring Knowledge Filtering Processes in Electronic Networks of Practice

(with Matt Jensen & Kelly Fadel; JMIS)

• Accuracy higher when filtering patterns employ – More constant evaluation of attributes across alternatives– More attribute-based –vs alternative-based processing

• Increased attribute-based processing in later filtering stages

Results

fMRI: Evaluation of Online Solutions(with Kelly Fadel, Ray Meservy; targeted ISR)

• How do individuals evaluate and adopt knowledge encountered in ENPs

• What cognitive processing occurs for different types of information?

• Central –vs- Peripheral; System 1 –vs- System 2

• Impact of different types of peripheral cues

Large Group Collaboration(with Joel Helquist and Amit Deokar; targeted CAIS)

• Few frameworks exist for characterizing large group collaborative endeavors

• Mass collaboration, including Web 2.0, is increasingly popular

• Conceptual framework characterizing emerging technologies

Scientific Ideation – Large Group Collaboration with Academics

(with Amit Deokar, Joel Helquist, Aaron Sainsbury; targeted at JMIS)

• Research process is broken especially in the social sciences– Long wait times, single channel,

isolated research agendas• Less Impact than what we

could have

Overview

• Communities of practice• Social capital• Individual motivations• Use technology to increase the

flow of information throughout the research process

Theories/Contribution

Information Addiction(with Kelly Fadel, Ray Meservy; targeted ISR)

• Addiction of all types has adverse impact• Technology addiction, including internet

addiction, is a recognized disorder with very real consequences

• Does Information addiction exist?• Are the mental processes for information

addiction similar to addiction patterns for other disorders?

• Screen for self-reported information addicts

• Gather information including logins for social media and other information sites

• fMRI – Present personalized information streams; self-rating of reaction

• Comparison of patterns

Approach

Riskiness in Online Social Media(with Shane Banks and Colin Onita; targeted at JMIS)

• Why do people post risky information on social media sites?

• How do fear affect behavioral intentions • Used custom designed snowballing

technique to solicit participants from social media site

• 600+ respondents• Protection Motivation Theory

Overview

Understanding Information Systems Continuance for Information Oriented Mobile Applications

(with Leida Chen and Mark Gillenson; CAIS)

• Information quality link to perceived usefulness• Quality of the system (e.g., availability,

responsiveness, flexibility) and quality of the process (e.g., ability to localize and personalize the information) lead to greater realization of the expected benefits

• Hedonic value (e.g., users’ feeling of joy, elation, fun, or pleasure, or depression associated with IS use) impacts the intention to continue to use IOMAs

Results

• Aims to understand the antecedents of consumers’ continuance behaviors in the context of information oriented mobile applications

• Mobile apps + ubiquitous access to information is becoming a reality

• Builds on Bhattacherjee’s work on IS Continuance

Overview

• Survey of users of Blackberry app “Instafind”, an Information Oriented Mobile Application

• 147 participants• SEM using AMOS

Data Collection & Analysis

Unleashing Agile Development in a Large Organization: How IS Loses Control

(with Lakshman Mahadevan & Bill Kettinger; CAIS)

• More varied control mechanisms • Clan control dominant control

mechanism• More frequent control points than in

traditional ISD processes• Business function exerts more control in

Agile than in traditional ISD processes

Results

• Case study at FedEx• Investigates dominant

control mechanisms during Agile software development

• Initial pilot of Agile processes

Overview