471
Views
35
CrossRef citations to date
0
Altmetric
Original Article

Are Users Threatened by Credibility Assessment Systems?

, , &
Pages 249-262 | Published online: 08 Dec 2014

References

  • Bond, C. F., Jr., and DePaulo, B. M. Accuracy of deception judgments. Personality and Social Psychology Review, 10, 3 (2006), 214-234.
  • Briggs, R. O.; Adkins, M.; Mittleman, D.; Kruse, J.; Miller, S.; and Nunamaker, J. F., Jr. A technology transition model derived from field investigation of GSS use aboard the USS Coronado. Journal of Management Information Systems, 15, 3 (Winter 1998-99), 151-195.
  • Cohen, G. L.; Garcia, J.; Apfel, N.; and Master, A. Reducing the racial achievement gap: A social-psychological intervention. Science, 313, 5791 (September 1, 2006), 1307-1310.
  • Correll, J.; Spencer, S. J.; and Zanna, M. P. An affirmed self and an open mind: Self-affirmation and sensitivity to argument strength. Journal of Experimental Social Psychology, 40, 3 (2004), 350-356.
  • Crocker, J.; Niiya, Y.; and Mischkowski, D. Why does writing about important values reduce defensiveness? Self-affirmation and the role of positive other-directed feelings. Psychological Science, 19, 7 (2008), 740-747.
  • Davis, F. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13, 3 (1989), 319-340.
  • DePaulo, B. M.; Lindsay, J. J.; Malone, B. E.; Muhlenbruck, L.; Charlton, K.; and Cooper, H. Cues to deception. Psychological Bulletin, 129, 1 (2003), 74-118.
  • Derrick, D. C.; Elkins, A. C.; Burgoon, J. K.; Nunamaker, J. F., Jr.; and Zeng, D. D. Border security credibility assessments via heterogeneous sensor fusion. IEEE Intelligent Systems, 25, 3 (2010), 41-49.
  • Iacono, W. G., and Patrick, C. J. Polygraph ("lie detector") testing: Current status and emerging trends. In I. B. Weiner and A. K. Hess (eds.), The Handbook of Forensic Psychology. Hoboken, NJ: John Wiley & Sons, 2006, pp. 552-588.
  • Jensen, M. L.; Burgoon, J. K.; and Nunamaker, J. F., Jr. Computer-aided credibility assessment by novice lie-catchers. In AMCIS 2007 Proceedings. Atlanta: Association for Information Systems, 2007, paper 159.
  • Jensen, M. L.; Lowry, P. B.; and Jenkins, J. Effects of automated and participative decision support in computer-aided credibility assessment. Journal of Management Information Systems, 28, 1 (Summer 2011), 201-234.
  • Jensen, M. L.; Lowry, P. B.; Burgoon, J. K.; and Nunamaker, J. F., Jr. Technology dominance in complex decision making: The case of aided credibility assessment. Journal of Management Information Systems, 27, 1 (Summer 2010), 175-202.
  • Legris, P.; Ingham, J.; and Collerette, P. Why do people use information technology? A critical review of the technology acceptance model. Information & Management, 40, 3 (2003), 191-204.
  • Nunamaker, J. F., Jr.; Derrick, D. C.; Elkins, A. C.; Burgoon, J. K.; and Patton, M. W. Embodied conversational agent-based kiosk for automated interviewing. Journal of Management Information Systems, 28, 1 (Summer 2011), 17-48.
  • Simon, H. A. Rational choice and the structure of the environment. Psychological Review, 63, 2 (1956), 129-138.
  • Steele, C. M. The psychology of self-affirmation: Sustaining the integrity of the self. In L. Berkowitz (ed.), Advances in Experimental Social Psychology, vol. 21. Amsterdam: Elsevier, 1988, pp. 261-302.
  • Venkatesh, V. Determinants of perceived ease of use: Integrating control, intrinsic motivation, and emotion into the technology acceptance model. Information Systems Research, 11, 4 (2000), 342-365.
  • Vrij, A. Why professionals fail to catch liars and how they can improve. Legal and Criminological Psychology, 9, 2 (2004), 159-181.
  • Vrij, A. Detecting Lies and Deceit: Pitfalls and Opportunities. West Sussex, UK: Wiley-Interscience, 2008.
  • Wooldridge, M., and Jennings, N. R. Intelligent agents: Theory and practice. Knowledge Engineering Review, 10, 2 (1995), 115-152.
  • Zhang, Y. Responses to humorous advertising: The moderating effect of need for cognition. Journal of Advertising, 25, 1 (1996), 15-32.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.