David P. Biros

According to our database1, David P. Biros authored at least 34 papers between 2002 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
When Programs Collide: A Panel Report on the Competing Interests of Analytics and Security.
Commun. Assoc. Inf. Syst., 2020

2016
An Empirical Validation of Malicious Insider Characteristics.
J. Manag. Inf. Syst., 2016

Validating Common Characteristics of Malicious Insiders: Proof of Concept Study.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Taxonomy of Malicious Insiders: A Proof of Concept Study.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
Real-World Deception and the Impact of Severity.
J. Comput. Inf. Syst., 2015

2012
Toward Alignment between Communities of Practice and Knowledge-Based Decision Support.
J. Digit. Forensics Secur. Law, 2012

2011
An investigation of data and text mining methods for real world deception detection.
Expert Syst. Appl., 2011

A Conceptual Model of Real World, High Stakes Deception Detection.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Ammunition Multimedia Encyclopedia (AME): A Case Study.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
On-demand Assistance in Handling Ammunition: Development of a Mobile Ammo DSS.
Proceedings of the Supporting Real Time Decision-Making, 2010

2009
Organization of Lessons Learned Knowledge: A Taxonomy and Implementation.
Int. J. Knowl. Manag., 2009

Decision support for determining veracity via linguistic-based cues.
Decis. Support Syst., 2009

A Model for the Impact of Task Complexity on Deception in a Group Decision Making Task.
Proceedings of the 15th Americas Conference on Information Systems, 2009

Mobile AME: A Handheld Application to Support Decision Making for Ammunition Personnel.
Proceedings of the 15th Americas Conference on Information Systems, 2009

Motivating Knowledge Sharing in Diverse Organizational Contexts: An Argument for Reopening the Intrinsic vs. Extrinsic Debate.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
The Role of E-Training in Protecting Information Assets Against Deception Attacks.
MIS Q. Executive, 2008

Exploration of Feature Selection and Advanced Classification Models for High-Stakes Deception Detection.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

2007
An Exploratory Analysis of Computer Mediated Communications on Cyberstalking Severity.
J. Digit. Forensics Secur. Law, 2007

Incorporating Information Assurance in Systems Analysis and Design Curricula.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
Development of a National Repository of Digital Forensic Intelligence.
J. Digit. Forensics Secur. Law, 2006

Detecting Deception in Person-of-Interest Statements.
Proceedings of the Intelligence and Security Informatics, 2006

Automated Determination of the Veracity of Interview Statements from People of Interest to an Operational Security Force.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

Vigilance and Error Detection in an Automated Command and Control Environment.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

An Analysis of Text-Based Deception Detection Tools.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2005
Inside the Fence: Sensitizing Decision Makers to the Possibility of Deception in the Data They Use.
MIS Q. Executive, 2005

A Quasi-experiment to Determine the Impact of a Computer Based Deception Detection Training System: The Use of Agent99 Trainer in the U.S. Military.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Task Performance Under Deceptive Conditions: Using Military Scenarios in Deception Detection Research.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

2004
Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training.
Proceedings of the Intelligence and Security Informatics, 2004

Testing Various Modes of Computer-Based Training for Deception Detection.
Proceedings of the Intelligence and Security Informatics, 2004

Training to Detect Deception: An Experimental Investigation.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2003
Training Professionals to Detect Deception.
Proceedings of the Intelligence and Security Informatics, First NSF/NIJ Symposium, 2003

The Effect of External Safeguards on Human-Information System Trust in an Information Warfare Environment.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

2002
Inducing Sensitivity to Deception in Order to Improve Decision Making Performance: A Field Study.
MIS Q., 2002

Career anchors of United States Air Force information systems workers: a turnover predictor?
Proceedings of the ACM SIGCPR Conference on Computer Personnel Research, 2002


  Loading...