John Kruse | University of Arizona (original) (raw)
Papers by John Kruse
Handbooks in Information Systems, 2007
Abstract Collaboration and the success of collaborative efforts has been the focus of much inform... more Abstract Collaboration and the success of collaborative efforts has been the focus of much information systems research. Recent measures of collaboration success include effectiveness, efficiency, productivity, commitment, satisfaction with the process, and satisfaction with the outcome. While the possible antecedents of collaboration success are many and varied, we suggest that constructs from the e-learning literature, that evolved independently from the information systems collaboration literature, can be used to ...
International Journal of Social and Organizational Dynamics in IT, 2011
Abstract Collaboration and the success of collaborative efforts has been the focus of much inform... more Abstract Collaboration and the success of collaborative efforts has been the focus of much information systems research. Recent measures of collaboration success include effectiveness, efficiency, productivity, commitment, satisfaction with the process, and satisfaction with the outcome. While the possible antecedents of collaboration success are many and varied, we suggest that constructs from the e-learning literature, that evolved independently from the information systems collaboration literature, can be used to ...
2010 43rd Hawaii International Conference on System Sciences, 2010
Abstract Collaboration and the success of collaborative efforts has been the focus of much inform... more Abstract Collaboration and the success of collaborative efforts has been the focus of much information systems research. Recent measures of collaboration success include effectiveness, efficiency, productivity, commitment, satisfaction with the process, and satisfaction with the outcome. While the possible antecedents of collaboration success are many and varied, we suggest that constructs from the e-learning literature, that evolved independently from the information systems collaboration literature, can be used to ...
2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), 2007
Results also indicate the number of off-topic and nonsolution brainstorming output increases sign... more Results also indicate the number of off-topic and nonsolution brainstorming output increases significantly over time. These findings are discussed in light of participant-driven group support systems.
Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), 2008
Abstract Traditional GSS workflow leverages the abilities of an expert facilitator to lead groups... more Abstract Traditional GSS workflow leverages the abilities of an expert facilitator to lead groups through the convergence activities. This dependence on a facilitator creates a bottleneck that is difficult to resolve in asynchronous and distributed groups. This paper presents a new ...
ACM SIGMIS Database, 2011
between individuals and organizations continue to grow, decision time horizons shrink and more wo... more between individuals and organizations continue to grow, decision time horizons shrink and more work is being performed by distributed teams. These factors are driving up overall problem space complexity and limiting the effectiveness of time-tested decision and collaboration processes. Increases in problem space complexity lead to higher equivocality in collaborative processes and associated products. Electronic collaboration support tools and associated process management schemes have proven successful in many challenging contexts. However, current collaboration process management schemes and tools may not be able to effectively handle more complex tasks. We posit that heightened problem space complexity must be addressed with commensurate process and technological support for collaborative efforts. To achieve truly agile collaborative solutions, we propose Dynamic Collaboration -a process management scheme that utilizes group consensus, and process evolution via iterative process alignment and product refinement phases to meet the challenges posed by complexity and equivocality.
Proceedings of the 38th Annual Hawaii International Conference on System Sciences, 2005
The idea of anywhere and anytime learning is enticing. Electronic-based learning is seen as an an... more The idea of anywhere and anytime learning is enticing. Electronic-based learning is seen as an answer to this requirement. Currently there are many variations in electronic-based instructional media, and there is little research to determine which format or combination of formats is most conducive to facilitating knowledge transfer and learning. This research project explores three primary constructs of media richness, content flexibility, and forced engagement, in relation to effectiveness or productivity in facilitating learning in the experimental participants. The instructional subject matter was detecting deceptive communication 0-7695-2268
Proceedings of the 38th Annual Hawaii International Conference on System Sciences, 2005
Available test beds for intent analysis are discussed and two proof-ofconcept studies exploring n... more Available test beds for intent analysis are discussed and two proof-ofconcept studies exploring nonverbal communication within the context of deception detection and intent analysis are shared.
Lecture Notes in Computer Science, 2005
This research initiative is an initial investigation into a novel approach for deriving indicator... more This research initiative is an initial investigation into a novel approach for deriving indicators of deception from video-taped interaction. The team utilized twodimensional spatial inputs extracted from video to construct a set of discrete and inter-relational features. The features for thirty-eight video interactions were then analyzed using discriminant analysis. Additionally, features were used to build a multivariate regression model. Through this exploratory study, the team established the validity of the approach, and identified a number of promising features, opening the door for further investigation.
2005 IEEE International Conference on Multimedia and Expo, 2005
Behavioral indicators of deception and behavioral state are extremely difficult for humans to ana... more Behavioral indicators of deception and behavioral state are extremely difficult for humans to analyze. This research effort attempts to leverage automated systems to augment humans in detecting deception by analyzing nonverbal behavior on video. By tracking faces and hands of an individual, it is anticipated that objective behavioral indicators of deception can be isolated, extracted and synthesized to create a more accurate means for detecting human deception. Blob analysis, a method for analyzing the movement of the head and hands based on the identification of skin color is presented. A proof-ofconcept study is presented that uses blob analysis to extract visual cues and events, throughout the examined videos. The integration of these cues is done using a hierarchical Hidden Markov Model to explore behavioral state identification in the detection of deception, mainly involving the detection of agitated and over-controlled behaviors.
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 2000
The Center for the Management of Information (CMI) at the University of Arizona worked with the U... more The Center for the Management of Information (CMI) at the University of Arizona worked with the US Navy Commander, Third Fleet (Third Fleet) to overcome limitations of performing closely coordinated staff work on board a US Navy ship. Third Fleet is required to collaborate with hundreds of people internally and with military and civilian organizations both nationally and internationally. Third Fleet has staff officers and enlisted personnel embarked from Canada, Chile, Japan, Australia, Peru, and Britain. In addition, Third Fleet regularly works with representatives from South Korea and Mexico. This physical separation raises significant barriers to collaboration and cooperation. The research presented in this paper details the efforts of CMI, SPAWAR Systems Center and Third Fleet to introduce a virtual workspace on board the Third Fleet Command Ship USS CORONADO (AGF-11), a seagoing command and control platform berthed in San Diego, California. The virtual environment was developed and implemented to afford the staff unfettered collaboration between two different spaces aboard the ship.
IEEE Transactions on Intelligent Transportation Systems, 2000
Past research in deception detection at the University of Arizona has guided the investigation of... more Past research in deception detection at the University of Arizona has guided the investigation of concealment detection. A theoretical foundation and model for the analysis of concealment detection is proposed. The visual and verbal channels are the two avenues of concealment detection studied. Several available test beds for visual intent analysis are discussed and a proof-of-concept study exploring nonverbal communication within the context of concealment detection is shared. Additionally, two methods that may aid in verbally detecting deception during the interviews characteristic of secondary screening are introduced. Message feature mining uses message features or cues combined with machine learning techniques to classify messages according to their deceptive potential. Speech act profiling, a method for quantifying and visualizing entire conversations, has shown promise in aiding deception detection. These methods may be combined and are intended to be a part of a suite of tools for automating deception detection.
IEEE Intelligent Systems, 2005
E very day, hundreds of thousands of people pass through airport security checkpoints, border cro... more E very day, hundreds of thousands of people pass through airport security checkpoints, border crossing stations, or other security screening measures. Security professionals must sift through countless interactions and ferret out high-risk individuals who represent a danger to other citizens. During each interaction, the security professional must decide whether the individual is being forthright or deceptive. This task is difficult because of the limits of human vigilance and perception and the small percentage of individuals who actually harbor hostile intent (see the sidebar for more about these challenges). Security personnel can't halt the flow of people and material to extensively gauge the truthfulness of every interaction, so we must do more to help them identify deception and ill intent.
Page 1. A Language Technology Toolset for Development of a Large Group Augmented Facilitation Sys... more Page 1. A Language Technology Toolset for Development of a Large Group Augmented Facilitation System Mark Adkins & John Kruse Robert Younger Center for the Management of Information University of Arizona Tucson, AZ ...
Journal of …, Dec 1, 1998
Intelligent …, Oct 3, 2004
Past research in deception detection at the University of Arizona has guided the investigation of... more Past research in deception detection at the University of Arizona has guided the investigation of intent detection. A theoretical foundation and model for the analysis of intent detection is proposed. Available test beds for intent analysis are discussed and two proof-of-concept studies exploring nonverbal communication within the context of intent detection are shared.
Mis Quarterly Executive, 2008
CIOs and IT managers need to mitigate the risks to information and IT assets arising from decepti... more CIOs and IT managers need to mitigate the risks to information and IT assets arising from deception-based attacks. Common examples of deception are "social engineering" and phishing, both aimed at getting people to divulge information that will enable unauthorized access to computer systems. One well-known hacker has claimed it is easier to ask people for the required information than to employ highly technical hacking techniques.
Handbooks in Information Systems, 2007
Abstract Collaboration and the success of collaborative efforts has been the focus of much inform... more Abstract Collaboration and the success of collaborative efforts has been the focus of much information systems research. Recent measures of collaboration success include effectiveness, efficiency, productivity, commitment, satisfaction with the process, and satisfaction with the outcome. While the possible antecedents of collaboration success are many and varied, we suggest that constructs from the e-learning literature, that evolved independently from the information systems collaboration literature, can be used to ...
International Journal of Social and Organizational Dynamics in IT, 2011
Abstract Collaboration and the success of collaborative efforts has been the focus of much inform... more Abstract Collaboration and the success of collaborative efforts has been the focus of much information systems research. Recent measures of collaboration success include effectiveness, efficiency, productivity, commitment, satisfaction with the process, and satisfaction with the outcome. While the possible antecedents of collaboration success are many and varied, we suggest that constructs from the e-learning literature, that evolved independently from the information systems collaboration literature, can be used to ...
2010 43rd Hawaii International Conference on System Sciences, 2010
Abstract Collaboration and the success of collaborative efforts has been the focus of much inform... more Abstract Collaboration and the success of collaborative efforts has been the focus of much information systems research. Recent measures of collaboration success include effectiveness, efficiency, productivity, commitment, satisfaction with the process, and satisfaction with the outcome. While the possible antecedents of collaboration success are many and varied, we suggest that constructs from the e-learning literature, that evolved independently from the information systems collaboration literature, can be used to ...
2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), 2007
Results also indicate the number of off-topic and nonsolution brainstorming output increases sign... more Results also indicate the number of off-topic and nonsolution brainstorming output increases significantly over time. These findings are discussed in light of participant-driven group support systems.
Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), 2008
Abstract Traditional GSS workflow leverages the abilities of an expert facilitator to lead groups... more Abstract Traditional GSS workflow leverages the abilities of an expert facilitator to lead groups through the convergence activities. This dependence on a facilitator creates a bottleneck that is difficult to resolve in asynchronous and distributed groups. This paper presents a new ...
ACM SIGMIS Database, 2011
between individuals and organizations continue to grow, decision time horizons shrink and more wo... more between individuals and organizations continue to grow, decision time horizons shrink and more work is being performed by distributed teams. These factors are driving up overall problem space complexity and limiting the effectiveness of time-tested decision and collaboration processes. Increases in problem space complexity lead to higher equivocality in collaborative processes and associated products. Electronic collaboration support tools and associated process management schemes have proven successful in many challenging contexts. However, current collaboration process management schemes and tools may not be able to effectively handle more complex tasks. We posit that heightened problem space complexity must be addressed with commensurate process and technological support for collaborative efforts. To achieve truly agile collaborative solutions, we propose Dynamic Collaboration -a process management scheme that utilizes group consensus, and process evolution via iterative process alignment and product refinement phases to meet the challenges posed by complexity and equivocality.
Proceedings of the 38th Annual Hawaii International Conference on System Sciences, 2005
The idea of anywhere and anytime learning is enticing. Electronic-based learning is seen as an an... more The idea of anywhere and anytime learning is enticing. Electronic-based learning is seen as an answer to this requirement. Currently there are many variations in electronic-based instructional media, and there is little research to determine which format or combination of formats is most conducive to facilitating knowledge transfer and learning. This research project explores three primary constructs of media richness, content flexibility, and forced engagement, in relation to effectiveness or productivity in facilitating learning in the experimental participants. The instructional subject matter was detecting deceptive communication 0-7695-2268
Proceedings of the 38th Annual Hawaii International Conference on System Sciences, 2005
Available test beds for intent analysis are discussed and two proof-ofconcept studies exploring n... more Available test beds for intent analysis are discussed and two proof-ofconcept studies exploring nonverbal communication within the context of deception detection and intent analysis are shared.
Lecture Notes in Computer Science, 2005
This research initiative is an initial investigation into a novel approach for deriving indicator... more This research initiative is an initial investigation into a novel approach for deriving indicators of deception from video-taped interaction. The team utilized twodimensional spatial inputs extracted from video to construct a set of discrete and inter-relational features. The features for thirty-eight video interactions were then analyzed using discriminant analysis. Additionally, features were used to build a multivariate regression model. Through this exploratory study, the team established the validity of the approach, and identified a number of promising features, opening the door for further investigation.
2005 IEEE International Conference on Multimedia and Expo, 2005
Behavioral indicators of deception and behavioral state are extremely difficult for humans to ana... more Behavioral indicators of deception and behavioral state are extremely difficult for humans to analyze. This research effort attempts to leverage automated systems to augment humans in detecting deception by analyzing nonverbal behavior on video. By tracking faces and hands of an individual, it is anticipated that objective behavioral indicators of deception can be isolated, extracted and synthesized to create a more accurate means for detecting human deception. Blob analysis, a method for analyzing the movement of the head and hands based on the identification of skin color is presented. A proof-ofconcept study is presented that uses blob analysis to extract visual cues and events, throughout the examined videos. The integration of these cues is done using a hierarchical Hidden Markov Model to explore behavioral state identification in the detection of deception, mainly involving the detection of agitated and over-controlled behaviors.
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 2000
The Center for the Management of Information (CMI) at the University of Arizona worked with the U... more The Center for the Management of Information (CMI) at the University of Arizona worked with the US Navy Commander, Third Fleet (Third Fleet) to overcome limitations of performing closely coordinated staff work on board a US Navy ship. Third Fleet is required to collaborate with hundreds of people internally and with military and civilian organizations both nationally and internationally. Third Fleet has staff officers and enlisted personnel embarked from Canada, Chile, Japan, Australia, Peru, and Britain. In addition, Third Fleet regularly works with representatives from South Korea and Mexico. This physical separation raises significant barriers to collaboration and cooperation. The research presented in this paper details the efforts of CMI, SPAWAR Systems Center and Third Fleet to introduce a virtual workspace on board the Third Fleet Command Ship USS CORONADO (AGF-11), a seagoing command and control platform berthed in San Diego, California. The virtual environment was developed and implemented to afford the staff unfettered collaboration between two different spaces aboard the ship.
IEEE Transactions on Intelligent Transportation Systems, 2000
Past research in deception detection at the University of Arizona has guided the investigation of... more Past research in deception detection at the University of Arizona has guided the investigation of concealment detection. A theoretical foundation and model for the analysis of concealment detection is proposed. The visual and verbal channels are the two avenues of concealment detection studied. Several available test beds for visual intent analysis are discussed and a proof-of-concept study exploring nonverbal communication within the context of concealment detection is shared. Additionally, two methods that may aid in verbally detecting deception during the interviews characteristic of secondary screening are introduced. Message feature mining uses message features or cues combined with machine learning techniques to classify messages according to their deceptive potential. Speech act profiling, a method for quantifying and visualizing entire conversations, has shown promise in aiding deception detection. These methods may be combined and are intended to be a part of a suite of tools for automating deception detection.
IEEE Intelligent Systems, 2005
E very day, hundreds of thousands of people pass through airport security checkpoints, border cro... more E very day, hundreds of thousands of people pass through airport security checkpoints, border crossing stations, or other security screening measures. Security professionals must sift through countless interactions and ferret out high-risk individuals who represent a danger to other citizens. During each interaction, the security professional must decide whether the individual is being forthright or deceptive. This task is difficult because of the limits of human vigilance and perception and the small percentage of individuals who actually harbor hostile intent (see the sidebar for more about these challenges). Security personnel can't halt the flow of people and material to extensively gauge the truthfulness of every interaction, so we must do more to help them identify deception and ill intent.
Page 1. A Language Technology Toolset for Development of a Large Group Augmented Facilitation Sys... more Page 1. A Language Technology Toolset for Development of a Large Group Augmented Facilitation System Mark Adkins & John Kruse Robert Younger Center for the Management of Information University of Arizona Tucson, AZ ...
Journal of …, Dec 1, 1998
Intelligent …, Oct 3, 2004
Past research in deception detection at the University of Arizona has guided the investigation of... more Past research in deception detection at the University of Arizona has guided the investigation of intent detection. A theoretical foundation and model for the analysis of intent detection is proposed. Available test beds for intent analysis are discussed and two proof-of-concept studies exploring nonverbal communication within the context of intent detection are shared.
Mis Quarterly Executive, 2008
CIOs and IT managers need to mitigate the risks to information and IT assets arising from decepti... more CIOs and IT managers need to mitigate the risks to information and IT assets arising from deception-based attacks. Common examples of deception are "social engineering" and phishing, both aimed at getting people to divulge information that will enable unauthorized access to computer systems. One well-known hacker has claimed it is easier to ask people for the required information than to employ highly technical hacking techniques.