John Kruse | University of Arizona (original) (raw)

Papers by John Kruse

Research paper thumbnail of Chapter 8 Deception and Intention Detection

Handbooks in Information Systems, 2007

Research paper thumbnail of Understanding Collaboration Success in Context of Cognitive and Social Presence

Abstract Collaboration and the success of collaborative efforts has been the focus of much inform... more Abstract Collaboration and the success of collaborative efforts has been the focus of much information systems research. Recent measures of collaboration success include effectiveness, efficiency, productivity, commitment, satisfaction with the process, and satisfaction with the outcome. While the possible antecedents of collaboration success are many and varied, we suggest that constructs from the e-learning literature, that evolved independently from the information systems collaboration literature, can be used to ...

Research paper thumbnail of Understanding Collaboration Success in Context of Cognitive and Social Presence

International Journal of Social and Organizational Dynamics in IT, 2011

Abstract Collaboration and the success of collaborative efforts has been the focus of much inform... more Abstract Collaboration and the success of collaborative efforts has been the focus of much information systems research. Recent measures of collaboration success include effectiveness, efficiency, productivity, commitment, satisfaction with the process, and satisfaction with the outcome. While the possible antecedents of collaboration success are many and varied, we suggest that constructs from the e-learning literature, that evolved independently from the information systems collaboration literature, can be used to ...

Research paper thumbnail of Understanding Collaboration Success in Context of Cognitive and Social Presence

2010 43rd Hawaii International Conference on System Sciences, 2010

Abstract Collaboration and the success of collaborative efforts has been the focus of much inform... more Abstract Collaboration and the success of collaborative efforts has been the focus of much information systems research. Recent measures of collaboration success include effectiveness, efficiency, productivity, commitment, satisfaction with the process, and satisfaction with the outcome. While the possible antecedents of collaboration success are many and varied, we suggest that constructs from the e-learning literature, that evolved independently from the information systems collaboration literature, can be used to ...

Research paper thumbnail of Participant-driven GSS: Quality of Brainstorming and Allocation of Participant Resources

2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), 2007

Results also indicate the number of off-topic and nonsolution brainstorming output increases sign... more Results also indicate the number of off-topic and nonsolution brainstorming output increases significantly over time. These findings are discussed in light of participant-driven group support systems.

Research paper thumbnail of Participant-Driven Collaborative Convergence

Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), 2008

Abstract Traditional GSS workflow leverages the abilities of an expert facilitator to lead groups... more Abstract Traditional GSS workflow leverages the abilities of an expert facilitator to lead groups through the convergence activities. This dependence on a facilitator creates a bottleneck that is difficult to resolve in asynchronous and distributed groups. This paper presents a new ...

Research paper thumbnail of Dynamic collaboration

ACM SIGMIS Database, 2011

between individuals and organizations continue to grow, decision time horizons shrink and more wo... more between individuals and organizations continue to grow, decision time horizons shrink and more work is being performed by distributed teams. These factors are driving up overall problem space complexity and limiting the effectiveness of time-tested decision and collaboration processes. Increases in problem space complexity lead to higher equivocality in collaborative processes and associated products. Electronic collaboration support tools and associated process management schemes have proven successful in many challenging contexts. However, current collaboration process management schemes and tools may not be able to effectively handle more complex tasks. We posit that heightened problem space complexity must be addressed with commensurate process and technological support for collaborative efforts. To achieve truly agile collaborative solutions, we propose Dynamic Collaboration -a process management scheme that utilizes group consensus, and process evolution via iterative process alignment and product refinement phases to meet the challenges posed by complexity and equivocality.

Research paper thumbnail of A Quasi-experiment to Determine the Impact of a Computer Based Deception Detection Training System: The Use of Agent99 Trainer in the U.S. Military

Proceedings of the 38th Annual Hawaii International Conference on System Sciences, 2005

The idea of anywhere and anytime learning is enticing. Electronic-based learning is seen as an an... more The idea of anywhere and anytime learning is enticing. Electronic-based learning is seen as an answer to this requirement. Currently there are many variations in electronic-based instructional media, and there is little research to determine which format or combination of formats is most conducive to facilitating knowledge transfer and learning. This research project explores three primary constructs of media richness, content flexibility, and forced engagement, in relation to effectiveness or productivity in facilitating learning in the experimental participants. The instructional subject matter was detecting deceptive communication 0-7695-2268

Research paper thumbnail of An Approach for Intent Identification by Building on Deception Detection

Proceedings of the 38th Annual Hawaii International Conference on System Sciences, 2005

Available test beds for intent analysis are discussed and two proof-ofconcept studies exploring n... more Available test beds for intent analysis are discussed and two proof-ofconcept studies exploring nonverbal communication within the context of deception detection and intent analysis are shared.

Research paper thumbnail of Automatic Extraction of Deceptive Behavioral Cues from Video

Lecture Notes in Computer Science, 2005

This research initiative is an initial investigation into a novel approach for deriving indicator... more This research initiative is an initial investigation into a novel approach for deriving indicators of deception from video-taped interaction. The team utilized twodimensional spatial inputs extracted from video to construct a set of discrete and inter-relational features. The features for thirty-eight video interactions were then analyzed using discriminant analysis. Additionally, features were used to build a multivariate regression model. Through this exploratory study, the team established the validity of the approach, and identified a number of promising features, opening the door for further investigation.

Research paper thumbnail of HMM-Based Deception Recognition from Visual Cues

2005 IEEE International Conference on Multimedia and Expo, 2005

Behavioral indicators of deception and behavioral state are extremely difficult for humans to ana... more Behavioral indicators of deception and behavioral state are extremely difficult for humans to analyze. This research effort attempts to leverage automated systems to augment humans in detecting deception by analyzing nonverbal behavior on video. By tracking faces and hands of an individual, it is anticipated that objective behavioral indicators of deception can be isolated, extracted and synthesized to create a more accurate means for detecting human deception. Blob analysis, a method for analyzing the movement of the head and hands based on the identification of skin color is presented. A proof-ofconcept study is presented that uses blob analysis to extract visual cues and events, throughout the examined videos. The integration of these cues is done using a hierarchical Hidden Markov Model to explore behavioral state identification in the detection of deception, mainly involving the detection of agitated and over-controlled behaviors.

Research paper thumbnail of Experiences developing a virtual environment to support disaster relief with the United States Navy's Commander Third Fleet

Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 2000

The Center for the Management of Information (CMI) at the University of Arizona worked with the U... more The Center for the Management of Information (CMI) at the University of Arizona worked with the US Navy Commander, Third Fleet (Third Fleet) to overcome limitations of performing closely coordinated staff work on board a US Navy ship. Third Fleet is required to collaborate with hundreds of people internally and with military and civilian organizations both nationally and internationally. Third Fleet has staff officers and enlisted personnel embarked from Canada, Chile, Japan, Australia, Peru, and Britain. In addition, Third Fleet regularly works with representatives from South Korea and Mexico. This physical separation raises significant barriers to collaboration and cooperation. The research presented in this paper details the efforts of CMI, SPAWAR Systems Center and Third Fleet to introduce a virtual workspace on board the Third Fleet Command Ship USS CORONADO (AGF-11), a seagoing command and control platform berthed in San Diego, California. The virtual environment was developed and implemented to afford the staff unfettered collaboration between two different spaces aboard the ship.

Research paper thumbnail of Detecting Concealment of Intent in Transportation Screening: A Proof of Concept

IEEE Transactions on Intelligent Transportation Systems, 2000

Past research in deception detection at the University of Arizona has guided the investigation of... more Past research in deception detection at the University of Arizona has guided the investigation of concealment detection. A theoretical foundation and model for the analysis of concealment detection is proposed. The visual and verbal channels are the two avenues of concealment detection studied. Several available test beds for visual intent analysis are discussed and a proof-of-concept study exploring nonverbal communication within the context of concealment detection is shared. Additionally, two methods that may aid in verbally detecting deception during the interviews characteristic of secondary screening are introduced. Message feature mining uses message features or cues combined with machine learning techniques to classify messages according to their deceptive potential. Speech act profiling, a method for quantifying and visualizing entire conversations, has shown promise in aiding deception detection. These methods may be combined and are intended to be a part of a suite of tools for automating deception detection.

Research paper thumbnail of Deception Detection through Automatic, Unobtrusive Analysis of Nonverbal Behavior

IEEE Intelligent Systems, 2005

E very day, hundreds of thousands of people pass through airport security checkpoints, border cro... more E very day, hundreds of thousands of people pass through airport security checkpoints, border crossing stations, or other security screening measures. Security professionals must sift through countless interactions and ferret out high-risk individuals who represent a danger to other citizens. During each interaction, the security professional must decide whether the individual is being forthright or deceptive. This task is difficult because of the limits of human vigilance and perception and the small percentage of individuals who actually harbor hostile intent (see the sidebar for more about these challenges). Security personnel can't halt the flow of people and material to extensively gauge the truthfulness of every interaction, so we must do more to help them identify deception and ill intent.

Research paper thumbnail of A language technology toolset for development of a large group augmented facilitation system

Page 1. A Language Technology Toolset for Development of a Large Group Augmented Facilitation Sys... more Page 1. A Language Technology Toolset for Development of a Large Group Augmented Facilitation System Mark Adkins & John Kruse Robert Younger Center for the Management of Information University of Arizona Tucson, AZ ...

Research paper thumbnail of A technology transition model derived from field investigation of GSS use aboard the USS Coronado

Journal of …, Dec 1, 1998

Research paper thumbnail of Moving toward intent detection: a tool-based approach

Intelligent …, Oct 3, 2004

Past research in deception detection at the University of Arizona has guided the investigation of... more Past research in deception detection at the University of Arizona has guided the investigation of intent detection. A theoretical foundation and model for the analysis of intent detection is proposed. Available test beds for intent analysis are discussed and two proof-of-concept studies exploring nonverbal communication within the context of intent detection are shared.

Research paper thumbnail of The Role of E-Training in Protecting Information Assets Against Deception Attacks

Mis Quarterly Executive, 2008

CIOs and IT managers need to mitigate the risks to information and IT assets arising from decepti... more CIOs and IT managers need to mitigate the risks to information and IT assets arising from deception-based attacks. Common examples of deception are "social engineering" and phishing, both aimed at getting people to divulge information that will enable unauthorized access to computer systems. One well-known hacker has claimed it is easier to ask people for the required information than to employ highly technical hacking techniques.

Research paper thumbnail of Chapter 8 Deception and Intention Detection

Handbooks in Information Systems, 2007

Research paper thumbnail of Understanding Collaboration Success in Context of Cognitive and Social Presence

Abstract Collaboration and the success of collaborative efforts has been the focus of much inform... more Abstract Collaboration and the success of collaborative efforts has been the focus of much information systems research. Recent measures of collaboration success include effectiveness, efficiency, productivity, commitment, satisfaction with the process, and satisfaction with the outcome. While the possible antecedents of collaboration success are many and varied, we suggest that constructs from the e-learning literature, that evolved independently from the information systems collaboration literature, can be used to ...

Research paper thumbnail of Understanding Collaboration Success in Context of Cognitive and Social Presence

International Journal of Social and Organizational Dynamics in IT, 2011

Abstract Collaboration and the success of collaborative efforts has been the focus of much inform... more Abstract Collaboration and the success of collaborative efforts has been the focus of much information systems research. Recent measures of collaboration success include effectiveness, efficiency, productivity, commitment, satisfaction with the process, and satisfaction with the outcome. While the possible antecedents of collaboration success are many and varied, we suggest that constructs from the e-learning literature, that evolved independently from the information systems collaboration literature, can be used to ...

Research paper thumbnail of Understanding Collaboration Success in Context of Cognitive and Social Presence

2010 43rd Hawaii International Conference on System Sciences, 2010

Abstract Collaboration and the success of collaborative efforts has been the focus of much inform... more Abstract Collaboration and the success of collaborative efforts has been the focus of much information systems research. Recent measures of collaboration success include effectiveness, efficiency, productivity, commitment, satisfaction with the process, and satisfaction with the outcome. While the possible antecedents of collaboration success are many and varied, we suggest that constructs from the e-learning literature, that evolved independently from the information systems collaboration literature, can be used to ...

Research paper thumbnail of Participant-driven GSS: Quality of Brainstorming and Allocation of Participant Resources

2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), 2007

Results also indicate the number of off-topic and nonsolution brainstorming output increases sign... more Results also indicate the number of off-topic and nonsolution brainstorming output increases significantly over time. These findings are discussed in light of participant-driven group support systems.

Research paper thumbnail of Participant-Driven Collaborative Convergence

Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008), 2008

Abstract Traditional GSS workflow leverages the abilities of an expert facilitator to lead groups... more Abstract Traditional GSS workflow leverages the abilities of an expert facilitator to lead groups through the convergence activities. This dependence on a facilitator creates a bottleneck that is difficult to resolve in asynchronous and distributed groups. This paper presents a new ...

Research paper thumbnail of Dynamic collaboration

ACM SIGMIS Database, 2011

between individuals and organizations continue to grow, decision time horizons shrink and more wo... more between individuals and organizations continue to grow, decision time horizons shrink and more work is being performed by distributed teams. These factors are driving up overall problem space complexity and limiting the effectiveness of time-tested decision and collaboration processes. Increases in problem space complexity lead to higher equivocality in collaborative processes and associated products. Electronic collaboration support tools and associated process management schemes have proven successful in many challenging contexts. However, current collaboration process management schemes and tools may not be able to effectively handle more complex tasks. We posit that heightened problem space complexity must be addressed with commensurate process and technological support for collaborative efforts. To achieve truly agile collaborative solutions, we propose Dynamic Collaboration -a process management scheme that utilizes group consensus, and process evolution via iterative process alignment and product refinement phases to meet the challenges posed by complexity and equivocality.

Research paper thumbnail of A Quasi-experiment to Determine the Impact of a Computer Based Deception Detection Training System: The Use of Agent99 Trainer in the U.S. Military

Proceedings of the 38th Annual Hawaii International Conference on System Sciences, 2005

The idea of anywhere and anytime learning is enticing. Electronic-based learning is seen as an an... more The idea of anywhere and anytime learning is enticing. Electronic-based learning is seen as an answer to this requirement. Currently there are many variations in electronic-based instructional media, and there is little research to determine which format or combination of formats is most conducive to facilitating knowledge transfer and learning. This research project explores three primary constructs of media richness, content flexibility, and forced engagement, in relation to effectiveness or productivity in facilitating learning in the experimental participants. The instructional subject matter was detecting deceptive communication 0-7695-2268

Research paper thumbnail of An Approach for Intent Identification by Building on Deception Detection

Proceedings of the 38th Annual Hawaii International Conference on System Sciences, 2005

Available test beds for intent analysis are discussed and two proof-ofconcept studies exploring n... more Available test beds for intent analysis are discussed and two proof-ofconcept studies exploring nonverbal communication within the context of deception detection and intent analysis are shared.

Research paper thumbnail of Automatic Extraction of Deceptive Behavioral Cues from Video

Lecture Notes in Computer Science, 2005

This research initiative is an initial investigation into a novel approach for deriving indicator... more This research initiative is an initial investigation into a novel approach for deriving indicators of deception from video-taped interaction. The team utilized twodimensional spatial inputs extracted from video to construct a set of discrete and inter-relational features. The features for thirty-eight video interactions were then analyzed using discriminant analysis. Additionally, features were used to build a multivariate regression model. Through this exploratory study, the team established the validity of the approach, and identified a number of promising features, opening the door for further investigation.

Research paper thumbnail of HMM-Based Deception Recognition from Visual Cues

2005 IEEE International Conference on Multimedia and Expo, 2005

Behavioral indicators of deception and behavioral state are extremely difficult for humans to ana... more Behavioral indicators of deception and behavioral state are extremely difficult for humans to analyze. This research effort attempts to leverage automated systems to augment humans in detecting deception by analyzing nonverbal behavior on video. By tracking faces and hands of an individual, it is anticipated that objective behavioral indicators of deception can be isolated, extracted and synthesized to create a more accurate means for detecting human deception. Blob analysis, a method for analyzing the movement of the head and hands based on the identification of skin color is presented. A proof-ofconcept study is presented that uses blob analysis to extract visual cues and events, throughout the examined videos. The integration of these cues is done using a hierarchical Hidden Markov Model to explore behavioral state identification in the detection of deception, mainly involving the detection of agitated and over-controlled behaviors.

Research paper thumbnail of Experiences developing a virtual environment to support disaster relief with the United States Navy's Commander Third Fleet

Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 2000

The Center for the Management of Information (CMI) at the University of Arizona worked with the U... more The Center for the Management of Information (CMI) at the University of Arizona worked with the US Navy Commander, Third Fleet (Third Fleet) to overcome limitations of performing closely coordinated staff work on board a US Navy ship. Third Fleet is required to collaborate with hundreds of people internally and with military and civilian organizations both nationally and internationally. Third Fleet has staff officers and enlisted personnel embarked from Canada, Chile, Japan, Australia, Peru, and Britain. In addition, Third Fleet regularly works with representatives from South Korea and Mexico. This physical separation raises significant barriers to collaboration and cooperation. The research presented in this paper details the efforts of CMI, SPAWAR Systems Center and Third Fleet to introduce a virtual workspace on board the Third Fleet Command Ship USS CORONADO (AGF-11), a seagoing command and control platform berthed in San Diego, California. The virtual environment was developed and implemented to afford the staff unfettered collaboration between two different spaces aboard the ship.

Research paper thumbnail of Detecting Concealment of Intent in Transportation Screening: A Proof of Concept

IEEE Transactions on Intelligent Transportation Systems, 2000

Past research in deception detection at the University of Arizona has guided the investigation of... more Past research in deception detection at the University of Arizona has guided the investigation of concealment detection. A theoretical foundation and model for the analysis of concealment detection is proposed. The visual and verbal channels are the two avenues of concealment detection studied. Several available test beds for visual intent analysis are discussed and a proof-of-concept study exploring nonverbal communication within the context of concealment detection is shared. Additionally, two methods that may aid in verbally detecting deception during the interviews characteristic of secondary screening are introduced. Message feature mining uses message features or cues combined with machine learning techniques to classify messages according to their deceptive potential. Speech act profiling, a method for quantifying and visualizing entire conversations, has shown promise in aiding deception detection. These methods may be combined and are intended to be a part of a suite of tools for automating deception detection.

Research paper thumbnail of Deception Detection through Automatic, Unobtrusive Analysis of Nonverbal Behavior

IEEE Intelligent Systems, 2005

E very day, hundreds of thousands of people pass through airport security checkpoints, border cro... more E very day, hundreds of thousands of people pass through airport security checkpoints, border crossing stations, or other security screening measures. Security professionals must sift through countless interactions and ferret out high-risk individuals who represent a danger to other citizens. During each interaction, the security professional must decide whether the individual is being forthright or deceptive. This task is difficult because of the limits of human vigilance and perception and the small percentage of individuals who actually harbor hostile intent (see the sidebar for more about these challenges). Security personnel can't halt the flow of people and material to extensively gauge the truthfulness of every interaction, so we must do more to help them identify deception and ill intent.

Research paper thumbnail of A language technology toolset for development of a large group augmented facilitation system

Page 1. A Language Technology Toolset for Development of a Large Group Augmented Facilitation Sys... more Page 1. A Language Technology Toolset for Development of a Large Group Augmented Facilitation System Mark Adkins & John Kruse Robert Younger Center for the Management of Information University of Arizona Tucson, AZ ...

Research paper thumbnail of A technology transition model derived from field investigation of GSS use aboard the USS Coronado

Journal of …, Dec 1, 1998

Research paper thumbnail of Moving toward intent detection: a tool-based approach

Intelligent …, Oct 3, 2004

Past research in deception detection at the University of Arizona has guided the investigation of... more Past research in deception detection at the University of Arizona has guided the investigation of intent detection. A theoretical foundation and model for the analysis of intent detection is proposed. Available test beds for intent analysis are discussed and two proof-of-concept studies exploring nonverbal communication within the context of intent detection are shared.

Research paper thumbnail of The Role of E-Training in Protecting Information Assets Against Deception Attacks

Mis Quarterly Executive, 2008

CIOs and IT managers need to mitigate the risks to information and IT assets arising from decepti... more CIOs and IT managers need to mitigate the risks to information and IT assets arising from deception-based attacks. Common examples of deception are "social engineering" and phishing, both aimed at getting people to divulge information that will enable unauthorized access to computer systems. One well-known hacker has claimed it is easier to ask people for the required information than to employ highly technical hacking techniques.