Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"University of Arizona" +contributor:("Nunamaker, Jay"). Showing records 1 – 30 of 104 total matches.

[1] [2] [3] [4]

Search Limiters

Last 2 Years | English Only

▼ Search Limiters


University of Arizona

1. Pentland, Steven J. Human-Analytics in Information Systems Research and Applications in Personnel Selection .

Degree: 2018, University of Arizona

 The human body provides a wealth of information that, when captured and analyzed, offers deep insight into the mind and its processes. At no other… (more)

Subjects/Keywords: behavioral informatics; behavioral sensing; employee sifting; human-analytics; personnel selection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pentland, S. J. (2018). Human-Analytics in Information Systems Research and Applications in Personnel Selection . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/630161

Chicago Manual of Style (16th Edition):

Pentland, Steven J. “Human-Analytics in Information Systems Research and Applications in Personnel Selection .” 2018. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/630161.

MLA Handbook (7th Edition):

Pentland, Steven J. “Human-Analytics in Information Systems Research and Applications in Personnel Selection .” 2018. Web. 17 Oct 2019.

Vancouver:

Pentland SJ. Human-Analytics in Information Systems Research and Applications in Personnel Selection . [Internet] [Doctoral dissertation]. University of Arizona; 2018. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/630161.

Council of Science Editors:

Pentland SJ. Human-Analytics in Information Systems Research and Applications in Personnel Selection . [Doctoral Dissertation]. University of Arizona; 2018. Available from: http://hdl.handle.net/10150/630161


University of Arizona

2. Diller, Christopher Benjamin Ralph. An Exploration of Distributed Parallel Sorting in GSS .

Degree: 2013, University of Arizona

 When the members of a group work collaboratively using a group support system (GSS), they often "brainstorm" a list of ideas in response to a… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Diller, C. B. R. (2013). An Exploration of Distributed Parallel Sorting in GSS . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/311479

Chicago Manual of Style (16th Edition):

Diller, Christopher Benjamin Ralph. “An Exploration of Distributed Parallel Sorting in GSS .” 2013. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/311479.

MLA Handbook (7th Edition):

Diller, Christopher Benjamin Ralph. “An Exploration of Distributed Parallel Sorting in GSS .” 2013. Web. 17 Oct 2019.

Vancouver:

Diller CBR. An Exploration of Distributed Parallel Sorting in GSS . [Internet] [Doctoral dissertation]. University of Arizona; 2013. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/311479.

Council of Science Editors:

Diller CBR. An Exploration of Distributed Parallel Sorting in GSS . [Doctoral Dissertation]. University of Arizona; 2013. Available from: http://hdl.handle.net/10150/311479


University of Arizona

3. Burns, Mary B. Examining Multiple Stages of Protective Behavior of Information System End-Users .

Degree: 2012, University of Arizona

 The adage, "old habits die hard", is especially relevant when humans learn new protective behaviors (i.e., dental flossing, IS security behaviors). The foundation that underlies… (more)

Subjects/Keywords: Phishing; Stage models; Management Information Systems; IS end-users; IS Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Burns, M. B. (2012). Examining Multiple Stages of Protective Behavior of Information System End-Users . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/243094

Chicago Manual of Style (16th Edition):

Burns, Mary B. “Examining Multiple Stages of Protective Behavior of Information System End-Users .” 2012. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/243094.

MLA Handbook (7th Edition):

Burns, Mary B. “Examining Multiple Stages of Protective Behavior of Information System End-Users .” 2012. Web. 17 Oct 2019.

Vancouver:

Burns MB. Examining Multiple Stages of Protective Behavior of Information System End-Users . [Internet] [Doctoral dissertation]. University of Arizona; 2012. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/243094.

Council of Science Editors:

Burns MB. Examining Multiple Stages of Protective Behavior of Information System End-Users . [Doctoral Dissertation]. University of Arizona; 2012. Available from: http://hdl.handle.net/10150/243094


University of Arizona

4. Proudfoot, Jeffrey Gainer. Identifying Deception Using Novel Technology-Based Approaches to Uncover Concealed Information .

Degree: 2014, University of Arizona

 Concealing information, one of the many forms of deception, is a pervasive phenomenon as it is present in virtually every facet of interpersonal communication. In… (more)

Subjects/Keywords: Concealed Information; Credibility Assessment; Deception; Human-Computer Interaction; Management Information Systems; Automated Screening

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Proudfoot, J. G. (2014). Identifying Deception Using Novel Technology-Based Approaches to Uncover Concealed Information . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/316781

Chicago Manual of Style (16th Edition):

Proudfoot, Jeffrey Gainer. “Identifying Deception Using Novel Technology-Based Approaches to Uncover Concealed Information .” 2014. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/316781.

MLA Handbook (7th Edition):

Proudfoot, Jeffrey Gainer. “Identifying Deception Using Novel Technology-Based Approaches to Uncover Concealed Information .” 2014. Web. 17 Oct 2019.

Vancouver:

Proudfoot JG. Identifying Deception Using Novel Technology-Based Approaches to Uncover Concealed Information . [Internet] [Doctoral dissertation]. University of Arizona; 2014. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/316781.

Council of Science Editors:

Proudfoot JG. Identifying Deception Using Novel Technology-Based Approaches to Uncover Concealed Information . [Doctoral Dissertation]. University of Arizona; 2014. Available from: http://hdl.handle.net/10150/316781


University of Arizona

5. Giboney, Justin Scott. Development And Application Of An Online Tool For Meta-Analyses Using Design Science Principles .

Degree: 2014, University of Arizona

 Nations are becoming increasingly sensitive about securing their borders, leading border security organizations to investigate systems designed to detect deception through linguistic analysis. As research… (more)

Subjects/Keywords: Linguistics; Meta-Analysis Software; Management Information Systems; Deception

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Giboney, J. S. (2014). Development And Application Of An Online Tool For Meta-Analyses Using Design Science Principles . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/333036

Chicago Manual of Style (16th Edition):

Giboney, Justin Scott. “Development And Application Of An Online Tool For Meta-Analyses Using Design Science Principles .” 2014. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/333036.

MLA Handbook (7th Edition):

Giboney, Justin Scott. “Development And Application Of An Online Tool For Meta-Analyses Using Design Science Principles .” 2014. Web. 17 Oct 2019.

Vancouver:

Giboney JS. Development And Application Of An Online Tool For Meta-Analyses Using Design Science Principles . [Internet] [Doctoral dissertation]. University of Arizona; 2014. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/333036.

Council of Science Editors:

Giboney JS. Development And Application Of An Online Tool For Meta-Analyses Using Design Science Principles . [Doctoral Dissertation]. University of Arizona; 2014. Available from: http://hdl.handle.net/10150/333036


University of Arizona

6. Schuetzler, Ryan M. Dynamic Interviewing Agents: Effects on Deception, Nonverbal Behavior, and Social Desirability .

Degree: 2015, University of Arizona

 Virtual humans and other virtual agents are becoming more common in our everyday lives. Whether in the form of phone-based personal assistants or automated customer… (more)

Subjects/Keywords: conversational agent; deception; impression management; social desirability; Management Information Systems; chat bot

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Schuetzler, R. M. (2015). Dynamic Interviewing Agents: Effects on Deception, Nonverbal Behavior, and Social Desirability . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/556441

Chicago Manual of Style (16th Edition):

Schuetzler, Ryan M. “Dynamic Interviewing Agents: Effects on Deception, Nonverbal Behavior, and Social Desirability .” 2015. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/556441.

MLA Handbook (7th Edition):

Schuetzler, Ryan M. “Dynamic Interviewing Agents: Effects on Deception, Nonverbal Behavior, and Social Desirability .” 2015. Web. 17 Oct 2019.

Vancouver:

Schuetzler RM. Dynamic Interviewing Agents: Effects on Deception, Nonverbal Behavior, and Social Desirability . [Internet] [Doctoral dissertation]. University of Arizona; 2015. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/556441.

Council of Science Editors:

Schuetzler RM. Dynamic Interviewing Agents: Effects on Deception, Nonverbal Behavior, and Social Desirability . [Doctoral Dissertation]. University of Arizona; 2015. Available from: http://hdl.handle.net/10150/556441


University of Arizona

7. Marquardson, James. Achieving Alignment: System Design and Attitudinal Considerations to Increase the Persuasive Power of Technology .

Degree: 2015, University of Arizona

 Increasing amounts of data are being produced and consumed on a daily basis. Every mouse movement and click on a website can be analyzed to… (more)

Subjects/Keywords: decision support; Management Information Systems; cognitive biases

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Marquardson, J. (2015). Achieving Alignment: System Design and Attitudinal Considerations to Increase the Persuasive Power of Technology . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/556848

Chicago Manual of Style (16th Edition):

Marquardson, James. “Achieving Alignment: System Design and Attitudinal Considerations to Increase the Persuasive Power of Technology .” 2015. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/556848.

MLA Handbook (7th Edition):

Marquardson, James. “Achieving Alignment: System Design and Attitudinal Considerations to Increase the Persuasive Power of Technology .” 2015. Web. 17 Oct 2019.

Vancouver:

Marquardson J. Achieving Alignment: System Design and Attitudinal Considerations to Increase the Persuasive Power of Technology . [Internet] [Doctoral dissertation]. University of Arizona; 2015. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/556848.

Council of Science Editors:

Marquardson J. Achieving Alignment: System Design and Attitudinal Considerations to Increase the Persuasive Power of Technology . [Doctoral Dissertation]. University of Arizona; 2015. Available from: http://hdl.handle.net/10150/556848


University of Arizona

8. Elkins, Aaron Chaim. Vocalic Markers of Deception and Cognitive Dissonance for Automated Emotion Detection Systems .

Degree: 2011, University of Arizona

 This dissertation investigates vocal behavior, measured using standard acoustic and commercial vocal analysis software, as it occurs naturally while lying, experiencing cognitive dissonance, or receiving… (more)

Subjects/Keywords: Deception; Emotion; Security; Vocalics; Management Information Systems; Affective Computing; Cognitive Dissonance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Elkins, A. C. (2011). Vocalic Markers of Deception and Cognitive Dissonance for Automated Emotion Detection Systems . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/202930

Chicago Manual of Style (16th Edition):

Elkins, Aaron Chaim. “Vocalic Markers of Deception and Cognitive Dissonance for Automated Emotion Detection Systems .” 2011. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/202930.

MLA Handbook (7th Edition):

Elkins, Aaron Chaim. “Vocalic Markers of Deception and Cognitive Dissonance for Automated Emotion Detection Systems .” 2011. Web. 17 Oct 2019.

Vancouver:

Elkins AC. Vocalic Markers of Deception and Cognitive Dissonance for Automated Emotion Detection Systems . [Internet] [Doctoral dissertation]. University of Arizona; 2011. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/202930.

Council of Science Editors:

Elkins AC. Vocalic Markers of Deception and Cognitive Dissonance for Automated Emotion Detection Systems . [Doctoral Dissertation]. University of Arizona; 2011. Available from: http://hdl.handle.net/10150/202930


University of Arizona

9. Pickard, Matthew. Persuasive Embodied Agents: Using Embodied Agents to Change People's Behavior, Beliefs, and Assessments .

Degree: 2012, University of Arizona

 Embodied Conversational Agents (i.e., avatars; ECAs) are appearing in increasingly many everyday contexts, such as e-commerce, occupational training, and airport security. Also common to a… (more)

Subjects/Keywords: embodied agent; embodied conversational agent; persuasion; self-disclosure; Management Information Systems; automated interviewing; avatar

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pickard, M. (2012). Persuasive Embodied Agents: Using Embodied Agents to Change People's Behavior, Beliefs, and Assessments . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/238634

Chicago Manual of Style (16th Edition):

Pickard, Matthew. “Persuasive Embodied Agents: Using Embodied Agents to Change People's Behavior, Beliefs, and Assessments .” 2012. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/238634.

MLA Handbook (7th Edition):

Pickard, Matthew. “Persuasive Embodied Agents: Using Embodied Agents to Change People's Behavior, Beliefs, and Assessments .” 2012. Web. 17 Oct 2019.

Vancouver:

Pickard M. Persuasive Embodied Agents: Using Embodied Agents to Change People's Behavior, Beliefs, and Assessments . [Internet] [Doctoral dissertation]. University of Arizona; 2012. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/238634.

Council of Science Editors:

Pickard M. Persuasive Embodied Agents: Using Embodied Agents to Change People's Behavior, Beliefs, and Assessments . [Doctoral Dissertation]. University of Arizona; 2012. Available from: http://hdl.handle.net/10150/238634


University of Arizona

10. Samtani, Sagar. Developing Proactive Cyber Threat Intelligence from the Online Hacker Community: A Computational Design Science Approach .

Degree: 2018, University of Arizona

 The proliferation of information systems (IS) has afforded modern society with unprecedented benefits. Unfortunately, malicious hackers often exploit these technologies for cyberwarfare, hacktivism, espionage, or… (more)

Subjects/Keywords: cybersecurity; cyber threat intelligence; deep learning; design science; graph convolutional networks; hacker community

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Samtani, S. (2018). Developing Proactive Cyber Threat Intelligence from the Online Hacker Community: A Computational Design Science Approach . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/628454

Chicago Manual of Style (16th Edition):

Samtani, Sagar. “Developing Proactive Cyber Threat Intelligence from the Online Hacker Community: A Computational Design Science Approach .” 2018. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/628454.

MLA Handbook (7th Edition):

Samtani, Sagar. “Developing Proactive Cyber Threat Intelligence from the Online Hacker Community: A Computational Design Science Approach .” 2018. Web. 17 Oct 2019.

Vancouver:

Samtani S. Developing Proactive Cyber Threat Intelligence from the Online Hacker Community: A Computational Design Science Approach . [Internet] [Doctoral dissertation]. University of Arizona; 2018. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/628454.

Council of Science Editors:

Samtani S. Developing Proactive Cyber Threat Intelligence from the Online Hacker Community: A Computational Design Science Approach . [Doctoral Dissertation]. University of Arizona; 2018. Available from: http://hdl.handle.net/10150/628454


University of Arizona

11. Yu, Shuo. Mobile Health Analytics for Senior Care: A Data Mining and Deep Learning Approach .

Degree: 2019, University of Arizona

 Senior citizens confront numerous challenges to their independent living, including chronic physical health conditions and a decline in mobility. With the advancement of mobile sensing… (more)

Subjects/Keywords: Data Mining; Deep Learning; Mobile Health Analytics; Motion Sensor; Senior Care

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu, S. (2019). Mobile Health Analytics for Senior Care: A Data Mining and Deep Learning Approach . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/633148

Chicago Manual of Style (16th Edition):

Yu, Shuo. “Mobile Health Analytics for Senior Care: A Data Mining and Deep Learning Approach .” 2019. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/633148.

MLA Handbook (7th Edition):

Yu, Shuo. “Mobile Health Analytics for Senior Care: A Data Mining and Deep Learning Approach .” 2019. Web. 17 Oct 2019.

Vancouver:

Yu S. Mobile Health Analytics for Senior Care: A Data Mining and Deep Learning Approach . [Internet] [Doctoral dissertation]. University of Arizona; 2019. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/633148.

Council of Science Editors:

Yu S. Mobile Health Analytics for Senior Care: A Data Mining and Deep Learning Approach . [Doctoral Dissertation]. University of Arizona; 2019. Available from: http://hdl.handle.net/10150/633148


University of Arizona

12. Spitzley, Lee. Using Narrative Disclosures to Detect Financial Fraud .

Degree: 2018, University of Arizona

 This dissertation measures the information content in narrative financial disclosures to identify linguistic differences in manager and analyst language when fraud versus when it is… (more)

Subjects/Keywords: deception; financial fraud; financial markets; linguistics; narrative disclosure; quasi-experiment

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Spitzley, L. (2018). Using Narrative Disclosures to Detect Financial Fraud . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/630214

Chicago Manual of Style (16th Edition):

Spitzley, Lee. “Using Narrative Disclosures to Detect Financial Fraud .” 2018. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/630214.

MLA Handbook (7th Edition):

Spitzley, Lee. “Using Narrative Disclosures to Detect Financial Fraud .” 2018. Web. 17 Oct 2019.

Vancouver:

Spitzley L. Using Narrative Disclosures to Detect Financial Fraud . [Internet] [Doctoral dissertation]. University of Arizona; 2018. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/630214.

Council of Science Editors:

Spitzley L. Using Narrative Disclosures to Detect Financial Fraud . [Doctoral Dissertation]. University of Arizona; 2018. Available from: http://hdl.handle.net/10150/630214


University of Arizona

13. Benjamin, Victor. Securing Cyberspace: Analyzing Cybercriminal Communities through Web and Text Mining Perspectives .

Degree: 2016, University of Arizona

 Cybersecurity has become one of the most pressing issues facing society today. In particular, cybercriminals often congregate within online communities to exchange knowledge and assets.… (more)

Subjects/Keywords: Cybersecurity; Forums; Text mining; Web mining; Management; Cybercriminal

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Benjamin, V. (2016). Securing Cyberspace: Analyzing Cybercriminal Communities through Web and Text Mining Perspectives . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/613280

Chicago Manual of Style (16th Edition):

Benjamin, Victor. “Securing Cyberspace: Analyzing Cybercriminal Communities through Web and Text Mining Perspectives .” 2016. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/613280.

MLA Handbook (7th Edition):

Benjamin, Victor. “Securing Cyberspace: Analyzing Cybercriminal Communities through Web and Text Mining Perspectives .” 2016. Web. 17 Oct 2019.

Vancouver:

Benjamin V. Securing Cyberspace: Analyzing Cybercriminal Communities through Web and Text Mining Perspectives . [Internet] [Doctoral dissertation]. University of Arizona; 2016. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/613280.

Council of Science Editors:

Benjamin V. Securing Cyberspace: Analyzing Cybercriminal Communities through Web and Text Mining Perspectives . [Doctoral Dissertation]. University of Arizona; 2016. Available from: http://hdl.handle.net/10150/613280


University of Arizona

14. Liu, Manlu. COMMUNITY SOURCE AS A NEW APPROACH TO ENTERPRISE APPLICATION DEVELOPMENT: EXPLORATION OF TECHNOLOGICAL AND MANAGERIAL ISSUES .

Degree: 2010, University of Arizona

 Community-based open source (community source) has emerged as a new approach of developing enterprise software systems that requires participation and investments from partner institutions. This… (more)

Subjects/Keywords: enterprise application development; Kuali; open source; service-oriented architecture; Management Information Systems; collaboration; community source

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, M. (2010). COMMUNITY SOURCE AS A NEW APPROACH TO ENTERPRISE APPLICATION DEVELOPMENT: EXPLORATION OF TECHNOLOGICAL AND MANAGERIAL ISSUES . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/216949

Chicago Manual of Style (16th Edition):

Liu, Manlu. “COMMUNITY SOURCE AS A NEW APPROACH TO ENTERPRISE APPLICATION DEVELOPMENT: EXPLORATION OF TECHNOLOGICAL AND MANAGERIAL ISSUES .” 2010. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/216949.

MLA Handbook (7th Edition):

Liu, Manlu. “COMMUNITY SOURCE AS A NEW APPROACH TO ENTERPRISE APPLICATION DEVELOPMENT: EXPLORATION OF TECHNOLOGICAL AND MANAGERIAL ISSUES .” 2010. Web. 17 Oct 2019.

Vancouver:

Liu M. COMMUNITY SOURCE AS A NEW APPROACH TO ENTERPRISE APPLICATION DEVELOPMENT: EXPLORATION OF TECHNOLOGICAL AND MANAGERIAL ISSUES . [Internet] [Doctoral dissertation]. University of Arizona; 2010. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/216949.

Council of Science Editors:

Liu M. COMMUNITY SOURCE AS A NEW APPROACH TO ENTERPRISE APPLICATION DEVELOPMENT: EXPLORATION OF TECHNOLOGICAL AND MANAGERIAL ISSUES . [Doctoral Dissertation]. University of Arizona; 2010. Available from: http://hdl.handle.net/10150/216949


University of Arizona

15. Gisches, Eyran Jacob. Information Effects on Group Behavior in Networks .

Degree: 2010, University of Arizona

 The essays presented in this dissertation strive to narrow the gap between Operations models and practice. They describe three models with seemingly paradoxical or counter-intuitive… (more)

Subjects/Keywords: experiment; game thoery; information; network; paradox; transportation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gisches, E. J. (2010). Information Effects on Group Behavior in Networks . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/195878

Chicago Manual of Style (16th Edition):

Gisches, Eyran Jacob. “Information Effects on Group Behavior in Networks .” 2010. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/195878.

MLA Handbook (7th Edition):

Gisches, Eyran Jacob. “Information Effects on Group Behavior in Networks .” 2010. Web. 17 Oct 2019.

Vancouver:

Gisches EJ. Information Effects on Group Behavior in Networks . [Internet] [Doctoral dissertation]. University of Arizona; 2010. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/195878.

Council of Science Editors:

Gisches EJ. Information Effects on Group Behavior in Networks . [Doctoral Dissertation]. University of Arizona; 2010. Available from: http://hdl.handle.net/10150/195878


University of Arizona

16. Huangfu, Luwen. Beyond Sentiment Polarity: Cognitive Theory-Based Emotion Type Analysis of Social Media Text for Business Applications .

Degree: 2019, University of Arizona

 The emotion types expressed in social media have a strong influence over the perspectives and judgments of readers and their decision making in commercial activities.… (more)

Subjects/Keywords: business applications; cognitive theory of emotions; emotion type analysis; interpretability; theory-based framework

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huangfu, L. (2019). Beyond Sentiment Polarity: Cognitive Theory-Based Emotion Type Analysis of Social Media Text for Business Applications . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/634214

Chicago Manual of Style (16th Edition):

Huangfu, Luwen. “Beyond Sentiment Polarity: Cognitive Theory-Based Emotion Type Analysis of Social Media Text for Business Applications .” 2019. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/634214.

MLA Handbook (7th Edition):

Huangfu, Luwen. “Beyond Sentiment Polarity: Cognitive Theory-Based Emotion Type Analysis of Social Media Text for Business Applications .” 2019. Web. 17 Oct 2019.

Vancouver:

Huangfu L. Beyond Sentiment Polarity: Cognitive Theory-Based Emotion Type Analysis of Social Media Text for Business Applications . [Internet] [Doctoral dissertation]. University of Arizona; 2019. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/634214.

Council of Science Editors:

Huangfu L. Beyond Sentiment Polarity: Cognitive Theory-Based Emotion Type Analysis of Social Media Text for Business Applications . [Doctoral Dissertation]. University of Arizona; 2019. Available from: http://hdl.handle.net/10150/634214


University of Arizona

17. Twyman, Nathan W. Automated Human Screening for Detecting Concealed Knowledge .

Degree: 2012, University of Arizona

 Screening individuals for concealed knowledge has traditionally been the purview of professional interrogators investigating a crime. But the ability to detect when a person is… (more)

Subjects/Keywords: deception detection; eye tracking; oculometrics; security screening; Management Information Systems; body movement; CIT

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Twyman, N. W. (2012). Automated Human Screening for Detecting Concealed Knowledge . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/222874

Chicago Manual of Style (16th Edition):

Twyman, Nathan W. “Automated Human Screening for Detecting Concealed Knowledge .” 2012. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/222874.

MLA Handbook (7th Edition):

Twyman, Nathan W. “Automated Human Screening for Detecting Concealed Knowledge .” 2012. Web. 17 Oct 2019.

Vancouver:

Twyman NW. Automated Human Screening for Detecting Concealed Knowledge . [Internet] [Doctoral dissertation]. University of Arizona; 2012. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/222874.

Council of Science Editors:

Twyman NW. Automated Human Screening for Detecting Concealed Knowledge . [Doctoral Dissertation]. University of Arizona; 2012. Available from: http://hdl.handle.net/10150/222874


University of Arizona

18. Humpherys, Sean L. A system of deception and fraud detection using reliable linguistic cues including hedging, disfluencies, and repeated phrases .

Degree: 2010, University of Arizona

 Given the increasing problem of fraud, crime, and national security threats, assessing credibility is a recurring research topic in Information Systems and in other disciplines.… (more)

Subjects/Keywords: classification algorithm; credibility assessment; deception detection; decision support systems; disfluency; interjections

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Humpherys, S. L. (2010). A system of deception and fraud detection using reliable linguistic cues including hedging, disfluencies, and repeated phrases . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/196115

Chicago Manual of Style (16th Edition):

Humpherys, Sean L. “A system of deception and fraud detection using reliable linguistic cues including hedging, disfluencies, and repeated phrases .” 2010. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/196115.

MLA Handbook (7th Edition):

Humpherys, Sean L. “A system of deception and fraud detection using reliable linguistic cues including hedging, disfluencies, and repeated phrases .” 2010. Web. 17 Oct 2019.

Vancouver:

Humpherys SL. A system of deception and fraud detection using reliable linguistic cues including hedging, disfluencies, and repeated phrases . [Internet] [Doctoral dissertation]. University of Arizona; 2010. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/196115.

Council of Science Editors:

Humpherys SL. A system of deception and fraud detection using reliable linguistic cues including hedging, disfluencies, and repeated phrases . [Doctoral Dissertation]. University of Arizona; 2010. Available from: http://hdl.handle.net/10150/196115

19. Grimes, George Mark. Analysis of Human Computer Interaction Behavior for Assessment of Affect, Cognitive Load, and Credibility .

Degree: 2015, University of Arizona

 This dissertation presents three studies consisting of seven experiments that investigate the relationship between human-computer interaction (HCI) behavior and changes in cognitive states by using… (more)

Subjects/Keywords: Cognitive Load; Human Computer Interaction; Keystroke Dynamics; Mouse Dynamics; Typing; Management Information Systems; Affect

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Grimes, G. M. (2015). Analysis of Human Computer Interaction Behavior for Assessment of Affect, Cognitive Load, and Credibility . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/556821

Chicago Manual of Style (16th Edition):

Grimes, George Mark. “Analysis of Human Computer Interaction Behavior for Assessment of Affect, Cognitive Load, and Credibility .” 2015. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/556821.

MLA Handbook (7th Edition):

Grimes, George Mark. “Analysis of Human Computer Interaction Behavior for Assessment of Affect, Cognitive Load, and Credibility .” 2015. Web. 17 Oct 2019.

Vancouver:

Grimes GM. Analysis of Human Computer Interaction Behavior for Assessment of Affect, Cognitive Load, and Credibility . [Internet] [Doctoral dissertation]. University of Arizona; 2015. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/556821.

Council of Science Editors:

Grimes GM. Analysis of Human Computer Interaction Behavior for Assessment of Affect, Cognitive Load, and Credibility . [Doctoral Dissertation]. University of Arizona; 2015. Available from: http://hdl.handle.net/10150/556821

20. Zimbra, David. Stakeholder and Sentiment Analysis in Web Forums .

Degree: 2012, University of Arizona

 Web forums offer open and interactive social communication platforms for numerous participants to share information and offer perspectives on a variety of business and social… (more)

Subjects/Keywords: Management Information Systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zimbra, D. (2012). Stakeholder and Sentiment Analysis in Web Forums . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/222894

Chicago Manual of Style (16th Edition):

Zimbra, David. “Stakeholder and Sentiment Analysis in Web Forums .” 2012. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/222894.

MLA Handbook (7th Edition):

Zimbra, David. “Stakeholder and Sentiment Analysis in Web Forums .” 2012. Web. 17 Oct 2019.

Vancouver:

Zimbra D. Stakeholder and Sentiment Analysis in Web Forums . [Internet] [Doctoral dissertation]. University of Arizona; 2012. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/222894.

Council of Science Editors:

Zimbra D. Stakeholder and Sentiment Analysis in Web Forums . [Doctoral Dissertation]. University of Arizona; 2012. Available from: http://hdl.handle.net/10150/222894

21. Jenkins, Jeffrey Lyne. Alleviating Insider Threats: Mitigation Strategies and Detection Techniques .

Degree: 2013, University of Arizona

 Insider threats – trusted members of an organization who compromise security – are considered the greatest security threat to organizations. Because of ignorance, negligence, or malicious intent,… (more)

Subjects/Keywords: Information Systems; Insider Threat; Mouse Movements; Passwords; Security; Management; Experiment

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jenkins, J. L. (2013). Alleviating Insider Threats: Mitigation Strategies and Detection Techniques . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/297023

Chicago Manual of Style (16th Edition):

Jenkins, Jeffrey Lyne. “Alleviating Insider Threats: Mitigation Strategies and Detection Techniques .” 2013. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/297023.

MLA Handbook (7th Edition):

Jenkins, Jeffrey Lyne. “Alleviating Insider Threats: Mitigation Strategies and Detection Techniques .” 2013. Web. 17 Oct 2019.

Vancouver:

Jenkins JL. Alleviating Insider Threats: Mitigation Strategies and Detection Techniques . [Internet] [Doctoral dissertation]. University of Arizona; 2013. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/297023.

Council of Science Editors:

Jenkins JL. Alleviating Insider Threats: Mitigation Strategies and Detection Techniques . [Doctoral Dissertation]. University of Arizona; 2013. Available from: http://hdl.handle.net/10150/297023

22. Fan, Shaokun. Three Case Studies On Business Collaboration And Process Management .

Degree: 2012, University of Arizona

 The importance of collaboration has been recognized for more than 2000 years. While recent improvement in technology creates vast opportunities for collaboration, effective collaboration remains… (more)

Subjects/Keywords: Process Pattern; Virtualization; Management Information Systems; Business process; Collaboration

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fan, S. (2012). Three Case Studies On Business Collaboration And Process Management . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/242374

Chicago Manual of Style (16th Edition):

Fan, Shaokun. “Three Case Studies On Business Collaboration And Process Management .” 2012. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/242374.

MLA Handbook (7th Edition):

Fan, Shaokun. “Three Case Studies On Business Collaboration And Process Management .” 2012. Web. 17 Oct 2019.

Vancouver:

Fan S. Three Case Studies On Business Collaboration And Process Management . [Internet] [Doctoral dissertation]. University of Arizona; 2012. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/242374.

Council of Science Editors:

Fan S. Three Case Studies On Business Collaboration And Process Management . [Doctoral Dissertation]. University of Arizona; 2012. Available from: http://hdl.handle.net/10150/242374

23. Wilson, David W. Overcoming Information Privacy Concerns: Learning from Three Disclosure Contexts .

Degree: 2015, University of Arizona

 Advances in information technology have amplified issues related to privacy and the disclosure of personal information. New technologies have enabled an explosion in the amount… (more)

Subjects/Keywords: control; disclosure; identity; irrational; privacy; Management Information Systems; calculus

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wilson, D. W. (2015). Overcoming Information Privacy Concerns: Learning from Three Disclosure Contexts . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/555938

Chicago Manual of Style (16th Edition):

Wilson, David W. “Overcoming Information Privacy Concerns: Learning from Three Disclosure Contexts .” 2015. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/555938.

MLA Handbook (7th Edition):

Wilson, David W. “Overcoming Information Privacy Concerns: Learning from Three Disclosure Contexts .” 2015. Web. 17 Oct 2019.

Vancouver:

Wilson DW. Overcoming Information Privacy Concerns: Learning from Three Disclosure Contexts . [Internet] [Doctoral dissertation]. University of Arizona; 2015. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/555938.

Council of Science Editors:

Wilson DW. Overcoming Information Privacy Concerns: Learning from Three Disclosure Contexts . [Doctoral Dissertation]. University of Arizona; 2015. Available from: http://hdl.handle.net/10150/555938


University of Arizona

24. MCINTYRE, SCOTT CAMPBELL. PLEXPLAN: AN INTEGRATED INTELLIGENT ENVIRONMENT FOR INFORMATION SYSTEMS PLANNING (ARTIFICIAL INTELLIGENCE).

Degree: 1986, University of Arizona

 PLEXPLAN, an automated software system and methodology for Information Systems (IS) planning, is described. The PLEXPLAN methodology and tools are used to integrate information from… (more)

Subjects/Keywords: Information storage and retrieval systems.; System design  – Data processing.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

MCINTYRE, S. C. (1986). PLEXPLAN: AN INTEGRATED INTELLIGENT ENVIRONMENT FOR INFORMATION SYSTEMS PLANNING (ARTIFICIAL INTELLIGENCE). (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/183897

Chicago Manual of Style (16th Edition):

MCINTYRE, SCOTT CAMPBELL. “PLEXPLAN: AN INTEGRATED INTELLIGENT ENVIRONMENT FOR INFORMATION SYSTEMS PLANNING (ARTIFICIAL INTELLIGENCE). ” 1986. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/183897.

MLA Handbook (7th Edition):

MCINTYRE, SCOTT CAMPBELL. “PLEXPLAN: AN INTEGRATED INTELLIGENT ENVIRONMENT FOR INFORMATION SYSTEMS PLANNING (ARTIFICIAL INTELLIGENCE). ” 1986. Web. 17 Oct 2019.

Vancouver:

MCINTYRE SC. PLEXPLAN: AN INTEGRATED INTELLIGENT ENVIRONMENT FOR INFORMATION SYSTEMS PLANNING (ARTIFICIAL INTELLIGENCE). [Internet] [Doctoral dissertation]. University of Arizona; 1986. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/183897.

Council of Science Editors:

MCINTYRE SC. PLEXPLAN: AN INTEGRATED INTELLIGENT ENVIRONMENT FOR INFORMATION SYSTEMS PLANNING (ARTIFICIAL INTELLIGENCE). [Doctoral Dissertation]. University of Arizona; 1986. Available from: http://hdl.handle.net/10150/183897


University of Arizona

25. McQuaid, Michael Joseph. The impact of time-based text visualization on situation awareness .

Degree: 2003, University of Arizona

 Overabundance of information has been well documented as a drag on human performance. Theoretical constructs such as visual dominance have led to visualization systems as… (more)

Subjects/Keywords: Business Administration, Management.; Psychology, Cognitive.; Information Science.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

McQuaid, M. J. (2003). The impact of time-based text visualization on situation awareness . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/290011

Chicago Manual of Style (16th Edition):

McQuaid, Michael Joseph. “The impact of time-based text visualization on situation awareness .” 2003. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/290011.

MLA Handbook (7th Edition):

McQuaid, Michael Joseph. “The impact of time-based text visualization on situation awareness .” 2003. Web. 17 Oct 2019.

Vancouver:

McQuaid MJ. The impact of time-based text visualization on situation awareness . [Internet] [Doctoral dissertation]. University of Arizona; 2003. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/290011.

Council of Science Editors:

McQuaid MJ. The impact of time-based text visualization on situation awareness . [Doctoral Dissertation]. University of Arizona; 2003. Available from: http://hdl.handle.net/10150/290011


University of Arizona

26. Broneck, Katherine Louise. Distributed work environment: Task structure and leadership roles in group outcomes .

Degree: 2005, University of Arizona

 With the expansion of educational institutions and companies into global arenas, there is a growing demand for the ability to distribute information and provide systems… (more)

Subjects/Keywords: Business Administration; Management.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Broneck, K. L. (2005). Distributed work environment: Task structure and leadership roles in group outcomes . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/280766

Chicago Manual of Style (16th Edition):

Broneck, Katherine Louise. “Distributed work environment: Task structure and leadership roles in group outcomes .” 2005. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/280766.

MLA Handbook (7th Edition):

Broneck, Katherine Louise. “Distributed work environment: Task structure and leadership roles in group outcomes .” 2005. Web. 17 Oct 2019.

Vancouver:

Broneck KL. Distributed work environment: Task structure and leadership roles in group outcomes . [Internet] [Doctoral dissertation]. University of Arizona; 2005. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/280766.

Council of Science Editors:

Broneck KL. Distributed work environment: Task structure and leadership roles in group outcomes . [Doctoral Dissertation]. University of Arizona; 2005. Available from: http://hdl.handle.net/10150/280766

27. Langhals, Brent. Using Eye and Head Based Psychophysiological Cues to Enhance Screener Vigilance .

Degree: 2011, University of Arizona

 The objective of this study was to determine if eye and head based psychophysiological cues can be used to maintain screener vigilance levels during long… (more)

Subjects/Keywords: Arousal; Attention; Cies; Security; Stimuli; Vigilance

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Langhals, B. (2011). Using Eye and Head Based Psychophysiological Cues to Enhance Screener Vigilance . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/145271

Chicago Manual of Style (16th Edition):

Langhals, Brent. “Using Eye and Head Based Psychophysiological Cues to Enhance Screener Vigilance .” 2011. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/145271.

MLA Handbook (7th Edition):

Langhals, Brent. “Using Eye and Head Based Psychophysiological Cues to Enhance Screener Vigilance .” 2011. Web. 17 Oct 2019.

Vancouver:

Langhals B. Using Eye and Head Based Psychophysiological Cues to Enhance Screener Vigilance . [Internet] [Doctoral dissertation]. University of Arizona; 2011. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/145271.

Council of Science Editors:

Langhals B. Using Eye and Head Based Psychophysiological Cues to Enhance Screener Vigilance . [Doctoral Dissertation]. University of Arizona; 2011. Available from: http://hdl.handle.net/10150/145271

28. Zhang, Yulei. Knowledge Discovery in Social Media: Physical World, Online World, and Virtual World .

Degree: 2011, University of Arizona

 Social media have grown tremendously, making the Internet a new platform for community-based social interaction. The rich and vast amount of social media data provides… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, Y. (2011). Knowledge Discovery in Social Media: Physical World, Online World, and Virtual World . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/145420

Chicago Manual of Style (16th Edition):

Zhang, Yulei. “Knowledge Discovery in Social Media: Physical World, Online World, and Virtual World .” 2011. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/145420.

MLA Handbook (7th Edition):

Zhang, Yulei. “Knowledge Discovery in Social Media: Physical World, Online World, and Virtual World .” 2011. Web. 17 Oct 2019.

Vancouver:

Zhang Y. Knowledge Discovery in Social Media: Physical World, Online World, and Virtual World . [Internet] [Doctoral dissertation]. University of Arizona; 2011. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/145420.

Council of Science Editors:

Zhang Y. Knowledge Discovery in Social Media: Physical World, Online World, and Virtual World . [Doctoral Dissertation]. University of Arizona; 2011. Available from: http://hdl.handle.net/10150/145420

29. Moffitt, Kevin Christopher. Toward Enhancing Automated Credibility Assessment: A Model for Question Type Classification and Tools for Linguistic Analysis .

Degree: 2011, University of Arizona

 The three objectives of this dissertation were to develop a question type model for predicting linguistic features of responses to interview questions, create a tool… (more)

Subjects/Keywords: Automated Linguistic Analysis; Credibility Assessment; Fraudulent Financial Reporting; Question Type

ARIZONA 2011 2 THE UNIVERSITY OF ARIZONA GRADUATE COLLEGE As members of the Dissertation… …University of Arizona and is deposited in the University Library to be made available to borrowers… …DOCTOR OF PHILOSOPHY WITH A MAJOR IN MANAGEMENT In the Graduate College THE UNIVERSITY OF… 

Page 1 Page 2 Page 3 Page 4 Page 5

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Moffitt, K. C. (2011). Toward Enhancing Automated Credibility Assessment: A Model for Question Type Classification and Tools for Linguistic Analysis . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/145456

Chicago Manual of Style (16th Edition):

Moffitt, Kevin Christopher. “Toward Enhancing Automated Credibility Assessment: A Model for Question Type Classification and Tools for Linguistic Analysis .” 2011. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/145456.

MLA Handbook (7th Edition):

Moffitt, Kevin Christopher. “Toward Enhancing Automated Credibility Assessment: A Model for Question Type Classification and Tools for Linguistic Analysis .” 2011. Web. 17 Oct 2019.

Vancouver:

Moffitt KC. Toward Enhancing Automated Credibility Assessment: A Model for Question Type Classification and Tools for Linguistic Analysis . [Internet] [Doctoral dissertation]. University of Arizona; 2011. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/145456.

Council of Science Editors:

Moffitt KC. Toward Enhancing Automated Credibility Assessment: A Model for Question Type Classification and Tools for Linguistic Analysis . [Doctoral Dissertation]. University of Arizona; 2011. Available from: http://hdl.handle.net/10150/145456

30. Hu, Daning. Analysis and Applications of Social Network Formation .

Degree: 2009, University of Arizona

 Nowadays people and organizations are more and more interconnected in the forms of social networks: the nodes are social entities and the links are various… (more)

Subjects/Keywords: Expert Recommendation Systems; Open Source Software Community; Security Informatics; Social Network Formation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hu, D. (2009). Analysis and Applications of Social Network Formation . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/145710

Chicago Manual of Style (16th Edition):

Hu, Daning. “Analysis and Applications of Social Network Formation .” 2009. Doctoral Dissertation, University of Arizona. Accessed October 17, 2019. http://hdl.handle.net/10150/145710.

MLA Handbook (7th Edition):

Hu, Daning. “Analysis and Applications of Social Network Formation .” 2009. Web. 17 Oct 2019.

Vancouver:

Hu D. Analysis and Applications of Social Network Formation . [Internet] [Doctoral dissertation]. University of Arizona; 2009. [cited 2019 Oct 17]. Available from: http://hdl.handle.net/10150/145710.

Council of Science Editors:

Hu D. Analysis and Applications of Social Network Formation . [Doctoral Dissertation]. University of Arizona; 2009. Available from: http://hdl.handle.net/10150/145710

[1] [2] [3] [4]

.