


default search action
David P. Biros
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j12]Jacob A. Young, David P. Biros, Ryan M. Schuetzler, Tyler Jon Smith, Paul R. Stephens, Rhonda A. Syler, Shawn H. Zheng:
When Programs Collide: A Panel Report on the Competing Interests of Analytics and Security. Commun. Assoc. Inf. Syst. 46: 24 (2020)
2010 – 2019
- 2016
- [j11]Nan Peter Liang, David P. Biros, Andy Luse:
An Empirical Validation of Malicious Insider Characteristics. J. Manag. Inf. Syst. 33(2): 361-392 (2016) - [c21]Nan Peter Liang, David P. Biros, Andy Luse:
Taxonomy of Malicious Insiders: A Proof of Concept Study. AMCIS 2016 - [c20]Nan Peter Liang, David P. Biros:
Validating Common Characteristics of Malicious Insiders: Proof of Concept Study. HICSS 2016: 3716-3726 - 2015
- [j10]Christie M. Fuller
, David P. Biros, Douglas P. Twitchell
, Rick L. Wilson:
Real-World Deception and the Impact of Severity. J. Comput. Inf. Syst. 55(2): 59-67 (2015) - 2012
- [j9]Jason Nichols, David P. Biros, Mark Weiser:
Toward Alignment between Communities of Practice and Knowledge-Based Decision Support. J. Digit. Forensics Secur. Law 7(2): 61-74 (2012) - 2011
- [j8]Christie M. Fuller
, David P. Biros, Dursun Delen
:
An investigation of data and text mining methods for real world deception detection. Expert Syst. Appl. 38(7): 8392-8398 (2011) - [c19]Joyce Lucca, Ramesh Sharda
, J. Ruffner, Upton Shimp, David P. Biros, A. Clower:
Ammunition Multimedia Encyclopedia (AME): A Case Study. HICSS 2011: 1-10 - [c18]Joseph Thomas, David P. Biros:
A Conceptual Model of Real World, High Stakes Deception Detection. HICSS 2011: 1-10 - 2010
- [p1]Supavich Pengnate, Ramesh Sharda, David P. Biros, Michael C. Hass, Upton Shimp:
On-demand Assistance in Handling Ammunition: Development of a Mobile Ammo DSS. Supporting Real Time Decision-Making 2010: 319-336
2000 – 2009
- 2009
- [j7]Christie M. Fuller
, David P. Biros, Rick L. Wilson:
Decision support for determining veracity via linguistic-based cues. Decis. Support Syst. 46(3): 695-703 (2009) - [j6]Subramanian Rama Iyer, Ramesh Sharda
, David P. Biros, Joyce Lucca, Upton Shimp:
Organization of Lessons Learned Knowledge: A Taxonomy and Implementation. Int. J. Knowl. Manag. 5(3): 1-20 (2009) - [c17]Douglas P. Twitchell, Christie M. Fuller, David P. Biros, Julia Graham:
A Model for the Impact of Task Complexity on Deception in a Group Decision Making Task. AMCIS 2009: 206 - [c16]Michael C. Hass, Jason Nichols, David P. Biros, Mark Weiser, Jim Burkman, Joseph Thomas:
Motivating Knowledge Sharing in Diverse Organizational Contexts: An Argument for Reopening the Intrinsic vs. Extrinsic Debate. AMCIS 2009: 285 - [c15]Supavich Pengnate, Ramesh Sharda, David P. Biros, Michael C. Hass, Upton Shimp:
Mobile AME: A Handheld Application to Support Decision Making for Ammunition Personnel. AMCIS 2009: 791 - 2008
- [j5]Joey F. George, David P. Biros, Judee K. Burgoon, Jay F. Nunamaker Jr., Janna M. Crews, Jinwei Cao, Kent Marett, Mark Adkins, John Kruse, Ming Lin:
The Role of E-Training in Protecting Information Assets Against Deception Attacks. MIS Q. Executive 7(2): 5 (2008) - [c14]Christie M. Fuller
, David P. Biros, Dursun Delen
:
Exploration of Feature Selection and Advanced Classification Models for High-Stakes Deception Detection. HICSS 2008: 80 - 2007
- [j4]Stephen Barnes, David P. Biros:
An Exploratory Analysis of Computer Mediated Communications on Cyberstalking Severity. J. Digit. Forensics Secur. Law 2(3): 7-28 (2007) - [c13]Stephen Barnes, David P. Biros, Mark Weiser, Nicholas C. Romano Jr.:
Incorporating Information Assurance in Systems Analysis and Design Curricula. AMCIS 2007: 238 - 2006
- [j3]Mark Weiser, David P. Biros, Greg Mosier:
Development of a National Repository of Digital Forensic Intelligence. J. Digit. Forensics Secur. Law 1(2): 5-18 (2006) - [c12]Christie M. Fuller, David P. Biros, Douglas P. Twitchell, Judee K. Burgoon, Mark Adkins:
An Analysis of Text-Based Deception Detection Tools. AMCIS 2006: 418 - [c11]David P. Biros, Kent Marett, Brent T. Langhals:
Vigilance and Error Detection in an Automated Command and Control Environment. HICSS 2006 - [c10]Douglas P. Twitchell
, David P. Biros, Mark Adkins, Nicole Forsgren, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Automated Determination of the Veracity of Interview Statements from People of Interest to an Operational Security Force. HICSS 2006 - [c9]Christie M. Fuller
, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr., Steven Coulon:
Detecting Deception in Person-of-Interest Statements. ISI 2006: 504-509 - 2005
- [j2]David P. Biros, Joey F. George, Robert W. Zmud:
Inside the Fence: Sensitizing Decision Makers to the Possibility of Deception in the Data They Use. MIS Q. Executive 4(1): 6 (2005) - [c8]David P. Biros, Michael C. Hass, Karl Wiers, Douglas P. Twitchell, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Task Performance Under Deceptive Conditions: Using Military Scenarios in Deception Detection Research. HICSS 2005 - [c7]David P. Biros, Jachin Sakamoto, Joey F. George, Mark Adkins, John Kruse, Judee K. Burgoon, Jay F. Nunamaker Jr.:
A Quasi-experiment to Determine the Impact of a Computer Based Deception Detection Training System: The Use of Agent99 Trainer in the U.S. Military. HICSS 2005 - 2004
- [c6]Joey F. George, Kent Marett, Judee K. Burgoon, Janna M. Crews, Jinwei Cao, Ming Lin, David P. Biros:
Training to Detect Deception: An Experimental Investigation. HICSS 2004 - [c5]Kent Marett, David P. Biros, Monti L. Knode:
Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training. ISI 2004: 187-200 - [c4]Joey F. George, David P. Biros, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Testing Various Modes of Computer-Based Training for Deception Detection. ISI 2004: 411-417 - 2003
- [c3]David P. Biros, Gregory Fields, Gregg H. Gunsch:
The Effect of External Safeguards on Human-Information System Trust in an Information Warfare Environment. HICSS 2003: 62 - [c2]Joey F. George, David P. Biros, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Training Professionals to Detect Deception. ISI 2003: 366-370 - 2002
- [j1]David P. Biros, Joey F. George, Robert W. Zmud:
Inducing Sensitivity to Deception in Order to Improve Decision Making Performance: A Field Study. MIS Q. 26(2): 119-144 (2002) - [c1]Lee A. Wynne, Thomas W. Ferratt, David P. Biros:
Career anchors of United States Air Force information systems workers: a turnover predictor? SIGCPR 2002: 79-89
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-14 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint