Publications

Borders Publications

 

View BORDERS publications by type:

GPS Signal and Position Authentication
University of Minnesota Avionics Laboratory
Zhefeng Li, Demoz Gebre-Egziabher

GPS-Denied Navigator for Small UAVs
University of Minnesota UAV Laboratory

Trevor Layh, Jordan Larson, Demoz Gebre-Egziabher, Brian Taylor, John Jackson, Yunus Agamawi

One Step In and One Step Out - The Lived Experience of Immigrant Participants in the Deferred Action for Childhood Arrivals (DACA) Program
University of California, San Diego

Hillary S. Kosnac, Wayne A. Cornelius, Tom K. Wong, Micah Gell-Redman, D. Alex Hughes, Andrés Albarrán, Isabella Blasi, Karla Díaz, Reyna Guzmán, Sahil Mehta, Monserrat Palacios, Christa Thurston  

Checking on Checkpoints An Assessment of U.S. Border Patrol Checkpoint Operations, Performance, and Impacts
University of Arizona
Jeffrey Jenkins, Jeffrey G. Proudfoot, Jim Marquardson, Judith Gans, Elyse Golob, Jay Nunamaker

Appendices for Checking on Checkpoints An Assessment of U.S. Border Patrol Checkpoint Operations, Performance, and Impacts
University of Arizona
Jeffrey Jenkins, Jeffrey G. Proudfoot, Jim Marquardson, Judith Gans, Elyse Golob, and Jay Nunamaker

Biometric Identification and Surveillance
West Virginia University
Don Adjeroh, Bojan Cukic, Arun Ross

Recent Trends in Coverage of the Mexican-Born Population of the United States: Results from Applying Multiple Methods Across Time
The Pennsylvania State University, University of California, Irvine, Temple University
Jennifer Van Hook, Catherine Tucker, Frank D. Bean, James D. Bachmeier

Immigration: Policy vs. Public Opinion
University of California, Berkeley
Kimberly Twist

An Exploration of Immigrant Political Participation: Placing a Life Course Perspective in Context
University of Utah Department of Sociology, University of North Carolina/Chapel Hill Department of Sociology
Julie Stewart, Neal Caren, Tom Quinn, Yvette Young 

Does Legalization Improve the Occupational Mobility Trajectories of Unauthorized Latin American Immigrants?
Vanderbilt University
Blake Sisk

Assessing the Influence of Language Background on Immigrants’ English Language Proficiency
Indiana University
Aaron Ponce

Field Tests of an AVATAR Interviewing System for Trusted Traveler Applicants
The University of Arizona
Jay F. Nunamaker, Elyse Golob, Douglas C. Derrick, Aaron C. Elkins,  Nathan W. Twyman

E-Verify, The Legal Arizona Workers Act (LAWA), and Employment
The University of Arizona
Judith Gans

Reasons and Resolve to Cross the Line: A Post-Apprehension Survey of Unauthorized Immigrants Along the U.S.-Mexico Border
The University of Arizona
Mark Grimes, Elyse Golob, Alexandra Durcikova, Jay Nunamaker

Measuring the Effectiveness of Border Security Between Ports-of-Entry
RAND Corporation
Henry H. Willis, Joel B. Predd, Paul K. Davis, Wayne Brown

Document

Household Income, Poverty, and Food-Stamp Use in Native-born and Immigrant Households: A Case Study in Use of Public Assistance
University of Arizona
Judith Gans

Document

Economic Contributions of Immigrants in the United States: A Regional and State-by-State Analysis
University of Arizona
Judith Gans

Document

The Border Patrol Checkpoint on Interstate 19 in Southern Arizona: A Case Study of Impacts on Local Real Estate Prices
University of Arizona
Judith Gans

2013

Burgoon, J. K. & White, C. H. (in press). Accuracy in Communication. In C. Müller, E. Fricke, A. Cienki, & D. McNeill (Eds.), Body – Language – Communication. New York: Mouton de Gruyter.

Burgoon, J. K., George, J. F., Marett, K., & Adkins, M. (in press). Maintaining Credibility in Group Collaboration: Detection of Deception. In J. F. Nunamaker, Jr., N.C. Romano and R. O. Briggs (Eds.), Collaboration Systems: Concept, Value, Use (special issue of V. Zwass, Ed., Advances in Management Information Systems). Armonk, NY: M. E. Sharpe, Inc.

Burgoon, J. K., & Walther, J. B. (in press). Media and Computer Mediation. In J. A. Hall and M. L. Knapp, Eds., Handbook of Nonverbal Communication (In P. Schulz and P. Cobley, Series Eds., Handbook of Communication Science.) Berlin: De Gruyter Mouton.

Burgoon, J. K., & Nunamaker, J. F., Jr. (in press). Detecting Deception in Collaboration and Negotiation. Group Decision and Negotiation, 18(special issue).

Burgoon, J. K., Wilson, D., Hass, M., & Schuetzler, R. (in press). Interactive Deception in Group Decision-Making: New Insights from Communication Pattern Analysis. In M. Magnusson & D. McNeill (Eds.), T-patterns in Behavior and Interactions.

Elkins, A. C., & Derrick, D. C. (2013). The Sound of Trust. Group Decision and Negotiation.

Elkins, A. C., Dunbar, N. E., Adame, B., & Nunamaker, J. F. (in press). Are Users Threatened by Credibility Assessment Systems? Journal of Management Information Systems.

George, J.F., Carlson, J., & Valacich, J.S. (forthcoming). Media Selection as a Strategic Component of Deceptive Communication. MIS Quarterly.

Reyes, L. F, Derrick, D. C., Langhals, B. T., Nunamaker J. F. (in press). Collaborative Cross-Border Security Infrastructure and Systems: Identifying Policy, Managerial and Technological Challenges. International Journal of E-Politics (in press.)


2012

Burgoon, J. K., & Guerrero, L. G. (2012). Nonverbal Cues and Communication. Oxford Bibliographies Online--Psychology.

Dang, Y., Zhang, Y., Chen, H., Brown, S., Hu, P. J. H., Nunamaker, J. F., “Theory-Informed Design and Evaluation of an Advanced Search and Knowledge Mapping System in Nanotechnology,” (to appear) JMIS, Vol. 28, No. 4, Spring 2012.

Dunbar, N. E., Jensen, M. L., Bessabarova, E., Burgoon, J. K., Bernard, D. R., Robertson, K. J., Kelley, K. M., Adame, B. & Eckstein, J. M. (2012). Empowered by Persuasive Deception: The Effects of Power and Deception on Interactional Dominance, Credibility, and Decision-Making. Communication Research. DOI: 10.1177/0093650212447099.

Elkins, A. C. (2012). Vocal Analysis Software for Security Screening: Validity and Deception Detection Potential. Homeland Security Affairs.  

Fuller, C. M., Biros, D. P., Burgoon, J. K., Nunamaker, J. F., “An Examination and Validation of Linguistic Constructs for Studying High-stakes Deception,” Group Decision and Negotiation, (accepted for publication; to appear 2012).

Langhals, B.T., Burgoon, J. K., Nunamaker, Jr., J. F. “Using Eye-based Psychophysiological Cues to Enhance Screener Vigilance,” Journal of Cognitive Engineering and Decision Making, accepted for publication, to appear 2012.

Twitchell, D. P., Jensen, M. L., Derrick, D. C., Burgoon, J. K., Nunamaker, J. F., “Negotiation Outcome Classification Using Language Features,” Group Decision and Negotiation, (accepted for publication; to appear 2012).

Coulter, L., and D. Stow. 2012a. Comparison of Time Series versus Bi-temporal Image Analysis for Automated Detection of People and Vehicles in Natural Environments. For submission to Computers special issue "Activity Detection and Novel Sensing Technologies" November 15, 2012.

Coulter, L., and D. Stow. 2012b. Large Area, Slow Frame Rate Video Using Nadir Viewing Frame Images Collected on a Single Moving Aircraft. For submission to Computers special issue "Activity Detection and Novel Sensing Technologies" November 15, 2012.

Zeng, D., Ma, J., Zhao, H. and Chen. H. (2012). "Spatial-Temporal Cross-Correlation and its Application in Security Informatics," forthcoming, Journal of Database Management.


2011

Dang, Y., Zhang, Y., Chen, H., Brown, S., Hu, P. J. H., Nunamaker, J. F., "Theory-Informed Design and Evaluation of an Advanced Search and Knowledge Mapping System in Nanotechnology," JMIS (accepted for publication; to appear 2011).

D. Twitchell, M. Jensen, D. C. Derrick, J. K. Burgoon, and J. F. Nunamaker, "Negotiation Outcome Classification Using Language Features," Group Decision and Negotiation, vol. in press, 2011.

J. F. Nunamaker, D. C. Derrick, A. C. Elkins, J. K. Burgoon, M. K. Patton, “Embodied Conversational Agent (ECA) Based Kiosk for Automated Interviewing,” Journal of Management Information Systems, vol. in press, 2011.

Humpherys, Sean, Moffitt, Kevin, Burns, Mary, Burgoon, Judee K., and Felix, William, “Identification of Fraudulent Financial Statements Using Linguistic Credibility Analysis,” Decision Support Systems, 50:3 (2011), 585-594.

Fuller, C. M., Biros, D. P., Burgoon, J. K., Nunamaker, J. F., “An Examination and Validation of Linguistic Constructs for Studying High-Stakes Deception,” Group Decision and Negotiation, (accepted for publication; to appear 2011).

D. C. Derrick, J. Jenkins, J. F. Nunamaker. (2011) "Design Principles for Special Purpose, Embodied, Conversational Intelligence with Environmental Sensors (SPECIES) Agents," AIS Transactions on Human-Computer Interaction (3) 2, pp. 62-81

Nunamaker Jr, J. F., Derrick, D. C., Elkins, A. C., & Burgoon, J. K. (in press). A System Model for Human Interactions with Intelligent, Embodied Conversational Agents. Journal of Management Information Systems.

Burgoon, J. K., Derrick, D. C., & Elkins, A. C. (2011). Sociocultural Intelligence and Intelligent Agents. IEEE Intelligent Systems, 26(4), 84-87.

Abbasi, A., Chen, F., Zhang, Z., and Chen, H. Selecting Attributes for Sentiment Classification Using Feature Relation Networks. IEEE Transactions on Knowledge and Data Engineering (TKDE) 23(3): 447-462 (2011).

Bean, F.D., Leach, M.A., Brown, S.K., Bachmeier, J.D., Hipp, J.R. (2011). The Educational Legacy of Unauthorized Migration: Comparisons Across U.S. Immigrant Groups in How Parent's Status Affects Their Offspring. International Migration Review 45 (2): 348-385.

T. Bourlai, N. Kalka, D. Cao, B. Decann, Z. Jafri, F. Nicolo, C. Whitelam, J. Zuo, D. Adjeroh, B. Cukic, J. Dawson, L. Hornak, A. Ross, N. A. Schmid, Ascertaining Human Identity in Night Environments, Distributed Video Sensor Networks, Springer, 2011, pg. 471-478.

Derrick, D. C., Jenkins, J., & Nunamaker Jr., J. F. (2011). Design Principles for Special Purpose, Embodied, Conversational Intelligence with Environmental Sensors (SPECIES) Agents. AIS Transactions on Human-Computer Interaction, 3(2), 62-81.

Ackleson, J. and Kastner, J. "Borders and Governance: An Analysis of Health Regulation and the Agri-Food Trade," Geopolitics 16, no. 1 (2011) (special issue on the "Theorization of Border Studies").

V. Kulathumani, S. Parupati, A. Ross, R. Jillela, "Collaborative Face Recognition Using a Network of Embedded Cameras," Distributed Video Sensor Networks, Springer, 2011

Jensen, M. L., Bessabarova, E., Adame, B., Burgoon, J. K. & Slowik, S. (2011). Deceptive Language by Innocent and Guilty Criminal Suspects: The Influence of Dominance, Question, and Guilt on Interview Response. Journal of Language and Social Psychology, 30, 357-375.

Derrick, D. C., Jenkins, J., & Nunamaker Jr., J. F. (2011). Design Principles for Special Purpose, Embodied, Conversational Intelligence with Environmental Sensors (SPECIES) Agents. AIS Transactions on Human-Computer Interaction, 3(2), 62-81.

Nunamaker Jr., J. F., Derrick, D. C., Elkins, A. C., Burgoon, J. K., & Patton, M. W. (2011). Embodied Conversational Agent (ECA) Based Kiosk for Automated Interviewing. Journal of Management Information Systems, 28(1), 17-49.

Bachmeier, J.D., and Bean, F.D. (2011). Ethnoracial Patterns of Work and School Among Adolescents: Implications for Mexican Immigrant Incorporation. Social Science Research (forthcoming).

Katz, Charles M., Andrew Fox and Michael White (2011). "Examining the Relationship between Illegal Immigration and Drug Use." Justice Quarterly, 28, 4: 541-575.

Wang, Y., Wang, Y., Cao, Z., Chua, C., Xua, Y., Zhang, H., Wen, L., Lia, C., Huo, D., Lia, F., Zheng, X., Wang, F., Zeng, D., and Song, H. (2011), "Impact of the Community Structure of Social Contacts on H1N1 Outbreaks," submitted to New England Journal of Medicine.

Chau, M., Wang, L., Zheng, X., Mao, W., Zeng, D., and Chen, H (eds.) (2011). "Intelligence and Security Informatics PAISI 2011 Workshop," Springer, LNCS

Joel B. Predd, Henry H. Willis, C. Stelzer and Claude Setodji (2011), "Resource Allocation, Pattern Analysis, and Systematic Randomness: Assessing Possibilities for Border Security", pending peer review.

Van Hook, J., and Zhang, W. (2011). Who Stays? Who Goes? Selective Emigration Among the Foreign Born. Population Research and Policy Review 30(1): 1-24.


2010

Derrick, D. C., Elkins, A. C., Burgoon, J. K., Nunamaker, J. F., & Zeng, D. D. (2010). Border Security Credibility Assessments via Heterogeneous Sensor Fusion. IEEE Intelligent Systems, 25(3), 41-49.

Hu, P., Zeng, D., and Chen, H. (2010). "Biosurveillance System Evaluation: A Case Study,'' in Biosurveillance and Infectious Disease Informatics, Springer.

Zeng, D., Chen, H., Chavez, C., Lober, B., Thurdmond, M. (eds.) (2010), "Biosurveillance and Infectious Disease Informatics,'' Springer, appeared in December 2010.

Wang, L., Xua, Y., Wang, Y., Dong, S., Cao, Z., Zhou, W., Sun, H., Huo, D., Zhang, H., Sun, Y., Huang, L., Zeng, D., and Song, H. (2010). "An Epidemiological Investigation and Intelligent Analytical System for Foodborne Disease Food Control'', accepted for publication in Food Control.

Cao, Z., Zeng, D., Wang, Q., Zheng, X., and Wang, F.-Y. (2010). "An Epidemiological Analysis of the Beijing 2008 Hand-Foot-Mouth Epidemic,'' Chinese Science Bulletin, 55(12).

Briggs, R. O., Nunamaker, J. F., Jr., Sprague, R. H., "Social Aspects of Sociotechnical Systems," JMIS, Volume 27, Number 1, Summer 2010.

A. Abbasi, Z. Zhang, D. Zimbra, H. Chen, and J. F. Nunamaker, "Detecting Fake Websites: The Contribution of Statistical Learning Theory," MIS Quarterly, Volume 34, Number 3, Pages 435-461, September 2010.

Jensen, M. L., Lowry, P. B., Burgoon, J. K., Nunamaker, J. F., Jr., “Technology Dominance in Complex Decision Making:  The Case of Aided Credibility Assessment,” JMIS, Volume 27, Number 1, Summer 2010.

Jensen, M. L., Meservy, T. O., Burgoon, J. K., and Nunamaker, J. F., Jr., “Automatic, Multimodal Evaluation of Human Interaction,” Group Decision and Negotiation, Vol. 19, No. 4, July 2010, pp. 323-416.

Derrick, D. C., Elkins, A. C., Burgoon, J. K., Nunamaker Jr, J. F., & Zeng, D. D. (2010). Border Security Credibility Assessments via Heterogeneous Sensor Fusion. IEEE Intelligent Systems, 25(May/June), 41–49. Published by the IEEE Computer Society.

Burgoon, J. K., Nunamaker, J. F., Jr., "Toward Computer-Aided Support for Detection of Deception," Group Decision and Negotiation, Vol. 19, No. 4, July 2010, pp. 323-416.

Wang, X., Zeng, D., Seale, H., Li. S., Cheng, H., Luan, R., He, X., Pang, X., Dou. X., and Wang, Q. (2010). "Comparing Early Outbreak Detection Algorithms Based on Their Optimized Parameter Values," Journal of Biomedical Informatics, 43(1), February.

Sun, A., Zeng, D, and Chen, H. (2010). "Burst Detection from Multiple Data Streams: A Network-Based Approach," IEEE Transactions on Systems, Man, and Cybernetics, Part C, 40(3), May.

Burrero, Bajado o Migrante? Mexico U.S. Migration and Post-Structural Violence Paper by Jeremy Slack, at the Society for Applied Anthropology, Merida, Mexico March 20th, 2010.

Zeng, D., Chen, H., Chavez, C., Lober, B., Thurdmond, M. (eds.) (2010), "Biosurveillance and Infectious Disease Informatics,'' Springer, appeared in December 2010.

Zeng, D., Cao, Z., Wang, F., Chen, H., Zheng, X., and Wang, Q. (2010). "Disease Surveillance Based On Spatial Contact Networks: A Case Study of Beijing 2003 SARS Epidemic," IEEE Intelligent Systems; Trends and Controversies Department Article, January 2010.

D. C. Derrick, A. C. Elkins, J. K. Burgoon, J. F. Nunamaker, and D. D. Zeng, "Credibility Assessment via Heterogeneous Sensor Fusion for Border Security," IEEE Intelligent Systems, vol. May/June 2010.

N. Kalka, J. Zuo, N. A. Schmid, B. Cukic, Estimating and Fusing Quality Factors for Iris Biometric Images, IEEE Transactions on Systems, Man and Cybernetics - Part A: Systems and Humans, Vol 40(3), 2010, pp. 509-524.

Models for Vector Tracking Loops," Accepted for publication in the Journal Navigation and will appear in the Fall/Winter 2010 Volume.

Lu, H., Zeng, D., and Chen, H. (2010). "Markov Switching-Based Outbreak Detection," in Biosurveillance and Infectious Disease Informatics, Springer.

Lu, H.-M., Zeng, D., and Chen, H. (2010). "Prospective Infectious Disease Outbreak Detection Using Markov Switching Models," IEEE Transactions on Knowledge and Data Engineering, 22(4), April.

Jensen, M. L., Lowry, P. B., Burgoon, J. K., Nunamaker, J. F., Jr., "Technology Dominance in Complex Decision Making: The Case of Aided Credibility Assessment," JMIS, Volume 27, Number 1, Summer 2010.

Cao, Z., Zeng, D., Zheng, X., Wang, Q., Wang, F.-Y., Wang, J., and Wang, X. (2010). "Spatio-Temporal Evolution of Beijing 2003 SARS Epidemic," Science in China Series D: Earth Sciences}, 53(7).


2009

V. Kulathumani and A. Arora and M. Demirbas and M. Sridharan, Trail, A Distance Sensitive Network Service for Distributed Object Tracking, ACM transactions on Sensor Networks, 5(2), 2009, pp.1 40

Ackleson, J. "The Politics of Border Controls," in Ashgate Research Companion to Border Studies, ed. Doris Wastl-Walter (London: Ashgate) (forthcoming, 2009).

Zeng, D., Ma, J., Chang, W., and Chen, H. (2009). "Spatial-Temporal Data Analysis and its Applications in Infectious Disease Informatics," in Handbooks in Information Systems: Business Computing, edited by Alok Gupta and Gedas Adomavicius, Elsevier.

Ackleson, J. and Kastner, J. "Regions, Borders and Regulation: The Food Safety & Security Case," Geopolitics (special issue on the "Theorization of Border Studies") (forthcoming, 2009).

A. Ross and N. Poh, "Multibiometric Systems: Overview, Case Studies and Open Issues," in Handbook of Remote Biometrics for Surveillance and Security, M. Tistarelli, S. Z. Li and R. Chellappa (Eds.), Springer, 2009. ISBN: 978-1-84882-384-6.

N. Bartlow, N. Kalka, B. Cukic, A. Ross: "Iris Digital Watermarking", Encyclopedia of Biometrics, (Stan Z. Li, Ed.), Springer, 2009.

Ackleson, J. "International Cooperation on Border Security in the Developed World," Rey Koslowski, ed., Global Mobility Regimes (Oxford: Oxford University Press, forthcoming, 2009).

Chen, H., Zeng, D., Yan, P. (2009). "Infectious Disease Informatics--Syndromic Surveillance for Public Health and Biodefense," Springer, monograph, appeared in December 2009.

Chen, H., Zeng, D., Yan, P. "Infectious Disease Informatics and Biodefense," Springer, monograph, to appear in November 2009.

M. Demirbas, A. Arora and V. Kulathumani, Glance: A Lightweight Querying Service for Wireless Sensor Networks, Elsevier Journal on Theoretical Computer Science, 410 (2009), pp. 500 513.

N. Bartlow, N. Kalka, B. Cukic, and A. Ross, Iris Digital Watermarking, Encyclopedia of Biometrics, (Stan Z. Li, Ed.), Springer, 2009.

Burgoon, J. K., Twitchell, D. P., Jensen, M. L., Adkins, M., Kruse, J., Deokar, A., Lu, S., Metaxas, D., Nunamaker, J. F., Jr., & Younger, R. E., "Detecting Concealment of Intent in Transportation Screening: A Proof-of-Concept," IEEE Transactions on Intelligent Transportation Systems Council, 10, no. 1, 2009: 103.

D. Adjeroh, M. C. Lee, N. Banda, and U. Kandaswamy, "Adaptive Edge-Oriented Shot Boundary Detection", EURASIP Journal on Image and Video Processing, Volume 2009 (2009), Article ID 859371, 13 pages.


2008

Ackleson, J. and Kastner, J. "'Routinizing' Cooperation and Changing Narratives: The Security and Prosperity Partnership of North America," Journal of Borderlands Studies 23, no. 1 (2008): 13-30.

2011

Brown, S.K., Bean F.D., Leach, M.A., and Rumbaut, R.G. (2011). "Legalization and Naturalization Trajectories Among Mexican Immigrants and Their Implications for the Second Generation". In R. Alba and M.C. Waters (Eds.) The Next Generation: Immigrant Youth in a Comparative Perspective (pp. 31-45). New York: NYU Press.

Bean, F.D., Bachmeier, J.D., Brown, S.K., and Tafoya-Estrada, R. (2011). "Immigration and Labor Market Dynamics". In E.E. Telles, M. Sawyer and G.Rivera-Salgado (Eds.), Just Neighbors? Research on African American and Latino Relations in the United States (pp. 37-60). New York: Russell Sage Foundation.

Brown, S.K., and Bean, F.D. (2011). "Immigrant Cross-Generational Incorporation in the United States". In J.HIgley, J.Nieuwenhuysen, and S. Neerup (Eds.) Immigration and the Financial Crisis: The United States and Australia Compared (pp. 92-104). Cheltenham, U.K.: Edward Elgar.

V. Kulathumani, S. Parupati, A. Ross, R. Jillela (2011), "Collaborative Face Recognition Using a Network of Embedded Cameras," Book chapter in Distributed Video Sensor Networks (pp. 373-387) London, England: Springer.

Ackleson, J. and Vasquez, R.A. "Border Security," in Governing America: Major: Policies and Decisions of Federal, State, and Local Government, eds. Paul J. Quirk and William Cunion (New York: Facts on File, 2011).

T. Bourlai, N. Kalka, D. Cao, B. Decann, Z. Jafri, F. Nicolo, C. Whitelam, J. Zuo, D. Adjeroh, B. Cukic, J. Dawson, L. Hornak, A. Ross, N. A. Schmid (2011), " Ascertaining Human Identity in Night Environments", Book Chapter, Distributed Video Sensor Networks (pp. 451-467) London, England: Springer.

Lapid, Y. and Albert, M., "Rethinking the 'Inter' in International Relations," in Nick Onuf et al eds., On Rules, Politics, and Knowledge: Friedrich Kratochwil, International Relations, and Domestic Affairs (London: Palgrave Macmillan, 2011).

Van Hook, J., and Fix, M. (2011). The Demographic Impacts of Repealing Birthright Citizenship. In D. Robinson & M. Parsa (Eds.) Legal Briefs on Immigration Reform from 25 of the Top Legal Minds in the Country, Volume 1 (Pp. 173-186). Nashville, TN: Robinson Omnimedia Publishing & Studios.

Lee, J., and Bean, F.D. (2010). The Diversity Paradox: Immigration and the Color Line in 21st-Century America. New York: Russell Sage. (2011 Otis Dudley Duncan award for distinguished scholarship in social demography, Sociology of Population Section, American Sociological Association).


2010

M. Albert and Y. Lapid. "The 'Inter' according to Fritz: Rethinking IR's Proverbial Toolbox" in O. Kessler et. al., eds., On Rule, Politics, and Knowledge (London: Palgrave/Macmillan, 2010), pp. 238-247.

D. L. Hall and J. M. Jordan, Human-Centered Information Fusion, Artech House Publishers, 2010

Bean, F.D., Brown, S.K., and Bachmeier, J.D. (2010). Comparative Integration Contexts and Mexican Immigrant-Group Incorporation in the United States. In A.C. d?Apollonia and S. Reich (Eds.) Managing Ethnic Diversity After 9/11: Integration, Security, and Civil Liberties in Transatlantic Perspective (pp. 253-275). New Brunswick, N.J.: Rutgers University Press.

M. Albert and Y. Lapid. "The 'Inter' According to Fritz: Rethinking IR's Proverbial Toolbox" in O. Kessler et. al., eds., On Rule, Politics, and Knowledge (London: Palgrave/Macmillan, 2010), pp. 238-247.


2009

Ackleson, J. and Heyman, J. "U.S. Border Security after 9/11," in Transforming Borders in the Al Qaeda Era, eds. John A. Winterdyk and Kelly W. Sundberg (London: Ashgate, 2009)

2013

Grimes, J. Jenkins, J., & Valacich, J. (2013). Assessing Credibility by Monitoring Changes in Typing Behavior: The Keystrokes Dynamics Deception Detection Model. Hawaii International Conference on System Sciences. Deception Detection Symposium. (Published on CD)

Twyman, N., Burgoon, J. K., Elkins, A. C., & Proudfoot, J. G. (2013). Alternative Cues in Concealed Information Testing. Forty-Sixth Annual Hawaii International Conference on System Sciences. January 7-9. Maui, Hawaii.

Valacich, J.S., Jenkins, J.L., Nunamaker, Jr., J.F., Hariri, S., & Howie, J. (2013). Identifying Insider Threats through Monitoring Mouse Movements in Concealed Information Tests. Hawaii International Conference on System Sciences. Deception Detection Symposium. (Published on CD)

Elkins, A. C., Sun, Y., Zafeiriou, S., & Pantic, M. (2013). The Face of an Imposter: Computer Vision for Deception Detection. Forty-Sixth Annual Hawaii International Conference on System Sciences. January 7-9. Maui, Hawaii.

Burgoon, J., Elkins, A. C., Nunamaker, J. F., Metaxas, D. (2013). Are Human Judges as Accurate as Automated Tools in Detecting Truth and Deceit? International Communication Association 2013 Conference. June 17-21, 2013, London, UK. 


2012

Elkins, A. C., Derrick, D. C., Burgoon, J. K., & Nunamaker Jr, J. F. (under review). Predicting Users’ Perceived Trust in Embodied Conversational Agents Using Vocal Dynamics. Forty-Fifth Annual Hawaii International Conference on System Sciences. Maui, Hawaii.

Coulter, L. D. Stow, S. Kumar, S. Dua, B. Loveless, G. Fraley, C. Lippitt, and V. Shrivastava.  2012.  Automated co-registration of multitemporal airborne frame images for near real-time change detection. Proceedings of the ASPRS 2012 Annual Conference, Sacramento, CA, March 19-23, 2012. 

Coulter, L., D. Stow, Y. H. Tsai, C. Chavis, C. Lippitt, G. Fraley, and R. McCreight.  2012.  Automated detection of people and vehicles in natural environments using high temporal resolution airborne remote sensing. Proceedings of the ASPRS 2012 Annual Conference, Sacramento, CA, March 19-23, 2012. 

Schuetzler, R. (2012). in Jensen, M., Meservy, T., Burgoon, J., and Nunamaker, J., Report of the HICSS-45 Rapid Screening Technologies, Deception Detection and Credibility Assessment Symposium, January 2012, 103 pp. 

Jay F. Nunamaker, Jr., Judee K. Burgoon, Nathan W. Twyman, Jeffrey Gainer Proudfoot, Ryan Schuetzler, Justin Scott Giboney (2012). “Establishing a Foundation for Automated Human Credibility Screening,” 2012 IEEE International Conference on Intelligence and Security Informatics (ISI), January 2012.

Jeffrey G. Proudfoot, Nathan W. Twyman, and Judee K. Burgoon (2012). “Familiarity Recognition in Automated Screening Environments: Utilizing Eye Tracking Technology as an Intelligence Gathering Tool.” HICSS-45 Symposium on Credibility Assessment and Information Quality in Government and Business, 45th Annual Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii, Jan 4-7. 

Jeffrey L. Jenkins, Jeffrey G. Proudfoot, Alexandra Durcikova, (2012). “Determinants and Impediments of Password Reuse on Deceptive Web Sites.” HICSS-45 Symposium on Credibility Assessment and Information Quality in Government and Business, 45th Annual Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii, Jan 4-7.

Jeffrey L. Jenkins, Jeffrey G. Proudfoot, Mary Burns, Elyse Golob (2012). “Estimating Unknown Numbers More Precisely: A Stratified Sampling Methodology for Estimating the Baseline Population of Illegal Immigrants Passing through Open Checkpoints.” HICSS-45 Symposium on Credibility Assessment and Information Quality in Government and Business, 45th Annual Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii, Jan 4-7. 

Justin Scott Giboney and Alexandra Durcikova (2012). “What Motivates Hackers? Insights from Self-Determination Theory and the General Theory of Crime,” The Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13, Provo, UT, 2012 (accepted 7 Aug 2012).

Kevin C. Moffitt, Justin Scott Giboney, Emma Ehrhardt, Judee K. Burgoon, Jay F. Nunamaker Jr. “Structured Programming for Linguistic Cue Extraction (SPLICE),” in Jensen, M., Meservy, T., Burgoon, J., and Nunamaker, J., Report of the HICSS-45 Rapid Screening Technologies, Deception Detection and Credibility Assessment Symposium, January 2012, pp. 103 

Nunamaker, J. F., Briggs, Robert O. (2012).  Introduction to Collaboration Systems and Technologies Track. Proceedings of the 45th Annual Hawaii International Conference on System Sciences. (2012 01 04 – 2012 01 07 Maui Hawaii USA).

Pickard, M. D., Jenkins, J. L., Nunamaker, J. F., Embodied Agents and the Predictive Elaboration Model of Persuasion: The Ability to Tailor Embodied Agents to Users Need for Cognition. Proceedings of the 45th Annual Hawaii International Conference on System Sciences. (2012 01 04 – 2012 01 07 Maui Hawaii USA) pp. 543-552.

Derrick, D. C., Meservy, T. O., Burgoon, J. K., & Nunamaker Jr, J. F. (2012). An Experimental Agent for Detecting Deceit in Chat-based Communication. Hawai’i International Conference on System Sciences (HICSS), Jan 4-7, 2012, Maui, HI.

Elkins, A. C., Burgoon, J. K., Nunamaker, J. F., Derrick, D. C.  Predicting Users’ Perceived Trust in Embodied Conversational Agents Using Vocal Dynamics. Proceedings of the 45th Hawaii International Conference on System Sciences (2012 01 04- 2012 01 07 Maui Hawaii USA) pp. 579-588.

Elkins, A. C., Dunbar, N. (2012). Are Deception Detection Experts Threatened by Artificial Intelligence Based Credibility Assessment Systems? Improving Assisted Detection Accuracy and Objectivity. Forty-Fifth Annual Hawaii International Conference on System Sciences, January 4-7, 2012, Maui, Hawaii.

Giboney, J.S., Brown, S. A., Nunamaker, J. F., User Acceptance of Knowledge-Based System Recommendations: Explanations, Arguments, and Fit-Research in Progress. Proceedings of the 45th Annual Hawaii International Conference on System Sciences. (2012 01 04 – 2012 01 07 Maui Hawaii USA) 3719-3727.

Luna-Reyes, L., Andersen, D. F., Andersen, D. L., Derrick, D. C., & Jarman, H. (2012). Full Information Product Pricing (FIPP) Regimes: Policy Implications for US-Mexico Sustainable Commerce. Presented at the Puentes Consortium Annual Conference, April 26, 2012, Houston, TX.

Elkins, A. C., Derrick, D. C., Gariup, M. (2012). The Voice and Eye Gaze Behavior of an Imposter: Automated Interviewing and Detection for Rapid Screening at the Border. European Chapter of the Association for Computational Linguistics (EACL), Apr 23-27, 2012, Avignon, France.

Oh, O., Nguyen, C., de Vreede, G. J., Derrick, D. C. (2012).  Collaboration Science in the Age of Social Media: A Crowdsourcing View.  Group Decision and Negotiation Conference, May 21-24, 2012, Recife, Brazil.

Jay F. Nunamaker Jr., Judee K. Burgoon, Nathan W. Twyman, Jeffrey G. Proudfoot, Ryan Schuetzler, and Justin S. Giboney (2012). “Establishing a Foundation for Automated Human Credibility Screening.” Developing Technologies and Tools for Border Security Applications Workshop at the IEEE International Conference on Intelligence and Security Informatics (ISI), Washington, D.C., June 11. 

Nunamaker Jr., J. F., Elkins, A. C., Twyman, N., & Derrick, D. C. (2012). AVATAR System for Automated Credibility Assessment and Interviewing. Presented at the IEEE International Conference on Intelligence and Security Informatics, Jun 11-14, 2012, Washington, D.C.

Alipour, H., Zeng, D. D., & Derrick, D. C. (2012). AdaBoost-Based Sensor Fusion for Credibility Assessment. Presented at the IEEE International Conference on Intelligence and Security Informatics, Jun 11-14, 2012, Washington, D.C.

Jeffrey G. Proudfoot, Nathan W. Twyman, and Judee K. Burgoon (2012). “A Comparison of Invasive and Noninvasive Sensors in the Concealed Information Test.” The Workshop on Innovation in Border Control (WIBC) at the European Intelligence and Security Informatics Conference (EISIC), Odense, Denmark, August 22-24. 

Marquardson, J. (2012). Password Policy Effects on Entropy and Recall: Research in Progress. Paper presented at the 18th Americas Conference on Information Systems, Seattle, WA.

Nathan W. Twyman, Matthew D. Pickard, and Mary B. Burns (2012). “Proposing Automated Human Credibility Screening Systems to Augment Forensic Interviews and Fraud Auditing.” Proceedings of the Strategic and Emerging Technologies Workshop at the American Accounting Association Annual Meeting, Washington D.C., August 4.

Randall Boyle, Jeffrey A. Clements, and Jeffrey G. Proudfoot (2012). “Predicting Deception Behavior: Exploring Antecedents to Deceptive Behaviors.” The National Communication Association Convention (NCA), Communication and Social Cognition Division, Orlando, FL, November 15-18. 

Burgoon, Judee K., Schuetzler, Ryan S., and Wilson, David W. “Uncovering Hidden Patterning in Interpersonal Communication: Illustration with Deceptive and Truthful Interactions” (2012). 98th Annual Convention of the NCA, Orlando, FL. *Best Paper, Nonverbal Communication Division.

Burgoon, Judee K., Wilson, David W., Hass, Michael, and Schuetzler, Ryan S. “Interactive Deception in Group Decision-Making: New Insights from Communication Pattern Analysis” (2012). 98th Annual Convention of the NCA, Orlando, FL.

Wilson, D.W. & Valacich, J.S. (2012). Unpacking the Privacy Paradox: Irrational Decision-Making within the Privacy Calculus. International Conference on Information Systems.

Derrick, D. C., Read, A. (2012). Enriching Human-Computer Interactions Via a Facial Recognition in an Embodied Agent. Presented at the Workshop on Information Technologies and Systems, Dec 15-16, 2012, Orlando, FL.

Elkins, A. C., Burgoon, J. K., & Nunamaker, J. F. (2012). Vocal analysis Software for Security Screening: Validity and Deception Detection Potential. Homeland Security Affairs, Fifth Annual DHS University Summit DHS Centers of Excellence Science and Technology Student Papers. 

Alipour, H., Zeng, D. (2012). "AdaBoost-Based Sensor Fusion for Credibility Assessment," Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics (ISI), Washington, D.C., June.

Bourlai, Thirimachos; Cukic, Bojan, "Multi-Spectral Face Recognition: Identification of People in Difficult Environments," 2012 IEEE International Conference on Intelligence and Security Informatics, Washington DC, June 2012.

C. Ghosh, H. Safavi-Naeini, S. Roy, K. Doppler, and J. Stahl, "QP-CSMA-CA: A Modified CSMA-CA-Based Cognitive Channel Access Mechanism with Testbed Implementation," Proc. IEEE DySPAN, Seattle, WA, Oct. 2012. 

Coulter, L., D. Stow, S. Kumar, S. Dua, B. Loveless, G. Fraley, C. Lippitt, and V. Shrivastava. 2012b. Automated Co-Registration of Multitemporal Airborne Frame Images for Near Real-Time Change Detection. Proceedings of the ASPRS 2012 Annual Conference, Sacramento, CA, March 19-23, 2012.

Coulter, L., D. Stow, Y.H. Tsai, C. Chavis, C. Lippitt, G. Fraley, and R. McCreight. 2012d. A New Paradigm for Persistent Wide Area Surveillance. Proceedings of the IEEE International Conference on Homeland Security Technologies, November 13-15, 2012, Waltham, MA.

D.C. Elkins, A. C., Derrick, D. C., Gariup, M. (2012). The Voice and Eye Gaze Behavior of an Imposter: Automated Interviewing and Detection for Rapid Screening at the Border. European Chapter of the Association for Computational Linguistics (EACL), Apr 23-27, 2012, Avignon, France.

Derrick, D. C., de Vreede, G. J. (2012). Automated Transactional Leadership in Ad-Hoc, Virtual Teams. Group Decision and Negotiation Conference, May 21-24, 2012, Recife, Brazil.

Derrick, D. C., de Vreede, G. J., Read, A. S. (2012). SPECIES Agents for Automated Facilitation of Mass Collaboration. Group Decision and Negotiation Conference, May 21-24, 2012, Recife, Brazil.

Elkins, A. C., Derrick, D. C., Burgoon, J. K., & Nunamaker Jr, J. F. (2012). Predicting Users? Perceived Trust in Embodied Conversational Agents Using Vocal Dynamics. Hawai? International Conference on System Sciences (HICSS), Jan 4-7, 2012, Maui, HI.

Jenkins, J. L., Proudfoot, J. G., & Durcikova, A. (2012). Determinants and Impediments of Password Reuse on Deceptive Websites in Jensen, M., Meservy, T., Burgoon, J., and Nunamaker, J., Report of the HICSS-45 Rapid Screening Technologies, Deception Detection and Credibility Assessment Symposium, January 2012.

Jun He, Robert A. Norwood, Mahmoud Fallahi, and Nasser Peyghambarian, "Solar-Powered Ad-Hoc Wireless Sensor Network for Border Surveillance", Proc. SPIE 8377, 83770T (2012).

Kaza, S., Lu, H.-M., Zeng, D., and Chen. H. (2012). "Using Burst Detection Techniques to Identify Suspicious Vehicular Traffic at Border Crossings," Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics (ISI), Washington, D.C., June.

Mayra Sacanamboy, Bojan Cukic, and Vittorio Cortellessa, "Performance and Risk Analysis for Border Management Applications: A Model-Driven Approach and A Perspective View", Workshop on Innovation in Border Control, Odense, Denmark, 2012.

Ruiz, E. E., & Head, K. L. (2012). Use of an Automatic Under-Vehicle Inspection System as a Tool to Streamline Vehicle Screening at Ports of Entry and Security Checkpoints. In Intelligence and Security Informatics Conference (EISIC), 2012 European (pp. 329-333). Presented at the Intelligence and Security Informatics Conference (EISIC), 2012 European. doi:10.1109/EISIC.2012.64

Schuetzler, R. (2012). Countermeasures and Eye Tracking Deception Detection. Paper presented to the 45th Annual Meeting of the Hawaii International Conference on System Sciences, Maui, Hawaii, January 2011.

Z. Li and D. Gebre-Egziabher "Performance Analysis of a Civilian GPS Position Authentication System," Proceedings of IEEE/ION PLANS 2012, April 24 - 26, 2012. Myrtle Beach, South Carolina. pp. 1028-1041

Zeng, D., Zhou, L., Cukic, B., Wang, A., Yang, C. (eds). (2012). "Intelligence and Security Informatics," IEEE International Conference on Intelligence and Security Informatics, ISI 2012 Proceedings, IEEE Press, June.


2011

Twyman, N., Burgoon, J. K., & Nunamaker, J. F. (2011). Noninvasive Screening for Concealed Information. Proceedings of the Annual Hawaii International Conference on System Sciences (CD-ROM), January 4-7, 2011, Computer Society Press, 2011 (4 pages).

Nunamaker, J. F. and Briggs, R. O., (EDS.), “Introduction to the Collaboration Systems and Technology Track,” Proceedings of the 44th Annual Hawaii International Conference on System Sciences (HICSS) in Kauai, HI, January 2011. 

Langhals, B. T., Burgoon, J. K., & Nunamaker, J. F. (2011). Using Eye and Head Based Psychophysiological Cues to Enhance Screener Vigilance. Proceedings of the 44th Annual Hawaii International Conference on System Sciences (CD-ROM), January 4-7, 2011, Computer Society Press, 2011 (9 pages).

A. Ross and C. Chen, "Can Gender be Predicted from Near-Infrared Face Images?," Proc. of International Conference on Image Analysis and Recognition (ICIAR), (Burnaby, Canada), June 2011.

Twyman, N., Elkins, A. C., & Burgoon, J. K. (2011). A Rigidity Detection System for the Guilty Knowledge Test. Forty-Fourth Annual Hawaii International Conference on System Sciences. Koloa, Kauai, Hawaii.

Golob, E., Elkins, A. C., & Agraz, G. (2011). Improving the Screening Process to Facilitate Trade at U.S. – Mexico Ports of Entry. Second Puentes Symposium on Border Security: Economic Development and the US-Mexico Border. Houston.

Elkins, A. C., & Stone, J. (2011). The Effect of Cognitive Dissonance on Argument Language and Vocalics. Forty-Fourth Annual Hawaii International Conference on System Sciences. Koloa, Kauai, Hawaii.

Cao D, Chen C, Piccirilli M, Adjeroh D, Bourlai T, and Ross A, "Can Facial Metrology Predict Gender?", Proceedings, International Joint Conference on Biometrics (IJCB-2011), Washington DC, October 11-13, 2011

Coulter, L. and D. Stow. 2011. Near Real-Time Change Detection for Border Monitoring. Proceedings of the ASPRS Annual Conference, Milwaukee, WI, May 1-5, 2011.

Derrick, D. C., Moffitt, K., & Nunamaker, J. F. (2011). Gaze Behavior as a Guilty Knowledge Test: Initial Exploration for Use in Automated, Kiosk-based Screening. Symposium on Credibility Assessment and Information Quality in Government and Business. Presented at the Hawaii International Conference on System Sciences (HICSS), Koloa, Hawaii, USA.

Dunbar, N. E., Jensen, M. L., Burgoon, J. K., et al. (2011). A Dyadic Approach to the Detection of Deception. Proceedings of the Thirty-Third Annual Hawaii International Conference on System Sciences (CD-ROM), January 4-7, 2010, Computer Society Press, 2011 (7 pages).

Jun He, Mahmoud Fallahi, Robert A. Norwood and Nasser Peyghambarian, "Smart Border: Ad-Hoc Wireless Sensor Networks for Border Surveillance", Proc. SPIE 8019, 80190Z (2011).

Kondaveeti, A., G. Runger, J. Rowe, H. Liu. "Extracting Geographic Knowledge from Sensor Intervention Data Using Spatial Association Rules," to appear Proceedings of the IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services 2011.

Memon, N., Zeng, D.,Wiil, U., and Karapelas, P. (eds.) (2011). Intelligence and Security Informatics: Proceedings of the European Conf. on Intelligence and Security Informatics, IEEE Computer Society Press.

Nathan Kalka, Huihua Lu, Bojan Cukic, The Role of Quality in Biometric Fusion, Proceedings of the Credibility Assessment and Information Quality in Government and Business Symposium, HICSS 43, Hawaii 2011.

Proudfoot, J. G., Twyman, N. T., & Burgoon, J. K. (2011). Familiarity Recognition in Automated Screening Environments: Utilizing Eye-Tracking Technology as an Intelligence-Gathering Tool. Proceedings of the 45th Annual Meeting of the Hawaii International Conference on System Sciences, Maui, Hawaii, Jan 4-7.

T. Chan, Y. Kuga and S. Roy, "Combined Use of Various Passive Radar Techniques and Angle of Arrival Using MUSIC for the Detection of Ground Moving Objects," Proc. IEEE Int. Symp. Antennas & Propn., Spokane, WA, July 2011.

Twyman, N. W., Burgoon, J. K., & Nunamaker, J. F. (2011). Non-invasive Screening for Concealed Information. Proceedings of the 43rd Annual Meeting of the Hawaii International Conference on System Sciences (CD-ROM), January 4-7, 2010, Computer Society Press, 2011 (4 pages).

Twyman, N. W., Elkins, A., & Burgoon, J. K. (2011). A Rigidity Detection System for the Guilty Knowledge Test. Proceedings of the 43rd Annual Meeting of the Hawaii International Conference on System Sciences (CD-ROM), January 4-7, 2010, Computer Society Press, 2011 (10 pages).


2010

Humpherys, S., Moffitt, K., Elkins, A. C., Burgoon, J. K., & Nunamaker Jr, J. F. (2010). Rapid Non-contact Credibility Assessment via Linguistic/Vocalic Analyses. National Communication Association 96th Annual Convention. San Francisco, California.

Golob, E., & Elkins, A. C. (2010). Improving the Primary Screening Process at North American Ports of Entry. Forty-Third Annual Hawaii International Conference on System Sciences. Koloa, Kauai, Hawaii.

Elkins, A. C., & Burgoon, J. K. (2010). Validating Vocal Analysis Software to Assess Credibility in Interpersonal Interaction: A Multilevel Factor Analytic Approach. National Communication Association 96th Annual Convention. San Francisco, California.

S. Bhattacharyya and D. Gebre-Egziabher, "Integrity Analysis of GPS Vector Tracking Architecture," to be presented at the ION-GNSS 2010 Conference in September 2010.

C. Matthews, Y. Ketema and D. Gebre-Egziabher, " In-Situ Stride Length Estimation Using a Kinetic Model of Human Gait" to be presented at the ION-GNSS 2010 Conference in September 2010.

B. Rumberg, D. Graham, V. Kulathumani, "Energy Efficient Sensor Networks Using Analog Signal Processing," IPSN 2010, Stockholm, Sweden.

B. Decann and A. Ross, "Gait Curves for Human Recognition, Backpack Detection, and Silhouette Correction in a Nighttime Environment," Proc. of SPIE Conference on Biometric Technology for Human Identification VII, (Orlando, USA), April 2010.

Amjad Abu-Baker, Hong Huang, Eric Johnson, Satyajayant Misra, Rafael Asorey-Cacheda, and Manikanden Balakrishnan, "Maximizing a-Lifetime of Wireless Sensor Networks with Solar Energy Sources," Proceedings of IEEE MILCOM 2010.

A. Ross and M. Sam Sunder, "Block Based Texture Analysis for Iris Classification and Matching," Proc. of IEEE Computer Society Workshop on Biometrics at the Computer Vision and Pattern Recognition (CVPR) Conference, (San Francisco, USA), June 2010.

Burgoon, J. K., Jensen, M., Twyman, N. W., Meservy, T. O., Metaxas, D. N., Michael, N., Elder, K., Nunamaker, J. F. (2010). Automated Kinesic Analysis for Deception Detection. Proceedings of the 43rd Hawaii International Conference on System Sciences, USA.

Adjeroh D, Cao D, Picirrilli M, and Ross A. On Predictability and Correlation in Human Metrology. Proceedings, IEEE WIFS'2010, Seattle WA, Dec. 2010.

Corruption at the Border and Security Concerns by Jorge Manuel Agiurre Hernandez, Jeremy Slack and Scott Whiteford Paper Presented at Puentes Symposium for University Presidents held in Houston at Rice University, January 14th 2010.

H. Zhang, W. Duncan, M. Fallahi, R. A. Norwood, and N. Peyghambarian, "Solar-powered Wireless Sensor System for Border Security," in Sensor and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IX, ed. by Edward M. Carapezza, Proc. SPIE 7666, 766621 (2010).

Elkins, A., Burgoon, J. K. (2010). Validating Vocal Analysis Software to Assess Credibility in Interpersonal Interaction: A Multilevel Factor Analytic Approach. Proceedings of the National Communications Association 96th Annual Convention, USA.

Elkins, A. (2010). Evaluating the Credibility Assessment Capability of Vocal Analysis Software. Proceedings of the 43rd Hawaii International Conference on System Sciences, USA.

Kondaveeti, A., G. Runger, J. Rowe, H. Liu. "Border Security: Supplementing Human Intelligence in a Sensor Network Using Sequential Pattern Mining," to 3rd International Conference on Human-centric Computing (HumanCom-10), 2010.

Lui Y* and Adjeroh D. Shadow Detection Using Spatio-temporal Contexts. International Conference on Image Processing, Proceedings, IEEE ICIP 2010, Hong Kong, Sept 2010.

Luo, Y., Zeng, D., Cao, Z., Zheng, X., Wang, Y., and Wang, Q. (2010). "Using Multi-source Web Data for Epidemiological Surveillance: A Case Study of Influenza A Pandemic (H1N1) 2009 in Beijing," in the Proceedings of the IEEE Services, Operations, Logistics and Informatics (SOLI) Conference, 2010, Qingdao, China, July.

M. Sacanamboy, B. Cukic, "Combined Performance and Risk Analysis for Border Management Applications," 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2010), Chicago, IL, 2010.

M. Sacanamboy, B. Cukic, "The Impact of Architecture Level Performance Analysis for Border Security Systems," 2010 SDPS Transformative Systems Conference, Dallas, TX, 2010.

Nunamaker, J. F., Luna-Reyes, L., Langhals, B., Derrick, D. C. (2010). Border Security Infrastructure and Systems, Puentes Consortium of University Presidents, Jan 13-14, 2010, Houston, TX.

Moffitt, K., Burns, M., Jenkins, J., Burgoon, J.K., Nunamaker, J.F. (2010) Facial Thermal Imaging as a Technique for Deception Detection. Proceedings of the 43rd Hawaii International Conference on System Sciences, USA.

Twyman, N. W., Moffitt, K., Burgoon, J. K., Marchak, F. (2010). Using Eye Tracking Technology as a Concealed Information Test. Proceedings of the 43rd Hawaii International Conference on System Sciences, USA.

What are Borders and Why We Need Bridges? Lessons and Questions from the Mexico /United States Border By Scott Whiteford and Jeremy Slack. Keynote Address for the Model United Nations Annual Conference held at the University of Arizona, March 17, 2010.

Y. Ding and A. Ross, "When Data Goes Missing: Methods for Missing Score Imputation in Biometric Fusion," Proc. of SPIE Conference on Biometric Technology for Human Identification VII, (Orlando, USA), April 2010.

S. Jaruwatanadilok, S. Roy, and Y. Kuga, "Improved Detection of a Target on a Random Rough Surface Using Angular Correlation Function," Proc. IGARSS, Honolulu, Hawaii, July 25-30, 2010

S. Bhattacharyya and D. Gebre-Egziabher, "Integrity Analysis of GPS Vector Tracking Architecture," to be presented at the ION-GNSS 2010 Conference in Sep 2010

Yang, C., Zeng, D., Wang, K., Sanfilippo, A., Tsang, H., Day, M., Glasser, U., Brantingham, P., and Chen, H. (eds) (2010). "Intelligence and Security Informatics," IEEE Intl. Conf. on Intelligence and Security Informatics, ISI 2010 Proceedings, IEEE Press, May


2009

T. Bourlai, A. Ross and A. K. Jain, "On Matching Digital Face Images Against Scanned Passport Photos," Proc. of First IEEE International Conference on Biometrics, Identity and Security (BIdS), (Tampa, USA), September 2009.

S. Crihalmeanu, A. Ross and R. Derakhshani, "Enhancement and Registration Schemes for Matching Conjunctival Vasculature," Proc. of the 3rd IAPR/IEEE International Conference on Biometrics (ICB), (Alghero, Italy), June 2009.

Yan, P. and Zeng, D. (2009). "In-store Shopping Activity Modeling based on Decision-theoretic Dynamic Bayesian Networks," Proceedings of the Workshop on Information Technologies and Systems (WITS) 2009, Phoenix, Arizona, December.

N. Bartlow, N. Kalka, B. Cukic and A. Ross, "Identifying Fingerprint Sensors from Images", Proc. of IEEE Computer Society Workshop on Biometrics at the Computer Vision and Pattern Recognition (CVPR) conference, (Miami Beach, USA), June 2009.

N. Kalka, N. Bartlow, B. Cukic, "Decision Dependability and its Application to Identity Management," Cyber Security and Information Intelligence Research Workshop, Oak Ridge, TN, 2009.

R. Jillela and A. Ross, "Adaptive Frame Selection for Improved Face Recognition in Low-Resolution Videos," Proc. of International Joint Conference on Neural Networks (IJCNN), (Atlanta, USA), June 2009.

Lu, H., Zeng, D., Chen, H., Chan, T., and King, C.-C. (2009). "Modeling Syndrome Count Time Series Using Markov Switching with Jumps Models," Proceedings of the 2009 Biosurveillance and Biosecurity Workshop, Taipei, September.

J. Frigo, V. Kulathumani, S. Brennan, E. Rosten, E. Raby, Sensor Network Based Vehicle Classification and License Plate identification System, International Conference on Networked Sensing Systems (INSS), Pittsburgh, 2009.

J. Jaquez, D. Valencia, M. Balakrishnan, E. Johnson and H. Huang, "Implementation of TEAN-Sleep for Wireless Sensor Networks," Proceedings of IEEE MILCOM 2009.

K. Nandakumar, A. K. Jain and A. Ross, "Fusion in Multibiometric Identification Systems: What about the Missing Data?," Proc. of the 3rd IAPR/IEEE International Conference on Biometrics (ICB), (Alghero, Italy), June 2009.

D. L. Hall, M. McNeese, B. Hellar, B. Panulla and W. Shumaker, "A Cyber Infrastructure for Evaluating the Performance of Human Centered Fusion," in Proceedings of the 12th International Conference on Information Fusion, Seattle, Washington, 6-9 July, 2009 pp 1257-1264.

Cao, Z., Zeng, D., Wang, Q., Wang, F., and Zheng, X. (2009). "Risk Analysis of Time of Birth to the Hand-Foot-Mouth Epidemic," Proceedings of the 2009 Biosurveillance and Biosecurity Workshop, Taipei, September.

A. Gyaourova and A. Ross, "A Coding Scheme for Indexing Multimodal Biometric Databases," Proc. of IEEE Computer Society Workshop on Biometrics at the Computer Vision and Pattern Recognition (CVPR) conference, (Miami Beach, USA), June 2009.

A. Ross, R. Pasula and L. Hornak, "Exploring Multispectral Iris Recognition Beyond 900nm," Proc. of 3rd IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), (Washington DC, USA), September 2009.

Ackleson, J. "From Thin to Thick? (And Back Again?): The Politics and Policies of the Contemporary U.S.-Canada Border," (special issue on the U.S. Elections and Canada-U.S. Relations (the 2008 Enders Symposium)), American Review of Canadian Studies (forthcoming, 2009).

Mathew L. Jenson, Paul Benjamin Lowry, Jeffrey L. Jenkins. “Using Source Credibility Theory to Explain and Predict the Efficacy of Human-Computer Systems for Credibility Assessment” (2009).

Aaron C. Elkins. “Evaluating the Credibility Assessment Capability of Vocal Analysis Software.” Accepted for publication, 2009.

Douglas C. Derrick. “Pilot Study to Classify Deceptive, Synchronous, Computer-Mediated Communication Using Lexical Features” (2009).

Sean Humpherys. “Discriminating Fraudulent Financial Statements by Identifying Linguistic Hedging.” (2009).

Brent Langhals, Judee K, Burgoon. “Psychological Responses during Rapid Non-contact Credibility Assessment: Blink Analysis.” Accepted, 2009.

Nathan W. Twyman, Kevin Moffitt, Judee K. Burgoon, Frank Marchak. “Using Eye Tracking Technology as a Concealed Information Test.” Accepted, 2009.

Judee K. Burgoon, Matthew Jensen, Nathan W. Twyman, Thomas O. Meservy, Dmitris N. Metaxas, Nicholas Michael, Koren Elder, Jay. F. Nunamaker. “Automated Kinesic Analysis for Deception Detection” Accepted, 2009.


2008

Burgoon, J. K., Elkins, A. C., Jensen, M., Diller, C., & Nunamaker Jr, J. F. (2008). Potential Non-contact Tools for Rapid Credibility Assessment from Physiological and Behavioral Cues. International Carnahan Conference on Security Technology. Prague, Czech Republic.

I. Brewer and D. L. Hall, "Overview of Penn State DHS Tasks", presented at the kickoff meeting held at the University of Arizona Center of Excellence for Border Security and Immigration, Tucson, Arizona, December 10-13, 2008.

M. Balakrishnan, E.E. Johnson, and H. Huang, "TEAN-Sleep for Distributed Sensor Networks: Introduction and a-Metrics Analysis," Proceedings of IEEE MILCOM, 2008.

2012

Persuasive Embodied Agents: Using Embodied Agents to Change People’s Behavior, Beliefs and Assessment. Matthew Pickard, Assistant Professor, University of New Mexico.

Examining Multiple Stages of IS Security Behavior by End-Users. Mary Burns, Assistant Professor, Augusta State University.

Automated Human Screening for Concealed Knowledge. Nathan Twyan, Post Doctoral Research Associate, University of Arizona.


2011

Vocalic Markers of Deception and Cognitive dissonance for Automated Emotion Detection Systems. Aaron Elkins, Post-Doctoral Research Associate, University of Arizona/Post Doctoral Research Associate, Imperial College, London

Special-Purpose, Embodied Conversational Intelligence with Environmental Sensors (SPECIES) Agents: Implemented in an Automated Interviewing Kiosk. Douglas Derrick, Assistant Professor, University of Nebraska, Omaha.

Using Eye and Head Based Psychophysiological Cues to Enhance Screener Vigilance. Brent Langhals, Assistant Professor, LT COL, Air Force Institute of Technology.

Toward Enhancing Automated Credibility Assessment: A Model for Question Type Classification and a Tool for Linguistic Analysis. Kevin Moffitt, Assistant Professor, Rutgers University.


2010

A System of Deception and Fraud Detection Using Reliable Linguistic Cues Including Hedging, Disfluencies, and Repeated Prases. Sean Humpherys, Assistant Professor, West Texas A&M.


2009

Decision Support for Rapid Assessment of Truth and Deception Using Automated Assessment Technologies and Kiosk-based Embodied Conversational Agents. Mark Patton, Lecturer, University of Arizona.

Year 6 Workplan
 

Year 5 Workplan
 

Year 4 Workplan 
 

Year 3 Workplan 
 

Year 2 Workplan 
 

Year 1 Workplan 
 

Year 4 Annual Report
 

Year 3 Annual Report
 

Year 2 Annual Report 
 

Year 1 Annual Report