Design Principles for Special Purpose, Embodied, Conversational Intelligence with Environmental Sensors (SPECIES) Agents
暂无分享,去创建一个
[1] Harri Oinas-Kukkonen,et al. Persuasive Systems Design: Key Issues, Process Model, and System Features , 2009, Commun. Assoc. Inf. Syst..
[2] A. Vrij. Detecting Lies and Deceit: Pitfalls and Opportunities , 2008 .
[3] Jennifer Edson Escalas. Self-Referencing and Persuasion: Narrative Transportation versus Analytical Elaboration , 2007 .
[4] D. M. Green,et al. Signal detection theory and psychophysics , 1966 .
[5] Kathy Kellermann. Communication: Inherently strategic and primarily automatic , 1992 .
[6] Richard E Petty,et al. Thought confidence as a determinant of persuasion: the self-validation hypothesis. , 2002, Journal of personality and social psychology.
[7] Eric T. Bradlow,et al. A Feature-Based Approach to Assessing Advertisement Similarity , 2006 .
[8] David R. Firth,et al. Communications of the Association for Information Systems , 2011 .
[9] Ritu Agarwal,et al. Research Note - Social Interactions and the "Digital Divide": Explaining Variations in Internet Use , 2009, Inf. Syst. Res..
[10] S. Asch. Effects of Group Pressure Upon the Modification and Distortion of Judgments , 1951 .
[11] H. Kelley,et al. Communication and Persuasion: Psychological Studies of Opinion Change , 1982 .
[12] Shelly Chaiken,et al. The pursuit of self-interest: self-interest bias in attitude judgment and persuasion. , 2005, Journal of personality and social psychology.
[13] Joseph P. Simmons,et al. Branding Alters Attitude Functions and Reduces the Advantage of Function-Matching Persuasive Appeals , 2007 .
[14] H. Raghav Rao,et al. Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..
[15] Kenneth G. DeBono,et al. Source expertise, source attractiveness, and the processing of persuasive information: A functional approach. , 1988 .
[16] James J. Lindsay,et al. Cues to deception. , 2003, Psychological bulletin.
[17] B. J. Fogg,et al. The elements of computer credibility , 1999, CHI '99.
[18] Judee K. Burgoon,et al. The ideal source: A reexamination of source credibility measurement , 1976 .
[19] Mikko Sams,et al. The effect of dynamics on identifying basic emotions from synthetic and natural faces , 2008, Int. J. Hum. Comput. Stud..
[20] Donald F. Roberts,et al. The Process and Effects of Mass Communication Revised Edition , 1971 .
[21] Matthew L. Jensen,et al. Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment , 2009, J. Manag. Inf. Syst..
[22] Mike Thelwall,et al. The Dimensions of Web Site Credibility and Their Relation to Active Trust and Behavioural Impact , 2009, Commun. Assoc. Inf. Syst..
[23] Dvijesh Shastri,et al. Imaging Facial Physiology for the Detection of Deceit , 2006, International Journal of Computer Vision.
[24] Ioannis Pavlidis,et al. Human behaviour: Seeing through the face of deception , 2002, Nature.
[25] Uma R. Karmarkar,et al. Believe Me, I Have No Idea What I’m Talking About: The Effects of Source Certainty on Consumer Involvement and Persuasion , 2010 .
[26] Ning Wang,et al. The politeness effect: Pedagogical agents and learning outcomes , 2008, Int. J. Hum. Comput. Stud..
[27] G. Bente,et al. Avatar-Mediated Networking: Increasing Social Presence and Interpersonal Trust in Net-Based Collaborations , 2008 .
[28] W. Feek. Communication works. , 1996, AIDS/STD health promotion exchange.
[29] S. Asch. Studies of independence and conformity: I. A minority of one against a unanimous majority. , 1956 .
[30] Kensuke Terai,et al. Respiratory changes during detection of deception , 2001 .
[31] Judee K. Burgoon,et al. The voice of deceit: Refining and expanding vocal cues to deception , 1997 .
[32] Mark W. Patton. DECISION SUPPORT FOR RAPID ASSESSMENT OF TRUTH AND DECEPTION USING AUTOMATED ASSESSMENT TECHNOLOGIES AND KIOSK-BASED EMBODIED CONVERSATIONAL AGENTS , 2009 .
[33] S. Asch. Opinions and Social Pressure , 1955, Nature.
[34] Paul Benjamin Lowry,et al. Explaining and Predicting the Impact of Branding Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites , 2007, J. Manag. Inf. Syst..
[35] Mitsuru Ishizuka,et al. Using human physiology to evaluate subtle expressivity of a virtual quizmaster in a mathematical game , 2005, Int. J. Hum. Comput. Stud..
[36] T. Gutheil. Detecting Lies and Deceit: Pitfalls and Opportunities , 2010 .
[37] C. F. Kao,et al. Central and peripheral routes to persuasion: An individual difference perspective. , 1986 .
[38] W. Wood. Attitude change: persuasion and social influence. , 2000, Annual review of psychology.
[39] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[40] Derek D. Rucker,et al. Unpacking attitude certainty: attitude clarity and attitude correctness. , 2007, Journal of personality and social psychology.
[41] K. Stewart. Trust Transfer on the World Wide Web , 2002 .
[42] I. Pavlov,et al. [Conditioned reflex]. , 1951, Fel'dsher i akusherka.
[43] Jeffrey M. Bradshaw,et al. Ten Challenges for Making Automation a "Team Player" in Joint Human-Agent Activity , 2004, IEEE Intell. Syst..
[44] Richard E. Mayer,et al. Constructing computer-based tutors that are socially sensitive: Politeness in educational software , 2006, Int. J. Hum. Comput. Stud..
[45] Ritu Agarwal,et al. Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion , 2009, MIS Q..
[46] Jörn Ostermann,et al. User evaluation: Synthetic talking faces for interactive services , 1999, The Visual Computer.
[47] Sid L. Huff,et al. CIO lateral influence behaviors: gaining peers' commitment to strategic information systems , 2000, ICIS.
[48] R. E. Lubow,et al. Pupillary size in response to a visual guilty knowledge test: New technique for the detection of deception , 1996 .
[49] Robert O. Briggs,et al. The Yield Shift Theory of Satisfaction and Its Application to the IS/IT Domain , 2008, J. Assoc. Inf. Syst..
[50] Ying Liu,et al. An evaluation of the chat and knowledge delivery components of a low-level dialog system: The AZ-ALICE experiment , 2007, Decis. Support Syst..
[51] R. Petty,et al. Positive Mood and Persuasion: Different Roles for Affect Under High- and Low-Elaboration Conditions , 1993 .
[52] A. Adam. Whatever happened to information systems ethics? Caught between the devil and the deep blue sea , 2004 .
[53] Edward J. Garrity,et al. An experimental investigation of web-based information systems success in the context of electronic commerce , 2005, Decis. Support Syst..
[54] E. N. Solokov. Perception and the conditioned reflex , 1963 .
[55] Frank Marchak,et al. Credibility assessments: operational issues and technology impact for law enforcement applications , 2003, SPIE Defense + Commercial Sensing.
[56] Norman I. Badler,et al. Creating Interactive Virtual Humans: Some Assembly Required , 2002, IEEE Intell. Syst..
[57] B. J. Fogg,et al. Persuasive technology: using computers to change what we think and do , 2002, UBIQ.
[58] Stacy Marsella,et al. Virtual Rapport , 2006, IVA.
[59] Jay F. Nunamaker,et al. Border Security Credibility Assessments via Heterogeneous Sensor Fusion , 2010, IEEE Intelligent Systems.
[60] Ioannis Pavlidis,et al. The face of fear , 2001 .
[61] Dale Goodhue,et al. Task-Technology Fit and Individual Performance , 1995, MIS Q..
[62] J. Cacioppo,et al. Attitudes and Persuasion: Classic and Contemporary Approaches , 1981 .
[63] John P. Lewis,et al. Perceiving Visual Emotions with Speech , 2006, IVA.
[64] Jay F. Nunamaker,et al. Automated Kinesic Analysis for Deception Detection , 2010 .
[65] James D. Westphal,et al. FLATTERY WILL GET YOU EVERYWHERE (ESPECIALLY IF YOU ARE A MALE CAUCASIAN): HOW INGRATIATION, BOARDROOM BEHAVIOR, AND DEMOGRAPHIC MINORITY STATUS AFFECT ADDITIONAL BOARD APPOINTMENTS AT U.S. COMPANIES , 2007 .
[66] Matthew L. Jensen,et al. Automatic Extraction of Deceptive Behavioral Cues from Video , 2005, ISI.
[67] Aaron C. Elkins,et al. Evaluating the Credibility Assessment Capability of Vocal Analysis Software , 2012 .
[68] G. Bower. Mood and memory. , 1981, The American psychologist.
[69] H Stanislaw,et al. Calculation of signal detection theory measures , 1999, Behavior research methods, instruments, & computers : a journal of the Psychonomic Society, Inc.
[70] Ira Rudowsky,et al. Intelligent Agents , 2004, Commun. Assoc. Inf. Syst..
[71] J. Forgas. Mood and judgment: the affect infusion model (AIM). , 1995, Psychological bulletin.
[72] G. Clore,et al. Mood, misattribution, and judgments of well-being: Informative and directive functions of affective states. , 1983 .
[73] A. Meystel,et al. Intelligent Systems , 2001 .
[74] J. Cacioppo,et al. Effects of message repetition and position on cognitive response, recall, and persuasion. , 1979 .
[75] Mervyn A. Jack,et al. Evaluating humanoid synthetic agents in e-retail applications , 2001, IEEE Trans. Syst. Man Cybern. Part A.
[76] Kenton O'Hara,et al. Social Impact , 2019, Encyclopedia of Food and Agricultural Ethics.
[77] Daniel M. Cable,et al. Managers' upward influence tactic strategies: the role of manager personality and supervisor leadership style , 2003 .
[78] Chin-Lung Hsu,et al. Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation , 2008, Inf. Manag..
[79] David Woods,et al. 1. How to make automated systems team players , 2002 .
[80] Richard E Petty,et al. The effects of message recipients' power before and after persuasion: a self-validation analysis. , 2007, Journal of personality and social psychology.