Christie Fuller
Christie Fuller
Associate Professor
Verified email at - Homepage
Cited by
Cited by
Common methods variance detection in business research
CM Fuller, MJ Simmering, G Atinc, Y Atinc, BJ Babin
Journal of Business Research 69 (8), 3192-3198, 2016
Marker variable choice, reporting, and interpretation in the detection of common method variance: A review and demonstration
MJ Simmering, CM Fuller, HA Richardson, Y Ocal, GM Atinc
Organizational Research Methods 18 (3), 473-511, 2015
Decision support for determining veracity via linguistic-based cues
CM Fuller, DP Biros, RL Wilson
Decision Support Systems 46 (3), 695-703, 2009
An investigation of data and text mining methods for real world deception detection
CM Fuller, DP Biros, D Delen
Expert Systems with Applications 38 (7), 8392-8398, 2011
Analysis of healthcare coverage: A data mining approach
D Delen, C Fuller, C McCann, D Ray
Expert systems with applications 36 (2), 995-1003, 2009
An examination of deception in virtual teams: Effects of deception on task performance, mutuality, and trust
CM Fuller, K Marett, DP Twitchell
IEEE Transactions on Professional Communication 55 (1), 20-35, 2011
An examination and validation of linguistic constructs for studying high-stakes deception
CM Fuller, DP Biros, J Burgoon, J Nunamaker
Group Decision and Negotiation 22 (1), 117-134, 2013
An analysis of text-based deception detection tools
C Fuller, D Biros, D Twitchell, J Burgoon, M Adkins
AMCIS 2006 Proceedings, 418, 2006
Exploration of feature selection and advanced classification models for high-stakes deception detection
CM Fuller, DP Biros, D Delen
Proceedings of the 41st Annual Hawaii International Conference on System …, 2008
High-stakes, real-world deception: An examination of the process of deception and deception detection using linguistic-based cues
CM Fuller
Oklahoma State University, 2008
Detecting deception in person-of-interest statements
C Fuller, DP Biros, M Adkins, JK Burgoon, JF Nunamaker, S Coulon
International Conference on Intelligence and Security Informatics, 504-509, 2006
Real-world deception and the impact of severity
CM Fuller, DP Biros, DP Twitchell, RL Wilson
Journal of Computer Information Systems 55 (2), 59-67, 2015
Extracting knowledge from neural networks
CM Fuller, RL Wilson
Encyclopedia of Knowledge Management, Second Edition, 320-330, 2011
Advancing the assessment of automated deception detection systems: Incorporating base rate and cost into system evaluation
DP Twitchell, CM Fuller
Information Systems Journal 29 (3), 738-761, 2019
The impact of ability and participation on trustworthiness and task performance in virtual teams
CM Fuller, DP Twitchell, K Marett, AJ Burns
International Journal of Social and Organizational Dynamics in IT (IJSODIT …, 2012
Knowledge retention in information assurance computerbased training: a comparative study of two courses for network user
C Fuller, D Biros, M Imperial
6th Annual Security Conference, The Information Institute, USA, Las Vegas, 2007
Data Quality Relevance in Linguistic Analysis: The Impact of Transcription Errors on Multiple Methods of Linguistic Analysis
S Pentland, L Spitzley, C Fuller, D Twitchell
An analytic approach to understanding and predicting healthcare coverage.
D Delen, CM Fuller
ICIMTH, 198-200, 2013
CollabSec: A Multi-Player Game for Researching and Teaching Information System Risk Assessment
D Twitchell, CM Fuller, D Biros, K Marett
Proceedings of the Seventh Pre-ICIS Workshop on Information Security and …, 2012
Case Study. Detecting Deception in Text with Freely Available Text and Data Mining Tools
C Fuller, D Delen
Practical Text Mining and Statistical Analysis for Non-structured Text Data …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20