
Douglas C. DerrickUniversity of Nebraska at Omaha | UN Omaha · School of Interdisciplinary Informatics
Douglas C. Derrick
PhD, Management Information Systems
About
73
Publications
44,595
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
991
Citations
Citations since 2017
Introduction
Skills and Expertise
Publications
Publications (73)
Creativity has been considered the driving force of organizational change. Despite the benevolent nature of creativity, the success of organizations fostering a creative product may be used for malevolent purposes. This two-part study explores the constraints to malevolent innovation in the context of terrorism. Drawing from a large sample of terro...
Malevolent manifestations of charismatic, ideological, and pragmatic leadership are understudied but pressing problems for society. Some scholars have shifted from a focus on leaders as benevolent to acknowledging the potential for dark and destructive leadership. This is particularly relevant as it applies to the CIP (Charismatic, Ideological, and...
We draw from Sykes and Matza's techniques of neutralization theory to interpret how Islamic State and the Levant (ISIL) soft-sympathizers justify violence perpetrated by ISIL. Data come from Tweets associated with ISIL-affiliated accounts that occurred within 24 hours of three high-profile ISIL-attributed attacks: Paris, Nice, and Orlando. Our find...
The advent of the Internet inadvertently augmented the functioning and success of violent extremist organizations. Terrorist organizations like the Islamic State in Iraq and Syria (ISIS) use the Internet to project their message to a global audience. The majority of research and practice on web‐based terrorist propaganda uses human coders to classi...
Collaborative via Social Media 2019 kicks off its inaugural year by introducing three impactful new articles discussing dimensions of social media's facilitating role in group processes. This short article sets the stage for the minitrack, introduces the papers, and concludes with areas of future interest. Looking ahead to Collaboration via Social...
This study investigates the role that information search behavior plays in the process of creative problem solving. Although models of creative processing posit that information search is a necessary stage of creative problem solving, no research has separated and measured information search from earlier processes to determine the nature of the rol...
It is widely held that leadership consists of behaviors that should be applied strategically and systematically to motivate individuals and teams to perform. It is also self-evident that we live in a world of automation, artificial intelligence, and expert systems. Given these two assertions, we propose that some aspects of leadership are candidate...
The design of a system interface can impact user judgements among expert and novice users alike. With information systems, fundamental design choices can either augment or distract individuals in identifying patterns of converging data points. The goal of this effort was to compare the influence of Likert and categorical type rating scales in a sys...
The Leadership of the Extreme and Dangerous for Innovative Results (LEADIR) project, funded by Programs (DHS S&T OUP) since 2010, uses an industrial and organizational psychology approach to assess the characteristics of violent extremist organizations (VEOs) in relation to their capacity for innovative and violent performance. In the current paper...
Terrorism provides a rich yet understudied domain to examine creativity. Because violent ideological organizations must continue to generate covert and novel ways to recruit members, raise finances, and plan attacks, theories of creativity typically applied to more conventional organizations can also apply to terrorist organizations. The present ef...
A long-standing problem in the US-Mexico bilateral agenda is migration. Although both countries have important agreements to promote economic exchange and trade, the events of 9/11 and other acts of terrorism have increased concerns about border security. Since the US-Mexico border is one of the most important borders in the world in terms of activ...
Leading for innovation is inherently cognitive in nature, but its implementation is often through the behaviors of managers of creative people, teams, and organizations. One challenge is that leading for creativity requires unique behaviors in order to provide appropriate structure and consideration that result in innovative performance. In this ch...
Terrorism provides a rich yet understudied domain to examine creative teams. Because teams working in a violent ideological organization must continue to generate covert and novel ways to recruit members, raise finances, and plan attacks, theories of creativity typically applied to more conventional organizations should also apply to terrorist team...
Daesh is the most prolific violent extremist group on social media, but their cyber footprint is much more complex than researchers of solely mainstream services such as Twitter imply. Their cyber profile involves pushing content into open infrastructures to disseminate information, such as ideological messages, propaganda, and training instruction...
This exploratory study examines the narrative space of the Islamic State in Iraq and the Levant (ISIL). Specifically, we developed a methodology to gather, archive, and analyze ISIL’s online presence in social media. Our sample was drawn from transient websites (N = 8308) collected between August 2015 and October 2015. From this pool, we coded a ra...
This study investigates the effectiveness of an automatic system for detection of deception by individuals with the use of multiple indicators of such potential deception. Deception detection research in the information systems discipline has postulated increased accuracy through a new class of screening systems that automatically conduct interview...
A long-standing problem in the US-Mexico bilateral agenda is migration. Although both countries have important agreements to promote economic exchange and trade, the events of 9/11 and other acts of terrorism have increased concerns about border security. Since the US-Mexico border is one of the most important borders in the world in terms of activ...
From our desk chairs it may be tempting to work up an idea, build a quick prototype, test it in a lab, and say, “Our work here is done; the rest is merely details.” More scholarly knowledge awaits discovery, however, by researchers who shepherd an information systems (IS) solution through the last research mile, that is, through successful transiti...
ISIS has run the most effective social media marketing campaign in history. In fact, violent extremist organizations (VEOs) market their ideology and organizations to a global audience in ways that rival even the savviest of conventional organizations. However, applying marketing theory and methodology to study VEOs has not been done to date for th...
Humans and machines are collaborating in new ways and organizations are increasingly leveraging mixed-initiative teams. We examine the effect that an individual's personality has on his or her willingness to: (1) seek assistance from and/or (2) accept the recommendations of an automated teammate. We use a game of pure strategy with a perfectly accu...
Embodied conversational agents (ECA) are a type of intelligent, multimodal computer interface that allow computers to interact with humans in a face-to-face manner. It is quite feasible that ECAs will someday replace the common keyboard as a human–computer interface. However, we have much to understand about how people interact with such embodied v...
In this study, we highlight the theoretical underpinnings of human impression management tactics and link them to current research in embodied conversational agents. Specifically, we incorporated impression management behaviors into an embodied conversational agent in order to show that different influence strategies affect user perceptions, and ho...
Universities are under increasing pressure to provide real world experience to students. Entrepreneurial courses are prevalent in business schools and have been shown to develop entrepreneurial skills. Entrepreneurial skills are equally important in the development of IT innovations. The research in this area of education is not as prevalent. We ar...
Trust is a critical component in effective collaboration, decision-making and negotiation. The goal of effective team leaders should be to send signals and messages that increase trust. We attempt to determine if signals can vary perceptions of trustworthiness and if nonverbal behaviors, such as the voice, contain indicators of trust. In order to i...
Computer-mediated deception is prevalent and may have serious consequences for individuals, organizations, and society. This article investigates several metrics as predictors of deception in synchronous chat-based environments, where participants must often spontaneously formulate deceptive responses. Based on cognitive load theory, we hypothesize...
Airway management skills are essential for healthcare providers within military and civilian settings. To maintain competency in these skills, it is crucial for the provider to have opportunities for review and retraining. Virtual airway training or telementoring can be an effective means to fulfilling these requirements for healthcare providers lo...
In this paper we discuss the relationships among negotiations, integrative and distributive speech acts, and classification of negotiation outcome. Our findings present how using automated linguistic analysis can show the trajectory of negotiations towards convergence (resolution) or divergence (non-resolution) and how these trajectories accurately...
The following values have no corresponding Zotero field:
PB - IGI Global
CP - Hershey, PA, USA
DO - 10.4018/jep.2013040102
SP - 21
The System development projects continue to fail at unacceptable rates. Including a wide array of users in the requirements development process for a wide-audience system can help to increase system success. Facilitated group workshops can effectively and efficiently gather requirements from several different users. To decrease cost and increase th...
Introduction to the Processes and Technologies for Small and Large Team Collaboration Minitrack
Individual credibility assessment is an ever-growing requirement in different applications including border crossing, airport checkpoint screening, criminal investigations, etc. In this paper, we describe a heterogeneous sensor fusion algorithm based on the AdaBoost algorithm and a speech emotional recognition technique in order to develop an autom...
One of the major challenges facing neurophysiological HCI design is to determine the systems and sensors that accurately and noninvasively measure human cognitive processes. Specifically, it is a significant undertaking to integrate sensors and measurements into an information system and accurately measure and interpret the human state. Using an ex...
Contextual differences present significant challenges when developing computational methods for detecting deception. We conducted a field experiment with border guards from the European Union in order to demonstrate that deception detection can be done robustly using context specific computational models. In the study, some of the participants were...
This paper presents findings from an eye tracker experiment based on the guilty knowledge test (GKT) paradigm. We conducted a two-group, posttest-only, randomized initial experiment in which the guilty group constructed an improvised explosive device (IED) and then was screened by an embodied conversational agent (ECA). Participants in the control...
We have created an automated kiosk that uses embodied intelligent agents to interview individuals and detect changes in arousal, behavior, and cognitive effort by using psychophysiological information systems. In this paper, we describe the system and propose a unique class of intelligent agents, which are described as Special Purpose Embodied Conv...
We have created an automated kiosk that uses embodied intelligent agents to interview individuals and detect changes in arousal, behavior, and cognitive ef- fort by using psychophysiological information systems. In this paper, we describe the system and propose a unique class of intelligent agents, which are described as Special Purpose Embodied Co...
A heterogeneous network of sensors that measure physiological and behavioral indicators of arousal, cognitive effort, and stress can facilitate deception detection, while limiting subjective judgments and improper profiling.
Credibility assessment is a perennial and increasingly urgent problem in light of escalating international security threats. New tools such are needed for rapid, noninvasive and possibly unobtrusive detection of deception and hostile intent. This paper reports five novel instrumented approaches to credibility assessment being investigated in a mult...
Fragile freshwater ecosystems have acted as important sentinels for global environmental change. A detailed understanding of the implications of global change in aquatic ecosystems relies on indicator species whose body parts are preserved in aquatic sediments for millennia. The phantom midge, "Chaoborus flavicans" (Meigen, 1830), for example, has...
Projects
Projects (2)
The “Collaboration via Social Media” mini-track focuses on:
1. The impact of the unstructured, non-time-constrained nature of social media interactions on collaborative efforts.
2. Theoretical aspects of social media-facilitated collaboration.
3. User studies concentrating on collaborative social media platforms such as Tumblr, Slack, Trello, wikis, and others.
4. Theoretical approaches and designs of social media enabled collaboration processes, tools, and the frontiers of current knowledge and practice.
5. Processes, interventions, and techniques that focus social media technologies on collaborative problem solving.
6. Empirical studies or case studies that examine the use of social media as collaboration technology.
7. Social media's influence on decision making and collaboration.
8. Evaluation methods and metrics for assessing performance in social media-facilitated collaborative efforts.
9. Fostering collaboration via Social Media through incentive engineering.