Marc T. P. Adam

Marc T. P. Adam
The University of Newcastle, Australia · Discipline of Computing and Information Technology

PhD (Information Systems)

About

125
Publications
82,257
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,857
Citations
Introduction
Dr. Marc T. P. Adam is an Associate Professor in Computing and Information Technology at the School of Information and Physical Sciences at the University of Newcastle, Australia. He received a Ph.D. in Information Systems from the Karlsruhe Institute of Technology.
Additional affiliations
September 2010 - July 2014
Karlsruhe Institute of Technology
Position
  • Professor (Assistant)
Education
September 2007 - June 2010
Karlsruhe Institute of Technology
Field of study
  • Information Systems

Publications

Publications (125)
Article
Full-text available
Traders and private investors are aware that emotional processes can have material consequences on their financial decision performance. However, typical learning approaches for de-biasing fail to overcome emotionally driven financial dispositions; mostly because of subjects’ limited capacity for self-monitoring. Our research aims at improving deci...
Article
Auction sites on the Internet frequently put bidders under time pressure or highlight the social competition that is inherent to auctions. Both aspects are believed to elicit an exciting shopping experience, which may culminate in auction fever. In two laboratory experiments, we investigate the process of auction fever in retail auctions and demons...
Article
The presence of computerized agents has become pervasive in everyday live. In this paper, we examine the impact of agency on human bidders’ affective processes and bidding behavior in an electronic auction environment. In particular, we use skin conductance response and heart rate measurements as proxies for the immediate emotions and overall arous...
Article
Full-text available
Automatic detection of individual intake gestures during eating occasions has the potential to improve dietary monitoring and support dietary recommendations. Existing studies typically make use of on-body solutions such as inertial and audio sensors, while video is used as ground truth. Intake gesture detection directly based on video has rarely b...
Article
While previous research established that culture plays an important role in technology adoption, there is only limited work on the role of cultural appropriateness in user interface design for users from a specific background. In this study, we focus on the case of avatar design as a user interface element for facilitating positive user experience....
Article
Full-text available
Time pressure, a common phenomenon in everyday workplace environments, is an important driver for non-secure cybersecurity behaviour in organisations. Under time pressure, users are more likely to rely upon fast, affect-driven decision making, increasing their susceptibility to make mistakes and justify non-secure workarounds. This contributes to t...
Article
Ten years ago the “emotional bidding framework” (Adam et al., Electronic Markets, 21 (3), 197–207, 2011b) was published in this journal. It provided a conceptualization for the role of human emotion in electronic auctions along six propositions on how emotions emerge during the auction process and affect auction outcomes. While the framework emphas...
Article
Full-text available
Complementors accumulate reputation on an ever-increasing number of online platforms. While the effects of reputation within individual platforms are well-understood, its potential effectiveness across platform boundaries has received much less attention. This research note considers complementors’ ability to increase their trustworthiness in the e...
Article
Full-text available
Research has shown that employing social cues (e.g., name, human-like avatar) in chatbot design enhances users’ social presence perceptions and their chatbot usage intentions. However, the picture is less clear for the social cue of chatbot response time. While some researchers argue that instant responses make chatbots appear unhuman-like, others...
Article
Full-text available
Due to global advances in technology, image-based food record methods have emerged as an alternative to traditional assessment methods. The use of image-based food records in low and lower-middle income countries such as Tanzania is limited, with countries still using traditional methods. The current study aimed to determine the feasibility of usin...
Article
Traditional methods of capturing people’s dietary intake are complex and labour-intensive, requiring a high level of literacy and time. Speech recording has potential to reduce these barriers, and recent technological advances have greatly increased the viability of this approach. The aim of this paper is to establish the current state of research...
Article
Full-text available
Recent research has employed deep learning to detect intake gestures from inertial sensor and video camera data. However, the fusion of these modalities has not been attempted. The present research explores the potential of fusing the outputs of two individual deep learning inertial and video intake gesture detection models (i.e., score-level and d...
Chapter
Full-text available
At this stage, empirical studies in the NeuroIS field have been conducted primarily in laboratory environments. However, the continuing advances in sensor technologies and software interfaces have created novel opportunities to explore the potential of NeuroIS not only in highly controlled lab environments but also in the wild. In this exploratory...
Article
User interfaces often utilise imagery of pristine natural environments, even if the system’s purpose and context are unrelated to nature. In this paper, we build on evolutionary psychology to develop a theoretical model for the influence of nature imagery on user perceptions of trust, visual aesthetics, and purchase intentions in a corporate sales...
Article
Full-text available
Mobile health (mHealth) systems hold great potential for supporting users in self-managing disease and engaging in a healthier life. However, given the mobile context and the multiple factors that affect a person’s health, designing mHealth systems involves much complexity and a range of pitfalls. To overcome these pitfalls, scholars have called on...
Article
Automatic human affect recognition is a key step towards more natural human-computer interaction. Recent trends include recognition in the wild using a fusion of audiovisual and physiological sensors, a challenging setting for conventional machine learning algorithms. Since 2010, novel deep learning algorithms have been applied increasingly in this...
Chapter
Online user representation (UR) is a cornerstone of platform-mediated interactions within the sharing economy. While the general usefulness of UR artifacts for facilitating online and offline interactions is widely acknowledged and understood, the underlying mechanisms and operating principles often require a more detailed analysis. In this chapter...
Chapter
The design of electronic auction platforms is an important field of electronic commerce research. It requires not only a profound understanding of the role of human cognition in human bidding behavior but also of the role of human affect. In this chapter, we focus specifically on the emotional aspects of human bidding behavior and the results of em...
Article
Full-text available
Background: Reaching and engaging individuals, especially young adults, in web-based prevention programs is challenging. 'No Money No Time' (NMNT) is a purpose built, healthy eating website with content and a social marketing strategy designed to reach and engage a young adult (18-34 year olds) target group. The aim of the current study was to con...
Preprint
BACKGROUND The proliferation of mobile devices has enabled new ways of delivering health services through mobile health systems. Researchers and practitioners have emphasized that the design of such systems is a complex endeavor with various pitfalls, including limited stakeholder involvement in design processes and integration into existing system...
Article
Background The proliferation of mobile devices has enabled new ways of delivering health services through mobile health systems. Researchers and practitioners emphasize that the design of such systems is a complex endeavor with various pitfalls, including limited stakeholder involvement in design processes and the lack of integration into existing...
Article
Co-usage sharing involves social interactions between providers and consumers. Previous research established that individuals’ motivation to engage in such transactions are not only driven by economic factors but also by expectations about the social reward that can be gained from them. This research develops a theoretical model to understand provi...
Article
Full-text available
Accurate detection of individual intake gestures is a key step towards automatic dietary monitoring. Both inertial sensor data of wrist movements and video data depicting the upper body have been used for this purpose. The most advanced approaches to date use a two-stage approach, in which (i) framelevel intake probabilities are learned from the se...
Conference Paper
Full-text available
Consumers interact with reputation signals such as star ratings in many online environments. Reputation portability has been proposed as an emerging application to leverage said signals across platform boundaries. While first research demonstrates the general trust-building potential of portable reputation, the cognitive and economic effects of sim...
Article
Full-text available
With the ever-growing popularity of sharing economy platforms, complementors increasingly face the challenge to manage their reputation on different platforms. The paper reports the results from an experimental online survey to investigate how and under which conditions online reputation is effective to engender trust across platform boundaries. It...
Article
Full-text available
In a Dutch auction, an item is offered for sale at a set maximum price. The price is then gradually lowered over a fixed interval of time until a bid is made, securing the item for the bidder at the current price. Bidders must trade-off between certainty and price: bid early to secure the item and you pay a premium; bid later at a lower price but r...
Chapter
False information such as “fake news” is widely believed to influence the opinions of individuals. So far, information systems (IS) literature is lacking a theoretical understanding of how users react and respond to fake news. In this study, we analyze drivers of cognitive and affective processing in terms of linguistic cues. For this purpose, we p...
Article
Full-text available
Wrist-worn inertial measurement units have emerged as a promising technology to passively capture dietary intake data. State-of-the-art approaches use deep neural networks to process the collected inertial data and detect characteristic hand movements associated with intake gestures. In order to clarify the effects of data preprocessing, sensor mod...
Preprint
Full-text available
Accurate detection of individual intake gestures is a key step towards automatic dietary monitoring. Both inertial sensor data of wrist movements and video data depicting the upper body have been used for this purpose. The most advanced approaches to date use a two-stage approach, in which (i) frame-level intake probabilities are learned from the s...
Preprint
Full-text available
Automatic detection of intake gestures is a key element of automatic dietary monitoring. Several types of sensors, including inertial measurement units (IMU) and video cameras, have been used for this purpose. The common machine learning approaches make use of the labelled sensor data to automatically learn how to make detections. One characteristi...
Article
Cybersecurity is a growing concern for private individuals and professional entities. Reports have shown that the majority of cybersecurity incidents occur because users fail to behave securely. Research on human cybersecurity (HCS) behavior suggests that time pressure is one of the important driving factors behind non-secure HCS behavior. However,...
Article
Cybersecurity is a growing concern for private individuals and professional entities. Reports have shown that the majority of cybersecurity incidents occur because users fail to behave securely. Research on human cybersecurity (HCS) behavior suggests that time pressure is one of the important driving factors behind non-secure HCS behavior. However,...
Article
While avatars are frequently employed as a user interface (UI) element for improving user experience in human-computer interaction, the current design of avatars is primarily dominated by non-Arabian cultures. To the best of our knowledge, no previous research or guidelines (based on empirical evidence) can be found for avatar design in the context...
Conference Paper
Full-text available
Online reputation represents an important driver for platform-mediated transactions. Reputation portability captures the notion of allowing users to transfer their reputation-often in the form of numerical rating scores-from one platform to another. The effectiveness of reputation as a driver of trustworthiness within platforms is well-understood....
Article
Full-text available
Automatic detection of intake gestures is a key element of automatic dietary monitoring. Several types of sensors, including inertial measurement units (IMU) and video cameras, have been used for this purpose. The common machine learning approaches make use of labeled sensor data to automatically learn how to make detections. One characteristic, es...
Article
Full-text available
In this paper, we present an evolutionary trust game, taking punishment and protection into consideration, to investigate the formation of trust in the so-called sharing economy from a population perspective. This sharing economy trust model comprises four types of players: a trustworthy provider, an untrustworthy provider, a trustworthy consumer,...
Article
In many platform-mediated services, people share resources in a way that involves social value beyond mere economic considerations. Considering peer-to-peer accommodation sharing, this paper links booking intentions to hosts’ user representation (UR). We consider how the most common UR artifacts facilitate sharing through social and economic value....
Article
Computerised graphical representations of human users and computer agents, known as avatars and embodied agents, have been extensively explored and investigated in Information Systems (IS) research and practice. Such digital representations can be employed in either 2D or 3D. In order to facilitate research on user and agent representations and the...
Preprint
Full-text available
Automatic detection of individual intake gestures during eating occasions has the potential to improve dietary monitoring and support dietary recommendations. Existing studies typically make use of on-body solutions such as inertial and audio sensors, while video is used as ground truth. Intake gesture detection directly based on video has rarely b...
Article
Full-text available
A person's health behavior plays a vital role in mitigating their risk of disease and promoting positive health outcomes. In recent years, mHealth systems have emerged to offer novel approaches for encouraging and supporting users in changing their health behavior. Mobile biosensors represent a promising technology in this regard; that is, sensors...
Article
Full-text available
Wearable motion tracking sensors are now widely used to monitor physical activity, and have recently gained more attention in dietary monitoring research. The aim of this review is to synthesise research to date that utilises upper limb motion tracking sensors, either individually or in combination with other technologies (e.g., cameras, microphone...
Article
Shared plate eating is a defining feature of the way food is consumed in some countries and cultures. Food may be portioned to another serving vessel or directly consumed into the mouth from a centralised dish rather than served individually onto a discrete plate for each person. Shared plate eating is common in some low-and lower-middle income cou...
Article
Full-text available
In today's fast-paced society, users of information technology increasingly operate under high time pressure. Loaded with multiple tasks and racing against deadlines, users experience considerable cognitive load and stress which can detrimentally impact their behaviour. As a result, scholars have shown that the human firewall in cybersecurity is of...
Preprint
Full-text available
A person's health behavior plays a vital role in mitigating their risk of disease and promoting positive health outcomes. In recent years, mHealth systems have emerged to offer novel approaches for encouraging and supporting users in health behavior change. A promising technology in this regard are mobile biosensors, that is, sensors that enable th...
Conference Paper
Full-text available
Nature imagery is frequently employed as a design element to improve how users experience interactions with computerized artifacts such as websites and mobile apps. However, literature on the influence of such imagery on human perception and behavior is scant and highly fragmented. In this paper, we develop a theoretical framework that integrates t...
Conference Paper
The application of neuroscience theories, methods, and tools holds great potential for the development of novel decision support systems. In this paper, we develop a theoretical framework for how NeuroIS may support the test screening process of filmmakers where decisions are made about what narrative material is shown to the audience, what sequenc...
Conference Paper
Full-text available
Chatbots have attracted considerable interest in recent years. A key design challenge to increase their adoption is to make the interaction with them feel natural and human-like. Therefore, it is suggested to incorporate social cues in the chatbot design. Drawing on the Computers are Social Actors paradigm and the "uncanny valley" hypothesis, we st...
Conference Paper
Full-text available
Cybersecurity is a growing concern for private individuals and professional entities. Thereby, reports have shown that the majority of cybersecurity incidents occur because users fail to behave securely. Research on human cybersecurity (HCS) behavior suggests that time pressure is one of the important driving factors behind insecure HCS behavior. H...
Article
Full-text available
Whilst filmmakers intuitively believe that the movie experience must be emotionally engaging, audience testing continues to follow traditional approaches involving questionnaires and focus groups with insights mainly at the level of overall movie satisfaction. In this paper, we outline a theoretical framework for how the idea of the cinematic momen...
Article
Full-text available
The information systems (IS) field contains a rich body of knowledge on approaches, methods, and frameworks that supports researchers in conducting design science research (DSR). It also contains some consensus about the key elements of DSR projects—such as problem identification, design, implementation, evaluation, and abstraction of design knowle...
Article
With the advances in sensor technology and real-time processing of neurophysiological data, a growing body of academic literature has begun to explore how live biofeedback can be integrated into information systems for everyday use. While researchers have traditionally studied live biofeedback in the clinical domain, the proliferation of affordable...
Article
Full-text available
Remote Photoplethysmography (rPPG) allows remote measurement of the heart rate using low-cost RGB imaging equipment. In this paper, we review the development of the field since its emergence in 2008, classify existing approaches for rPPG, and derive a framework that provides an overview of modular steps. Based on this framework, practitioners can u...
Article
Full-text available
With the proliferation of information technology and artificial intelligence in society, human users have started to engage in social interactions with computer agents. In this study, we conducted a laboratory experiment in which neurophysiological measurements were used to investigate the effect of computer agents on the affective processes and be...
Article
Despite countless anecdotes about emotionally-charged bidding in auctions, there is little research to help understand what causes auction fever and why it persists. Because research has only considered how integral arousal (i.e., arousal from within the auction) affects bidding, the current research considered whether incidental arousal (i.e., aro...
Conference Paper
Stock market prediction plays an important role in financial decision-making for investors. Many of them rely on news disclosures to make their decisions in buying or selling stocks. However, accurate modelling of stock market trends via news disclosures is a challenging task, considering the complexity and ambiguity of natural languages used. Unli...
Conference Paper
Full-text available
The rising prevalence of non-communicable diseases calls for more sophisticated approaches to support individuals in engaging in healthy lifestyle behaviors, particularly in terms of their dietary intake. Building on recent advances in information technology, user assistance systems hold the potential of combining active and passive data collection...
Conference Paper
Full-text available
A key challenge in designing conversational user interfaces is to make the conversation between the user and the system feel natural and human-like. In order to increase perceived humanness, many systems with conversational user interfaces (e.g., chatbots) use response delays to simu-late the time it would take humans to respond to a message. Howev...
Conference Paper
Full-text available
Mobile health, or mHealth in short, concerns using mobile devices to provide health information to users. Research has shown that the use of avatars within mHealth applications can improve health outcomes. While several studies have investigated the design of avatars for mHealth applications, these studies focused solely on western cultures and mos...
Conference Paper
Full-text available
A globally ageing population is more frequently required to utilize information systems as caregiving agencies and government policies adapt newer technologies to sustain efficiency. This unique user group commonly has difficulty with the solutions presented to them, and recent studies have focused on establishing the causes of these difficulties a...