{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T13:19:51Z","timestamp":1722950391339},"reference-count":55,"publisher":"Elsevier BV","issue":"10","license":[{"start":{"date-parts":[[2009,10,1]],"date-time":"2009-10-01T00:00:00Z","timestamp":1254355200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Human-Computer Studies"],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1016\/j.ijhcs.2009.07.005","type":"journal-article","created":{"date-parts":[[2009,8,7]],"date-time":"2009-08-07T05:51:52Z","timestamp":1249624312000},"page":"870-886","source":"Crossref","is-referenced-by-count":164,"title":["Automated stress detection using keystroke and linguistic features: An exploratory study"],"prefix":"10.1016","volume":"67","author":[{"given":"Lisa M.","family":"Vizer","sequence":"first","affiliation":[]},{"given":"Lina","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Sears","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ijhcs.2009.07.005_bib1","series-title":"Introduction to Machine Learning (Adaptive Computation and Machine Learning)","author":"Alpaydin","year":"2004"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib2","unstructured":"American Psychological Association Presidential Task Force on the Assessment of Age-Consistent Memory Decline and Dementia, 1998. Guidelines for the evaluation of dementia and age-related cognitive decline. American Psychological Association, Washington, DC."},{"issue":"2","key":"10.1016\/j.ijhcs.2009.07.005_bib3","doi-asserted-by":"crossref","first-page":"851","DOI":"10.1109\/TSP.2004.839903","article-title":"User authentication through typing biometric features","volume":"53","author":"Ara\u00fajo","year":"2005","journal-title":"IEEE Transactions on Signal Processing"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib4","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1097\/00000441-194010000-00005","article-title":"Blood pressure determinations by patients with essential hypertension: the difference between clinical and home readings before treatment","volume":"200","author":"Ayman","year":"1940","journal-title":"American Journal of the Medical Sciences"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib5","doi-asserted-by":"crossref","unstructured":"Beaudin, J., Intille, S., Tapia, E.M., 2004. Lessons learned using ubiquitous sensors for data collection in real homes. Paper presented at the CHI 2004 Extended Abstracts on Human Factors in Computing Systems, Vienna, Austria, April 24\u201329, 2004.","DOI":"10.1145\/985921.986064"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib6","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1111\/j.1468-2885.1996.tb00127.x","article-title":"Interpersonal deception theory","volume":"6","author":"Buller","year":"1996","journal-title":"Communication Theory"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib7","series-title":"Measuring Stress: A Guide for Health and Social Scientists","year":"1995"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib8","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1001\/jama.243.4.340","article-title":"Plasma catecholamines in stress and exercise","volume":"243","author":"Dimsdale","year":"1980","journal-title":"Journal of the American Medical Association"},{"issue":"4\u20137","key":"10.1016\/j.ijhcs.2009.07.005_bib9","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1016\/j.actaastro.2006.09.003","article-title":"Monitoring of facial stress during space flight: optical computer recognition combining discriminative and generative methods","volume":"60","author":"Dinges","year":"2007","journal-title":"Acta Astronautica"},{"issue":"4","key":"10.1016\/j.ijhcs.2009.07.005_bib10","doi-asserted-by":"crossref","first-page":"500","DOI":"10.1037\/0882-7974.4.4.500","article-title":"Adult age differences in working memory","volume":"4","author":"Dobbs","year":"1989","journal-title":"Psychology and Aging"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib11","doi-asserted-by":"crossref","unstructured":"Dowland, P.S., Furnell, S.M., Papadaki, B., 2002. Keystroke analysis as a method of advanced user authentication and response. Paper presented at the 17th IFIP\/SEC Conference.","DOI":"10.1007\/978-0-387-35586-3_17"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib12","unstructured":"Dowland, P.S., Singh, H., Furnell, S.M., 2001. A preliminary investigation of user authentication using continuous keystroke analysis. Paper presented at the Eighth IFIP Annual Working Conference on Information Security Management and Small System Security."},{"key":"10.1016\/j.ijhcs.2009.07.005_bib13","unstructured":"Freund, Y., Schapire, R.E., 1996. Experiments with a new boosting algorithm. Paper presented at the International Conference on Machine Learning."},{"key":"10.1016\/j.ijhcs.2009.07.005_bib14","series-title":"The Handbook of Stress","author":"Goldberger","year":"1993"},{"issue":"3","key":"10.1016\/j.ijhcs.2009.07.005_bib15","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1145\/1085126.1085129","article-title":"Keystroke analysis of free text","volume":"8","author":"Gunetti","year":"2005","journal-title":"ACM Transactions on Information Systems Security"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib16","doi-asserted-by":"crossref","first-page":"1555","DOI":"10.1002\/(SICI)1097-0258(20000615\/30)19:11\/12<1555::AID-SIM445>3.0.CO;2-3","article-title":"A change point model for estimating the onset of cognitive decline in preclinical Alzheimer's disease","volume":"19","author":"Hall","year":"2000","journal-title":"Statistics in Medicine"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib17","series-title":"Data Mining: Concepts and Techniques","author":"Han","year":"2001"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib18","unstructured":"Healey, J., Picard, R.W., 2000. SmartCar: detecting driver stress. Paper presented at the 15th International Conference on Pattern Recognition."},{"key":"10.1016\/j.ijhcs.2009.07.005_bib19","doi-asserted-by":"crossref","unstructured":"Hirsch, T., Forlizzi, J., Hyder, E., Goetz, J., Kurtz, C., Stroback, J., 2000. The ELDer project: social, emotional, and environmental factors in the design of elder technologies. Paper presented at the 2000 Conference on Universal Usability, Arlington, VA, USA.","DOI":"10.1145\/355460.355476"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib20","unstructured":"Jimison, H., Jessey, N., McKanna, J., Zitzelberger, T., Kaye, J., 2006. Monitoring computer interactions to detect early cognitive impairment in elders. Paper presented at the First Distributed Diagnosis and Home Healthcare Conference."},{"key":"10.1016\/j.ijhcs.2009.07.005_bib21","doi-asserted-by":"crossref","unstructured":"Jimison, H., Pavel, M., McKanna, J., 2005. Unobtrusive computer monitoring of sensory-motor function. Paper presented at the 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.","DOI":"10.1109\/IEMBS.2005.1615711"},{"issue":"3","key":"10.1016\/j.ijhcs.2009.07.005_bib22","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1109\/TITB.2004.835539","article-title":"Unobtrusive monitoring of computer interactions to detect cognitive status in elders","volume":"8","author":"Jimison","year":"2004","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib23","series-title":"Generations Online in 2009","author":"Jones","year":"2009"},{"issue":"2","key":"10.1016\/j.ijhcs.2009.07.005_bib24","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1145\/75577.75582","article-title":"Identity authentication based on keystroke latencies","volume":"33","author":"Joyce","year":"1990","journal-title":"Communications of the ACM"},{"issue":"4","key":"10.1016\/j.ijhcs.2009.07.005_bib25","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1109\/TITB.2006.874194","article-title":"RTWPMS: a real-time wireless physiological monitoring system","volume":"10","author":"Lin","year":"2006","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib26","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1017\/S0033291700034826","article-title":"Brief cognitive screening of the elderly: a comparison of the Mini-Mental State Examination (MMSE), Abbreviated Mental Test (AMT), and Mental Status Questionnaire (MSQ)","volume":"26","author":"MacKenzie","year":"1996","journal-title":"Psychological Medicine"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib27","series-title":"The Handbook of Stress","article-title":"Thought, memory, and learning: effects of emotional stress","author":"Mandler","year":"1993"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib28","series-title":"Introduction to Information Retrieval","author":"Manning","year":"2008"},{"issue":"5","key":"10.1016\/j.ijhcs.2009.07.005_bib29","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1037\/h0023813","article-title":"Non-immediacy between communicator and object of communication in a verbal message: application to the inference of attitudes","volume":"30","author":"Mehrabian","year":"1966","journal-title":"Journal of Consulting Psychology"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib30","doi-asserted-by":"crossref","unstructured":"Monrose, F., Rubin, A., 1997. Authentication via keystroke dynamics. Paper presented at the Fourth ACM Conference on Computer and Communications Security.","DOI":"10.1145\/266420.266434"},{"issue":"4","key":"10.1016\/j.ijhcs.2009.07.005_bib31","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/S0167-739X(99)00059-X","article-title":"Keystroke dynamics as a biometric for authentication","volume":"16","author":"Monrose","year":"2000","journal-title":"Future Generation Computer Systems"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib32","doi-asserted-by":"crossref","unstructured":"Morris, M., Intille, S., Beaudin, J., 2005. Embedded assessment: overcoming barriers to early detection with pervasive computing. Paper presented at the Third International Conference on Pervasive Computing, PERVASIVE 2005.","DOI":"10.1007\/11428572_20"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib33","unstructured":"Murata, A., Uetake, A., 2001. Evaluation of mental fatigue in human\u2013computer interaction: analysis using feature parameters extracted from event-related potential. Paper presented at the IEEE Workshop on Robot and Human Interactive Communication."},{"issue":"3","key":"10.1016\/j.ijhcs.2009.07.005_bib34","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1023\/B:BTTJ.0000047127.01462.49","article-title":"Sensor networks for continuous health monitoring","volume":"22","author":"Neild","year":"2004","journal-title":"BT Technology Journal"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib35","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1002\/hbm.20131","article-title":"N-Back working memory paradigm: a meta-analysis of normative functional neuroimaging studies","volume":"25","author":"Owen","year":"2005","journal-title":"Human Brain Mapping"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib36","first-page":"997","article-title":"Reliability of grip strength, walking time, and button test performance according to a standard protocol","volume":"18","author":"Pincus","year":"1991","journal-title":"Journal of Rheumatology"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib37","series-title":"Advances in Kernel Methods\u2014Support Vector Learning","article-title":"Fast Training of Support Vector Machines using Sequential Minimal Optimization","author":"Platt","year":"1998"},{"issue":"2","key":"10.1016\/j.ijhcs.2009.07.005_bib38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1530064.1530068","article-title":"The development and evaluation of performance-based functional assessment: a methodology for the measurement of physical capabilities","volume":"2","author":"Price","year":"2009","journal-title":"ACM Transactions on Accessible Computing"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib39","doi-asserted-by":"crossref","unstructured":"Pusara, M., Brodley, C.E., 2004. User re-authentication via mouse movements. Paper presented at the 2004 ACM Workshop on Visualization and Data Mining for Computer Security.","DOI":"10.1145\/1029208.1029210"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib40","doi-asserted-by":"crossref","unstructured":"Qi, Y., Reynolds, C., Picard, R.W., 2001. The Bayes Point Machine for computer-user frustration detection via PressureMouse. Paper presented at the 2001 Workshop on Perceptive User Interfaces.","DOI":"10.1145\/971478.971495"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib41","series-title":"C4.5: Programs for Machine Learning","author":"Quinlan","year":"1993"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib42","unstructured":"Sears, A., Young, M., 2003. Physical disabilities and computing technologies: an analysis of impairments. In: Jacko, J., Sears, A. (Eds.), The Human\u2013Computer Interaction Handbook. New York, NY, pp. 482\u2013503."},{"key":"10.1016\/j.ijhcs.2009.07.005_bib43","doi-asserted-by":"crossref","unstructured":"Sharlin, E., Itoh, Y., Watson, B., Kitamura, Y., Sutphen, S., Liu, L., 2002. Cognitive cubes: a tangible user interface for cognitive assessment. Paper presented at the SIGCHI Conference on Human Factors in Computing Systems.","DOI":"10.1145\/503376.503438"},{"issue":"1","key":"10.1016\/j.ijhcs.2009.07.005_bib44","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/S0735-1097(00)01054-8","article-title":"Age-predicted maximal heart rate revisited","volume":"37","author":"Tanaka","year":"2001","journal-title":"Journal of the American College of Cardiology"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib45","doi-asserted-by":"crossref","unstructured":"Trujillo, M., Shakra, I., El Saddik, A., 2005. Haptic: the new biometrics-embedded media to recognizing and quantifying human patterns. Paper presented at the 13th Annual ACM International Conference on Multimedia.","DOI":"10.1145\/1101149.1101232"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib46","unstructured":"Uetake, A., Murata, A., 2000. Assessment of mental fatigue during VDT task using event-related potential. Paper presented at the 2000 IEEE International Workshop on Robot and Human Interactive Communication."},{"key":"10.1016\/j.ijhcs.2009.07.005_bib47","series-title":"The Nature of Statistical Learning Theory","author":"Vapnik","year":"1995"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib48","unstructured":"Villani, M., Tappert, C., Ngo, G., Simone, J., St. Fort, H., Cha, S., 2006. Keystroke Biometric Recognition Studies on long-text input under ideal and application-oriented conditions. Paper presented at the 2006 Conference on Computer Vision and Pattern Recognition Workshop."},{"key":"10.1016\/j.ijhcs.2009.07.005_bib49","series-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"Witten","year":"2005"},{"issue":"3","key":"10.1016\/j.ijhcs.2009.07.005_bib50","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1109\/TITB.2005.854507","article-title":"A wearable point-of-care system for hom use that incorporates plug-and-play and wireless standards","volume":"9","author":"Yao","year":"2005","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib51","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1002\/cne.920180503","article-title":"The relation of strength of stimulus to rapidity of habit formation","volume":"18","author":"Yerkes","year":"1908","journal-title":"Journal of Comparative Neurology and Psychology"},{"key":"10.1016\/j.ijhcs.2009.07.005_bib52","doi-asserted-by":"crossref","unstructured":"Yin, B., Ruiz, N., Chen, F., Khawaja, M.A., 2007. Automatic cognitive load detection from speech features. Paper presented at the OzCHI 2007, Adelaide, Australia, November 28\u201330, 2007.","DOI":"10.1145\/1324892.1324946"},{"issue":"2","key":"10.1016\/j.ijhcs.2009.07.005_bib53","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1109\/TPC.2005.849652","article-title":"An empirical investigation of deception behavior in instant messaging","volume":"48","author":"Zhou","year":"2005","journal-title":"IEEE Transactions on Professional Communication"},{"issue":"1","key":"10.1016\/j.ijhcs.2009.07.005_bib54","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1023\/B:GRUP.0000011944.62889.6f","article-title":"Automated linguistics-based cues for detecting deception in text-based asynchronous computer-mediated communication: an empirical investigation","volume":"13","author":"Zhou","year":"2004","journal-title":"Group Decision and Negotiation"},{"issue":"2","key":"10.1016\/j.ijhcs.2009.07.005_bib55","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1177\/1046496405285125","article-title":"A comparison of deception behavior in dyadic and triadic group decision making in synchronous computer-mediated communication","volume":"37","author":"Zhou","year":"2006","journal-title":"Small Group Research"}],"container-title":["International Journal of Human-Computer Studies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1071581909000937?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1071581909000937?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T18:31:24Z","timestamp":1558463484000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1071581909000937"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":55,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2009,10]]}},"alternative-id":["S1071581909000937"],"URL":"http:\/\/dx.doi.org\/10.1016\/j.ijhcs.2009.07.005","relation":{},"ISSN":["1071-5819"],"issn-type":[{"value":"1071-5819","type":"print"}],"subject":[],"published":{"date-parts":[[2009,10]]}}}