Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Wearable Devices for Non-invasive, Inexpensive Physiological Data Collection., , , , and . HICSS, page 1-9. ScholarSpace / AIS Electronic Library (AISeL), (2017)Pulling the Plug: When to Call It a Day on Research Projects., and . Commun. Assoc. Inf. Syst., (2011)Detecting Deceptive Chat-Based Communication Using Typing Behavior and Message Cues., , , , and . ACM Trans. Manag. Inf. Syst., 4 (2): 9:1-9:21 (2013)The Business Rules Approach and Its Effect on Software Testing., , , and . IEEE Software, 29 (4): 60-66 (2012)Production vs. Consumption on Social Media: A Uses and Gratifications Perspective., , , and . AMCIS, Association for Information Systems, (2019)Dynamic collaboration: participant-driven agile processes for complex tasks., , , and . DATA BASE, 42 (2): 95-115 (2011)An Approach for Intent Identification by Building on Deception Detection., , , , , , , , , and 2 other author(s). HICSS, IEEE Computer Society, (2005)Cognitive Patterns of Information Addiction., , and . AMCIS, Association for Information Systems, (2017)Deception Detection through Automatic, Unobtrusive Analysis of Nonverbal Behavior., , , , , , and . IEEE Intelligent Systems, 20 (5): 36-43 (2005)The Missing Framework for Virtually Assisted Activities., , , and . ICIS, Association for Information Systems, (2017)