Author of the publication

Sleight of Hand: Identifying Concealed Information by Monitoring Mouse-Cursor Movements.

, , , , and . J. Assoc. Inf. Syst., 20 (1): 3 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Fake Websites: The Contribution of Statistical Learning Theory., , , , and . MIS Q., 34 (3): 435-461 (2010)The Application of Electronic Meeting Technology to Support Strategic Management., , , and . MIS Q., 16 (3): 313-334 (1992)Information technology for organizational change., , and . Decis. Support Syst., 8 (4): 307-315 (1992)Automatic Extraction of Deceptive Behavioral Cues from Video., , , , and . ISI, volume 3495 of Lecture Notes in Computer Science, page 198-208. Springer, (2005)Electronic Meeting Systems To Support Group Work., , , , and . Commun. ACM, 34 (7): 40-61 (1991)Bringing automated support to large groups: The Burr-Brown experience., , , and . Inf. Manag., 18 (3): 111-121 (1990)The influence of conversational agent embodiment and conversational relevance on socially desirable responding., , , and . Decis. Support Syst., (2018)Interaction of task and technology to support large groups., , and . Decis. Support Syst., 5 (2): 139-152 (1989)The Use of Integrated Organization and Information Systems Models in Building and Delivering Business Applications., , and . IEEE Trans. Knowl. Data Eng., 1 (3): 406-409 (1989)A Knowledge Management Framework for the Support of Decision Making in Humanitarian Assistance/Disaster Relief., , and . Knowl. Inf. Syst., 4 (3): 370-385 (2002)