From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Systems Approach to Countermeasures in Credibility Assessment Interviews., , , и . ICIS, Association for Information Systems, (2013)When Disclosure is Involuntary: Empowering Users with Control to Reduce Concerns., , , и . ICIS, Association for Information Systems, (2015)Saving Face on Facebook: Privacy Concerns, Social Benefits, and Impression Management., , и . ICIS, Association for Information Systems, (2014)Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews., , , и . ISI, стр. 97-102. IEEE, (2015)Evaluating the Feasibility of Using Noncontact Sensors to Conduct a Targetless Concealed Information Test.. EISIC, стр. 269-272. IEEE, (2013)Mitigating Threats to Collaboration and CMC: Identifying Antecedents of Online Deviance., , и . HICSS, стр. 325-334. IEEE Computer Society, (2013)Man vs. machine: Investigating the effects of adversarial system use on end-user behavior in automated deception detection interviews., , и . Decis. Support Syst., (2016)Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals., , , и . Inf. Technol. Dev., 20 (2): 196-213 (2014)Trends in Phishing Attacks: Suggestions for Future Research., , , и . AMCIS, Association for Information Systems, (2011)The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resource Allocation., , , , , и . EISIC, стр. 252-255. IEEE, (2013)