Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effects of Veracity, Modality, and Sanctioning on Credibility Assessment During Mediated and Unmediated Interviews., , , , , , and . Commun. Res., 42 (5): 649-674 (2015)Detecting Deception through Linguistic Analysis., , , and . ISI, volume 2665 of Lecture Notes in Computer Science, page 91-101. Springer, (2003)An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering., and . ISI, page 152-159. IEEE, (2007)Designing Interfaces to Maximize the Quality of Collaborative Work., , , , and . HICSS, IEEE Computer Society, (1999)An Exploratory Study on Promising Cues in Deception Detection and Application of Decision Tree., , and . HICSS, IEEE Computer Society, (2004)Trust and Deception in Mediated Communication., , , and . HICSS, page 44. IEEE Computer Society, (2003)Task Performance Under Deceptive Conditions: Using Military Scenarios in Deception Detection Research., , , , , , and . HICSS, IEEE Computer Society, (2005)An Approach for Intent Identification by Building on Deception Detection., , , , , , , , , and 2 other author(s). HICSS, IEEE Computer Society, (2005)Detecting Deception through Linguistic Analysis, , , and . Proceedings of Intelligence and Security Informatics (ISI), 2665, page 958. (2008)Detecting Deceptive Chat-Based Communication Using Typing Behavior and Message Cues, , , , and . ACM Trans. Manage. Inf. Syst., 4 (2): 9:1--9:21 (August 2013)