Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Response to the AIS Bright ICT Initiative., and . AMCIS, Association for Information Systems, (2016)Advancing the assessment of automated deception detection systems: Incorporating base rate and cost into system evaluation., and . Inf. Syst. J., 29 (3): 738-761 (2019)A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication., , , , and . J. Manag. Inf. Syst., 20 (4): 139-165 (2004)Speech Act Pro.ling: A Probabilistic Method for Analyzing Persistent Conversations and Their Participants., and . HICSS, IEEE Computer Society, (2004)The Impact of Ability and Participation on Trustworthiness and Task Performance in Virtual Teams., , , and . Int. J. Soc. Organ. Dyn. IT, 2 (2): 1-17 (2012)Data Quality Relevance in Linguistic Analysis: The Impact of Transcription Errors on Multiple Methods of Linguistic Analysis., , , and . AMCIS, Association for Information Systems, (2019)Too Busy to Be Manipulated: How Multitasking with Technology Improves Deception Detection in Collaborative Teamwork., , , , , and . J. Manag. Inf. Syst., 37 (2): 377-395 (2020)An Approach for Intent Identification by Building on Deception Detection., , , , , , , , , and 2 other author(s). HICSS, IEEE Computer Society, (2005)Task Performance Under Deceptive Conditions: Using Military Scenarios in Deception Detection Research., , , , , , and . HICSS, IEEE Computer Society, (2005)A Longitudinal Analysis of Language Behavior of Deception in E-mail, , and . Proceedings of Intelligence and Security Informatics (ISI), 2665, page 959. (2008)