From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews., , , и . ISI, стр. 97-102. IEEE, (2015)Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers., , , , , и . J. Assoc. Inf. Sci. Technol., 63 (4): 755-776 (2012)Get a Cue on IS Security Training: Explaining the Difference between how Security Cues and Security Arguments Improve Secure Behavior., , и . ICIS, Association for Information Systems, (2011)Encouraging Users to Behave Securely: Examining the Influence of Technical, Managerial, and Educational Controls on Users' Secure Behavior., , , и . ICIS, стр. 150. Association for Information Systems, (2010)Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment., , и . J. Manag. Inf. Syst., 28 (1): 201-233 (2011)Tuning Out Security Warnings: A Longitudinal Examination of Habituation Through fMRI, Eye Tracking, and Field Experiments., , , , и . MIS Q., (2018)Embracing brain and behaviour: Designing programs of complementary neurophysiological and behavioural studies., , , и . Inf. Syst. J., 33 (2): 324-349 (марта 2023)Detecting Goal-Oriented vs. Browsing Users Through Behavior Analysis., , , и . MIPRO, стр. 13-18. IEEE, (2023)Digital Behavioral Biometrics and Privacy: Methods for Improving Business Processes without Compromising Customer Privacy., , и . MIPRO, стр. 1019-1024. IEEE, (2022)Thinking Fast or slow? Understanding Answering Behavior Using Dual-Process Theory through Mouse Cursor Movements., , , , и . HICSS, стр. 1-10. ScholarSpace, (2022)