Author of the publication

Task Performance Under Deceptive Conditions: Using Military Scenarios in Deception Detection Research.

, , , , , , and . HICSS, IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inside the Fence: Sensitizing Decision Makers to the Possibility of Deception in the Data They Use., , and . MIS Q. Executive, 4 (1): 6 (2005)Exploration of Feature Selection and Advanced Classification Models for High-Stakes Deception Detection., , and . HICSS, page 80. IEEE Computer Society, (2008)Incorporating Information Assurance in Systems Analysis and Design Curricula., , , and . AMCIS, page 238. Association for Information Systems, (2007)Inducing Sensitivity to Deception in Order to Improve Decision Making Performance: A Field Study., , and . MIS Q., 26 (2): 119-144 (2002)An Exploratory Analysis of Computer Mediated Communications on Cyberstalking Severity., and . J. Digit. Forensics Secur. Law, 2 (3): 7-28 (2007)Task Performance Under Deceptive Conditions: Using Military Scenarios in Deception Detection Research., , , , , , and . HICSS, IEEE Computer Society, (2005)An Analysis of Text-Based Deception Detection Tools., , , , and . AMCIS, page 418. Association for Information Systems, (2006)Motivating Knowledge Sharing in Diverse Organizational Contexts: An Argument for Reopening the Intrinsic vs. Extrinsic Debate., , , , , and . AMCIS, page 285. Association for Information Systems, (2009)An investigation of data and text mining methods for real world deception detection., , and . Expert Syst. Appl., 38 (7): 8392-8398 (2011)Organization of Lessons Learned Knowledge: A Taxonomy and Implementation., , , , and . Int. J. Knowl. Manag., 5 (3): 1-20 (2009)