Author of the publication

Video-Based Deception Detection.

, , , and . Intelligence and Security Informatics, volume 135 of Studies in Computational Intelligence, Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Benefitting from IS Research - Who and How? A Panel on the Value of IS Research., , , , and . AMCIS, Association for Information Systems, (2013)Automatic Extraction of Deceptive Behavioral Cues from Video., , , , and . ISI, volume 3495 of Lecture Notes in Computer Science, page 198-208. Springer, (2005)Electronic Meeting Systems To Support Group Work., , , , and . Commun. ACM, 34 (7): 40-61 (1991)Bringing automated support to large groups: The Burr-Brown experience., , , and . Inf. Manag., 18 (3): 111-121 (1990)Interaction of task and technology to support large groups., , and . Decis. Support Syst., 5 (2): 139-152 (1989)The influence of conversational agent embodiment and conversational relevance on socially desirable responding., , , and . Decis. Support Syst., (2018)Synchronicity and Group Ability to Autonomously Cluster Brainstorming Ideas., , and . IJeC, 5 (4): 67-81 (2009)Detecting Deception through Linguistic Analysis, , , and . Proceedings of Intelligence and Security Informatics (ISI), 2665, page 958. (2008)Detecting Deceptive Chat-Based Communication Using Typing Behavior and Message Cues, , , , and . ACM Trans. Manage. Inf. Syst., 4 (2): 9:1--9:21 (August 2013)The Use of Integrated Organization and Information Systems Models in Building and Delivering Business Applications., , and . IEEE Trans. Knowl. Data Eng., 1 (3): 406-409 (1989)