Author of the publication

Mitigating Cognitive Bias through the Use of Serious Games: Effects of Feedback.

, , , , , , , , , , , , , , , , and . PERSUASIVE, volume 8462 of Lecture Notes in Computer Science, page 92-105. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Deception through Linguistic Analysis., , , and . ISI, volume 2665 of Lecture Notes in Computer Science, page 91-101. Springer, (2003)Effects of Veracity, Modality, and Sanctioning on Credibility Assessment During Mediated and Unmediated Interviews., , , , , , and . Commun. Res., 42 (5): 649-674 (2015)An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering., and . ISI, page 152-159. IEEE, (2007)Designing Interfaces to Maximize the Quality of Collaborative Work., , , , and . HICSS, IEEE Computer Society, (1999)Task Performance Under Deceptive Conditions: Using Military Scenarios in Deception Detection Research., , , , , , and . HICSS, IEEE Computer Society, (2005)An Approach for Intent Identification by Building on Deception Detection., , , , , , , , , and 2 other author(s). HICSS, IEEE Computer Society, (2005)Trust and Deception in Mediated Communication., , , and . HICSS, page 44. IEEE Computer Society, (2003)An Exploratory Study on Promising Cues in Deception Detection and Application of Decision Tree., , and . HICSS, IEEE Computer Society, (2004)Machine learning methods for credibility assessment of interviewees based on posturographic data., , , , and . EMBC, page 6708-6711. IEEE, (2015)Automatic Extraction of Deceptive Behavioral Cues from Video., , , , and . ISI, volume 3495 of Lecture Notes in Computer Science, page 198-208. Springer, (2005)