Author of the publication

Gender deception in asynchronous online communication: A path analysis.

, , , , and . Inf. Process. Manag., 53 (1): 21-41 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ethical dilemma: Deception dynamics in computer-mediated group communication., , and . J. Assoc. Inf. Sci. Technol., 68 (12): 2729-2742 (2017)IntegraL Connects Data, User and Scientists., , and . IASSIST, (2010)Consciousness of cyber defense: A collective activity system for developing organizational cyber awareness., and . Comput. Secur., (2021)Factors Affecting Individual Information Security Practices., , , and . CPR, page 135-144. ACM, (2015)An online game simulation environment for detecting potential deceptive insiders., , and . WSC, page 3222-3223. IEEE/ACM, (2015)Ön the left side, there's nothing right. On the right side, there's nothing left: " Polarization of Political Opinion by News Media., , , , and . iConference, volume 12051 of Lecture Notes in Computer Science, page 209-219. Springer, (2020)Do You Speak Meme? A Dynamic Digital Language for the InformationSociety., , and . iConference (1), volume 13971 of Lecture Notes in Computer Science, page 523-534. Springer, (2023)Computer-Mediated Deception: Collective Language-action Cues as Stigmergic Signals for Computational Intelligence., and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2018)Guess who? An empirical study of gender deception and detection in computer-mediated communication., and . ASIST, volume 50 of Proc. Assoc. Inf. Sci. Technol., page 1-4. Wiley, (2013)Dyadic attribution model: A mechanism to assess trustworthiness in virtual organizations., and . J. Assoc. Inf. Sci. Technol., 65 (8): 1555-1576 (2014)