Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On-demand Assistance in Handling Ammunition: Development of a Mobile Ammo DSS., , , , and . Supporting Real Time Decision-Making, volume 13 of Annals of Information Systems, Springer, (2010)Motivating Knowledge Sharing in Diverse Organizational Contexts: An Argument for Reopening the Intrinsic vs. Extrinsic Debate., , , , , and . AMCIS, page 285. Association for Information Systems, (2009)A Model for the Impact of Task Complexity on Deception in a Group Decision Making Task., , , and . AMCIS, page 206. Association for Information Systems, (2009)An Analysis of Text-Based Deception Detection Tools., , , , and . AMCIS, page 418. Association for Information Systems, (2006)Vigilance and Error Detection in an Automated Command and Control Environment., , and . HICSS, IEEE Computer Society, (2006)Organization of Lessons Learned Knowledge: A Taxonomy and Implementation., , , , and . IJKM, 5 (3): 1-20 (2009)An Empirical Validation of Malicious Insider Characteristics., , and . J. of Management Information Systems, 33 (2): 361-392 (2016)An investigation of data and text mining methods for real world deception detection., , and . Expert Syst. Appl., 38 (7): 8392-8398 (2011)Automated Determination of the Veracity of Interview Statements from People of Interest to an Operational Security Force., , , , , and . HICSS, IEEE Computer Society, (2006)Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training., , and . ISI, volume 3073 of Lecture Notes in Computer Science, page 187-200. Springer, (2004)