Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing Interfaces to Maximize the Quality of Collaborative Work., , , , and . HICSS, IEEE Computer Society, (1999)Testing the Interactivity Model: Communication Processes, Partner Assessments, and the Quality of Collaborative Work., , , , , and . J. of Management Information Systems, 16 (3): 33-56 (2000)Are Users Threatened by Credibility Assessment Systems?, , , and . J. of Management Information Systems, 29 (4): 249-262 (2013)Trust and Deception in Mediated Communication., , , and . HICSS, page 44. IEEE Computer Society, (2003)Mitigating bias blind spot via a serious video game., , , , , , , , , and 2 other author(s). Computers in Human Behavior, (2016)Predicting dominance in multi-person videos., , , , , , and . IJCAI, page 4643-4650. ijcai.org, (2019)Ideological lens matters: Credibility heuristics, pre-existing attitudes, and reactions to messages on ideological websites., , , , , , and . Computers in Human Behavior, (2017)Synchrony facilitates altruistic decision making for non-human avatars., , , and . Comput. Hum. Behav., (2022)Interaction Coordination and Adaptation., , and . Social Signal Processing, Cambridge University Press, (2017)Ideological group persuasion: A within-person study of how violence, interactivity, and credibility features influence online persuasion., , , , , , , , and . Computers in Human Behavior, (2015)