Author of the publication

Detecting Concealment of Intent in Transportation Screening: A Proof of Concept.

, , , , , , , , , , , and . IEEE Trans. Intelligent Transportation Systems, 10 (1): 103-112 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research Note - Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance., , , , and . Information Systems Research, 25 (2): 385-400 (2014)Deception Detection through Automatic, Unobtrusive Analysis of Nonverbal Behavior., , , , , , and . IEEE Intelligent Systems, 20 (5): 36-43 (2005)Computer-aided Credibility Assessment by Novice Lie-Catchers., , and . AMCIS, page 159. Association for Information Systems, (2007)Blob Analysis of the Head and Hands: A Method for Deception Detection., , , , and . HICSS, IEEE Computer Society, (2005)Is Interactional Dissynchrony a Clue to Deception? Insights From Automated Analysis of Nonverbal Visual Cues., , , , , , , , and . IEEE Trans. Cybernetics, 45 (3): 506-520 (2015)Fear Appeals, Message Processing Cues, and Credibility in the Websites of Violent, Ideological, and Nonideological Groups., , , , , , and . J. Computer-Mediated Communication, 19 (4): 871-889 (2014)Serious Games: An Evaluation Framework and Case Study., , , , , , , , , and 2 other author(s). HICSS, page 638-647. IEEE Computer Society, (2016)Credibility of Anonymous Online Product Reviews: A Language Expectancy Perspective., , , and . J. of Management Information Systems, 30 (1): 293-324 (2013)Organizational balancing of website interactivity and control: An examination of ideological groups and the duality of goals., , , , , , and . Computers in Human Behavior, (2014)Implicit and explicit training in the mitigation of cognitive bias through the use of a serious game., , , , , , , , , and 5 other author(s). Computers in Human Behavior, (2014)