关注
Thomas Meservy
标题
引用次数
引用次数
年份
Framework of affordances for virtual reality and augmented reality
JH Steffen, JE Gaskin, TO Meservy, JL Jenkins, I Wolman
Journal of management information systems 36 (3), 683-729, 2019
2962019
Deception detection through automatic, unobtrusive analysis of nonverbal behavior
TO Meservy, ML Jensen, J Kruse, JK Burgoon, JF Nunamaker, ...
IEEE Intelligent Systems 20 (5), 36-43, 2005
1592005
Transforming software development: an MDA road map
TO Meservy, KD Fenstermacher
Computer 38 (9), 52-58, 2005
1512005
Understanding information systems continuance for information-oriented mobile applications
L Chen, TO Meservy, M Gillenson
Communications of the Association for Information Systems 30 (1), 9, 2012
1302012
Running on hybrid: Control changes when introducing an agile methodology in a traditional “waterfall” system development environment
L Mahadevan, WJ Kettinger, TO Meservy
Communications of the Association for Information Systems 36 (1), 5, 2015
872015
Evaluation of competing candidate solutions in electronic networks of practice
TO Meservy, ML Jensen, KJ Fadel
Information Systems Research 25 (1), 15-34, 2014
792014
Detecting deceptive chat-based communication using typing behavior and message cues
DC Derrick, TO Meservy, JL Jenkins, JK Burgoon, JF Nunamaker Jr
ACM Transactions on Management Information Systems (TMIS) 4 (2), 1-21, 2013
742013
Detecting concealment of intent in transportation screening: A proof of concept
JK Burgoon, DP Twitchell, ML Jensen, TO Meservy, M Adkins, J Kruse, ...
IEEE Transactions on Intelligent Transportation Systems 10 (1), 103-112, 2009
702009
Automatic extraction of deceptive behavioral cues from video
TO Meservy, ML Jensen, WJ Kruse, JK Burgoon, JF Nunamaker
Terrorism informatics: Knowledge management and data mining for homeland …, 2008
622008
Automatic, multimodal evaluation of human interaction
ML Jensen, TO Meservy, JK Burgoon, JF Nunamaker
Group Decision and Negotiation 19, 367-389, 2010
592010
An approach for intent identification by building on deception detection
J Burgoon, M Adkins, J Kruse, ML Jensen, T Meservy, DP Twitchell, ...
Proceedings of the 38th Annual Hawaii International Conference on System …, 2005
572005
Augmenting human identification of emotional states in video
JK Burgoon, ML Jensen, TO Meservy, J Kruse, JF Nunamaker
Intelligence Analysis Conference, McClean, VA, 1633-1640, 2005
432005
Risky behavior in online social media: protection motivation and social influence
MS Banks, CG Onita, TO Meservy
422010
Exploring knowledge filtering processes in electronic networks of practice
KJ Fadel, TO Meservy, ML Jensen
Journal of Management Information Systems 31 (4), 158-181, 2015
412015
HMM-based deception recognition from visual cues
G Tsechpenakis, D Metaxas, M Adkins, J Kruse, JK Burgoon, ML Jensen, ...
2005 IEEE International Conference on Multimedia and Expo, 824-827, 2005
302005
Using wearable devices for non-invasive, inexpensive physiological data collection
J Gaskin, J Jenkins, T Meservy, J Steffen, K Payne
292017
Dynamic collaboration: Participant-driven agile processes for complex tasks
JH Helquist, A Deokar, T Meservy, J Kruse
ACM SIGMIS Database: The DATABASE for Advances in Information Systems 42 (2 …, 2011
262011
An fMRI Exploration of Information Processing in Electronic Networks of Practice.
TO Meservy, KJ Fadel, CB Kirwan, RD Meservy
MIS Quarterly 43 (3), 2019
222019
Structured programming for linguistic cue extraction (SPLICE)
KC Moffitt, JS Giboney, E Ehrhardt, JK Burgoon, JF Nunamaker, M Jensen, ...
Proceedings of the HICSS-45 rapid screening technologies, deception …, 2012
222012
The business rules approach and its effect on software testing
TO Meservy, C Zhang, ET Lee, J Dhaliwal
IEEE software 29 (4), 60-66, 2011
172011
系统目前无法执行此操作,请稍后再试。
文章 1–20