Follow
Thomas Meservy
Title
Cited by
Cited by
Year
Transforming software development: an MDA road map
TO Meservy, KD Fenstermacher
Computer 38 (9), 52-58, 2005
1462005
Deception detection through automatic, unobtrusive analysis of nonverbal behavior
TO Meservy, ML Jensen, J Kruse, JK Burgoon, JF Nunamaker, ...
IEEE Intelligent Systems 20 (5), 36-43, 2005
1432005
Understanding information systems continuance for information-oriented mobile applications
L Chen, TO Meservy, M Gillenson
Communications of the Association for Information Systems 30 (1), 9, 2012
1122012
Framework of affordances for virtual reality and augmented reality
JH Steffen, JE Gaskin, TO Meservy, JL Jenkins, I Wolman
Journal of Management Information Systems 36 (3), 683-729, 2019
962019
Running on hybrid: Control changes when introducing an agile methodology in a traditional “waterfall” system development environment
L Mahadevan, WJ Kettinger, TO Meservy
Communications of the Association for Information Systems 36 (1), 5, 2015
612015
Detecting concealment of intent in transportation screening: A proof of concept
JK Burgoon, DP Twitchell, ML Jensen, TO Meservy, M Adkins, J Kruse, ...
IEEE Transactions on Intelligent Transportation Systems 10 (1), 103-112, 2009
582009
Evaluation of competing candidate solutions in electronic networks of practice
TO Meservy, ML Jensen, KJ Fadel
Information Systems Research 25 (1), 15-34, 2014
572014
Detecting deceptive chat-based communication using typing behavior and message cues
DC Derrick, TO Meservy, JL Jenkins, JK Burgoon, JF Nunamaker Jr
ACM Transactions on Management Information Systems (TMIS) 4 (2), 1-21, 2013
562013
An approach for intent identification by building on deception detection
J Burgoon, M Adkins, J Kruse, ML Jensen, T Meservy, DP Twitchell, ...
Proceedings of the 38th Annual Hawaii International Conference on System …, 2005
542005
Automatic extraction of deceptive behavioral cues from video
TO Meservy, ML Jensen, WJ Kruse, JK Burgoon, JF Nunamaker
Terrorism Informatics, 495-516, 2008
522008
Automatic extraction of deceptive behavioral cues from video
TO Meservy, ML Jensen, WJ Kruse, JK Burgoon, JF Nunamaker
Terrorism Informatics, 495-516, 2008
522008
Automatic, multimodal evaluation of human interaction
ML Jensen, TO Meservy, JK Burgoon, JF Nunamaker
Group Decision and Negotiation 19 (4), 367-389, 2010
512010
Augmenting human identification of emotional states in video
JK Burgoon, ML Jensen, TO Meservy, J Kruse, JF Nunamaker
Intelligence Analysis Conference, McClean, VA, 1633-1640, 2005
432005
Risky behavior in online social media: protection motivation and social influence
MS Banks, CG Onita, TO Meservy
332010
Exploring knowledge filtering processes in electronic networks of practice
KJ Fadel, TO Meservy, ML Jensen
Journal of Management Information Systems 31 (4), 158-181, 2015
312015
HMM-based deception recognition from visual cues
G Tsechpenakis, D Metaxas, M Adkins, J Kruse, JK Burgoon, ML Jensen, ...
2005 IEEE International Conference on Multimedia and Expo, 824-827, 2005
262005
Dynamic collaboration: Participant-driven agile processes for complex tasks
JH Helquist, A Deokar, T Meservy, J Kruse
ACM SIGMIS Database: The DATABASE for Advances in Information Systems 42 (2 …, 2011
232011
Using wearable devices for non-invasive, inexpensive physiological data collection
J Gaskin, J Jenkins, T Meservy, J Steffen, K Payne
Proceedings of the 50th Hawaii international conference on system sciences, 2017
162017
Structured programming for linguistic cue extraction (SPLICE)
KC Moffitt, JS Giboney, E Ehrhardt, JK Burgoon, JF Nunamaker, M Jensen, ...
Proceedings of the HICSS-45 Rapid Screening Technologies, Deception …, 2012
152012
Implementing quality gates throughout the enterprise it production process
V Ambartsoumian, J Dhaliwal, E Lee, T Meservy, C Zhang
Journal of Information Technology Management 22 (1), 28-38, 2011
142011
The system can't perform the operation now. Try again later.
Articles 1–20