Transforming software development: an MDA road map TO Meservy, KD Fenstermacher Computer 38 (9), 52-58, 2005 | 146 | 2005 |
Deception detection through automatic, unobtrusive analysis of nonverbal behavior TO Meservy, ML Jensen, J Kruse, JK Burgoon, JF Nunamaker, ... IEEE Intelligent Systems 20 (5), 36-43, 2005 | 143 | 2005 |
Understanding information systems continuance for information-oriented mobile applications L Chen, TO Meservy, M Gillenson Communications of the Association for Information Systems 30 (1), 9, 2012 | 112 | 2012 |
Framework of affordances for virtual reality and augmented reality JH Steffen, JE Gaskin, TO Meservy, JL Jenkins, I Wolman Journal of Management Information Systems 36 (3), 683-729, 2019 | 96 | 2019 |
Running on hybrid: Control changes when introducing an agile methodology in a traditional “waterfall” system development environment L Mahadevan, WJ Kettinger, TO Meservy Communications of the Association for Information Systems 36 (1), 5, 2015 | 61 | 2015 |
Detecting concealment of intent in transportation screening: A proof of concept JK Burgoon, DP Twitchell, ML Jensen, TO Meservy, M Adkins, J Kruse, ... IEEE Transactions on Intelligent Transportation Systems 10 (1), 103-112, 2009 | 58 | 2009 |
Evaluation of competing candidate solutions in electronic networks of practice TO Meservy, ML Jensen, KJ Fadel Information Systems Research 25 (1), 15-34, 2014 | 57 | 2014 |
Detecting deceptive chat-based communication using typing behavior and message cues DC Derrick, TO Meservy, JL Jenkins, JK Burgoon, JF Nunamaker Jr ACM Transactions on Management Information Systems (TMIS) 4 (2), 1-21, 2013 | 56 | 2013 |
An approach for intent identification by building on deception detection J Burgoon, M Adkins, J Kruse, ML Jensen, T Meservy, DP Twitchell, ... Proceedings of the 38th Annual Hawaii International Conference on System …, 2005 | 54 | 2005 |
Automatic extraction of deceptive behavioral cues from video TO Meservy, ML Jensen, WJ Kruse, JK Burgoon, JF Nunamaker Terrorism Informatics, 495-516, 2008 | 52 | 2008 |
Automatic extraction of deceptive behavioral cues from video TO Meservy, ML Jensen, WJ Kruse, JK Burgoon, JF Nunamaker Terrorism Informatics, 495-516, 2008 | 52 | 2008 |
Automatic, multimodal evaluation of human interaction ML Jensen, TO Meservy, JK Burgoon, JF Nunamaker Group Decision and Negotiation 19 (4), 367-389, 2010 | 51 | 2010 |
Augmenting human identification of emotional states in video JK Burgoon, ML Jensen, TO Meservy, J Kruse, JF Nunamaker Intelligence Analysis Conference, McClean, VA, 1633-1640, 2005 | 43 | 2005 |
Risky behavior in online social media: protection motivation and social influence MS Banks, CG Onita, TO Meservy | 33 | 2010 |
Exploring knowledge filtering processes in electronic networks of practice KJ Fadel, TO Meservy, ML Jensen Journal of Management Information Systems 31 (4), 158-181, 2015 | 31 | 2015 |
HMM-based deception recognition from visual cues G Tsechpenakis, D Metaxas, M Adkins, J Kruse, JK Burgoon, ML Jensen, ... 2005 IEEE International Conference on Multimedia and Expo, 824-827, 2005 | 26 | 2005 |
Dynamic collaboration: Participant-driven agile processes for complex tasks JH Helquist, A Deokar, T Meservy, J Kruse ACM SIGMIS Database: The DATABASE for Advances in Information Systems 42 (2 …, 2011 | 23 | 2011 |
Using wearable devices for non-invasive, inexpensive physiological data collection J Gaskin, J Jenkins, T Meservy, J Steffen, K Payne Proceedings of the 50th Hawaii international conference on system sciences, 2017 | 16 | 2017 |
Structured programming for linguistic cue extraction (SPLICE) KC Moffitt, JS Giboney, E Ehrhardt, JK Burgoon, JF Nunamaker, M Jensen, ... Proceedings of the HICSS-45 Rapid Screening Technologies, Deception …, 2012 | 15 | 2012 |
Implementing quality gates throughout the enterprise it production process V Ambartsoumian, J Dhaliwal, E Lee, T Meservy, C Zhang Journal of Information Technology Management 22 (1), 28-38, 2011 | 14 | 2011 |