Transforming software development: an MDA road map TO Meservy, KD Fenstermacher Computer 38 (9), 52-58, 2005 | 142 | 2005 |
Deception detection through automatic, unobtrusive analysis of nonverbal behavior TO Meservy, ML Jensen, J Kruse, JK Burgoon, JF Nunamaker, ... IEEE Intelligent Systems 20 (5), 36-43, 2005 | 131 | 2005 |
Understanding information systems continuance for information-oriented mobile applications L Chen, TO Meservy, M Gillenson Communications of the Association for Information Systems 30 (1), 9, 2012 | 98 | 2012 |
Detecting concealment of intent in transportation screening: A proof of concept JK Burgoon, DP Twitchell, ML Jensen, TO Meservy, M Adkins, J Kruse, ... IEEE Transactions on Intelligent Transportation Systems 10 (1), 103-112, 2009 | 55 | 2009 |
Detecting deceptive chat-based communication using typing behavior and message cues DC Derrick, TO Meservy, JL Jenkins, JK Burgoon, JF Nunamaker Jr ACM Transactions on Management Information Systems (TMIS) 4 (2), 1-21, 2013 | 53 | 2013 |
An approach for intent identification by building on deception detection J Burgoon, M Adkins, J Kruse, ML Jensen, T Meservy, DP Twitchell, ... Proceedings of the 38th Annual Hawaii International Conference on System …, 2005 | 52 | 2005 |
Automatic extraction of deceptive behavioral cues from video TO Meservy, ML Jensen, WJ Kruse, JK Burgoon, JF Nunamaker Terrorism Informatics, 495-516, 2008 | 49 | 2008 |
Automatic extraction of deceptive behavioral cues from video TO Meservy, ML Jensen, WJ Kruse, JK Burgoon, JF Nunamaker Terrorism Informatics, 495-516, 2008 | 49 | 2008 |
Evaluation of competing candidate solutions in electronic networks of practice TO Meservy, ML Jensen, KJ Fadel Information Systems Research 25 (1), 15-34, 2014 | 48 | 2014 |
Running on hybrid: Control changes when introducing an agile methodology in a traditional “waterfall” system development environment L Mahadevan, WJ Kettinger, TO Meservy Communications of the Association for Information Systems 36 (1), 5, 2015 | 46 | 2015 |
Automatic, multimodal evaluation of human interaction ML Jensen, TO Meservy, JK Burgoon, JF Nunamaker Group Decision and Negotiation 19 (4), 367-389, 2010 | 45 | 2010 |
Augmenting human identification of emotional states in video JK Burgoon, ML Jensen, TO Meservy, J Kruse, JF Nunamaker Intelligence Analysis Conference, McClean, VA, 1633-1640, 2005 | 41 | 2005 |
Risky Behavior in Online Social Media: Protection Motivation and Social Influence. MS Banks, CG Onita, TO Meservy AMCIS, 372, 2010 | 31 | 2010 |
Exploring knowledge filtering processes in electronic networks of practice KJ Fadel, TO Meservy, ML Jensen Journal of Management Information Systems 31 (4), 158-181, 2015 | 25 | 2015 |
Framework of affordances for virtual reality and augmented reality JH Steffen, JE Gaskin, TO Meservy, JL Jenkins, I Wolman Journal of Management Information Systems 36 (3), 683-729, 2019 | 21 | 2019 |
Dynamic collaboration: Participant-driven agile processes for complex tasks JH Helquist, A Deokar, T Meservy, J Kruse ACM SIGMIS Database: The DATABASE for Advances in Information Systems 42 (2 …, 2011 | 21 | 2011 |
Hmm-based deception recognition from visual cues G Tsechpenakis, D Metaxas, M Adkins, J Kruse, JK Burgoon, ML Jensen, ... 2005 IEEE International Conference on Multimedia and Expo, 824-827, 2005 | 21 | 2005 |
The business rules approach and its effect on software testing TO Meservy, C Zhang, ET Lee, J Dhaliwal IEEE software 29 (4), 60-66, 2011 | 13 | 2011 |
Using wearable devices for non-invasive, inexpensive physiological data collection J Gaskin, J Jenkins, T Meservy, J Steffen, K Payne Proceedings of the 50th Hawaii international conference on system sciences, 2017 | 12 | 2017 |
Implementing quality gates throughout the enterprise it production process V Ambartsoumian, J Dhaliwal, E Lee, T Meservy, C Zhang Journal of Information Technology Management 22 (1), 28-38, 2011 | 12 | 2011 |