Information manipulation theory

Results: 13



#Item
1The Hong Kong University of Science and Technology

The Hong Kong University of Science and Technology

Add to Reading List

Source URL: www.bm.ust.hk

Language: English - Date: 2011-01-23 20:24:15
21_1 - Derrick Meservy Burgoon Nunamaker - Experimental Agent for Detecting Deceipt v2.pdf

1_1 - Derrick Meservy Burgoon Nunamaker - Experimental Agent for Detecting Deceipt v2.pdf

Add to Reading List

Source URL: www.hicss.hawaii.edu

Language: English - Date: 2012-01-02 15:23:45
3C SI RO A U ST RA LIA CSI RO LAN D and WATER  Storage And Manipulation Of The Land

C SI RO A U ST RA LIA CSI RO LAN D and WATER Storage And Manipulation Of The Land

Add to Reading List

Source URL: www.clw.csiro.au

Language: English - Date: 2005-10-14 00:46:31
4doi:[removed]j.econlet[removed]

doi:[removed]j.econlet[removed]

Add to Reading List

Source URL: www.people.fas.harvard.edu

Language: English - Date: 2014-03-20 11:09:28
5COPYRIGHT NOTICE:  Alfred R. Mele: Self-Deception Unmasked is published by Princeton University Press and copyrighted, © 2000, by Princeton University Press. All rights reserved. No part of this book may be reproduced i

COPYRIGHT NOTICE: Alfred R. Mele: Self-Deception Unmasked is published by Princeton University Press and copyrighted, © 2000, by Princeton University Press. All rights reserved. No part of this book may be reproduced i

Add to Reading List

Source URL: press.princeton.edu

Language: English - Date: 2005-02-07 14:38:08
6Microsoft Word - cmc.Deception_2013[removed]v22

Microsoft Word - cmc.Deception_2013[removed]v22

Add to Reading List

Source URL: www.asis.org

Language: English - Date: 2014-07-19 18:51:48
7Experts close to perfect in determining truth in interrogations using active question methods

Experts close to perfect in determining truth in interrogations using active question methods

Add to Reading List

Source URL: medicalxpress.com

Language: English - Date: 2014-10-28 19:34:21
8—1— Social and Cognitive Approaches to Interpersonal Communication: Introduction and Overview Susan R. Fussell

—1— Social and Cognitive Approaches to Interpersonal Communication: Introduction and Overview Susan R. Fussell

Add to Reading List

Source URL: sfussell.hci.cornell.edu

Language: English - Date: 2013-03-14 21:32:52
9In Search of a Gold Standard in Studies of Deception  Stephanie Gokhman1 , Jeff Hancock1,3 , Poornima Prabhu2 , Myle Ott2 , Claire Cardie2,3 Departments of Communication1 , Computer Science2 , and Information Science3 Co

In Search of a Gold Standard in Studies of Deception Stephanie Gokhman1 , Jeff Hancock1,3 , Poornima Prabhu2 , Myle Ott2 , Claire Cardie2,3 Departments of Communication1 , Computer Science2 , and Information Science3 Co

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2012-03-20 14:43:20
10Practical Message Manipulation Attacks in IEEE[removed]Wireless Networks Matthias Wilhelm1 , Jens B. Schmitt1 , and Vincent Lenders2 Disco Labs, TU Kaiserslautern, Germany 2 armasuisse, Thun, Switzerland

Practical Message Manipulation Attacks in IEEE[removed]Wireless Networks Matthias Wilhelm1 , Jens B. Schmitt1 , and Vincent Lenders2 Disco Labs, TU Kaiserslautern, Germany 2 armasuisse, Thun, Switzerland

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2012-04-09 07:27:46