Group support systems and deceptive communication
暂无分享,去创建一个
[1] Stephen Reder,et al. Selection and Effects of Channels in Distributed Communication and Decision-Making Tasks. , 1988 .
[2] Judee K. Burgoon,et al. Interpersonal deception: V. Accuracy in deception detection , 1994 .
[3] T. Levine,et al. The dark side of trust: Conceptualizing and measuring types of communicative suspicion , 1991 .
[4] Gene D. Fowler,et al. Audio teleconferencing versus face‐to‐face conferencing: A synthesis of the literature , 1980 .
[5] David R. Seibold,et al. Communication and influence in group decision making. , 1996 .
[6] Jane S. Webster,et al. Rational and social theories as complementary explanations of communication media choices: two polic , 1995 .
[7] Robert Johansen,et al. Social evaluations of teleconferencing , 1977 .
[8] Joey F. George,et al. Theoretical and Methodological Issues in Group Support Systems Research , 1997 .
[9] S. Grover. Lying, Deceit, and Subterfuge: A Model of Dishonesty in the Workplace , 1993 .
[10] Thomas Hugh Feeley,et al. Global cue usage in behavioral lie detection , 1995 .
[11] R. Johansen,et al. Electronic meetings : technical alternatives and social choices , 1979 .
[12] Rob Kling,et al. Cooperation, coordination and control in computer-supported work , 1991, CACM.
[13] J. Valacich,et al. Effects of anonymity and evaluative tone on idea generation in computer-mediated groups , 1990 .
[14] Jay F. Nunamaker,et al. Communication Concurrency and the New Media , 1993 .
[15] Leonard M. Jessup,et al. The deindividuating effects of anonymity on automated group idea generation. , 1989 .
[16] Jay F. Nunamaker,et al. Electronic meeting systems , 1991, CACM.
[17] Richard L. Daft,et al. Organizational information requirements, media richness and structural design , 1986 .
[18] John Short,et al. The social psychology of telecommunications , 1976 .
[19] Linda L. Putnam,et al. Bona Fide Groups: An Alternative Perspective for Communication and Small Group Decision Making , 1996 .
[20] T. Levine,et al. When lovers become leery: The relationship between suspicion and accuracy in detecting deception , 1990 .
[21] James B. Stiff,et al. Truth Biases and Aroused Suspicion in Relational Deception , 1992 .
[22] R. Daft,et al. Understanding Managers' Media Choices: A Symbolic Interactionist Perspective , 1990 .
[23] Ping Zhang,et al. Fast timing estimation for CDMA waveforms in a near-far environment , 1996, Proceedings of GLOBECOM'96. 1996 IEEE Global Telecommunications Conference.
[24] Poppy Lauretta McLeod,et al. An Assessment of the Experimental Literature on Electronic Support of Group Work: Results of a Meta-Analysis , 1992, Hum. Comput. Interact..
[25] Richard L. Daft,et al. Message Equivocality, Media Selection, and Manager Performance: Implications for Information Systems , 1987, MIS Q..
[26] Janet Fulk,et al. Emerging Theories of Communication in Organizations , 1991 .
[27] Steven A. Mccornack. Information manipulation theory , 1992 .
[28] Laura K. Guerrero,et al. Interpersonal deception: XII. Information management dimensions underlying deceptive and truthful messages , 1996 .
[29] Carlos Ferrán-Urdaneta,et al. Truth or deception: the impact of videoconferencing for job interviews , 1997, ICIS '97.
[30] Brian K. Thorn,et al. Discretionary Databases: Theory, Data, and Implications , 1990 .
[31] R. Daft,et al. Media Symbolism, Media Richness, and Media Choice in Organizations , 1987 .
[32] Malcolm R. Parks,et al. Deception Detection and Relationship Development: The Other Side of Trust , 1986 .
[33] John R. Carlson. Channel expansion theory: A dynamic view of media and information richness perceptions , 1994 .
[34] Judee K. Burgoon,et al. Interpersonal deception: III. Effects of deceit on perceived communication and nonverbal behavior dynamics , 1994 .
[35] C. Steinfield,et al. A Social Influence Model of Technology use , 1990 .