Jeffrey L. Jenkins
Orcid: 0000-0001-8550-4897Affiliations:
- Brigham Young University, Marriott School of Business, Provo, UT, USA
According to our database1,
Jeffrey L. Jenkins
authored at least 63 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
MIS Q., 2024
Proceedings of the 47th MIPRO ICT and Electronics Convention, 2024
Proceedings of the 45th International Conference on Information Systems, 2024
Detecting Social Desirability Bias with Human-Computer Interaction: A Mouse-Tracking Study.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Detecting Social Desirability Bias in Polls: A Digital Behavioral Biometric Approach.
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024
2023
Embracing brain and behaviour: Designing programs of complementary neurophysiological and behavioural studies.
Inf. Syst. J., March, 2023
Getting What You Paid For: Assessing Participant Experience Parameters for Amazon Mechanical Turk (MTurk) Workers on Survey Response Quality.
Proceedings of the 46th MIPRO ICT and Electronics Convention, 2023
Proceedings of the 46th MIPRO ICT and Electronics Convention, 2023
Proceedings of the 46th MIPRO ICT and Electronics Convention, 2023
Proceedings of the 44th International Conference on Information Systems, 2023
Typing Fast versus Typing Slow: Using Typing Dynamics to Reveal Authentic and Imposter Users.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
2022
Digital Behavioral Biometrics and Privacy: Methods for Improving Business Processes without Compromising Customer Privacy.
Proceedings of the 45th Jubilee International Convention on Information, 2022
When is enough, enough? An Examination of Student Engagement when Watching Online Group Project Presentations.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
Thinking Fast or slow? Understanding Answering Behavior Using Dual-Process Theory through Mouse Cursor Movements.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
2021
Detecting Noncompliant Behavior in Organizations: How Online Survey Responses and Behaviors Reveal Risk.
J. Manag. Inf. Syst., 2021
Mitigating the Security Intention-Behavior Gap: The Moderating Role of Required Effort on the Intention-Behavior Relationship.
J. Assoc. Inf. Syst., 2021
2020
Using Accelerometer and Gyroscope Data in Common Mobile Devices to Assess Credibility.
Proceedings of the 26th Americas Conference on Information Systems, 2020
2019
J. Manag. Inf. Syst., 2019
Sleight of Hand: Identifying Concealed Information by Monitoring Mouse-Cursor Movements.
J. Assoc. Inf. Syst., 2019
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019
Proceedings of the 40th International Conference on Information Systems, 2019
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Improving Compassion Measurement in the Workforce by Analyzing Users' Mouse-Cursor Movements.
Proceedings of the 25th Americas Conference on Information Systems, 2019
2018
Tuning Out Security Warnings: A Longitudinal Examination of Habituation Through fMRI, Eye Tracking, and Field Experiments.
MIS Q., 2018
Improving Security Message Adherence through Improved Comprehension: Neural and Behavioral Insights.
Proceedings of the 24th Americas Conference on Information Systems, 2018
2017
How Is Your User Feeling? Inferring Emotion Through Human-Computer interaction Devices.
MIS Q., 2017
AIS Trans. Hum. Comput. Interact., 2017
Proceedings of the International Conference on Information Systems, 2017
Proceedings of the International Conference on Information Systems, 2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
What Do We Really Know about How Habituation to Warnings Occurs Over Time?: A Longitudinal fMRI Study of Habituation and Polymorphic Warnings.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
2016
More Than Meets the Eye: How Oculometric Behaviors Evolve Over the Course of Automated Deception Detection Interactions.
J. Manag. Inf. Syst., 2016
From Warning to Wallpaper: Why the Brain Habituates to Security Warnings and What Can Be Done About It.
J. Manag. Inf. Syst., 2016
Inf. Syst. Res., 2016
How users perceive and respond to security messages: a NeuroIS research agenda and empirical study.
Eur. J. Inf. Syst., 2016
Your memory is working against you: How eye tracking and memory explain habituation to security warnings.
Decis. Support Syst., 2016
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
Proceedings of the 24th European Conference on Information Systems, 2016
Proceedings of the 22nd Americas Conference on Information Systems, 2016
2015
Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015
How Polymorphic Warnings Reduce Habituation in the Brain: Insights from an fMRI Study.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
A Multi-Experimental Examination of Analyzing Mouse Cursor Trajectories to Gauge Subject Uncertainty.
Proceedings of the 21st Americas Conference on Information Systems, 2015
The Impact of Technostress on Users' Responses to Security Warnings: A NeuroIS Study.
Proceedings of the 21st Americas Conference on Information Systems, 2015
2014
Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals.
Inf. Technol. Dev., 2014
Proposing the Affect-Trust Infusion Model (ATIM) to explain and predict the influence of high and low affect infusion on Web vendor trust.
Inf. Manag., 2014
Implicit and explicit training in the mitigation of cognitive bias through the use of a serious game.
Comput. Hum. Behav., 2014
Investigating the Effect of Insurance Fraud on Mouse Usage in Human-Computer Interactions.
Proceedings of the International Conference on Information Systems, 2014
2013
ACM Trans. Manag. Inf. Syst., 2013
Simplicity is Bliss: Controlling Extraneous Cognitive Load in Online Security Training to Promote Secure Behavior.
J. Organ. End User Comput., 2013
What, I Shouldn't Have Done That? : The Influence of Training and Just-in-Time Reminders on Secure Behavior.
Proceedings of the International Conference on Information Systems, 2013
Proceedings of the International Conference on Information Systems, 2013
What Kind of Interventions Can Help Users from Falling for Phishing Attempts: A Research Proposal for Examining Stage-Appropriate Interventions.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resource Allocation.
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013
2012
Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers.
J. Assoc. Inf. Sci. Technol., 2012
E-Collaboration Media Use and Diversity Perceptions: An Evolutionary Perspective of Virtual Organizations.
Int. J. e Collab., 2012
On Not Falling for Phish: Examining Multiple Stages of Protective Behavior of Information System End-Users.
Proceedings of the International Conference on Information Systems, 2012
Embodied Agents and the Predictive Elaboration Model of Persuasion-The Ability to Tailor Embodied Agents to Users' Need for Cognition.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
Forget the Fluff: Examining How Media Richness Influences the Impact of Information Security Training on Secure Behavior.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
2011
Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment.
J. Manag. Inf. Syst., 2011
Get a Cue on IS Security Training: Explaining the Difference between how Security Cues and Security Arguments Improve Secure Behavior.
Proceedings of the International Conference on Information Systems, 2011
Knowledge Sourcing and Knowledge Consumption in Computer-Mediated Complex Decision Making.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011
2010
Encouraging Users to Behave Securely: Examining the Influence of Technical, Managerial, and Educational Controls on Users' Secure Behavior.
Proceedings of the International Conference on Information Systems, 2010
2009
The CMC Interactivity Model: How Interactivity Enhances Communication Quality and Process Satisfaction in Lean-Media Groups.
J. Manag. Inf. Syst., 2009