关注
Jeffrey L. Jenkins
Jeffrey L. Jenkins
Professor of Information Systems, Brigham Young University
在 byu.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Framework of affordances for virtual reality and augmented reality
JH Steffen, JE Gaskin, TO Meservy, JL Jenkins, I Wolman
Journal of management information systems 36 (3), 683-729, 2019
3302019
The CMC interactivity model: How interactivity enhances communication quality and process satisfaction in lean-media groups
PB Lowry, NC Romano, JL Jenkins, RW Guthrie
Journal of Management Information Systems 26 (1), 155-196, 2009
3192009
Identifying deceptive answers to online questions through human-computer interaction data
JS Valacich, JL Jenkins
US Patent 10,524,713, 2020
2642020
How is your user feeling? Inferring emotion through human–computer interaction devices
M Hibbeln, JL Jenkins, C Schneider, JS Valacich, M Weinmann
Mis Quarterly 41 (1), 1-22, 2017
2362017
Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers
P Lowry, G Moody, A Vance, M Jensen, J Jenkins, T Wells
Journal of the American Society for Information Science and Technology 63 (4 …, 2011
2122011
More harm than good? How messages that interrupt can make us vulnerable
JL Jenkins, BB Anderson, A Vance, CB Kirwan, D Eargle
Information Systems Research 27 (4), 880-896, 2016
1672016
How polymorphic warnings reduce habituation in the brain: Insights from an fMRI study
BB Anderson, CB Kirwan, JL Jenkins, D Eargle, S Howard, A Vance
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
1572015
Tuning out security warnings
A Vance, JL Jenkins, BB Anderson, DK Bjornn, CB Kirwan
MIS Quarterly 42 (2), 355-380, 2018
1562018
Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time …
JL Jenkins, M Grimes, JG Proudfoot, PB Lowry
Information Technology for Development 20 (2), 196-213, 2014
1312014
How users perceive and respond to security messages: a NeuroIS research agenda and empirical study
B Brinton Anderson, A Vance, CB Kirwan, D Eargle, JL Jenkins
European Journal of Information Systems 25 (4), 364-390, 2016
1262016
From warning to wallpaper: Why the brain habituates to security warnings and what can be done about it
BB Anderson, A Vance, CB Kirwan, JL Jenkins, D Eargle
Journal of Management Information Systems 33 (3), 713-743, 2016
1122016
Design principles for special purpose, embodied, conversational intelligence with environmental sensors (SPECIES) agents
DC Derrick, JL Jenkins, JF Nunamaker Jr
AIS Transactions on Human-Computer Interaction 3 (2), 62-81, 2011
1002011
Implicit and explicit training in the mitigation of cognitive bias through the use of a serious game
NE Dunbar, CH Miller, BJ Adame, J Elizondo, SN Wilson, BL Lane, ...
Computers in Human Behavior 37, 307-318, 2014
852014
Detecting deceptive chat-based communication using typing behavior and message cues
DC Derrick, TO Meservy, JL Jenkins, JK Burgoon, JF Nunamaker Jr
ACM Transactions on Management Information Systems (TMIS) 4 (2), 1-21, 2013
782013
Your memory is working against you: How eye tracking and memory explain habituation to security warnings
BB Anderson, JL Jenkins, A Vance, CB Kirwan, D Eargle
Decision Support Systems 92, 3-13, 2016
752016
What do we really know about how habituation to warnings occurs over time? A longitudinal fMRI study of habituation and polymorphic warnings
A Vance, B Kirwan, D Bjornn, J Jenkins, BB Anderson
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
632017
Effects of automated and participative decision support in computer-aided credibility assessment
ML Jensen, PB Lowry, JL Jenkins
Journal of Management Information Systems 28 (1), 201-234, 2011
632011
More than meets the eye: How oculometric behaviors evolve over the course of automated deception detection interactions
JG Proudfoot, JL Jenkins, JK Burgoon, JF Nunamaker Jr
Journal of Management Information Systems 33 (2), 332-360, 2016
542016
The fog of warnings: how non-essential notifications blur with security warnings
A Vance, D Eargle, JL Jenkins, CB Kirwan, BB Anderson
Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), 407-420, 2019
512019
What, I Shouldn’t Have Done That?: The Influence of Training and Just-in-Time Reminders on Secure Behavior
J Jenkins, A Durcikova
International Conference on Information Systems, 2013
472013
系统目前无法执行此操作,请稍后再试。
文章 1–20