Bonnie Brinton Anderson

According to our database1, Bonnie Brinton Anderson authored at least 28 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Barriers to a cybersecurity career: Analysis across career stage and gender.
Comput. Secur., September, 2023

Embracing brain and behaviour: Designing programs of complementary neurophysiological and behavioural studies.
Inf. Syst. J., March, 2023

2019
The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

2018
Tuning Out Security Warnings: A Longitudinal Examination of Habituation Through fMRI, Eye Tracking, and Field Experiments.
MIS Q., 2018

Improving Security Message Adherence through Improved Comprehension: Neural and Behavioral Insights.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
What Do We Really Know about How Habituation to Warnings Occurs Over Time?: A Longitudinal fMRI Study of Habituation and Polymorphic Warnings.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
From Warning to Wallpaper: Why the Brain Habituates to Security Warnings and What Can Be Done About It.
J. Manag. Inf. Syst., 2016

More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable.
Inf. Syst. Res., 2016

How users perceive and respond to security messages: a NeuroIS research agenda and empirical study.
Eur. J. Inf. Syst., 2016

Your memory is working against you: How eye tracking and memory explain habituation to security warnings.
Decis. Support Syst., 2016

When Training Gets Trumped: How dual-Task interference inhibits Security Training.
Proceedings of the 24th European Conference on Information Systems, 2016

2015
Neural correlates of gender differences and color in distinguishing security warnings and legitimate websites: a neurosecurity study.
J. Cybersecur., 2015

How Polymorphic Warnings Reduce Habituation in the Brain: Insights from an fMRI Study.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

The Impact of Technostress on Users' Responses to Security Warnings: A NeuroIS Study.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
Using Measures of Risk Perception to Predict Information Security Behavior: Insights from Electroencephalography (EEG).
J. Assoc. Inf. Syst., 2014

Users Aren't (Necessarily) Lazy: Using NeuroIS to Explain Habituation to Security Warnings.
Proceedings of the International Conference on Information Systems, 2014

2012
Incorporating a robot into an autism therapy team.
IEEE Intell. Syst., 2012

2011
A case for low-dose robotics in autism therapy.
Proceedings of the 6th International Conference on Human Robot Interaction, 2011

2010
Detailed requirements for robots in autism therapy.
Proceedings of the IEEE International Conference on Systems, 2010

The Value of Distrust in Computer-Based Decision-Making Groups.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
Creating automated plans for Semantic Web applications through planning as model checking.
Expert Syst. Appl., 2009

2007
A Semantic Web data retrieval implementation with an adaptive model for supporting agent decision structures.
Electron. Commer. Res., 2007

2006
Standards and verification for fair-exchange and atomicity in e-commerce transactions.
Inf. Sci., 2006

The application of model checking for securing e-commerce transactions.
Commun. ACM, 2006

2005
Model checking for E-business control and assurance.
IEEE Trans. Syst. Man Cybern. Part C, 2005

Model checking for design and assurance of e-Business processes.
Decis. Support Syst., 2005

Dependability Auditing with Model Checking.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

2002
An estimation of the decision models of senior IS managers when evaluating the external quality of organizational software.
J. Syst. Softw., 2002


  Loading...