Jeffrey L. Jenkins

Affiliations:
  • Brigham Young University, Marriott School of Business, Provo, UT, USA


According to our database1, Jeffrey L. Jenkins authored at least 58 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Detecting Social Desirability Bias with Human-Computer Interaction: A Mouse-Tracking Study.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Embracing brain and behaviour: Designing programs of complementary neurophysiological and behavioural studies.
Inf. Syst. J., March, 2023

Getting What You Paid For: Assessing Participant Experience Parameters for Amazon Mechanical Turk (MTurk) Workers on Survey Response Quality.
Proceedings of the 46th MIPRO ICT and Electronics Convention, 2023

Detecting Goal-Oriented vs. Browsing Users Through Behavior Analysis.
Proceedings of the 46th MIPRO ICT and Electronics Convention, 2023

Measuring State and Trait Attention Control Using Mouse Movements.
Proceedings of the 46th MIPRO ICT and Electronics Convention, 2023

Typing Fast versus Typing Slow: Using Typing Dynamics to Reveal Authentic and Imposter Users.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2022
Digital Behavioral Biometrics and Privacy: Methods for Improving Business Processes without Compromising Customer Privacy.
Proceedings of the 45th Jubilee International Convention on Information, 2022

When is enough, enough? An Examination of Student Engagement when Watching Online Group Project Presentations.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

Thinking Fast or slow? Understanding Answering Behavior Using Dual-Process Theory through Mouse Cursor Movements.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

2021
Detecting Noncompliant Behavior in Organizations: How Online Survey Responses and Behaviors Reveal Risk.
J. Manag. Inf. Syst., 2021

Mitigating the Security Intention-Behavior Gap: The Moderating Role of Required Effort on the Intention-Behavior Relationship.
J. Assoc. Inf. Syst., 2021

2020
Using Accelerometer and Gyroscope Data in Common Mobile Devices to Assess Credibility.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
Framework of Affordances for Virtual Reality and Augmented Reality.
J. Manag. Inf. Syst., 2019

Sleight of Hand: Identifying Concealed Information by Monitoring Mouse-Cursor Movements.
J. Assoc. Inf. Syst., 2019

The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

How Online Patient-Physician Interaction Influences Patient Satisfaction.
Proceedings of the 40th International Conference on Information Systems, 2019

Introduction to the Minitrack on Human-Computer Interaction in the Digital Economy.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Improving Compassion Measurement in the Workforce by Analyzing Users' Mouse-Cursor Movements.
Proceedings of the 25th Americas Conference on Information Systems, 2019

2018
Tuning Out Security Warnings: A Longitudinal Examination of Habituation Through fMRI, Eye Tracking, and Field Experiments.
MIS Q., 2018

Improving Security Message Adherence through Improved Comprehension: Neural and Behavioral Insights.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
How Is Your User Feeling? Inferring Emotion Through Human-Computer interaction Devices.
MIS Q., 2017

Measuring Actual Behaviors in HCI Research - A call to Action and an Example.
AIS Trans. Hum. Comput. Interact., 2017

The Missing Framework for Virtually Assisted Activities.
Proceedings of the International Conference on Information Systems, 2017

Human-Computer Interaction Movement Indicators of Response Biases in Online Surveys.
Proceedings of the International Conference on Information Systems, 2017

Using Wearable Devices for Non-invasive, Inexpensive Physiological Data Collection.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

What Do We Really Know about How Habituation to Warnings Occurs Over Time?: A Longitudinal fMRI Study of Habituation and Polymorphic Warnings.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
More Than Meets the Eye: How Oculometric Behaviors Evolve Over the Course of Automated Deception Detection Interactions.
J. Manag. Inf. Syst., 2016

From Warning to Wallpaper: Why the Brain Habituates to Security Warnings and What Can Be Done About It.
J. Manag. Inf. Syst., 2016

More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable.
Inf. Syst. Res., 2016

How users perceive and respond to security messages: a NeuroIS research agenda and empirical study.
Eur. J. Inf. Syst., 2016

Your memory is working against you: How eye tracking and memory explain habituation to security warnings.
Decis. Support Syst., 2016

Serious Games: An Evaluation Framework and Case Study.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

When Training Gets Trumped: How dual-Task interference inhibits Security Training.
Proceedings of the 24th European Conference on Information Systems, 2016

Integrating Facial Cues of Threat into Security Warnings - An fMRI and Field Study.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

How Polymorphic Warnings Reduce Habituation in the Brain: Insights from an fMRI Study.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

A Multi-Experimental Examination of Analyzing Mouse Cursor Trajectories to Gauge Subject Uncertainty.
Proceedings of the 21st Americas Conference on Information Systems, 2015

The Impact of Technostress on Users' Responses to Security Warnings: A NeuroIS Study.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals.
Inf. Technol. Dev., 2014

Proposing the Affect-Trust Infusion Model (ATIM) to explain and predict the influence of high and low affect infusion on Web vendor trust.
Inf. Manag., 2014

Implicit and explicit training in the mitigation of cognitive bias through the use of a serious game.
Comput. Hum. Behav., 2014

Investigating the Effect of Insurance Fraud on Mouse Usage in Human-Computer Interactions.
Proceedings of the International Conference on Information Systems, 2014

2013
Detecting Deceptive Chat-Based Communication Using Typing Behavior and Message Cues.
ACM Trans. Manag. Inf. Syst., 2013

Simplicity is Bliss: Controlling Extraneous Cognitive Load in Online Security Training to Promote Secure Behavior.
J. Organ. End User Comput., 2013

What, I Shouldn't Have Done That? : The Influence of Training and Just-in-Time Reminders on Secure Behavior.
Proceedings of the International Conference on Information Systems, 2013

Exploring the Effect of Arousal and Valence on Mouse Interaction.
Proceedings of the International Conference on Information Systems, 2013

What Kind of Interventions Can Help Users from Falling for Phishing Attempts: A Research Proposal for Examining Stage-Appropriate Interventions.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resource Allocation.
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013

2012
Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers.
J. Assoc. Inf. Sci. Technol., 2012

E-Collaboration Media Use and Diversity Perceptions: An Evolutionary Perspective of Virtual Organizations.
Int. J. e Collab., 2012

On Not Falling for Phish: Examining Multiple Stages of Protective Behavior of Information System End-Users.
Proceedings of the International Conference on Information Systems, 2012

Embodied Agents and the Predictive Elaboration Model of Persuasion-The Ability to Tailor Embodied Agents to Users' Need for Cognition.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

Forget the Fluff: Examining How Media Richness Influences the Impact of Information Security Training on Secure Behavior.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment.
J. Manag. Inf. Syst., 2011

Get a Cue on IS Security Training: Explaining the Difference between how Security Cues and Security Arguments Improve Secure Behavior.
Proceedings of the International Conference on Information Systems, 2011

Knowledge Sourcing and Knowledge Consumption in Computer-Mediated Complex Decision Making.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
Encouraging Users to Behave Securely: Examining the Influence of Technical, Managerial, and Educational Controls on Users' Secure Behavior.
Proceedings of the International Conference on Information Systems, 2010

2009
The CMC Interactivity Model: How Interactivity Enhances Communication Quality and Process Satisfaction in Lean-Media Groups.
J. Manag. Inf. Syst., 2009


  Loading...