Justin Scott Giboney

Orcid: 0000-0001-6460-723X

According to our database1, Justin Scott Giboney authored at least 35 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Perception of "This is Not a Game": Definition and Measurement.
Int. J. Hum. Comput. Interact., September, 2024

Student Interaction with Generative AI: An Exploration of an Emergent Information-Search Process.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Barriers to a cybersecurity career: Analysis across career stage and gender.
Comput. Secur., September, 2023

Know your enemy: Conversational agents for security, education, training, and awareness at scale.
Comput. Secur., June, 2023

2022
Design of a Chatbot Social Engineering Victim.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

2021
Deciding Whether and How to Deploy Chatbots.
MIS Q. Executive, 2021

Mental models and expectation violations in conversational AI interactions.
Decis. Support Syst., 2021

The Abacus: A New Architecture for Policy-based Authorization.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

A Social Engineering Victim Chatbot to Teach Adversarial Thinking.
Proceedings of the 27th Americas Conference on Information Systems, 2021

2020
The impact of chatbot conversational skill on engagement and perceived humanness.
J. Manag. Inf. Syst., 2020

2019
Special Section: Engineering Artifacts and Processes of Information Systems.
J. Manag. Inf. Syst., 2019

The effect of conversational agent skill on user behavior during deception.
Comput. Hum. Behav., 2019

Designing Authentic Cybersecurity Learning Experiences: Lessons from the Cybermatics Playable Case Study.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Theory of Experiential Career Exploration Technology (TECET): Increasing cybersecurity career interest through playable case studies.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
The influence of conversational agent embodiment and conversational relevance on socially desirable responding.
Decis. Support Syst., 2018

Training Future Cybersecurity Professionals in Spear Phishing using SiEVE.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018

The Influence of Conversational Agents on Socially Desirable Responding.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

An Investigation of Conversational Agent Relevance, Presence, and Engagement.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
Creating High-Value Real-World Impact through Systematic Programs of Research.
MIS Q., 2017

Special Issue: Creating Social Value with Information.
J. Manag. Inf. Syst., 2017

Examining the learning effects of live streaming video game instruction over Twitch.
Comput. Hum. Behav., 2017

2016
Special Issue: Information Systems for Deception Detection.
J. Manag. Inf. Syst., 2016

Special Issue: Designing Tools to Answer Great Information Systems Research Questions.
J. Manag. Inf. Syst., 2016

Application of Expectancy Violations Theory to communication with and judgments about embodied agents during a decision-making task.
Int. J. Hum. Comput. Stud., 2016

The Security Expertise Assessment Measure (SEAM): Developing a scale for hacker expertise.
Comput. Secur., 2016

2015
Special Issue: On the Contributions of Applied Science/Engineering Research to Information Systems.
J. Manag. Inf. Syst., 2015

User acceptance of knowledge-based system recommendations: Explanations, arguments, and fit.
Decis. Support Syst., 2015

2014
Facilitating Natural Conversational Agent Interactions: Lessons from a Deception Experiment.
Proceedings of the International Conference on Information Systems, 2014

An Individual's Views of the Right to Privacy of Other Individuals, Companies, and Governments: A Theoretical Perspective.
Proceedings of the 20th Americas Conference on Information Systems, 2014

2013
Breaking out of the Design Science Box: High-Value Impact Through Multidisciplinary Design Science Programs of Research.
Proceedings of the 19th Americas Conference on Information Systems, 2013

2012
Establishing a foundation for automated human credibility screening.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

User Acceptance of Knowledge-Based System Recommendations: Explanations, Arguments, and Fit-Research in Progress.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
Overview and Guidance on Agile Development in Large Organizations.
Commun. Assoc. Inf. Syst., 2011

Trends in Phishing Attacks: Suggestions for Future Research.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

2010
The Value of Distrust in Computer-Based Decision-Making Groups.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010


  Loading...