Matthew L. Jensen

Orcid: 0000-0001-8711-1827

According to our database1, Matthew L. Jensen authored at least 60 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Exploring the Shifting Dynamics of Information Source Selection: Situational Characteristics and the Rise of Artificial Intelligence.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Phishing susceptibility across industries: The differential impact of influence techniques.
Comput. Secur., December, 2023

Learning not to take the bait: a longitudinal examination of digital training methods and overlearning on phishing susceptibility.
Eur. J. Inf. Syst., March, 2023

2022
Improving Phishing Reporting Using Security Gamification.
J. Manag. Inf. Syst., 2022

Effects of introducing an online community in a crowdsourcing contest platform.
Inf. Syst. J., 2022

An Empirical Examination of Peer vs. Expert Advice in Online Forums.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

2021
Efficiency and Exposure: Reconciling the Effects of Website Browsing Behaviors for Non-transactional Outcomes.
AIS Trans. Hum. Comput. Interact., June, 2021

Attribution of Responsibility after Failures within Platform Ecosystems.
J. Manag. Inf. Syst., 2021

A comparison of features in a crowdsourced phishing warning system.
Inf. Syst. J., 2021

Using susceptibility claims to motivate behaviour change in IT security.
Eur. J. Inf. Syst., 2021

Expert vs. Peer: The Role of Situational Characteristics in Electronic Networks of Practice.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Introduction to the Minitrack on Collaboration in Online Communities: Information Processing and Decision Making.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Searching for Expert or Peer Advice in Online Forums.
Proceedings of the 27th Americas Conference on Information Systems, 2021

2019
Training Law Enforcement Officers to Identify Reliable Deception Cues With a Serious Digital Game.
Int. J. Game Based Learn., 2019

2018
Reliable deception cues training in an interactive video game.
Comput. Hum. Behav., 2018

2017
Prominence and Interpretation of Online Conflict of Interest Disclosures.
MIS Q., 2017

Training to Mitigate Phishing Attacks Using Mindfulness Techniques.
J. Manag. Inf. Syst., 2017

Mitigation of Cognitive Bias with a Serious Game: Two Experiments Testing Feedback Timing and Source.
Int. J. Game Based Learn., 2017

Reactions to ideological websites: The impact of emotional appeals, credibility, and pre-existing attitudes.
Comput. Hum. Behav., 2017

Ideological lens matters: Credibility heuristics, pre-existing attitudes, and reactions to messages on ideological websites.
Comput. Hum. Behav., 2017

Combating Phishing Attacks: A Knowledge Management Approach.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
Social Categorization, Moral Disengagement, and Credibility of Ideological Group Websites.
J. Media Psychol. Theor. Methods Appl., 2016

Mitigating bias blind spot via a serious video game.
Comput. Hum. Behav., 2016

Exploring Failure and Engagement in a Complex Digital Training Game: A Multi-method Examination.
AIS Trans. Hum. Comput. Interact., 2016

Serious Games: An Evaluation Framework and Case Study.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
Is Interactional Dissynchrony a Clue to Deception? Insights From Automated Analysis of Nonverbal Visual Cues.
IEEE Trans. Cybern., 2015

Exploring Knowledge Filtering Processes in Electronic Networks of Practice.
J. Manag. Inf. Syst., 2015

Effects of Veracity, Modality, and Sanctioning on Credibility Assessment During Mediated and Unmediated Interviews.
Commun. Res., 2015

Ideological group persuasion: A within-person study of how violence, interactivity, and credibility features influence online persuasion.
Comput. Hum. Behav., 2015

Complacency and Intentionality in IT Use and Continuance.
AIS Trans. Hum. Comput. Interact., 2015

2014
Fear Appeals, Message Processing Cues, and Credibility in the Websites of Violent, Ideological, and Nonideological Groups.
J. Comput. Mediat. Commun., 2014

Research Note - Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance.
Inf. Syst. Res., 2014

Evaluation of Competing Candidate Solutions in Electronic Networks of Practice.
Inf. Syst. Res., 2014

Empowered by Persuasive Deception.
Commun. Res., 2014

Organizational balancing of website interactivity and control: An examination of ideological groups and the duality of goals.
Comput. Hum. Behav., 2014

Implicit and explicit training in the mitigation of cognitive bias through the use of a serious game.
Comput. Hum. Behav., 2014

Credibility and Interactivity: Persuasive Components of Ideological Group Websites.
Proceedings of the Persuasive Technology - 9th International Conference, 2014

Mitigating Cognitive Bias through the Use of Serious Games: Effects of Feedback.
Proceedings of the Persuasive Technology - 9th International Conference, 2014

Dissecting the Process of Knowledge Filtering in Electronic Networks of Practice.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

Impacts of Information Systems on Decision-Making.
Proceedings of the Computing Handbook, 2014

2013
Credibility of Anonymous Online Product Reviews: A Language Expectancy Perspective.
J. Manag. Inf. Syst., 2013

MACBETH: Development of a Training Game for the Mitigation of Cognitive Bias.
Int. J. Game Based Learn., 2013

Automated analysis of interactional synchrony using robust facial tracking and expression recognition.
Proceedings of the 10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition, 2013

Don't Lie to Me: The Impact of Deception on Vocalic and Linguistic Synchrony.
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013

Social Media on Violent Ideological Group Websites.
Proceedings of the 19th Americas Conference on Information Systems, 2013

2012
Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers.
J. Assoc. Inf. Sci. Technol., 2012

2011
Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment.
J. Manag. Inf. Syst., 2011

The Effects of Compensation Disclosure and Consensus on Perceptions of Online Product Reviews.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

The Differential Effects Of Technological Cues On Elaboration.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

2010
Technology Dominance in Complex Decision Making: The Case of Aided Credibility Assessment.
J. Manag. Inf. Syst., 2010

Judging the Credibility of Information Gathered from Face-to-Face Interactions.
ACM J. Data Inf. Qual., 2010

2009
Detecting Concealment of Intent in Transportation Screening: A Proof of Concept.
IEEE Trans. Intell. Transp. Syst., 2009

2008
Video-Based Deception Detection.
Proceedings of the Intelligence and Security Informatics, Techniques and Applications, 2008

2007
The Effects of an Expert System on Novice and Professional Decision Making with Application in Deception Detection.
PhD thesis, 2007

Computer-aided Credibility Assessment by Novice Lie-Catchers.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2005
Deception Detection through Automatic, Unobtrusive Analysis of Nonverbal Behavior.
IEEE Intell. Syst., 2005

Automatic Extraction of Deceptive Behavioral Cues from Video.
Proceedings of the Intelligence and Security Informatics, 2005

HMM-Based Deception Recognition from Visual Cues.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

Blob Analysis of the Head and Hands: A Method for Deception Detection.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

An Approach for Intent Identification by Building on Deception Detection.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005


  Loading...