Jeffrey L. Jenkins
Title
Cited by
Cited by
Year
The CMC interactivity model: How interactivity enhances communication quality and process satisfaction in lean-media groups
PB Lowry, NC Romano, JL Jenkins, RW Guthrie
Journal of Management Information Systems 26 (1), 155-196, 2009
2232009
How is your user feeling? Inferring emotion through human-computer interaction devices
MT Hibbeln, JL Jenkins, C Schneider, J Valacich, M Weinmann
Mis Quarterly 41 (1), 1-21, 2017
130*2017
Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers
P Lowry, G Moody, A Vance, M Jensen, J Jenkins, T Wells
Journal of the American Society for Information Science and Technology 63 (4 …, 2011
1272011
Identifying deceptive answers to online questions through human-computer interaction data
JS Valacich, JL Jenkins
US Patent 10,524,713, 2020
1192020
How polymorphic warnings reduce habituation in the brain: Insights from an fMRI study
BB Anderson, CB Kirwan, JL Jenkins, D Eargle, S Howard, A Vance
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
1082015
Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time …
JL Jenkins, M Grimes, JG Proudfoot, PB Lowry
Information Technology for Development 20 (2), 196-213, 2014
892014
More harm than good? How messages that interrupt can make us vulnerable
JL Jenkins, BB Anderson, A Vance, CB Kirwan, D Eargle
Information Systems Research 27 (4), 880-896, 2016
852016
Design principles for special purpose, embodied, conversational intelligence with environmental sensors (SPECIES) agents
DC Derrick, JL Jenkins, JF Nunamaker Jr
AIS Transactions on Human-Computer Interaction 3 (2), 62-81, 2011
802011
How users perceive and respond to security messages: a NeuroIS research agenda and empirical study
B Brinton Anderson, A Vance, CB Kirwan, D Eargle, JL Jenkins
European Journal of Information Systems 25 (4), 364-390, 2016
642016
Implicit and explicit training in the mitigation of cognitive bias through the use of a serious game
NE Dunbar, CH Miller, BJ Adame, J Elizondo, SN Wilson, BL Lane, ...
Computers in Human Behavior 37, 307-318, 2014
592014
Tuning out security warnings: A longitudinal examination of habituation through fMRI, eye tracking, and field experiments
A Vance, JL Jenkins, BB Anderson, DK Bjornn, CB Kirwan
MIS Quarterly 42 (2), 355-380, 2018
572018
Detecting deceptive chat-based communication using typing behavior and message cues
DC Derrick, TO Meservy, JL Jenkins, JK Burgoon, JF Nunamaker Jr
ACM Transactions on Management Information Systems (TMIS) 4 (2), 1-21, 2013
532013
From warning to wallpaper: Why the brain habituates to security warnings and what can be done about it
BB Anderson, A Vance, CB Kirwan, JL Jenkins, D Eargle
Journal of Management Information Systems 33 (3), 713-743, 2016
522016
Effects of automated and participative decision support in computer-aided credibility assessment
ML Jensen, PB Lowry, JL Jenkins
Journal of Management Information Systems 28 (1), 201-234, 2011
502011
Framework of affordances for virtual reality and augmented reality
JH Steffen, JE Gaskin, TO Meservy, JL Jenkins, I Wolman
Journal of Management Information Systems 36 (3), 683-729, 2019
452019
What, I Shouldn’t Have Done That?: The Influence of Training and Just-in-Time Reminders on Secure Behavior
J Jenkins, A Durcikova
International Conference on Information Systems, 2013
352013
Your memory is working against you: How eye tracking and memory explain habituation to security warnings
BB Anderson, JL Jenkins, A Vance, CB Kirwan, D Eargle
Decision Support Systems 92, 3-13, 2016
332016
Exploring the Effect of Arousal and Valence on Mouse Interaction
M Grimes, J Jenkins, J Valacich
International Conference on Information Systems, 2013
312013
What do we really know about how habituation to warnings occurs over time? A longitudinal FMRI study of habituation and polymorphic warnings
A Vance, B Kirwan, D Bjornn, J Jenkins, BB Anderson
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
302017
Identifying Insider Threats through Monitoring Mouse Movements in Concealed Information Tests
JS Valacich, JL Jenkins, JF Nunamaker Jr, S Hariri, J Howie
2013 Hawaii International Conference on Computer and Systems Sciences. Maui …, 0
28*
The system can't perform the operation now. Try again later.
Articles 1–20