Follow
Jeffrey L. Jenkins
Title
Cited by
Cited by
Year
The CMC interactivity model: How interactivity enhances communication quality and process satisfaction in lean-media groups
PB Lowry, NC Romano, JL Jenkins, RW Guthrie
Journal of Management Information Systems 26 (1), 155-196, 2009
3052009
Framework of affordances for virtual reality and augmented reality
JH Steffen, JE Gaskin, TO Meservy, JL Jenkins, I Wolman
Journal of management information systems 36 (3), 683-729, 2019
2672019
Identifying deceptive answers to online questions through human-computer interaction data
JS Valacich, JL Jenkins
US Patent 10,524,713, 2020
2612020
How is your user feeling? Inferring emotion through human–computer interaction devices
M Hibbeln, JL Jenkins, C Schneider, JS Valacich, M Weinmann
Mis Quarterly 41 (1), 1-22, 2017
2222017
Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers
P Lowry, G Moody, A Vance, M Jensen, J Jenkins, T Wells
Journal of the American Society for Information Science and Technology 63 (4 …, 2011
1942011
More harm than good? How messages that interrupt can make us vulnerable
JL Jenkins, BB Anderson, A Vance, CB Kirwan, D Eargle
Information Systems Research 27 (4), 880-896, 2016
1492016
How polymorphic warnings reduce habituation in the brain: Insights from an fMRI study
BB Anderson, CB Kirwan, JL Jenkins, D Eargle, S Howard, A Vance
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
1472015
Tuning Out Security Warnings
A Vance, JL Jenkins, BB Anderson, DK Bjornn, CB Kirwan
MIS Quarterly 42 (2), 355-380, 2018
1322018
Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time …
JL Jenkins, M Grimes, JG Proudfoot, PB Lowry
Information Technology for Development 20 (2), 196-213, 2014
1242014
How users perceive and respond to security messages: a NeuroIS research agenda and empirical study
B Brinton Anderson, A Vance, CB Kirwan, D Eargle, JL Jenkins
European Journal of Information Systems 25 (4), 364-390, 2016
1122016
From warning to wallpaper: Why the brain habituates to security warnings and what can be done about it
BB Anderson, A Vance, CB Kirwan, JL Jenkins, D Eargle
Journal of Management Information Systems 33 (3), 713-743, 2016
982016
Design principles for special purpose, embodied, conversational intelligence with environmental sensors (SPECIES) agents
DC Derrick, JL Jenkins, JF Nunamaker Jr
AIS Transactions on Human-Computer Interaction 3 (2), 62-81, 2011
912011
Implicit and explicit training in the mitigation of cognitive bias through the use of a serious game
NE Dunbar, CH Miller, BJ Adame, J Elizondo, SN Wilson, BL Lane, ...
Computers in Human Behavior 37, 307-318, 2014
802014
Detecting deceptive chat-based communication using typing behavior and message cues
DC Derrick, TO Meservy, JL Jenkins, JK Burgoon, JF Nunamaker Jr
ACM Transactions on Management Information Systems (TMIS) 4 (2), 1-21, 2013
732013
Your memory is working against you: How eye tracking and memory explain habituation to security warnings
BB Anderson, JL Jenkins, A Vance, CB Kirwan, D Eargle
Decision Support Systems 92, 3-13, 2016
622016
Effects of automated and participative decision support in computer-aided credibility assessment
ML Jensen, PB Lowry, JL Jenkins
Journal of Management Information Systems 28 (1), 201-234, 2011
622011
What do we really know about how habituation to warnings occurs over time? A longitudinal fMRI study of habituation and polymorphic warnings
A Vance, B Kirwan, D Bjornn, J Jenkins, BB Anderson
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
582017
More than meets the eye: How oculometric behaviors evolve over the course of automated deception detection interactions
JG Proudfoot, JL Jenkins, JK Burgoon, JF Nunamaker Jr
Journal of Management Information Systems 33 (2), 332-360, 2016
482016
What, I Shouldn’t Have Done That?: The Influence of Training and Just-in-Time Reminders on Secure Behavior
J Jenkins, A Durcikova
International Conference on Information Systems, 2013
442013
The fog of warnings: how non-essential notifications blur with security warnings
A Vance, D Eargle, JL Jenkins, CB Kirwan, BB Anderson
Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), 407-420, 2019
422019
The system can't perform the operation now. Try again later.
Articles 1–20