Mark Grimes
Cited by
Cited by
Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time …
JL Jenkins, M Grimes, JG Proudfoot, PB Lowry
Information Technology for Development 20 (2), 196-213, 2014
The influence of conversational agent embodiment and conversational relevance on socially desirable responding
RM Schuetzler, JS Giboney, GM Grimes, JF Nunamaker Jr
Decision Support Systems 114, 94-102, 2018
Facilitating natural conversational agent interactions: Lessons from a deception experiment
RM Schuetzler, M Grimes, JS Giboney, J Buckman
An investigation of conversational agent relevance, presence, and engagement
RM Schuetzler, GM Grimes, JS Giboney
The impact of chatbot conversational skill on engagement and perceived humanness
RM Schuetzler, GM Grimes, J Scott Giboney
Journal of Management Information Systems 37 (3), 875-900, 2020
The influence of conversational agents on socially desirable responding
RM Schuetzler, GM Grimes, JS Giboney, JF Nunamaker Jr
Proceedings of the 51st Hawaii International Conference on System Sciences, 283, 2018
The effect of conversational agent skill on user behavior during deception
RM Schuetzler, GM Grimes, JS Giboney
Computers in Human Behavior 97, 250-259, 2019
Exploring the Effect of Arousal and Valence on Mouse Interaction
M Grimes, J Jenkins, J Valacich
International Conference on Information Systems, 2013
Quality matters: Evoking subjective norms and coping appraisals by system design to increase security intentions
M Grimes, J Marquardson
Decision Support Systems 119, 23-34, 2019
Mind over mouse: The effect of cognitive load on mouse movement behavior
M Grimes, J Valacich
Deciding Whether and How to Deploy Chatbots.
RM Schuetzler, GM Grimes, JS Giboney, HK Rosser
MIS Quarterly Executive 20 (1), 2021
Mental models and expectation violations in conversational AI interactions
GM Grimes, RM Schuetzler, JS Giboney
Decision Support Systems 144, 113515, 2021
Sleight of hand: Identifying concealed information by monitoring mouse-cursor movements
JL Jenkins, J Proudfoot, JS Valacich, GM Grimes, JF Nunamaker Jr
Journal of the Association for Information Systems 20 (1), 3, 2019
Assessing Credibility by Monitoring Changes in Typing Behavior: The Keystroke Dynamics Deception Detection Model
GM Grimes, JL Jenkins, JS Valacich
HICSS-46 Symposium on Credibility Assessment and Information Quality in …, 2013
Reasons and Resolve to Cross the Line
M Grimes, E Golob, A Durcikova, J Nuamaker
Tucson, AZ: University of Arizona National Center for Border Security and …, 2013
Broken windows, bad passwords: Influencing secure user behavior via website design
M Grimes, J Marquardson, J Nunamaker
Supporting Better Decisions: How Order Effects Influence Decision Support System Alignment
J Marquardson, M Grimes
Interacting with Computers 30 (6), 469-479, 2018
Analysis of human computer interaction behavior for assessment of affect, cognitive load, and credibility
GM Grimes
The University of Arizona, 2015
Observations on Strategies for Goofspiel
M Grimes, M Dror
IEEE Conference on Computational Intelligence in Games, 2013
Design of a Chatbot Social Engineering Victim
R Schuetzler, J Giboney, G Grimes
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
The system can't perform the operation now. Try again later.
Articles 1–20