Follow
Jeffrey L. Jenkins
Title
Cited by
Cited by
Year
The CMC interactivity model: How interactivity enhances communication quality and process satisfaction in lean-media groups
PB Lowry, NC Romano, JL Jenkins, RW Guthrie
Journal of Management Information Systems 26 (1), 155-196, 2009
2912009
Identifying deceptive answers to online questions through human-computer interaction data
JS Valacich, JL Jenkins
US Patent 10,524,713, 2020
2482020
Framework of affordances for virtual reality and augmented reality
JH Steffen, JE Gaskin, TO Meservy, JL Jenkins, I Wolman
Journal of Management Information Systems 36 (3), 683-729, 2019
2162019
How is your user feeling? Inferring emotion through human–computer interaction devices
M Hibbeln, JL Jenkins, C Schneider, JS Valacich, M Weinmann
Mis Quarterly 41 (1), 1-22, 2017
2102017
Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers
P Lowry, G Moody, A Vance, M Jensen, J Jenkins, T Wells
Journal of the American Society for Information Science and Technology 63 (4 …, 2011
1862011
How polymorphic warnings reduce habituation in the brain: Insights from an fMRI study
BB Anderson, CB Kirwan, JL Jenkins, D Eargle, S Howard, A Vance
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
1432015
More harm than good? How messages that interrupt can make us vulnerable
JL Jenkins, BB Anderson, A Vance, CB Kirwan, D Eargle
Information Systems Research 27 (4), 880-896, 2016
1392016
Tuning out security warnings: A longitudinal examination of habituation through fMRI, eye tracking, and field experiments
A Vance, JL Jenkins, BB Anderson, DK Bjornn, CB Kirwan
The Authors, 2018
1232018
Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time …
JL Jenkins, M Grimes, JG Proudfoot, PB Lowry
Information Technology for Development 20 (2), 196-213, 2014
1222014
How users perceive and respond to security messages: a NeuroIS research agenda and empirical study
B Brinton Anderson, A Vance, CB Kirwan, D Eargle, JL Jenkins
European Journal of Information Systems 25 (4), 364-390, 2016
1042016
From warning to wallpaper: Why the brain habituates to security warnings and what can be done about it
BB Anderson, A Vance, CB Kirwan, JL Jenkins, D Eargle
Journal of Management Information Systems 33 (3), 713-743, 2016
932016
Design principles for special purpose, embodied, conversational intelligence with environmental sensors (SPECIES) agents
DC Derrick, JL Jenkins, JF Nunamaker Jr
AIS Transactions on Human-Computer Interaction 3 (2), 62-81, 2011
902011
Implicit and explicit training in the mitigation of cognitive bias through the use of a serious game
NE Dunbar, CH Miller, BJ Adame, J Elizondo, SN Wilson, BL Lane, ...
Computers in Human Behavior 37, 307-318, 2014
772014
Detecting deceptive chat-based communication using typing behavior and message cues
DC Derrick, TO Meservy, JL Jenkins, JK Burgoon, JF Nunamaker Jr
ACM Transactions on Management Information Systems (TMIS) 4 (2), 1-21, 2013
692013
Effects of automated and participative decision support in computer-aided credibility assessment
ML Jensen, PB Lowry, JL Jenkins
Journal of Management Information Systems 28 (1), 201-234, 2011
622011
Your memory is working against you: How eye tracking and memory explain habituation to security warnings
BB Anderson, JL Jenkins, A Vance, CB Kirwan, D Eargle
Decision Support Systems 92, 3-13, 2016
572016
What do we really know about how habituation to warnings occurs over time? A longitudinal fMRI study of habituation and polymorphic warnings
A Vance, B Kirwan, D Bjornn, J Jenkins, BB Anderson
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
532017
More than meets the eye: How oculometric behaviors evolve over the course of automated deception detection interactions
JG Proudfoot, JL Jenkins, JK Burgoon, JF Nunamaker Jr
Journal of Management Information Systems 33 (2), 332-360, 2016
462016
What, I Shouldn’t Have Done That?: The Influence of Training and Just-in-Time Reminders on Secure Behavior
J Jenkins, A Durcikova
International Conference on Information Systems, 2013
442013
Exploring the Effect of Arousal and Valence on Mouse Interaction
M Grimes, J Jenkins, J Valacich
International Conference on Information Systems, 2013
382013
The system can't perform the operation now. Try again later.
Articles 1–20