Jeffrey L. Jenkins
Title
Cited by
Cited by
Year
The CMC interactivity model: How interactivity enhances communication quality and process satisfaction in lean-media groups
PB Lowry, NC Romano, JL Jenkins, RW Guthrie
Journal of Management Information Systems 26 (1), 155-196, 2009
2152009
How is your user feeling? Inferring emotion through human-computer interaction devices
MT Hibbeln, JL Jenkins, C Schneider, J Valacich, M Weinmann
Mis Quarterly 41 (1), 1-21, 2017
123*2017
Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers
P Lowry, G Moody, A Vance, M Jensen, J Jenkins, T Wells
Journal of the American Society for Information Science and Technology 63 (4 …, 2011
1212011
Identifying deceptive answers to online questions through human-computer interaction data
JS Valacich, JL Jenkins
US Patent 10,524,713, 2020
1052020
How polymorphic warnings reduce habituation in the brain: Insights from an fMRI study
BB Anderson, CB Kirwan, JL Jenkins, D Eargle, S Howard, A Vance
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
1012015
Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time …
JL Jenkins, M Grimes, JG Proudfoot, PB Lowry
Information Technology for Development 20 (2), 196-213, 2014
872014
More harm than good? How messages that interrupt can make us vulnerable
JL Jenkins, BB Anderson, A Vance, CB Kirwan, D Eargle
Information Systems Research 27 (4), 880-896, 2016
832016
Design principles for special purpose, embodied, conversational intelligence with environmental sensors (SPECIES) agents
DC Derrick, JL Jenkins, JF Nunamaker Jr
AIS Transactions on Human-Computer Interaction 3 (2), 62-81, 2011
792011
How users perceive and respond to security messages: a NeuroIS research agenda and empirical study
B Brinton Anderson, A Vance, CB Kirwan, D Eargle, JL Jenkins
European Journal of Information Systems 25 (4), 364-390, 2016
582016
Detecting deceptive chat-based communication using typing behavior and message cues
DC Derrick, TO Meservy, JL Jenkins, JK Burgoon, JF Nunamaker Jr
ACM Transactions on Management Information Systems (TMIS) 4 (2), 1-21, 2013
532013
Implicit and explicit training in the mitigation of cognitive bias through the use of a serious game
NE Dunbar, CH Miller, BJ Adame, J Elizondo, SN Wilson, BL Lane, ...
Computers in Human Behavior 37, 307-318, 2014
522014
Tuning out security warnings: A longitudinal examination of habituation through fMRI, eye tracking, and field experiments
A Vance, JL Jenkins, BB Anderson, DK Bjornn, CB Kirwan
MIS Quarterly 42 (2), 355-380, 2018
512018
Effects of automated and participative decision support in computer-aided credibility assessment
ML Jensen, PB Lowry, JL Jenkins
Journal of Management Information Systems 28 (1), 201-234, 2011
512011
From warning to wallpaper: Why the brain habituates to security warnings and what can be done about it
BB Anderson, A Vance, CB Kirwan, JL Jenkins, D Eargle
Journal of Management Information Systems 33 (3), 713-743, 2016
502016
Using postoperative cardiac Troponin-I (cTi) levels to detect myocardial ischaemia in patients undergoing vascular surgery
N Andrews, J Jenkins, G Andrews, P Walker
Cardiovascular Surgery 9 (3), 254-265, 2001
412001
What, I Shouldn’t Have Done That?: The Influence of Training and Just-in-Time Reminders on Secure Behavior
J Jenkins, A Durcikova
International Conference on Information Systems, 2013
332013
Exploring the Effect of Arousal and Valence on Mouse Interaction
M Grimes, J Jenkins, J Valacich
International Conference on Information Systems, 2013
312013
Framework of affordances for virtual reality and augmented reality
JH Steffen, JE Gaskin, TO Meservy, JL Jenkins, I Wolman
Journal of Management Information Systems 36 (3), 683-729, 2019
302019
Your memory is working against you: How eye tracking and memory explain habituation to security warnings
BB Anderson, JL Jenkins, A Vance, CB Kirwan, D Eargle
Decision Support Systems 92, 3-13, 2016
292016
Identifying Insider Threats through Monitoring Mouse Movements in Concealed Information Tests
JS Valacich, JL Jenkins, JF Nunamaker Jr, S Hariri, J Howie
2013 Hawaii International Conference on Computer and Systems Sciences. Maui …, 0
28*
The system can't perform the operation now. Try again later.
Articles 1–20