Bonnie Brinton Anderson
Bonnie Brinton Anderson
Professor of Information Systems, Brigham Young University
Verified email at
Cited by
Cited by
Using measures of risk perception to predict information security behavior: Insights from electroencephalography (EEG)
A Vance, BB Anderson, CB Kirwan, D Eargle
Journal of the Association for Information Systems 15 (10), 2, 2014
How polymorphic warnings reduce habituation in the brain: Insights from an fMRI study
BB Anderson, CB Kirwan, JL Jenkins, D Eargle, S Howard, A Vance
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
More harm than good? How messages that interrupt can make us vulnerable
JL Jenkins, BB Anderson, A Vance, CB Kirwan, D Eargle
Information Systems Research 27 (4), 880-896, 2016
How users perceive and respond to security messages: a NeuroIS research agenda and empirical study
B Brinton Anderson, A Vance, CB Kirwan, D Eargle, JL Jenkins
European Journal of Information Systems 25 (4), 364-390, 2016
Tuning out security warnings: A longitudinal examination of habituation through fMRI, eye tracking, and field experiments
A Vance, JL Jenkins, BB Anderson, DK Bjornn, CB Kirwan
MIS Quarterly 42 (2), 355-380, 2018
From warning to wallpaper: Why the brain habituates to security warnings and what can be done about it
BB Anderson, A Vance, CB Kirwan, JL Jenkins, D Eargle
Journal of Management Information Systems 33 (3), 713-743, 2016
Model checking for design and assurance of e-Business processes
BB Anderson, JV Hansen, PB Lowry, SL Summers
Decision Support Systems 39 (3), 333-344, 2005
Users aren’t (necessarily) lazy: Using neurois to explain habituation to security warnings
B Anderson, T Vance, B Kirwan, D Eargle, S Howard
Your memory is working against you: How eye tracking and memory explain habituation to security warnings
BB Anderson, JL Jenkins, A Vance, CB Kirwan, D Eargle
Decision Support Systems 92, 3-13, 2016
Model checking for E-business control and assurance
BB Anderson, JV Hansen, PB Lowry, SL Summers
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2005
What do we really know about how habituation to warnings occurs over time? A longitudinal FMRI study of habituation and polymorphic warnings
A Vance, B Kirwan, D Bjornn, J Jenkins, BB Anderson
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
of e-Business processes
BB Anderson, JV Hansen, PB Lowry, SL Summers
An estimation of the decision models of senior IS managers when evaluating the external quality of organizational software
BB Anderson, A Bajaj, W Gorr
Journal of systems and software 61 (1), 59-75, 2002
The application of model checking for securing e-commerce transactions
BB Anderson, JV Hansen, PB Lowry, SL Summers
Communications of the ACM 49 (6), 97-101, 2006
Standards and verification for fair-exchange and atomicity in e-commerce transactions
BB Anderson, JV Hansen, PB Lowry, SL Summers
Information Sciences 176 (8), 1045-1066, 2006
It all blurs together: How the effects of habituation generalize across system notifications and security warnings
BB Anderson, A Vance, JL Jenkins, CB Kirwan, D Bjornn
Information Systems and Neuroscience, 43-49, 2017
The fog of warnings: how non-essential notifications blur with security warnings
A Vance, D Eargle, JL Jenkins, CB Kirwan, BB Anderson
Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019), 407-420, 2019
Creating automated plans for semantic web applications through planning as model checking
BB Anderson, JV Hansen, PB Lowry
Expert Systems with Applications 36 (7), 10595-10603, 2009
Is your susceptibility to phishing dependent on your memory
B Anderson, A Vance, D Eargle
Proceedings of the Eighth Pre-ICIS Workshop on Information Security and …, 2013
Using fMRI to measure stimulus generalization of software notification to security warnings
B Kirwan, B Anderson, D Eargle, J Jenkins, A Vance
Information systems and neuroscience, 93-99, 2020
The system can't perform the operation now. Try again later.
Articles 1–20