default search action
Jeffrey L. Jenkins
Person information
- affiliation: Brigham Young University, Marriott School of Business, Provo, UT, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]David W. Wilson, Joseph S. Valacich, Jeffrey L. Jenkins:
Behaviorally Measuring Usability by Analyzing Users' Mouse Movement Efficiency. MIS Q. 48(3): 979-1008 (2024) - [c45]Paul A. Weisgarber, Joseph S. Valacich, Jeffrey L. Jenkins, David W. Wilson, David Kim, Manasvi Kumar:
Detecting Social Desirability Bias in Polls: A Digital Behavioral Biometric Approach. AMCIS 2024 - [c44]Christoph Schneider, Joseph S. Valacich, Jeffrey L. Jenkins:
Introduction to the Minitrack on Human-Computer Interaction in the Digital Economy. HICSS 2024: 4652-4654 - [c43]Paul Weisgarber, Joseph S. Valacich, Jeffrey L. Jenkins, David Kim, Manasvi Kumar:
Detecting Social Desirability Bias with Human-Computer Interaction: A Mouse-Tracking Study. HICSS 2024: 4673-4682 - [c42]Paul A. Weisgarber, Joseph S. Valacich, Jeffrey L. Jenkins, David W. Wilson, David Kim, Manasvi Kumar:
Detecting Faking in Hiring Assessments: A Digital Behavioral Biometric Approach. ICIS 2024 - [c41]Joseph S. Valacich, Jeffrey L. Jenkins, David W. Wilson, P. A. Weisgarber, David Kim, Manasvi Kumar:
Navigating Ethical Oversight in Computing Research: A Case for Umbrella Protocols. MIPRO 2024: 1344-1349 - 2023
- [j22]C. Brock Kirwan, Anthony Vance, Jeffrey L. Jenkins, Bonnie Brinton Anderson:
Embracing brain and behaviour: Designing programs of complementary neurophysiological and behavioural studies. Inf. Syst. J. 33(2): 324-349 (2023) - [c40]Jeffrey L. Jenkins, Christoph Schneider, Joseph S. Valacich:
Introduction to the Minitrack on Human-Computer Interaction in the Digital Economy. HICSS 2023: 4046 - [c39]David Kim, Joseph S. Valacich, Jeffrey L. Jenkins, Manasvi Kumar:
Typing Fast versus Typing Slow: Using Typing Dynamics to Reveal Authentic and Imposter Users. HICSS 2023: 4047-4056 - [c38]David W. Wilson, Parker Burnett, Joseph S. Valacich, Jeffrey L. Jenkins:
Human or AI? Using Digital Behavior to Verify Essay Authorship. ICIS 2023 - [c37]David W. Wilson, Jeffrey L. Jenkins, Joe S. Valacich:
Measuring State and Trait Attention Control Using Mouse Movements. MIPRO 2023: 1-6 - [c36]Manasvi Kumar, David Kim, P. A. Weisgarber, Joe S. Valacich, Jeffrey L. Jenkins:
Getting What You Paid For: Assessing Participant Experience Parameters for Amazon Mechanical Turk (MTurk) Workers on Survey Response Quality. MIPRO 2023: 7-12 - [c35]Jeffrey L. Jenkins, A. Denison, Joe S. Valacich, David W. Wilson:
Detecting Goal-Oriented vs. Browsing Users Through Behavior Analysis. MIPRO 2023: 13-18 - 2022
- [c34]David Kim, Joseph S. Valacich, Jeffrey L. Jenkins, Manasvi Kumar, Alan R. Dennis:
Thinking Fast or slow? Understanding Answering Behavior Using Dual-Process Theory through Mouse Cursor Movements. HICSS 2022: 1-10 - [c33]Manasvi Kumar, Joseph S. Valacich, Jeffrey L. Jenkins, David Kim:
When is enough, enough? An Examination of Student Engagement when Watching Online Group Project Presentations. HICSS 2022: 1-10 - [c32]Joseph S. Valacich, Christoph Schneider, Jeffrey L. Jenkins:
Introduction to the Minitrack on Human-Computer Interaction in the Digital Economy. HICSS 2022: 1-2 - [c31]Joseph S. Valacich, Jeffrey L. Jenkins, Dragan Cisic:
Digital Behavioral Biometrics and Privacy: Methods for Improving Business Processes without Compromising Customer Privacy. MIPRO 2022: 1019-1024 - 2021
- [j21]Jeffrey L. Jenkins, Alexandra Durcikova, Jay F. Nunamaker Jr.:
Mitigating the Security Intention-Behavior Gap: The Moderating Role of Required Effort on the Intention-Behavior Relationship. J. Assoc. Inf. Syst. 22(1): 1 (2021) - [j20]Jeffrey L. Jenkins, Joseph S. Valacich, Aaron F. Zimbelman, Mark F. Zimbelman:
Detecting Noncompliant Behavior in Organizations: How Online Survey Responses and Behaviors Reveal Risk. J. Manag. Inf. Syst. 38(3): 704-731 (2021) - [c30]Christoph Schneider, Jeffrey L. Jenkins, Joseph S. Valacich:
Introduction to the Minitrack on Human-Computer Interaction in the Digital Economy. HICSS 2021: 1-2 - 2020
- [c29]Joseph S. Valacich, Jeffrey L. Jenkins, Michael D. Byrd, David Kim, Manasvi Kumar, Parker A. Williams:
Using Accelerometer and Gyroscope Data in Common Mobile Devices to Assess Credibility. AMCIS 2020 - [c28]Christoph Schneider, Jeffrey L. Jenkins, Joseph S. Valacich:
Introduction to the Minitrack on Human-Computer Interaction in the Digital Economy. HICSS 2020: 1
2010 – 2019
- 2019
- [j19]Jeffrey L. Jenkins, Jeffrey Proudfoot, Joseph S. Valacich, G. Mark Grimes, Jay F. Nunamaker Jr.:
Sleight of Hand: Identifying Concealed Information by Monitoring Mouse-Cursor Movements. J. Assoc. Inf. Syst. 20(1): 3 (2019) - [j18]Jacob Heaton Steffen, James E. Gaskin, Thomas O. Meservy, Jeffrey L. Jenkins, Iopa Wolman:
Framework of Affordances for Virtual Reality and Augmented Reality. J. Manag. Inf. Syst. 36(3): 683-729 (2019) - [c27]Jeffrey L. Jenkins, Haley Kirk, Joe S. Valacich:
Improving Compassion Measurement in the Workforce by Analyzing Users' Mouse-Cursor Movements. AMCIS 2019 - [c26]Christoph Schneider, Joe S. Valacich, Jeffrey L. Jenkins:
Introduction to the Minitrack on Human-Computer Interaction in the Digital Economy. HICSS 2019: 1 - [c25]Xiaofei Zhang, Yi Wu, Joe S. Valacich, Jeffrey L. Jenkins, Kai Li:
How Online Patient-Physician Interaction Influences Patient Satisfaction. ICIS 2019 - [c24]Anthony Vance, David Eargle, Jeffrey L. Jenkins, C. Brock Kirwan, Bonnie Brinton Anderson:
The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings. SOUPS @ USENIX Security Symposium 2019 - 2018
- [j17]Anthony Vance, Jeffrey L. Jenkins, Bonnie Brinton Anderson, Daniel Bjorn, C. Brock Kirwan:
Tuning Out Security Warnings: A Longitudinal Examination of Habituation Through fMRI, Eye Tracking, and Field Experiments. MIS Q. 42(2) (2018) - [c23]Bonnie Brinton Anderson, Daniel Bjorn, Jeffrey L. Jenkins, C. Brock Kirwan, Anthony Vance:
Improving Security Message Adherence through Improved Comprehension: Neural and Behavioral Insights. AMCIS 2018 - 2017
- [j16]Parker A. Williams, Jeffrey L. Jenkins, Joseph S. Valacich, Michael D. Byrd:
Measuring Actual Behaviors in HCI Research - A call to Action and an Example. AIS Trans. Hum. Comput. Interact. 9(4): 4 (2017) - [j15]Martin Hibbeln, Jeffrey L. Jenkins, Christoph Schneider, Joseph S. Valacich, Markus Weinmann:
How Is Your User Feeling? Inferring Emotion Through Human-Computer interaction Devices. MIS Q. 41(1): 1-21 (2017) - [c22]Anthony Vance, C. Brock Kirwan, Daniel Bjorn, Jeffrey L. Jenkins, Bonnie Brinton Anderson:
What Do We Really Know about How Habituation to Warnings Occurs Over Time?: A Longitudinal fMRI Study of Habituation and Polymorphic Warnings. CHI 2017: 2215-2227 - [c21]James E. Gaskin, Jeffrey L. Jenkins, Thomas O. Meservy, Jacob Steffen, Katherine Payne:
Using Wearable Devices for Non-invasive, Inexpensive Physiological Data Collection. HICSS 2017: 1-9 - [c20]Jeffrey L. Jenkins, Joseph S. Valacich, Parker A. Williams:
Human-Computer Interaction Movement Indicators of Response Biases in Online Surveys. ICIS 2017 - [c19]Jacob Heaton Steffen, James E. Gaskin, Thomas O. Meservy, Jeffrey L. Jenkins:
The Missing Framework for Virtually Assisted Activities. ICIS 2017 - 2016
- [j14]Bonnie Brinton Anderson, Jeffrey L. Jenkins, Anthony Vance, C. Brock Kirwan, David Eargle:
Your memory is working against you: How eye tracking and memory explain habituation to security warnings. Decis. Support Syst. 92: 3-13 (2016) - [j13]Bonnie Brinton Anderson, Anthony Vance, C. Brock Kirwan, David Eargle, Jeffrey L. Jenkins:
How users perceive and respond to security messages: a NeuroIS research agenda and empirical study. Eur. J. Inf. Syst. 25(4): 364-390 (2016) - [j12]Jeffrey L. Jenkins, Bonnie Brinton Anderson, Anthony Vance, C. Brock Kirwan, David Eargle:
More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable. Inf. Syst. Res. 27(4): 880-896 (2016) - [j11]Jeffrey Gainer Proudfoot, Jeffrey L. Jenkins, Judee K. Burgoon, Jay F. Nunamaker Jr.:
More Than Meets the Eye: How Oculometric Behaviors Evolve Over the Course of Automated Deception Detection Interactions. J. Manag. Inf. Syst. 33(2): 332-360 (2016) - [j10]Bonnie Brinton Anderson, Anthony Vance, C. Brock Kirwan, Jeffrey L. Jenkins, David Eargle:
From Warning to Wallpaper: Why the Brain Habituates to Security Warnings and What Can Be Done About It. J. Manag. Inf. Syst. 33(3): 713-743 (2016) - [c18]David Eargle, Dennis F. Galletta, C. Brock Kirwan, Anthony Vance, Jeffrey L. Jenkins:
Integrating Facial Cues of Threat into Security Warnings - An fMRI and Field Study. AMCIS 2016 - [c17]Jeffrey L. Jenkins, Bonnie Brinton Anderson, Anthony Osborn Vance, Scott R. Jensen:
When Training Gets Trumped: How dual-Task interference inhibits Security Training. ECIS 2016: Research Paper 163 - [c16]David W. Wilson, Jeffrey L. Jenkins, Nathan W. Twyman, Matthew L. Jensen, Joe S. Valacich, Norah E. Dunbar, Scott N. Wilson, Claude H. Miller, Bradley J. Adame, Yu-Hao Lee, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Serious Games: An Evaluation Framework and Case Study. HICSS 2016: 638-647 - 2015
- [c15]Bonnie Brinton Anderson, David Eargle, Jeffrey L. Jenkins, C. Brock Kirwan, Tony Vance:
The Impact of Technostress on Users' Responses to Security Warnings: A NeuroIS Study. AMCIS 2015 - [c14]Robert G. Bodily, Spencer Harris, Jeffrey L. Jenkins, Ross Larsen, Daniel S. Sandberg, Steve Stokes, Joe S. Valacich, Parker A. Williams:
A Multi-Experimental Examination of Analyzing Mouse Cursor Trajectories to Gauge Subject Uncertainty. AMCIS 2015 - [c13]Bonnie Brinton Anderson, C. Brock Kirwan, Jeffrey L. Jenkins, David Eargle, Seth Howard, Anthony Vance:
How Polymorphic Warnings Reduce Habituation in the Brain: Insights from an fMRI Study. CHI 2015: 2883-2892 - [c12]Jeffrey Gainer Proudfoot, Jeffrey L. Jenkins, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews. ISI 2015: 97-102 - 2014
- [j9]Norah E. Dunbar, Claude H. Miller, Bradley J. Adame, Javier Elizondo, Scott N. Wilson, Brianna Lane, Abigail Allums Kauffman, Elena Bessarabova, Matthew L. Jensen, Sara K. Straub, Yu-Hao Lee, Judee K. Burgoon, Joseph S. Valacich, Jeffrey L. Jenkins, Jun Zhang:
Implicit and explicit training in the mitigation of cognitive bias through the use of a serious game. Comput. Hum. Behav. 37: 307-318 (2014) - [j8]Paul Benjamin Lowry, Nathan W. Twyman, Matthew D. Pickard, Jeffrey L. Jenkins, Quang "Neo" Bui:
Proposing the Affect-Trust Infusion Model (ATIM) to explain and predict the influence of high and low affect infusion on Web vendor trust. Inf. Manag. 51(5): 579-594 (2014) - [j7]Jeffrey L. Jenkins, G. Mark Grimes, Jeffrey Gainer Proudfoot, Paul Benjamin Lowry:
Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals. Inf. Technol. Dev. 20(2): 196-213 (2014) - [c11]Martin Hibbeln, Jeffrey L. Jenkins, Christoph Schneider, Joseph S. Valacich, Markus Weinmann:
Investigating the Effect of Insurance Fraud on Mouse Usage in Human-Computer Interactions. ICIS 2014 - 2013
- [j6]Jeffrey L. Jenkins, Alexandra Durcikova, Mary B. Burns:
Simplicity is Bliss: Controlling Extraneous Cognitive Load in Online Security Training to Promote Secure Behavior. J. Organ. End User Comput. 25(3): 52-66 (2013) - [j5]Douglas C. Derrick, Thomas O. Meservy, Jeffrey L. Jenkins, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Detecting Deceptive Chat-Based Communication Using Typing Behavior and Message Cues. ACM Trans. Manag. Inf. Syst. 4(2): 9:1-9:21 (2013) - [c10]Jeffrey L. Jenkins, Jim Marquardson, Jeffrey Gainer Proudfoot, Joseph S. Valacich, Elyse Golob, Jay F. Nunamaker Jr.:
The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resource Allocation. EISIC 2013: 252-255 - [c9]Mary B. Burns, Alexandra Durcikova, Jeffrey L. Jenkins:
What Kind of Interventions Can Help Users from Falling for Phishing Attempts: A Research Proposal for Examining Stage-Appropriate Interventions. HICSS 2013: 4023-4032 - [c8]G. Mark Grimes, Jeffrey L. Jenkins, Joseph S. Valacich:
Exploring the Effect of Arousal and Valence on Mouse Interaction. ICIS 2013 - [c7]Jeffrey L. Jenkins, Alexandra Durcikova:
What, I Shouldn't Have Done That? : The Influence of Training and Just-in-Time Reminders on Secure Behavior. ICIS 2013 - 2012
- [j4]Sherry M. B. Thatcher, Susan A. Brown, Jeffrey L. Jenkins:
E-Collaboration Media Use and Diversity Perceptions: An Evolutionary Perspective of Virtual Organizations. Int. J. e Collab. 8(2): 28-46 (2012) - [j3]Paul Benjamin Lowry, Greg D. Moody, Anthony Vance, Matthew L. Jensen, Jeffrey L. Jenkins, Taylor Wells:
Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers. J. Assoc. Inf. Sci. Technol. 63(4): 755-776 (2012) - [c6]Matthew D. Pickard, Jeffrey L. Jenkins, Jay F. Nunamaker Jr.:
Embodied Agents and the Predictive Elaboration Model of Persuasion-The Ability to Tailor Embodied Agents to Users' Need for Cognition. HICSS 2012: 543-552 - [c5]Jeffrey L. Jenkins, Alexandra Durcikova, Mary B. Burns:
Forget the Fluff: Examining How Media Richness Influences the Impact of Information Security Training on Secure Behavior. HICSS 2012: 3288-3296 - [c4]Mary B. Burns, Alexandra Durcikova, Jeffrey L. Jenkins:
On Not Falling for Phish: Examining Multiple Stages of Protective Behavior of Information System End-Users. ICIS 2012 - 2011
- [j2]Matthew L. Jensen, Paul Benjamin Lowry, Jeffrey L. Jenkins:
Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment. J. Manag. Inf. Syst. 28(1): 201-233 (2011) - [c3]Nathan W. Twyman, Jeffrey L. Jenkins, Jay F. Nunamaker Jr., Katherine Carl:
Knowledge Sourcing and Knowledge Consumption in Computer-Mediated Complex Decision Making. HICSS 2011: 1-8 - [c2]Jeffrey L. Jenkins, Alexandra Durcikova, Mary B. Burns:
Get a Cue on IS Security Training: Explaining the Difference between how Security Cues and Security Arguments Improve Secure Behavior. ICIS 2011 - 2010
- [c1]Jeffrey L. Jenkins, Alexandra Durcikova, Grayson Ross, Jay F. Nunamaker Jr.:
Encouraging Users to Behave Securely: Examining the Influence of Technical, Managerial, and Educational Controls on Users' Secure Behavior. ICIS 2010: 150
2000 – 2009
- 2009
- [j1]Paul Benjamin Lowry, Nicholas C. Romano Jr., Jeffrey L. Jenkins, Randy W. Guthrie:
The CMC Interactivity Model: How Interactivity Enhances Communication Quality and Process Satisfaction in Lean-Media Groups. J. Manag. Inf. Syst. 26(1): 155-195 (2009)
Coauthor Index
aka: Joe S. Valacich
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-21 20:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint