Author of the publication

Users Aren't (Necessarily) Lazy: Using NeuroIS to Explain Habituation to Security Warnings.

, , , , and . ICIS, Association for Information Systems, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Standards and verification for fair-exchange and atomicity in e-commerce transactions., , , and . Inf. Sci., 176 (8): 1045-1066 (2006)What Do We Really Know about How Habituation to Warnings Occurs Over Time?: A Longitudinal fMRI Study of Habituation and Polymorphic Warnings., , , , and . CHI, page 2215-2227. ACM, (2017)When Training Gets Trumped: How dual-Task interference inhibits Security Training., , , and . ECIS, page Research Paper 163. (2016)A Semantic Web data retrieval implementation with an adaptive model for supporting agent decision structures., , , , and . Electron. Commer. Res., 7 (1): 5-16 (2007)From Warning to Wallpaper: Why the Brain Habituates to Security Warnings and What Can Be Done About It., , , , and . J. Manag. Inf. Syst., 33 (3): 713-743 (2016)Using Measures of Risk Perception to Predict Information Security Behavior: Insights from Electroencephalography (EEG)., , , and . J. Assoc. Inf. Syst., 15 (10): 2 (2014)The Value of Distrust in Computer-Based Decision-Making Groups., , , , , , and . HICSS, page 1-10. IEEE Computer Society, (2010)The application of model checking for securing e-commerce transactions., , , and . Commun. ACM, 49 (6): 97-101 (2006)Tuning Out Security Warnings: A Longitudinal Examination of Habituation Through fMRI, Eye Tracking, and Field Experiments., , , , and . MIS Q., (2018)Embracing brain and behaviour: Designing programs of complementary neurophysiological and behavioural studies., , , and . Inf. Syst. J., 33 (2): 324-349 (March 2023)