Author of the publication

How users perceive and respond to security messages: a NeuroIS research agenda and empirical study.

, , , , and . Eur. J. Inf. Syst., 25 (4): 364-390 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals., , , and . Inf. Technol. Dev., 20 (2): 196-213 (2014)What Do We Really Know about How Habituation to Warnings Occurs Over Time?: A Longitudinal fMRI Study of Habituation and Polymorphic Warnings., , , , and . CHI, page 2215-2227. ACM, (2017)When Training Gets Trumped: How dual-Task interference inhibits Security Training., , , and . ECIS, page Research Paper 163. (2016)Framework of Affordances for Virtual Reality and Augmented Reality., , , , and . J. Manag. Inf. Syst., 36 (3): 683-729 (2019)From Warning to Wallpaper: Why the Brain Habituates to Security Warnings and What Can Be Done About It., , , , and . J. Manag. Inf. Syst., 33 (3): 713-743 (2016)Introduction to the Minitrack on Human-Computer Interaction in the Digital Economy., , and . HICSS, page 1-2. ScholarSpace, (2021)Knowledge Sourcing and Knowledge Consumption in Computer-Mediated Complex Decision Making., , , and . HICSS, page 1-8. IEEE Computer Society, (2011)Introduction to the Minitrack on Human-Computer Interaction in the Digital Economy., , and . HICSS, page 1. ScholarSpace, (2020)Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews., , , and . ISI, page 97-102. IEEE, (2015)Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers., , , , , and . J. Assoc. Inf. Sci. Technol., 63 (4): 755-776 (2012)