• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4591707)   Today's Articles (1619)   Subscriber (49315)
For: Vance A, Jenkins JL, Anderson BB, Bjornn DK, Kirwan CB. Tuning Out Security Warnings: A Longitudinal Examination of Habituation Through fMRI, Eye Tracking, and Field Experiments. MIS QUART 2018. [DOI: 10.25300/misq/2018/14124] [Citation(s) in RCA: 47] [Impact Index Per Article: 7.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/13/2022]
Number Cited by Other Article(s)
1
How do technology use patterns influence phishing susceptibility? A two-wave study of the role of reformulated locus of control. EUR J INFORM SYST 2023. [DOI: 10.1080/0960085x.2023.2186275] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/08/2023]
2
When information security depends on font size: how the saliency of warnings affects protection behavior. JOURNAL OF RISK RESEARCH 2022;26:233-255. [PMID: 36896244 PMCID: PMC9988306 DOI: 10.1080/13669877.2022.2142952] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/05/2022] [Revised: 10/07/2022] [Accepted: 10/24/2022] [Indexed: 06/18/2023]
3
To download or not to download? Spatial and temporal neural dynamics across the brain regions when deciding to download an app. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT 2022. [DOI: 10.1016/j.ijinfomgt.2022.102531] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
4
The effect of signal icon and persuasion strategy on warning design in online fraud. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102839] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
5
Investigation the role of contrast on habituation and sensitisation effects in peripheral areas of graphical user interfaces. Sci Rep 2022;12:15281. [PMID: 36088380 PMCID: PMC9464255 DOI: 10.1038/s41598-022-16284-2] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/17/2021] [Accepted: 07/07/2022] [Indexed: 11/14/2022]  Open
6
Roles and Research Trends of Neuroscience on Major Information Systems Journal: A Bibliometric and Content Analysis. Front Neurosci 2022;16:872532. [PMID: 35992932 PMCID: PMC9382099 DOI: 10.3389/fnins.2022.872532] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/09/2022] [Accepted: 05/20/2022] [Indexed: 11/20/2022]  Open
7
Embracing brain and behaviour: Designing programs of complementary neurophysiological and behavioural studies. INFORMATION SYSTEMS JOURNAL 2022. [DOI: 10.1111/isj.12402] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
8
Do emotions influence safe browsing? Toward an electroencephalography marker of affective responses to cybersecurity notifications. Front Neurosci 2022;16:922960. [PMID: 35911995 PMCID: PMC9330617 DOI: 10.3389/fnins.2022.922960] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/18/2022] [Accepted: 06/29/2022] [Indexed: 11/29/2022]  Open
9
Repeated IT Interruption: Habituation and Sensitization of User Responses. J MANAGE INFORM SYST 2022. [DOI: 10.1080/07421222.2021.2023411] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
10
The commodification of consent. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102605] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/03/2022]
11
The infamous “Like” feature - A neuro perspective. INTERNATIONAL JOURNAL OF TECHNOLOGY AND HUMAN INTERACTION 2022. [DOI: 10.4018/ijthi.299073] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
12
That's interesting: An examination of interest theory and self‐determination in organisational cybersecurity training. INFORMATION SYSTEMS JOURNAL 2021. [DOI: 10.1111/isj.12374] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
13
Herd behavior in information security decision-making. INFORMATION & MANAGEMENT 2021. [DOI: 10.1016/j.im.2021.103526] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
14
The Phishing Funnel Model: A Design Artifact to Predict User Susceptibility to Phishing Websites. INFORMATION SYSTEMS RESEARCH 2021. [DOI: 10.1287/isre.2020.0973] [Citation(s) in RCA: 16] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
15
A comparison of features in a crowdsourced phishing warning system. INFORMATION SYSTEMS JOURNAL 2021. [DOI: 10.1111/isj.12318] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/06/2023]
16
Understanding employees' information security identities: an interpretive narrative approach. INFORMATION TECHNOLOGY & PEOPLE 2021. [DOI: 10.1108/itp-04-2020-0197] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
17
Organizational science and cybersecurity: abundant opportunities for research at the interface. JOURNAL OF BUSINESS AND PSYCHOLOGY 2021;37:1-29. [PMID: 33564206 PMCID: PMC7861585 DOI: 10.1007/s10869-021-09732-9] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Accepted: 01/05/2021] [Indexed: 06/10/2023]
18
Trust calibration of automated security IT artifacts: A multi-domain study of phishing-website detection tools. INFORMATION & MANAGEMENT 2021. [DOI: 10.1016/j.im.2020.103394] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
19
Repetition of Computer Security Warnings Results in Differential Repetition Suppression Effects as Revealed With Functional MRI. Front Psychol 2020;11:528079. [PMID: 33364992 PMCID: PMC7751389 DOI: 10.3389/fpsyg.2020.528079] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/18/2020] [Accepted: 11/11/2020] [Indexed: 11/27/2022]  Open
20
Eyes wide open: The role of situational information security awareness for security‐related behaviour. INFORMATION SYSTEMS JOURNAL 2020. [DOI: 10.1111/isj.12317] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/21/2022]
21
The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context. INFORMATION SYSTEMS RESEARCH 2020. [DOI: 10.1287/isre.2020.0941] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
22
Semi-Supervised Cyber Threat Identification in Dark Net Markets: A Transductive and Deep Learning Approach. J MANAGE INFORM SYST 2020. [DOI: 10.1080/07421222.2020.1790186] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
23
IS Reappraisal and Technology Adaptation Behaviors. DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS 2020. [DOI: 10.1145/3433148.3433151] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
24
Future Directions for Optimizing Clinical Science & Safety: Ecological Momentary Assessments in Suicide/Self-Harm Research. JOURNAL OF CLINICAL CHILD AND ADOLESCENT PSYCHOLOGY 2020;50:141-153. [PMID: 33047987 DOI: 10.1080/15374416.2020.1815208] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
25
Appealing to Sense and Sensibility: System 1 and System 2 Interventions for Fake News on Social Media. INFORMATION SYSTEMS RESEARCH 2020. [DOI: 10.1287/isre.2020.0927] [Citation(s) in RCA: 22] [Impact Index Per Article: 5.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
26
A Decade of NeuroIS Research. DATA BASE FOR ADVANCES IN INFORMATION SYSTEMS 2020. [DOI: 10.1145/3410977.3410980] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
27
Risk communication in cyberspace: a brief review of the information-processing and mental models approaches. Curr Opin Psychol 2020;36:135-140. [PMID: 32679482 DOI: 10.1016/j.copsyc.2020.06.006] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/01/2020] [Revised: 06/05/2020] [Accepted: 06/09/2020] [Indexed: 01/18/2023]
28
Protecting a whale in a sea of phish. JOURNAL OF INFORMATION TECHNOLOGY 2020. [DOI: 10.1177/0268396220918594] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
29
What does existing NeuroIS research focus on? INFORM SYST 2020. [DOI: 10.1016/j.is.2019.101462] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/06/2023]
30
The Dilemma of User Engagement in Privacy Notices. ACM TRANSACTIONS ON PRIVACY AND SECURITY 2020. [DOI: 10.1145/3372296] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
31
Neural correlates of decision making related to information security: Self-control and moral potency. PLoS One 2019;14:e0221808. [PMID: 31483825 PMCID: PMC6726187 DOI: 10.1371/journal.pone.0221808] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/15/2019] [Accepted: 08/09/2019] [Indexed: 12/02/2022]  Open
32
It's the deceiver and the receiver: Individual differences in phishing susceptibility and false positives with item profiling. PLoS One 2018;13:e0205089. [PMID: 30365492 PMCID: PMC6203253 DOI: 10.1371/journal.pone.0205089] [Citation(s) in RCA: 17] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/15/2017] [Accepted: 09/19/2018] [Indexed: 11/18/2022]  Open
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA