Jeff Jenkins

Jeff Jenkins


Office: 783 TNRB
Phone: 385-335-9856
Email: jeffrey_jenkins@byu.edu

Biography

Jeff graduated with a Ph.D. in Management from the Eller College of Management, the University of Arizona with a major in Management Information Systems and a minor in Computational Linguistics. He earned his Bachelor’s and Master’s degree in Information Systems Management from BYU, and an Associate’s degree in Information Systems from BYU-Idaho. Prior to earning his Ph.D., Jeff was a Software Engineer in both the public and private sectors. Jeff is originally from Rigby, Idaho.

Education

  • Doctor of Philosophy in Management, Management Information Systems, University of Arizona, 2013
  • Master of Science, Information Systems Management, Brigham Young University, 2009
  • Bachelor of Science, Information Systems, Brigham Young University, 2009
  • Associate of Science, Information Systems, Brigham Young University-Idaho, 2006

Selected Publications

  • "Using Wearable Devices for Non-invasive, Inexpensive Physiological Data Collection", Hawaiian International Conference on System Sciences, 2017.    
  • "Integrating Facial Cues of Threat into Security Warnings – An fMRI and Field Study", Americas Conference on Information Systems, 2016.    
  • "Real-Time Hand Tremor Detection via Mouse Cursor Movements for Improved Human-Computer Interactions: An Exploratory Study", Special Interest Group on Human Computer Interaction, 2016.    
  • "Serious Games for Reducing Bias in Credibility Decisions: An Evaluation Framework and Case Study", Hawaii International Conference on Computer and Systems Sciences, 2016.    
  • "Suspicion Detection in the Wild: Lessons Learned from an Early Stage Company", Hawaii International Conference on Computer and Systems Sciences, Symposium on Rapid Screening Technologies, Deception Detection, and Credibility Assessment, 2016.    
  • "From warnings to wallpaper: Why the brain habituates to security warnings and what can be done about it." Journal of Management Information Systems", Journal of Management Information Systems, Edition 3, Volume 33, Issue 3, Pages 713-743, 2016.    
  • "How Users Perceive and Respond to Security Messages: A NeuroIS Research Agenda and Empirical Study", European Journal of Information Systems, Edition 4, Volume 25, Issue 4, Pages 364-390, 2016.    
  • "More Harm than Good? How Security Messages that Interrupt Make Us Vulnerable", Information Systems Research, Edition 4, Volume 27, Issue 4, Pages 880-896, INFORMS, 2016.    
  • "Your Memory is Working Against You:  How Eye Tracking and Memory Explain Habituation to Security Warnings", Decision Support Systems, Volume 92, Pages 3-13, 2016.    
  • "A Multi-Experimental Examination of Analyzing Mouse Cursor Trajectories to Gauge Subject Uncertainty", Americas Conference on Information Systems, 2015.    
  • "Behaviorally Measuring Ease-of-Use by Analyzing Users’ Mouse Cursor Movements", Fourteenth Annual Workshop on HCI Research in MIS, 2015.    
  • "Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews", IEEE International Conference on Intelligence and Security Informatics (ISI), 2015.    
  • "Lessons Learned From Successive Deception Experiment", Hawaii International Conference on Computer and Systems Sciences, 2015.    
  • "How Polymorphic Warnings Reduce Habituation in the Brain—Insights from an fMRI Study", Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI), Seoul, 2015.    
  • "Exploring how Dual-Task Interference Influences End-User Secure Behavior", The Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13, 2014.    
  • "Implicit and Explicit Training in the Mitigation of Cognitive Bias Through the Use of a Serious Game", Computers in Human Behavior, Volume 37, Pages 307-318, 2014.    
  • "Assessing Credibility by Monitoring Changes in Typing Behavior: The Keystroke Dynamics Deception Detection Model", Hawaii International Conference on Computer and Systems Sciences, Symposium on Rapid Screening Technologies, Deception Detection and Credibility Assessment, 2013.    
  • "Detecting deceptive chat-based communication using typing behavior and message cues", ACM Transactions on Management Information Systems, Edition 2, Volume 4, Issue 2, 2013.    
  • "Exploring the Effect of Arousal and Valence on Mouse Interaction", International Conference on Information Systems, 2013.    
  • "Identifying Insider Threats through Monitoring Mouse Movements in Concealed Information Tests", Hawaii International Conference on Computer and Systems Sciences, Symposium on Rapid Screening Technologies, Deception Detection and Credibility Assessment, 2013.    
  • "Improving End-User Security through SETA Programs: An Action Research Approach", The Dewald Roode Workshop on Information Systems Security Research, 2013.    
  • "Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals", Information Technology for Development, Edition 4, Volume 17, Issue 4, Pages 289-305, 2013.    
  • "Mitigation of Cognitive Bias Through the Use of a Serious Game", Games + Learning + Society Conference 9.0, 2013.    
  • "Simplicity is Bliss: Controlling Extraneous Cognitive Load in Online Security Training to Promote Secure Behavior", Journal of Organizational and End User Computing, Edition 3, Volume 25, Issue 3, Pages 52–66, 2013.    
  • "The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resource Allocation", European Intelligence and Security Informatics Conference (EISIC), Pages 252-255, 2013.    
  • "What, I Shouldn’t Have Done That?: The Influence of Training and Just-in-Time Reminders on Secure Behavior", International Conference on Information Systems, 2013.    
  • "What Kind of Interventions Can Help Users from Falling for Phishing Attempts: A Research Proposal for Examining Stage-Appropriate Interventions", Hawaii International Conference on System Sciences, Pages 4023–4032, 2013.    
  • "E-Collaboration Media Use and Diversity Perceptions: An Evolutionary Perspective of Virtual Organizations", Edition 2, Volume 8, Issue 2, Pages 28–46, International Journal of e-Collaboration, 2012.    
  • "Embodied Agents and the Predictive Elaboration Model of Persuasion – Embodied Agents Tailored to Users’ Need for Cognition", 2012 Hawaii International Conference on Computer and Systems Sciences, Symposium on Rapid Screening Technologies, Deception Detection and Credibility Assessment, 2012.    
  • "Estimating Unknown Numbers More Precisely: A Stratified Sampling Methodology for Estimating the Baseline Population of Illegal Immigrants Passing through Open Checkpoints", Hawaii International Conference on Computer and Systems Sciences, Symposium on Rapid Screening Technologies, Deception Detection and Credibility Assessment, 2012.    
  • "Examining Protective Behavior Stages of IS End Users: An Exploratory Cluster Analysis", The Dewald Roode Workshop on Information Systems Security Research, 2012.    
  • "Forget the Fluff: Examining How Media Richness Influences the Impact of Information Security Training on Secure Behavior", Hawaii International Conference on System Science (HICSS), Pages 3288–3296, 2012.    
  • "Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers", Journal of the American Society for Information Science and Technology, Edition 4, Volume 63, Issue 4, Pages 755–776, 2012.    
  • "Closing IT Security Hotspot: Increasing Auditors’ Understanding of the Impacts of IT Security Training on End-User Secure Behavior", 3rd. Annual pre-ICIS workshop on Accounting Information Systems, 2011.    
  • "Design principles for special purpose, embodied, conversational intelligence with environmental sensors (SPECIES) agents", AIS Transactions on Human-Computer Interaction, Edition 2, Volume 3, Issue 2, Pages 62–81, 2011.    
  • "Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment", Journal of Management Information Systems, Edition 1, Volume 28, Issue 1, Pages 201–234, 2011.    
  • "Knowledge Sourcing and Knowledge Consumption in Computer-Mediated Complex Decision Making", Hawaii International Conference on System Sciences, Pages 1–8, 2011.    
  • "Proposing the Affect-Trust Infusion Model (ATIM) to Explain and Predict the Influence of High-and Low-Affect Infusion on Web Vendor Trust", ". Journal of the Association for Information Systems (JAIS) ICIS Theory Development Workshop, 2011.    
  • "Understanding Persistence of Risky IS Behavior with Respect to Phishing: A Multi-Stage Approach", The Dewald Roode Workshop on Information Systems Security Research, 2011.    
  • "Encouraging Users to Behave Securely: Examining the Influence of Technical, Managerial, and Educational Controls on Users’ Secure Behavior", International Conference on Information Systems, 2010.    
  • "Facial Thermal Imaging as a Technique for Deception Detection", Hawaii International Conference on Computer and Systems Sciences, Symposium on Rapid Screening Technologies, Deception Detection and Credibility Assessment, 2010.    
  • "The CMC interactivity model: how interactivity enhances communication quality and process satisfaction in lean-media groups", Journal of Management Information Systems, Edition 1, Volume 26, Issue 1, Pages 155–196, 2009.    
  • "Using Source Credibility Theory to Explain and Predict the Efficacy of Human-Computer Systems for Credibility Assessment", The 8th Annual Workshop on HCI Research in MIS, 2009.    
  • "Proposing the Hedonic Affect Model (HAM) to Explain how Stimuli and Performance Expectations Predict Affect in Individual and Group Hedonic Systems Use", Journal of the Association for Information Systems (JAIS) ICIS Theory Development Workshop, 2008.    

Languages

  • German

Certificates and Licenses

  • Certificate in College Teaching University of Arizona 2013

Presentations

  • A longitudinal investigation of habituation to security warnings: A parallel fMRI and eye tracking study - - The 6th Annual Interdisciplinary Symposium on Decision Neuroscience - 2016
  • I Can’t Spot the Difference: An Eye Tracking Study Examining Generalization between Security Warnings and System Notifications - IFIP WG8.11/WG11.13 - The Dewald Roode Workshop on Information Systems Security Research - 2016
  • It All Blurs Together: How the Effects of Habituation Generalize Across System Notifications and Security Warnings - USENIX - Symposium on Usable Privacy and Security - 2016
  • It All Blurs Together: How the Effects of Habituation Generalize Across System Notifications and Security Warnings - Harvard Univeristy - Workshop on Security and Human Behavior - 2016
  • It All Blurs Together: How the Effects of Habituation Generalize Across System Notifications and Security Warnings - Johannes Kepler University - Gmunden Retreat on NeuroIS - 2016
  • It All Looks the Same to Me: Security Warning and System Notification Generalization Captured through Eye Tracking - AIS SIGSEC - Workshop on Information Security and Privacy (WISP) - 2016
  • More Harm than Good? How Security Messages that Interrupt Make Us Vulnerable - Harvard Univeristy - Workshop on Security and Human Behavior - 2016
  • When Training Gets Trumped: How Dual-Task Interference Inhibits Security Training - AIS - European Conference on Information Systems (ECIS) - 2016
  • "Not Now:" Using fMRI and Eye Tracking to Improve the Timing of Security Messages" - AIS - Workshop on Information Security and Privacy (WISP) - 2015
  • Assessing Identity and Credibility Using Soft Biometric Features - University of Cambridge - Deception: International Conference on Deceptive Behavior - 2015
  • How Polymorphic Warnings Reduce Habituation in the Brain—Insights from an fMRI Study - ACM - ACM Conference on Human Factors in Computing Systems (CHI) - 2015
  • How Polymorphic Warnings Reduce Habituation in the Brain—Insights from an fMRI Study - Apple - Presentation to Apple security team - 2015
  • More Harm than Good? How Security Messages that Interrupt Make us Vulnerable - IFIP WG8.11/WG11.13 - Dewald Roode Information Security Workshop - 2015
  • More Harm than Good? How Security Messages that Interrupt Make Us Vulnerable - ISR - ISR Digital Vulnerabilities Special Issue Workshop - 2015
  • The Impact of Technostress on Users' Responses to Security Warnings: A NeuroIS Study - - Americas Conference on Information Systems - 2015
  • The Impact of Technostress on Users' Responses to Security Warnings: A NeuroIS Study - - Security and Human Behavior Workshop (SHB 2015) - 2015
  • Using fMRI to Explain the Effect of Dual-Task Interference on Security Behavior - - Gmunden Retreat on NeuroIS - 2015
  • Using fMRI to Explain the Effect of Dual-Task Interference on Security Behavior - - Security and Human Behavior Workshop (SHB 2015) - 2015
  • On Not Phalling for Phish: Examining Multiple Stages for Protective Behavior by IS End-Users - - International Conference on Information Systems - 2012
  • Defending Homeland Transportation Systems through Application of Automated Linguistic Analysis to Transcripts of Emergency Calls for Deception Detection - - Fifth Annual U.S. Department of Homeland Security (DHS) University Network Summit - 2011
  • Get a Cue on IS Security Training: Explaining the Difference between how Security Cues and Security Arguments Improve Secure Behavior - - International Conference on Information Systems - 2011
  • Protecting America’s Cyber Infrastructure through Understanding How Security Controls Influence Humans’ Secure Behavior - - Fifth Annual U.S. Department of Homeland Security (DHS) University Network Summit - 2011
  • How Secure is Your System? Examining the Influence of Technical, Managerial, and Educational Controls on Users’ Secure Behavior - - Americas Conference on Information Systems - 2010