Jeff Jenkins

Jeff Jenkins

Download Vita

Office: 776 TNRB
Phone: 385-335-9856
Email: jeffrey_jenkins@byu.edu

Biography

Jeff graduated with a Ph.D. in Management from the Eller College of Management, the University of Arizona with a major in Management Information Systems and a minor in Computational Linguistics. He earned his Bachelor’s and Master’s degree in Information Systems Management from BYU, and an Associate’s degree in Information Systems from BYU-Idaho. Prior to earning his Ph.D., Jeff was a Software Engineer in both the public and private sectors. Jeff is originally from Rigby, Idaho.

Education

  • Doctor of Philosophy in Management, Management Information Systems, University of Arizona, 2013
  • Master of Science, Information Systems Management, Brigham Young University, 2009
  • Bachelor of Science, Information Systems, Brigham Young University, 2009
  • Associate of Science, Information Systems, Brigham Young University-Idaho, 2006

Selected Publications

Languages

  • German

Certificates and Licenses

  • Certificate in College Teaching University of Arizona 2013

Presentations

  • A longitudinal investigation of habituation to security warnings: A parallel fMRI and eye tracking study - - The 6th Annual Interdisciplinary Symposium on Decision Neuroscience - 2016
  • I Can’t Spot the Difference: An Eye Tracking Study Examining Generalization between Security Warnings and System Notifications - IFIP WG8.11/WG11.13 - The Dewald Roode Workshop on Information Systems Security Research - 2016
  • It All Blurs Together: How the Effects of Habituation Generalize Across System Notifications and Security Warnings - USENIX - Symposium on Usable Privacy and Security - 2016
  • It All Blurs Together: How the Effects of Habituation Generalize Across System Notifications and Security Warnings - Harvard Univeristy - Workshop on Security and Human Behavior - 2016
  • It All Blurs Together: How the Effects of Habituation Generalize Across System Notifications and Security Warnings - Johannes Kepler University - Gmunden Retreat on NeuroIS - 2016
  • It All Looks the Same to Me: Security Warning and System Notification Generalization Captured through Eye Tracking - AIS SIGSEC - Workshop on Information Security and Privacy (WISP) - 2016
  • More Harm than Good? How Security Messages that Interrupt Make Us Vulnerable - Harvard Univeristy - Workshop on Security and Human Behavior - 2016
  • When Training Gets Trumped: How Dual-Task Interference Inhibits Security Training - AIS - European Conference on Information Systems (ECIS) - 2016
  • "Not Now:" Using fMRI and Eye Tracking to Improve the Timing of Security Messages" - AIS - Workshop on Information Security and Privacy (WISP) - 2015
  • Assessing Identity and Credibility Using Soft Biometric Features - University of Cambridge - Deception: International Conference on Deceptive Behavior - 2015
  • How Polymorphic Warnings Reduce Habituation in the Brain—Insights from an fMRI Study - ACM - ACM Conference on Human Factors in Computing Systems (CHI) - 2015
  • How Polymorphic Warnings Reduce Habituation in the Brain—Insights from an fMRI Study - Apple - Presentation to Apple security team - 2015
  • More Harm than Good? How Security Messages that Interrupt Make us Vulnerable - IFIP WG8.11/WG11.13 - Dewald Roode Information Security Workshop - 2015
  • More Harm than Good? How Security Messages that Interrupt Make Us Vulnerable - ISR - ISR Digital Vulnerabilities Special Issue Workshop - 2015
  • The Impact of Technostress on Users' Responses to Security Warnings: A NeuroIS Study - - Americas Conference on Information Systems - 2015
  • The Impact of Technostress on Users' Responses to Security Warnings: A NeuroIS Study - - Security and Human Behavior Workshop (SHB 2015) - 2015
  • Using fMRI to Explain the Effect of Dual-Task Interference on Security Behavior - - Gmunden Retreat on NeuroIS - 2015
  • Using fMRI to Explain the Effect of Dual-Task Interference on Security Behavior - - Security and Human Behavior Workshop (SHB 2015) - 2015
  • On Not Phalling for Phish: Examining Multiple Stages for Protective Behavior by IS End-Users - - International Conference on Information Systems - 2012
  • Defending Homeland Transportation Systems through Application of Automated Linguistic Analysis to Transcripts of Emergency Calls for Deception Detection - - Fifth Annual U.S. Department of Homeland Security (DHS) University Network Summit - 2011
  • Get a Cue on IS Security Training: Explaining the Difference between how Security Cues and Security Arguments Improve Secure Behavior - - International Conference on Information Systems - 2011
  • Protecting America’s Cyber Infrastructure through Understanding How Security Controls Influence Humans’ Secure Behavior - - Fifth Annual U.S. Department of Homeland Security (DHS) University Network Summit - 2011
  • How Secure is Your System? Examining the Influence of Technical, Managerial, and Educational Controls on Users’ Secure Behavior - - Americas Conference on Information Systems - 2010