Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- NeuroIS (3)
- Dual-task interference (2)
- Habituation (2)
- Amazon Mechanical Turk (1)
- Behavioral information systems security (1)
-
- Eye tracking (1)
- FMRI (1)
- Functional magnetic resonance imaging (fMRI) (1)
- Information security (1)
- Information security behavior (1)
- Innovation (1)
- Knowledge filter (1)
- Knowledge pool (1)
- Laboratory experimentation (1)
- Mouse cursor tracking (1)
- Multitasking (1)
- Networks (1)
- Pipes (1)
- Security message (1)
- Security messages (1)
- Security warnings (1)
- Tacit knowledge (1)
Articles 1 - 4 of 4
Full-Text Articles in Business
From Warning To Wallpaper: Why The Brain Habituates To Security Warnings, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, Jeffrey L. Jenkins, David Eargle
From Warning To Wallpaper: Why The Brain Habituates To Security Warnings, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, Jeffrey L. Jenkins, David Eargle
Faculty Publications
Warning messages are fundamental to users' security interactions. Unfortunately, research has shown that they are largely ineffective. A key contributor to this failure is habituation: decreased response to a repeated warning. Previous research has inferred the occurrence of habituation to warnings or measured it indirectly, such as through the proxy of a related behavior. Therefore, there is a gap in our understanding of how habituation to security warnings develops in the brain. Without direct measures of habituation, we are limited in designing warnings that can mitigate its effects. In this study, we use neurophysiological measures to directly observe habituation as …
More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable, Jeffrey L. Jenkins, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, David Eargle
More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable, Jeffrey L. Jenkins, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, David Eargle
Faculty Publications
System-generated alerts are ubiquitous in personal computing and, with the proliferation of mobile devices, daily activity. While these interruptions provide timely information, research shows they come at a high cost in terms of increased stress and decreased productivity. This is due to dual-task interference (DTI), a cognitive limitation in which even simple tasks cannot be simultaneously performed without significant performance loss. Although previous research has examined how DTI impacts the performance of a primary task (the task that was interrupted), no research has examined the effect of DTI on the interrupting task. This is an important gap because in many …
How Users Perceive And Respond To Security Messages: A Neurois Research Agenda And Empirical Study, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, David Eargle, Jeffrey Jenkins
How Users Perceive And Respond To Security Messages: A Neurois Research Agenda And Empirical Study, Bonnie Anderson, Anthony Vance, C. Brock Kirwan, David Eargle, Jeffrey Jenkins
Faculty Publications
Users are vital to the information security of organizations. In spite of technical safeguards, users make many critical security decisions. An example is users' responses to security messages—discrete communication designed to persuade users to either impair or improve their security status. Research shows that although users are highly susceptible to malicious messages (e.g., phishing attacks), they are highly resistant to protective messages such as security warnings. Research is therefore needed to better understand how users perceive and respond to security messages. In this article, we argue for the potential of NeuroIS—cognitive neuroscience applied to information system (IS)—to shed new light …
Pipes, Pools And Filters: How Collaboration Networks Affect Innovative Performance, Harpeet Singh, David Kryscynski, Xinxin Li, Ram Gopal
Pipes, Pools And Filters: How Collaboration Networks Affect Innovative Performance, Harpeet Singh, David Kryscynski, Xinxin Li, Ram Gopal
Faculty Publications
Innovation requires inventors to have both "new knowledge" and the ability to combine and configure knowledge (i.e. "combinatory knowledge") and such knowledge may flow through networks. We argue that both combinatory knowledge and new knowledge are accessed through collaboration networks, but that inventors' abilities to access such knowledge depends on its location in the network. Combinatory knowledge transfers from direct contacts, but not easily from indirect contacts. In contrast, new knowledge transfers from both direct and indirect contacts, but is far more likely to be new and useful when it comes from indirect contacts. Exploring knowledge flows in 69,476 patents …