Author of the publication

What Do We Really Know about How Habituation to Warnings Occurs Over Time?: A Longitudinal fMRI Study of Habituation and Polymorphic Warnings.

, , , , and . CHI, page 2215-2227. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Compassion Measurement in the Workforce by Analyzing Users' Mouse-Cursor Movements., , and . AMCIS, Association for Information Systems, (2019)Detecting Deceptive Chat-Based Communication Using Typing Behavior and Message Cues, , , , and . ACM Trans. Manage. Inf. Syst., 4 (2): 9:1--9:21 (August 2013)The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings., , , , and . SOUPS @ USENIX Security Symposium, USENIX Association, (2019)How Online Patient-Physician Interaction Influences Patient Satisfaction., , , , and . ICIS, Association for Information Systems, (2019)E-Collaboration Media Use and Diversity Perceptions: An Evolutionary Perspective of Virtual Organizations., , and . Int. J. e Collab., 8 (2): 28-46 (2012)How Polymorphic Warnings Reduce Habituation in the Brain: Insights from an fMRI Study., , , , , and . CHI, page 2883-2892. ACM, (2015)Mitigating the Security Intention-Behavior Gap: The Moderating Role of Required Effort on the Intention-Behavior Relationship., , and . J. Assoc. Inf. Syst., 22 (1): 1 (2021)Behaviorally Measuring Usability by Analyzing Users' Mouse Movement Efficiency., , and . MIS Q., 48 (3): 979-1008 (2024)Detecting Noncompliant Behavior in Organizations: How Online Survey Responses and Behaviors Reveal Risk., , , and . J. Manag. Inf. Syst., 38 (3): 704-731 (2021)Embodied Agents and the Predictive Elaboration Model of Persuasion-The Ability to Tailor Embodied Agents to Users' Need for Cognition., , and . HICSS, page 543-552. IEEE Computer Society, (2012)