Learn More
This version of the referenced work is the post-print version of the article—it is NOT the final published version nor the corrected proofs. If you would like to receive the final published version please send a request to Paul.Lowry.PhD@gmail.com, and I will be happy to send you the latest version. Moreover, you can contact the publisher's website and(More)
Research on security warnings consistently points to habituation as a key reason why users ignore security warnings. However, because habituation as a mental state is difficult to observe, previous research has examined habituation indirectly by observing its influence on security behaviors. This study addresses this gap by using functional magnetic(More)
Determining a user's affective state can be an important element when trying to understand human-computer interactions. Accurately assessing affect during system use, however, can be very difficult, especially in a non-laboratory setting. Extensive previous research in neuroscience has shown that arousal and valence influence motor control. In this(More)
History has shown that inaccurate assessments of credibility can result in tremendous costs to businesses and society. This study uses Signal Detection Theory (SDT) to improve the accuracy of credibility assessments through combining automated and participatory decision support. Participatory decision support is also proposed to encourage acceptance of the(More)
Computer-mediated deception is prevalent and may have serious consequences for individuals, organizations, and society. This article investigates several metrics as predictors of deception in synchronous chat-based environments, where participants must often spontaneously formulate deceptive responses. Based on cognitive load theory, we hypothesize that(More)
The human is frequently referred to as the weakest link of security. Employees who engage in behaviors contrary to their organization's security policy often cause undesirable outcomes. This research presents a dual-processing model explaining and predicting secure behavior in relation to password policies. The model posits that the number of password(More)
Heuristics can interfere with information processing and hinder decision-making when more systematic processes that might lead to better decisions are ignored. Based on the heuristic-systematic model (HSM) of information processing, a serious training game (called MACBETH) was designed to address and mitigate cognitive biases that interfere with the(More)
The adage, " old habits die hard " is especially relevant when humans learn new protective behaviors (i.e., dental flossing, IS security behaviors). The foundation that underlies many social-cognitive theories used in IS research is that intention to change predicts actual behavior change. Despite intentions to change, humans do not always change their(More)