To view contact information, verify you are human below:
Biography
Dr. Jenkins is an Associate Professor of Information Systems at the Marriott School of Business, Brigham Young University. His research focuses on using human-computer input devices (e.g., the computer mouse, touchscreen, keyboard) to better understand users’ cognitive and emotional states. He has applied his expertise to a variety of settings to improve fraud detection, risk assessments, behavioral information security, system usability, and online learning. He has published extensively in leading business and technology journals. In addition, the university has patented his research and licensed the patents to NeuroID, Inc. -- a university spin-off company that Dr. Jenkins co-founded.
Dr. Jenkins teaches classes in tech entrepreneurship, cyber security, and other information systems courses. He believes that teaching should not only help students develop relevant and useful skills, but also inspire students to seek and achieve great things beyond formal university instruction. He loves teaching in the classroom and also developing improved methods to teach and inspire students in online learning scenarios.
He graduated with a Ph.D. in Management with a major in Management Information Systems and a minor in Computational Linguistics from the University of Arizona. His advisor was Dr. Joe Valacich. He earned a master’s degree in Information Systems Management and a bachelor’s degree in Information Systems from Brigham Young University, and an associate degree in Information Systems from Brigham Young University-Idaho. He is originally from Rigby, Idaho.
Education
- Doctor of Philosophy in Management, Management Information Systems, University of Arizona, 2013
- Bachelor of Science, Information Systems, Brigham Young University, 2009
- Master of Science, Information Systems Management, Brigham Young University, 2009
- Associate of Science, Information Systems, Brigham Young University-Idaho, 2006
Selected Publications
- "Detecting Social Desirability Bias with Human-Computer Interaction: A Mouse-Tracking Study", Hawaii International Conference on Computer and Systems Sciences. Hawaii, 2024
- "Human or AI? Using Digital Behavior to Verify Essay Authorship", International Conference on Information Systems (ICIS), Association for Information Systems, 2023
- "Getting What You Paid For: Assessing Participant Experience Parameters for Amazon Mechanical Turk (MTurk) Workers on Survey Response Quality", 46th MIPRO ICT and Electronics Convention (MIPRO), 2023
- "Typing Fast versus Typing Slow: Using Typing Dynamics to Reveal Authentic and Imposter Users", Hawaii International Conference on Computer and Systems Sciences, 2023
- "Understanding Product Interest through Mouse-Cursor Tracking Analysis", Proceedings of the Twenty-Second Annual Workshop on HCI Research in MIS, 2023
- "Detecting Goal-Oriented vs. Browsing Users Through Behavior Analysis", 2023 MIPRO HCI Conference, 2023
- "Measuring State and Trait Attentional Control using Mouse Movements", 2023 MIPRO HCI Conference, 2023
- "Digital Behavioral Biometrics and Privacy: Methods for Improving Business Processes without Compromising Customer Privacy", MIPRO, 2022
- "The Path of the Righteous: Using Trace Data to Understand Fraud Decisions in Real Time", MIS Quarterly, Edition 4, Volume 46, Pages 2317-2336, 2022
- "Too Fast? Too Slow? A Novel Approach for Identifying Extreme Response Behavior in Online Surveys", Proceedings of the Twenty- First Annual Workshop on HCI Research in MIS, 2022
- "When is enough, enough? An Examination of Student Engagement when Watching Online Group Project Presentations", Hawaii International Conference on Computer and Systems Sciences, 2022
- "Do privacy assurances work? a study of truthfulness in healthcare history data collection", PLoS ONE, Edition 11, Volume 17, Pages e0276442, 2022
- "Embracing Brain and Behavior: Designing Programs of Complementary Neurophysiological and Behavioral Studies", Information Systems Journal, Wiley, 2022
- "Improving the Quality of Survey Data: Using Answering Behavior as an Alternative Method for Detecting Biased Respondents", Proceedings of the Twentieth Annual Workshop on HCI Research in MIS, 2021
- "Mitigating the Security Intention-Behavior Gap: The Moderating Role of Required Effort on the Intention-Behavior Relationship", Journal of the Association for Information Systems, Edition 1, Volume 22, 2021
- "Rigor, Relevance, and Practical Significance: A Real-life Journey to Organizational Value", AIS Transactions on Human-Computer Interaction, Edition 3, Volume 13, Pages 350-368, 2021
- "Detecting Noncompliant Behavior in Organizations: How Online Survey Responses and Behaviors Reveal Risk", Journal of Management Information Systems, 2021
- "Repetition of Computer Security Warnings Results in Differential Repetition Suppression Effects as Revealed with Functional MRI", Frontiers in Psychology, Edition 3403, Volume 11, 2020
- "Using Accelerometer and Gyroscope Data in Common Mobile Devices to Assess Credibility", Americas Conference on Information Systems, 2020
- "Using fMRI to Measure Stimulus Generalization of Software Notification to Security Warnings", Information Systems and Neuroscience, Pages 93-99, Springer, 2019
- "A Framework of Affordances for Virtually Assisted Activities", Journal of Management Information Systems, Edition 3, Volume 36, Pages 683-729, 2019
- "Framework of affordances for virtual reality and augmented reality", Journal of Management Information Systems, Edition 3, Volume 35, Pages 683-729, 2019
- "How Online Patient-Physician Interaction Influences Patient Satisfaction", International Conference on Information Systems, 2019
- "Improving Compassion Measurement in the Workforce by Analyzing Users’ Mouse-Cursor Movements", Americas Conference on Information Systems, 2019
- "Sleight of Hand: Identifying Insider Threats by Monitoring Mouse-Cursor Movements", Journal of the Association for Information Systems, Edition 1, Volume 20, Pages 1-32, 2019
- "Understanding Unauthorized Access using Fine-Grained Human-Computer Interaction Data", Proceedings of the Eighteenth Annual Workshop on HCI Research, 2019
- "Distinguishing the Difference: Critical Warnings and Non-essential Notifications", Proceedings of the 2019 Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13, Bossier City, Louisiana, 2019
- "The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings", Proceedings of the Fifteenth Symposium on Usable Privacy and Security, USENIX, Santa Clara, CA, 2019
- "Framework of Affordances for Virtual Reality and Augmented Reality", Journal of Management Information Systems, Edition 3, Volume 36, Pages 683-729, 2019
- "Keystroke Dynamics: Establishing Keyprints to Verify Users in Online Courses", Computers in the Schools, Edition 1, Volume 36, Pages 1-21, 2019
- "A Research Protocol for Examining Countermeasures: Developing Ground Truth and Motivating an Adequate Malicious Baseline", Credibility Assessment and Screening Technologies, Hawaii International Conference on Computer and Systems Sciences, 2018
- "Controlled Realism in Behavioral Research: Nine Lessons for Designing Experiments that Maximize both Control and Realism", Credibility Assessment and Screening Technologies, Hawaii International Conference on Computer and Systems Sciences, 2018
- "Creating a Realistic Experimental Scenario for HCI-Based Deception Detection Research with Ground Truth and Unsanctioned Malicious Acts", Proceedings of the Seventeenth Annual Workshop on HCI Research in MIS, 2018
- "Detecting Privacy Concerns Through Users’ Human-Computer Interaction (HCI) Dynamics", The Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13, 2018
- "Improve Your Behavioral Study with a Complementary Neurophysiological Study and Vice Versa", CHI Workshop on Bridging HCI, 2018
- "The Influence of Buying vs. Receiving an IT-based Device on User Commitment", Proceedings of the Seventeenth Annual Workshop on HCI Research in MIS, 2018
- "Improving Security Message Adherence through Improved Comprehension: Neural and Behavioral Insights", AMCIS 2019 Proceedings, 2018
- "Comprehending Comprehension of Security Warnings: Insights from Eye Tracking, fMRI, and Behavior", 2018
- "Tuning Out Security Warnings: A Longitudinal Examination of Habituation through fMRI, Eye Tracking, and Field Experiments", MIS Quarterly, 2018
- "The Missing Framework for Virtually Assisted Activities", ICIS 2017: Transforming Society with Digital Innovation, 2018
- "The Missing Framework for Virtually Assisted Activities", International Conference on Information Systems, 2017
- "How Is Your User Feeling? Inferring Emotion Through Human-Computer Interaction Devices", MIS Quarterly, Edition 1, Volume 41, Pages 1-21, 2017
- "Measuring Actual Behaviors in HCI Research – A call to Action and an Example", AIS Transactions on Human-Computer Interaction, Edition 4, Volume 9, Pages 339-352, 2017
- "Why and How to Design Complementary NeuroIS and Behavioral Experiments", Information Systems and Neuroscience: Gmunden Retreat on NeuroIS 2017, Springer, 2017
- "The Missing Framework for Virtually Assisted Activities", Thirty eighth International Conference on Information Systems, Seoul 2017, 2017
- "What Do We Really Know about How Habituation to Warnings Occurs Over Time? A Longitudinal fMRI Study of Habituation and Polymorphic Warnings", Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI), ACM, 2017
- "Using Wearable Devices for Non-invasive, Inexpensive Physiological Data Collection", Hawaiian International Conference on Systems Sciences, 2017
- "Using Wearable Devices for Non-invasive, Inexpensive Physiological Data Collection", Hawaiian International Conference on System Sciences, 2017
- "Using Wearable Devices for Non-invasive, Inexpensive Physiological Data Collection", Proceedings of the 50th Hawaii International Conference on System Sciences | 2017, 2017
- "From Warning to Wallpaper: Why the Brain Habituates to Security Warnings", Journal of Management Information Systems, Edition 3, Volume 30, Pages 713-743, 2016
- "From warnings to wallpaper: Why the brain habituates to security warnings and what can be done about it." Journal of Management Information Systems", Journal of Management Information Systems, Edition 3, Volume 33, Pages 713-743, 2016
- "More Harm than Good? How Security Messages that Interrupt Make Us Vulnerable", Information Systems Research, Edition 4, Volume 27, Pages 880-896, INFORMS, 2016
- "Integrating Facial Cues of Threat into Security Warnings – An fMRI and Field Study", Americas Conference on Information Systems, 2016
- "More Than Meets the Eye: How Oculometric Behaviors Evolve Over the Course of Automated Deception Detection Interactions", Journal of Management Information Systems, Edition 2, Volume 33, Pages 332-360, 2016
- "Real-Time Hand Tremor Detection via Mouse Cursor Movements for Improved Human-Computer Interactions: An Exploratory Study", Special Interest Group on Human Computer Interaction, 2016
- "Serious Games for Reducing Bias in Credibility Decisions: An Evaluation Framework and Case Study", Hawaii International Conference on Computer and Systems Sciences, 2016
- "Serious games: an evaluation framework and case study", 2016 49th Hawaii International Conference on System Sciences (HICSS), Pages 638--647, 2016
- "Suspicion Detection in the Wild: Lessons Learned from an Early Stage Company", Hawaii International Conference on Computer and Systems Sciences, Symposium on Rapid Screening Technologies, Deception Detection, and Credibility Assessment, 2016
- "Your Memory is Working Against You: How Eye Tracking and Memory Explain Habituation to Security Warnings", Decision Support Systems, Volume 92, Pages 3-13, 2016
- "How Users Perceive and Respond to Security Messages: A NeuroIS Research Agenda and Empirical Study", European Journal of Information Systems, Edition 4, Volume 25, Pages 364-390, 2016
- "A Multi-Experimental Examination of Analyzing Mouse Cursor Trajectories to Gauge Subject Uncertainty", Americas Conference on Information Systems, 2015
- "Behaviorally Measuring Ease-of-Use by Analyzing Users’ Mouse Cursor Movements", Fourteenth Annual Workshop on HCI Research in MIS, 2015
- "Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews", IEEE International Conference on Intelligence and Security Informatics (ISI), 2015
- "Lessons Learned From Successive Deception Experiment", Hawaii International Conference on Computer and Systems Sciences, 2015
- "Lessons Learned from Successive Deception Experiments", 2015
- "How Polymorphic Warnings Reduce Habituation in the Brain—Insights from an fMRI Study", Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI), Seoul, 2015
- "Exploring how Dual-Task Interference Influences End-User Secure Behavior", The Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13, 2014
- "Implicit and Explicit Training in the Mitigation of Cognitive Bias Through the Use of a Serious Game", Computers in Human Behavior, Volume 37, Pages 307-318, 2014
- "Investigating the Effect of Insurance Fraud on Mouse Usage in Human-Computer Interactions", International Conference on Information Systems, 2014
- "Proposing the Affect-Trust Infusion Model (ATIM) to explain and predict the influence of high and low affect infusion on Web vendor trust", Edition 5, Volume 51, Pages 579--594, Information \& Management, 2014
- "Proposing the Affect-Trust Infusion Model (ATIM) to Explain and Predict the Influence of High- and Low-Affect Infusion on Web-Vendor Trust", Proposing the Affect-Trust Infusion Model (ATIM) to Explain and Predict the Influence of High- and Low-Affect Infusion on Web-Vendor Trust, Edition 5, Volume 51, Pages 579-594, Information & Management, 2014
- "Assessing Credibility by Monitoring Changes in Typing Behavior: The Keystroke Dynamics Deception Detection Model", Hawaii International Conference on Computer and Systems Sciences, Symposium on Rapid Screening Technologies, Deception Detection and Credibility Assessment, 2013
- "Detecting deceptive chat-based communication using typing behavior and message cues", ACM Transactions on Management Information Systems, Edition 2, Volume 4, 2013
- "Exploring the Effect of Arousal and Valence on Mouse Interaction", International Conference on Information Systems, 2013
- "Identifying Insider Threats through Monitoring Mouse Movements in Concealed Information Tests", Hawaii International Conference on Computer and Systems Sciences, Symposium on Rapid Screening Technologies, Deception Detection and Credibility Assessment, 2013
- "Improving End-User Security through SETA Programs: An Action Research Approach", The Dewald Roode Workshop on Information Systems Security Research, 2013
- "Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals", Information Technology for Development, Edition 4, Volume 17, Pages 289-305, 2013
- "Mitigation of Cognitive Bias Through the Use of a Serious Game", Games + Learning + Society Conference 9.0, 2013
- "Proposing the Hedonic Affect Model (HAM) to explain how stimuli and performance expectations predict affect in individual and group hedonic systems use", Proceedings of the Journal of the Association for Information Systems Theory Development Workshop at the International Conference on Systems Sciences, Paris, France, December, Volume 13, Pages 1--51, 2013
- "Simplicity is Bliss: Controlling Extraneous Cognitive Load in Online Security Training to Promote Secure Behavior", Journal of Organizational and End User Computing, Edition 3, Volume 25, Pages 52–66, 2013
- "The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resource Allocation", European Intelligence and Security Informatics Conference (EISIC), Pages 252-255, 2013
- "What Kind of Interventions Can Help Users from Falling for Phishing Attempts: A Research Proposal for Examining Stage-Appropriate Interventions", Hawaii International Conference on System Sciences, Pages 4023–4032, 2013
- "What, I Shouldn’t Have Done That?: The Influence of Training and Just-in-Time Reminders on Secure Behavior", International Conference on Information Systems, 2013
- "E-Collaboration Media Use and Diversity Perceptions: An Evolutionary Perspective of Virtual Organizations", Edition 2, Volume 8, Pages 28–46, International Journal of e-Collaboration, 2012
- "Embodied Agents and the Predictive Elaboration Model of Persuasion – Embodied Agents Tailored to Users’ Need for Cognition", 2012 Hawaii International Conference on Computer and Systems Sciences, Symposium on Rapid Screening Technologies, Deception Detection and Credibility Assessment, 2012
- "Estimating Unknown Numbers More Precisely: A Stratified Sampling Methodology for Estimating the Baseline Population of Illegal Immigrants Passing through Open Checkpoints", Hawaii International Conference on Computer and Systems Sciences, Symposium on Rapid Screening Technologies, Deception Detection and Credibility Assessment, 2012
- "Examining Protective Behavior Stages of IS End Users: An Exploratory Cluster Analysis", The Dewald Roode Workshop on Information Systems Security Research, 2012
- "Forget the Fluff: Examining How Media Richness Influences the Impact of Information Security Training on Secure Behavior", Hawaii International Conference on System Science (HICSS), Pages 3288–3296, 2012
- "Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers", Journal of the American Society for Information Science and Technology, Edition 4, Volume 63, Pages 755–776, 2012
- "Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers", Journal of the Association for Information Science and Technology, Edition 4, Volume 63, Pages 755-776, 2012
- "Closing IT Security Hotspot: Increasing Auditors’ Understanding of the Impacts of IT Security Training on End-User Secure Behavior", 3rd. Annual pre-ICIS workshop on Accounting Information Systems, 2011
- "Design principles for special purpose, embodied, conversational intelligence with environmental sensors (SPECIES) agents", AIS Transactions on Human-Computer Interaction, Edition 2, Volume 3, Pages 62–81, 2011
- "Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment", Journal of Management Information Systems, Edition 1, Volume 28, Pages 201–234, 2011
- "Knowledge Sourcing and Knowledge Consumption in Computer-Mediated Complex Decision Making", Hawaii International Conference on System Sciences, Pages 1–8, 2011
- "Knowledge Sourcing and Knowledge Consumption in Computer-Mediated Complex Decision Making", 2011 44th Hawaii International Conference on System Sciences, Pages 1--8, 2011
- "Proposing the Affect-Trust Infusion Model (ATIM) to Explain and Predict the Influence of High-and Low-Affect Infusion on Web Vendor Trust", ". Journal of the Association for Information Systems (JAIS) ICIS Theory Development Workshop, 2011
- "Understanding Persistence of Risky IS Behavior with Respect to Phishing: A Multi-Stage Approach", The Dewald Roode Workshop on Information Systems Security Research, 2011
- "Encouraging Users to Behave Securely: Examining the Influence of Technical, Managerial, and Educational Controls on Users’ Secure Behavior", International Conference on Information Systems, 2010
- "Facial Thermal Imaging as a Technique for Deception Detection", Hawaii International Conference on Computer and Systems Sciences, Symposium on Rapid Screening Technologies, Deception Detection and Credibility Assessment, 2010
- "The CMC interactivity model: how interactivity enhances communication quality and process satisfaction in lean-media groups", Journal of Management Information Systems, Edition 1, Volume 26, Pages 155–196, 2009
- "Using Source Credibility Theory to Explain and Predict the Efficacy of Human-Computer Systems for Credibility Assessment", The 8th Annual Workshop on HCI Research in MIS, 2009
- "Proposing the Hedonic Affect Model (HAM) to Explain how Stimuli and Performance Expectations Predict Affect in Individual and Group Hedonic Systems Use", Journal of the Association for Information Systems (JAIS) ICIS Theory Development Workshop, 2008
- "Did I Buy the Right Gadget? A Methodological Replication Study", AIS Transactions on Replication Research
- "Are You, You? Seamlessly Fighting Identity Fraud with Keystroke Dynamics", Information Systems Research
- "Behaviorally Measuring Usability by Analyzing Users’ Mouse Movement Efficiency", MIS Quarterly
Awards
- Best Paper Nominee, Hawaii International Conference on Computer and Systems Sciences, 2023
- Association of Information Systems (AIS) Distinguised Member - Cum Laude, Association of Information Systems, 2022
- Association for Information Systems (AIS) Impact Award, Association for Information Systems, 2021
- BYU Early Career Scholarhip Award, BYU, 2021
- Twentieth Annual Workshop on HCI Research in MIS Best Paper Nominee, AIS Special Interest Group on Human Computer Interaction, 2021
- Faculty Research Award, BYU Marriott School of Business, 2020
- Best Paper Award, Journal of the Association of Information Systems, 2019
- European Research Paper of the Year, CIONet, 2018
- AIS Early Career Award, Association for Information Systems, 2017
- Best Paper Award: Information Systems Research, Information Systems Research, 2016
- Americans Conference on Information Systems Best Paper Nominee, 2015
- Fourteenth Annual Workshop on HCI Research in MIS Best Paper Nominee, 2015
- Games + Learning + Society Conference 9.0 Best Adaptive Force Award (Chosen by the Office of the Secretary of Defense), 2013
- Games + Learning + Society Conference 9.0 Best Game Overall: Business Category, 2013
- International Conference on Information Systems Best Paper Nominee, 2013
- Paul S. & Shirley Goodman Award in International Computer Technology, 2013
- 2012 ICIS Doctoral Consortium, 2012
- National Science Foundation Research Fellowship, 2012
- Science Foundation Arizona Fellowship, 2009
Languages
- German
Certificates and Licenses
- Certificate in College Teaching — University of Arizona — 2013