IS

Jensen, Matthew L.

Topic Weight Topic Terms
0.626 detection deception assessment credibility automated fraud fake cues detecting results screening study detect design indicators
0.581 decision accuracy aid aids prediction experiment effects accurate support making preferences interaction judgment hybrid perceptual
0.539 knowledge sharing contribution practice electronic expertise individuals repositories management technical repository knowledge-sharing shared contributors novelty
0.381 personalization content personalized willingness web pay online likelihood information consumers cues customers consumer services elaboration
0.355 results study research experiment experiments influence implications conducted laboratory field different indicate impact effectiveness future
0.213 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals
0.197 using subjects results study experiment did conducted task time used experienced use preference experimental presented
0.195 theory theories theoretical paper new understanding work practical explain empirical contribution phenomenon literature second implications
0.173 problems issues major involved legal future technological impact dealing efforts current lack challenges subsystem related
0.143 network networks social analysis ties structure p2p exchange externalities individual impact peer-to-peer structural growth centrality
0.138 model research data results study using theoretical influence findings theory support implications test collected tested
0.110 task fit tasks performance cognitive theory using support type comprehension tools tool effects effect matching
0.109 analysis techniques structured categories protocol used evolution support methods protocols verbal improve object-oriented difficulties analyses

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Fadel, Kelly J. 2 Lowry, Paul Benjamin 2 Burgoon, Judee K 1 Jenkins, Jeffrey L. 1
Meservy, Thomas 1 Meservy, Thomas O. 1 Nunamaker, Jr., Jay F. 1 Thatcher, Jason Bennett 1
Wright, Ryan T. 1
credibility assessment 2 deception 2 electronic networks of practice 2 field experiment 2
credibility 1 constancy directionality 1 deception detection 1 decision aids 1
decision making 1 decision support systems 1 dual process theory 1 elaboration likelihood 1
eye tracking 1 field experiments 1 filtering 1 indirect cues elicitation 1
information influence 1 influence techniques 1 knowledge management 1 knowledge forums 1
knowledge filtering 1 knowledge evaluation 1 linguistic analysis 1 mediated knowledge exchange 1
motivation theory 1 mediated deception 1 online deception 1 phishing 1
persuasion theory 1 perceived locus of causality 1 self-determination 1 social engineering 1
theory of technology dominance 1

Articles (5)

Exploring Knowledge Filtering Processes in Electronic Networks of Practice (Journal of Management Information Systems, 2015)
Authors: Abstract:
    Electronic networks of practice (ENPs) have become an important mechanism for knowledge exchange among loosely connected individuals who share common knowledge interests. While prior research has explored factors that influence knowledge contribution in such networks, less is understood about the process by which individuals evaluate and ultimately adopt knowledge from ENPs. This study examines the process of knowledge filtering in online ENP forums. Drawing from dual process and information-evaluation theories, we hypothesize that performance on a knowledge-filtering task will be influenced by the constancy and directionality of search patterns employed by knowledge seekers. Hypotheses are tested in an experiment that utilized an eye tracker to record gaze data from professional software developers using an experimental ENP forum. By combining information-evaluation and dual process theory perspectives, our results deepen the insights offered in extant information-processing literature by showing that higher filtering accuracy is associated with (a) constant evaluation of some types of information attributes (solution content) but not others (peripheral cues), and (b) increasing attribute-based processing over time. > >
Evaluation of Competing Candidate Solutions in Electronic Networks of Practice (Information Systems Research, 2014)
Authors: Abstract:
    Electronic networks of practice have become a prevalent means for acquiring new knowledge. Knowledge seekers commonly turn to online repositories constructed by these networks to find solutions to domain-specific problems and questions. Yet little is understood about the process by which such knowledge is evaluated and adopted by knowledge seekers. This study examines how individuals filter knowledge encountered in online forums, a common platform for knowledge exchange in an electronic network of practice. Drawing on dual process theory, we develop research hypotheses regarding both central and peripheral evaluation of knowledge. These hypotheses are examined in a field experiment in which participants evaluate online solutions for computer programming problems. Results show that peripheral cues (source expertise and validation) have a greater influence on knowledge filtering decisions than does the content quality of the solution. Moreover, elaboration increases the effect of content quality but does not seem to attenuate the effect of peripheral cues. Implications for research and practice are discussed.
Research Note--Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance (Information Systems Research, 2014)
Authors: Abstract:
    Phishing is a major threat to individuals and organizations. Along with billions of dollars lost annually, phishing attacks have led to significant data breaches, loss of corporate secrets, and espionage. Despite the significant threat, potential phishing targets have little theoretical or practical guidance on which phishing tactics are most dangerous and require heightened caution. The current study extends persuasion and motivation theory to postulate why certain influence techniques are especially dangerous when used in phishing attacks. We evaluated our hypotheses using a large field experiment that involved sending phishing messages to more than 2,600 participants. Results indicated a disparity in levels of danger presented by different influence techniques used in phishing attacks. Specifically, participants were less vulnerable to phishing influence techniques that relied on fictitious prior shared experience and were more vulnerable to techniques offering a high level of self-determination. By extending persuasion and motivation theory to explain the relative efficacy of phishers' influence techniques, this work clarifies significant vulnerabilities and lays the foundation for individuals and organizations to combat phishing through awareness and training efforts.
Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment. (Journal of Management Information Systems, 2011)
Authors: Abstract:
    Historically, inaccurate credibility assessments have resulted in tremendous costs to businesses and to society. Recent research offers unobtrusive credibility assessment aids as a solution; however, the accuracy of these decision aids is inadequate, and users often resist accepting the aids' recommendations. We follow the principles of signal detection theory to improve the accuracy of recommendations in computer-aided credibility assessment by combining automated and participatory decision support. We also leverage participation in decision-making theory to explain and predict an increased acceptance of assessment aid recommendations when perceptual cues are elicited from users. Based on these two theories, we design and test a hybrid decision aid to perform automated linguistic analysis and to elicit and analyze perceptual cues from an observer. Results from a laboratory experiment indicate that decision aids that use linguistic and perceptual cues offer more accurate recommendations than aids that use only one type of cue. Automatic analysis of linguistic cues improved both the decision aid's recommendations and the users' credibility assessment accuracy. Challenging the generalizability of past findings, the elicitation of perceptual cues did not improve the decision aid's recommendations or the users' assessment accuracy. Elicitation of perceptual cues, however, did improve user acceptance of the decision aid's recommendations. These findings provide guidance for future development of credibility assessment decision aids.
Technology Dominance in Complex Decision Making: The Case of Aided Credibility Assessment. (Journal of Management Information Systems, 2010)
Authors: Abstract:
    The article presents the results of an experiment which involved novices and experts using a decision aid to detect deception in a law enforcement scenario. Both groups improved their assessment accuracy using the decision support system, but tended to ignore it when it contradicted them. The professionals often did not even look at the decision aid's reasons for contradicting them. The theory of technology dominance (TTD) is discussed in this context, and it is noted that the experiment's results contradicted TTD in two respects.