Follow
Bonnie Brinton Anderson
Bonnie Brinton Anderson
Professor of Information Systems, Brigham Young University
Verified email at byu.edu
Title
Cited by
Cited by
Year
Using measures of risk perception to predict information security behavior: Insights from electroencephalography (EEG)
A Vance, BB Anderson, CB Kirwan, D Eargle
Journal of the Association for Information Systems 15 (10), 2, 2014
1392014
How polymorphic warnings reduce habituation in the brain: Insights from an fMRI study
BB Anderson, CB Kirwan, JL Jenkins, D Eargle, S Howard, A Vance
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
1232015
More harm than good? How messages that interrupt can make us vulnerable
JL Jenkins, BB Anderson, A Vance, CB Kirwan, D Eargle
Information Systems Research 27 (4), 880-896, 2016
1052016
How users perceive and respond to security messages: a NeuroIS research agenda and empirical study
B Brinton Anderson, A Vance, CB Kirwan, D Eargle, JL Jenkins
European Journal of Information Systems 25 (4), 364-390, 2016
822016
Tuning out security warnings: A longitudinal examination of habituation through fMRI, eye tracking, and field experiments
A Vance, JL Jenkins, BB Anderson, DK Bjornn, CB Kirwan
MIS Quarterly 42 (2), 355-380, 2018
732018
From warning to wallpaper: Why the brain habituates to security warnings and what can be done about it
BB Anderson, A Vance, CB Kirwan, JL Jenkins, D Eargle
Journal of Management Information Systems 33 (3), 713-743, 2016
702016
Model checking for design and assurance of e-Business processes
BB Anderson, JV Hansen, PB Lowry, SL Summers
Decision Support Systems 39 (3), 333-344, 2005
512005
Users aren’t (necessarily) lazy: Using neurois to explain habituation to security warnings
B Anderson, A Vance, B Kirwan, D Eargle, S Howard
502014
What do we really know about how habituation to warnings occurs over time? A longitudinal fMRI study of habituation and polymorphic warnings
A Vance, B Kirwan, D Bjornn, J Jenkins, BB Anderson
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems …, 2017
412017
Your memory is working against you: How eye tracking and memory explain habituation to security warnings
BB Anderson, JL Jenkins, A Vance, CB Kirwan, D Eargle
Decision Support Systems 92, 3-13, 2016
382016
Model checking for E-business control and assurance
BB Anderson, JV Hansen, PB Lowry, SL Summers
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2005
342005
of e-Business processes
BB Anderson, JV Hansen, PB Lowry, SL Summers
332003
An estimation of the decision models of senior IS managers when evaluating the external quality of organizational software
BB Anderson, A Bajaj, W Gorr
Journal of systems and software 61 (1), 59-75, 2002
29*2002
The application of model checking for securing e-commerce transactions
BB Anderson, JV Hansen, PB Lowry, SL Summers
Communications of the ACM 49 (6), 97-101, 2006
242006
Standards and verification for fair-exchange and atomicity in e-commerce transactions
BB Anderson, JV Hansen, PB Lowry, SL Summers
Information Sciences 176 (8), 1045-1066, 2006
242006
The fog of warnings: how non-essential notifications blur with security warnings
A Vance, D Eargle, JL Jenkins, CB Kirwan, BB Anderson
Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), 407-420, 2019
192019
Coding, programming and the changing curriculum for computing in schools
D Storte, M Webb, RM Bottino, D Passey, I Kalas, C Bescherer, JM Smith, ...
82019
It all blurs together: How the effects of habituation generalize across system notifications and security warnings
BB Anderson, A Vance, JL Jenkins, CB Kirwan, D Bjornn
Information Systems and Neuroscience, 43-49, 2017
82017
Using fMRI to measure stimulus generalization of software notification to security warnings
B Kirwan, B Anderson, D Eargle, J Jenkins, A Vance
Information systems and neuroscience, 93-99, 2020
52020
Creating automated plans for semantic web applications through planning as model checking
BB Anderson, JV Hansen, PB Lowry
Expert Systems with Applications 36 (7), 10595-10603, 2009
52009
The system can't perform the operation now. Try again later.
Articles 1–20