Zachary Vance and Bonnie Anderson, Information Systems The comprehension of security messages can be a difficult task to decipher, as comprehension works through a series of stages. The four major steps in comprehension are attention, semantics, syntax, and pragmatics, as outlined by figure 1 below. Through the use of eye-tracking, we were able to focus […]
Measuring Compassion in the Workforce
Haley Kirk, Jeffrey Jenkins, Information Systems My ORCA project is designed to measure a person’s level of compassion using mouse-cursor tracking. The field of compassion is relatively untouched in the world of research, and I wanted to be one of the first to effectively measure compassion. I also wanted this measurement to be easily implemented into […]
Helping Consumers Make Better Decisions: Transitioning from Text-to Video-Based Privacy Policies
Jacob Fredericksen and Dr. Mark Keith, Information Systems Electronic transactions such as purchases, account registrations, and app downloads frequently require consumers to disclose personal information, financial information, and/or online social network information. Providers who participate in such transactions (e.g., mobile application vendors) may disclose how they intend to use consumers’ information by displaying some form […]
Improving Privacy and Security of Mobile Devices in Uganda
Deana Mugimu and Dr. Anthony Vance, Information Systems Mobile security illiteracy isn’t an issue for only the people of Uganda, it’s an issue all around the world, even in developed countries. Smartphones are becoming more technologically advanced, cheaper, and more people from all age ranges around the world are using them. Business information, social media […]
Improving Fraud Detection by Auditors via Integration of Cybersecurity Principles
Andrew Sanford and Dr. Conan Albrecht, Information Systems Introduction It is generally accepted that the American public expects auditors to find fraud. While detecting both fraud and errors are official SAS 99 expectations, auditors spend the overwhelming majority of their time on finding only errors. This focus, in part, has allowed frauds such as Enron […]
How Habituation to System Notifications Leads to Disregard of Security Warnings
Nate Munk, Dr. Bonnie Anderson, and Dr. Anthony Vance, Information Systems Habituation, the decreased response to repeated stimulation (Thompson and Spencer, 1966), to security warnings may be more serious than previously thought, due to generalization of habituation. Generalization occurs when the effects of habituation to a repeated stimulus carry over to other novel stimuli that […]
Model Analysis Automation
John Lim and Dr. James Gaskin, Information Systems Introduction The development of statistical modeling plugins for use in AMOS and SPSS software continues! We cannot do justice to the contributions that we have been able to produce through our research this past year. The ORCA Grant was awarded at a very timely point in our […]
Right Now Is the Wrong Time: And Other Considerations When Presenting Security Warnings
Brock Johanson and Bonnie Anderson, Information Systems Introduction Neuro Information Security (NeuroIS) focuses on the use of neurological measurements to improve the security of information systems. The BYU NeuroIS lab uses neurological tools and measurements to examine factors that affect security outcomes. Previous work has focused on various factors such as dual task interference (DTI), […]
Mobile Hands: What Your Phone Use Says About You
Parker Williams and Jeff Jenkins, Information Systems Introduction The percentage of individuals using mobile phones to respond to online applications, forms, and surveys is predicted to rapidly increase in the future. As of June 2, 2015, there were an estimated 2.6 billion smartphones in use in the world; by 2020 there will be 6.1 billion smartphones […]
Resolving “mixed” privacy signals Untangling the anchoring and adjustment in the presence of multiple signals
Thong Pham and Mark Keith, Information Systems Introduction As the technologies enabling mobile and ubiquitous information rapidly evolve, so do the information privacy risks to consumers (Belanger and Crossler 2011; Pavlou 2011; Smith et al. 2011). Perceived privacy risk has been demonstrated to be a critical factor in both information disclosure intentions (Dinev and Hart […]
- 1
- 2
- 3
- …
- 5
- Next Page »