default search action
Matthew L. Jensen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Yi Wu, Hua Jonathan Ye, Matthew L. Jensen, Linwei Liu:
Impact of Project Updates and Their Social Endorsement in Online Medical Crowdfunding. J. Manag. Inf. Syst. 41(1): 73-110 (2024) - [c24]Matthew L. Jensen, Tom Meservy, Kelly J. Fadel:
Introduction to the Minitrack on Collaboration in Online Communities: Information Processing and Decision Making. HICSS 2024: 338-338 - [c23]Jon T. Meservy, Tom Meservy, Kelly J. Fadel, Matthew L. Jensen:
Exploring the Shifting Dynamics of Information Source Selection: Situational Characteristics and the Rise of Artificial Intelligence. HICSS 2024: 339-348 - [e1]Michelle Carter, Kelly J. Fadel, Thomas O. Meservy, Deborah J. Armstrong, Amit Deokar, Matthew L. Jensen:
30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, AMCIS 2024, Salt Lake City, UT, USA, August 15-17, 2024. Association for Information Systems 2024 [contents] - 2023
- [j37]Chuan (Annie) Tian, Matthew L. Jensen, Alexandra Durcikova:
Phishing susceptibility across industries: The differential impact of influence techniques. Comput. Secur. 135: 103487 (2023) - [j36]Christopher Nguyen, Matthew L. Jensen, Eric Day:
Learning not to take the bait: a longitudinal examination of digital training methods and overlearning on phishing susceptibility. Eur. J. Inf. Syst. 32(2): 238-262 (2023) - [c22]Matthew L. Jensen, Tom Meservy, Kelly J. Fadel:
Introduction to the Minitrack on Collaboration in Online Communities: Information Processing and Decision Making. HICSS 2023: 279 - 2022
- [j35]Jonathan (Hua) Ye, Matthew L. Jensen:
Effects of introducing an online community in a crowdsourcing contest platform. Inf. Syst. J. 32(6): 1203-1230 (2022) - [j34]Matthew L. Jensen, Ryan T. Wright, Alexandra Durcikova, Shamya Karumbaiah:
Improving Phishing Reporting Using Security Gamification. J. Manag. Inf. Syst. 39(3): 793-823 (2022) - [c21]Kelly J. Fadel, Matthew L. Jensen, Michael Matthews, Tom Meservy:
An Empirical Examination of Peer vs. Expert Advice in Online Forums. HICSS 2022: 1-10 - [c20]Tom Meservy, Kelly J. Fadel, Matthew L. Jensen:
Introduction to the Minitrack on Collaboration in Online Communities: Information Processing and Decision Making. HICSS 2022: 1 - 2021
- [j33]Brian Kimball Dunn, Narayan Ramasubbu, Matthew L. Jensen, Dennis F. Galletta, Paul Benjamin Lowry:
Efficiency and Exposure: Reconciling the Effects of Website Browsing Behaviors for Non-transactional Outcomes. AIS Trans. Hum. Comput. Interact. 13(2): 206-242 (2021) - [j32]Matthew L. Jensen, Alexandra Durcikova, Ryan T. Wright:
Using susceptibility claims to motivate behaviour change in IT security. Eur. J. Inf. Syst. 30(1): 27-45 (2021) - [j31]Christopher Nguyen, Matthew L. Jensen, Alexandra Durcikova, Ryan T. Wright:
A comparison of features in a crowdsourced phishing warning system. Inf. Syst. J. 31(3): 473-513 (2021) - [j30]Brian Kimball Dunn, Matthew L. Jensen, Ryan Ralston:
Attribution of Responsibility after Failures within Platform Ecosystems. J. Manag. Inf. Syst. 38(2): 546-570 (2021) - [c19]Tom Meservy, Kelly J. Fadel, Matthew L. Jensen, Michael Matthews:
Searching for Expert or Peer Advice in Online Forums. AMCIS 2021 - [c18]Shaila M. Miranda, Bachazile L. Sikhondze, Matthew L. Jensen, Marina Mery, Divya Patel, Shane Connelly:
Robust Action in Cross-Platform Communication by Ideological Groups: The Dark Side of Digital Activism. AMCIS 2021 - [c17]Matthew L. Jensen, Kelly J. Fadel, Thomas O. Meservy:
Introduction to the Minitrack on Collaboration in Online Communities: Information Processing and Decision Making. HICSS 2021: 1-2 - [c16]Matthew L. Jensen, Michael Matthews, Thomas O. Meservy, Kelly J. Fadel:
Expert vs. Peer: The Role of Situational Characteristics in Electronic Networks of Practice. HICSS 2021: 1-10
2010 – 2019
- 2019
- [j29]Claude H. Miller, Norah E. Dunbar, Matthew L. Jensen, Zachary B. Massey, Yu-Hao Lee, Spencer B. Nicholls, Chris Anderson, Aubrie Serena Adams, Javier Elizondo, William Thompson, Scott N. Wilson:
Training Law Enforcement Officers to Identify Reliable Deception Cues With a Serious Digital Game. Int. J. Game Based Learn. 9(3): 1-22 (2019) - 2018
- [j28]Norah E. Dunbar, Claude H. Miller, Yu-Hao Lee, Matthew L. Jensen, Chris Anderson, Aubrie Serena Adams, Javier Elizondo, William Thompson, Zach Massey, Spencer B. Nicholls, Ryan Ralston, Jaise Donovan, Emmett Mathews, Braden Roper, Scott N. Wilson:
Reliable deception cues training in an interactive video game. Comput. Hum. Behav. 85: 74-85 (2018) - 2017
- [j27]Michael K. Ault, Alisha M. Ness, William D. Taylor, Genevieve Johnson, Shane Connelly, Matthew L. Jensen, Norah E. Dunbar:
Ideological lens matters: Credibility heuristics, pre-existing attitudes, and reactions to messages on ideological websites. Comput. Hum. Behav. 68: 315-325 (2017) - [j26]Alisha M. Ness, Genevieve Johnson, Michael K. Ault, William D. Taylor, Jennifer A. Griffith, Shane Connelly, Norah E. Dunbar, Matthew L. Jensen:
Reactions to ideological websites: The impact of emotional appeals, credibility, and pre-existing attitudes. Comput. Hum. Behav. 72: 496-511 (2017) - [j25]Norah E. Dunbar, Matthew L. Jensen, Claude H. Miller, Elena Bessarabova, Yu-Hao Lee, Scott N. Wilson, Javier Elizondo, Bradley J. Adame, Joseph S. Valacich, Sara K. Straub, Judee K. Burgoon, Brianna Lane, Cameron W. Piercy, David W. Wilson, Shawn King, Cindy Vincent, Ryan M. Schuetzler:
Mitigation of Cognitive Bias with a Serious Game: Two Experiments Testing Feedback Timing and Source. Int. J. Game Based Learn. 7(4): 86-100 (2017) - [j24]Matthew L. Jensen, Michael Dinger, Ryan T. Wright, Jason Bennett Thatcher:
Training to Mitigate Phishing Attacks Using Mindfulness Techniques. J. Manag. Inf. Syst. 34(2): 597-626 (2017) - [j23]Matthew L. Jensen, Emre Yetgin:
Prominence and Interpretation of Online Conflict of Interest Disclosures. MIS Q. 41(2): 629-643 (2017) - [c15]Matthew L. Jensen, Alexandra Durcikova, Ryan T. Wright:
Combating Phishing Attacks: A Knowledge Management Approach. HICSS 2017: 1-10 - 2016
- [j22]Matthew L. Jensen, Yu-Hao Lee, Cameron W. Piercy, Norah E. Dunbar, Javier Elizondo, Elena Bessarabova, Nathan W. Twyman, Judee K. Burgoon, Joseph S. Valacich, Bradley J. Adame, Claude H. Miller, Scott N. Wilson:
Exploring Failure and Engagement in a Complex Digital Training Game: A Multi-method Examination. AIS Trans. Hum. Comput. Interact. 8(1): 2 (2016) - [j21]Elena Bessarabova, Cameron W. Piercy, Shawn King, Cindy Vincent, Norah E. Dunbar, Judee K. Burgoon, Claude H. Miller, Matthew L. Jensen, Aaron C. Elkins, David W. Wilson, Scott N. Wilson, Yu-Hao Lee:
Mitigating bias blind spot via a serious video game. Comput. Hum. Behav. 62: 452-466 (2016) - [j20]Shane Connelly, Norah E. Dunbar, Matthew L. Jensen, Jennifer A. Griffith, William D. Taylor, Genevieve Johnson, Michael G. Hughes, Michael D. Mumford:
Social Categorization, Moral Disengagement, and Credibility of Ideological Group Websites. J. Media Psychol. Theor. Methods Appl. 28(1): 16-31 (2016) - [c14]David W. Wilson, Jeffrey L. Jenkins, Nathan W. Twyman, Matthew L. Jensen, Joe S. Valacich, Norah E. Dunbar, Scott N. Wilson, Claude H. Miller, Bradley J. Adame, Yu-Hao Lee, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Serious Games: An Evaluation Framework and Case Study. HICSS 2016: 638-647 - 2015
- [j19]Emre Yetgin, Matthew L. Jensen, Teresa M. Shaft:
Complacency and Intentionality in IT Use and Continuance. AIS Trans. Hum. Comput. Interact. 7(1): 2 (2015) - [j18]William D. Taylor, Genevieve Johnson, Michael K. Ault, Jennifer A. Griffith, Bobby Rozzell, Shane Connelly, Matthew L. Jensen, Norah E. Dunbar, Alisha M. Ness:
Ideological group persuasion: A within-person study of how violence, interactivity, and credibility features influence online persuasion. Comput. Hum. Behav. 51: 448-460 (2015) - [j17]Norah E. Dunbar, Matthew L. Jensen, Judee K. Burgoon, Katherine M. Kelley, Kylie J. Harrison, Bradley J. Adame, Daniel Rex Bernard:
Effects of Veracity, Modality, and Sanctioning on Credibility Assessment During Mediated and Unmediated Interviews. Commun. Res. 42(5): 649-674 (2015) - [j16]Kelly J. Fadel, Thomas O. Meservy, Matthew L. Jensen:
Exploring Knowledge Filtering Processes in Electronic Networks of Practice. J. Manag. Inf. Syst. 31(4): 158-181 (2015) - [j15]Xiang Yu, Shaoting Zhang, Zhennan Yan, Fei Yang, Junzhou Huang, Norah E. Dunbar, Matthew L. Jensen, Judee K. Burgoon, Dimitris N. Metaxas:
Is Interactional Dissynchrony a Clue to Deception? Insights From Automated Analysis of Nonverbal Visual Cues. IEEE Trans. Cybern. 45(3): 506-520 (2015) - 2014
- [j14]Norah E. Dunbar, Claude H. Miller, Bradley J. Adame, Javier Elizondo, Scott N. Wilson, Brianna Lane, Abigail Allums Kauffman, Elena Bessarabova, Matthew L. Jensen, Sara K. Straub, Yu-Hao Lee, Judee K. Burgoon, Joseph S. Valacich, Jeffrey L. Jenkins, Jun Zhang:
Implicit and explicit training in the mitigation of cognitive bias through the use of a serious game. Comput. Hum. Behav. 37: 307-318 (2014) - [j13]Matthew L. Jensen, Norah E. Dunbar, Shane Connelly, William D. Taylor, Michael G. Hughes, Bradley J. Adame, Bobby Rozzell:
Organizational balancing of website interactivity and control: An examination of ideological groups and the duality of goals. Comput. Hum. Behav. 38: 43-54 (2014) - [j12]Norah E. Dunbar, Matthew L. Jensen, Elena Bessarabova, Judee K. Burgoon, Daniel Rex Bernard, Kylie J. Harrison, Katherine M. Kelley, Bradley J. Adame, Jacqueline M. Eckstein:
Empowered by Persuasive Deception. Commun. Res. 41(6): 852-876 (2014) - [j11]Thomas O. Meservy, Matthew L. Jensen, Kelly J. Fadel:
Evaluation of Competing Candidate Solutions in Electronic Networks of Practice. Inf. Syst. Res. 25(1): 15-34 (2014) - [j10]Ryan T. Wright, Matthew L. Jensen, Jason Bennett Thatcher, Michael Dinger, Kent Marett:
Research Note - Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance. Inf. Syst. Res. 25(2): 385-400 (2014) - [j9]Norah E. Dunbar, Shane Connelly, Matthew L. Jensen, Bradley J. Adame, Bobby Rozzell, Jennifer A. Griffith, H. Dan O'Hair:
Fear Appeals, Message Processing Cues, and Credibility in the Websites of Violent, Ideological, and Nonideological Groups. J. Comput. Mediat. Commun. 19(4): 871-889 (2014) - [c13]Kelly J. Fadel, Thomas O. Meservy, Matthew L. Jensen:
Dissecting the Process of Knowledge Filtering in Electronic Networks of Practice. HICSS 2014: 376-385 - [c12]Norah E. Dunbar, Matthew L. Jensen, Claude H. Miller, Elena Bessarabova, Sara K. Straub, Scott N. Wilson, Javier Elizondo, Judee K. Burgoon, Joseph S. Valacich, Bradley J. Adame, Yu-Hao Lee, Brianna Lane, Cameron W. Piercy, David W. Wilson, Shawn King, Cindy Vincent, Ryan Scheutzler:
Mitigating Cognitive Bias through the Use of Serious Games: Effects of Feedback. PERSUASIVE 2014: 92-105 - [c11]Genevieve Johnson, William D. Taylor, Alisha M. Ness, Michael K. Ault, Norah E. Dunbar, Matthew L. Jensen, Shane Connelly:
Credibility and Interactivity: Persuasive Components of Ideological Group Websites. PERSUASIVE 2014: 143-154 - [p2]Emre Yetgin, Matthew L. Jensen, Teresa M. Shaft:
Impacts of Information Systems on Decision-Making. Computing Handbook, 3rd ed. (2) 2014: 42: 1-15 - 2013
- [j8]Norah E. Dunbar, Scott N. Wilson, Bradley J. Adame, Javier Elizondo, Matthew L. Jensen, Claude H. Miller, Abigail Allums Kauffman, Toby Seltsam, Elena Bessarabova, Cindy Vincent, Sara K. Straub, Ryan Ralston, Christopher L. Dulawan, Dennis Ramirez, Kurt Squire, Joseph S. Valacich, Judee K. Burgoon:
MACBETH: Development of a Training Game for the Mitigation of Cognitive Bias. Int. J. Game Based Learn. 3(4): 7-26 (2013) - [j7]Matthew L. Jensen, Joshua M. Averbeck, Zhu Zhang, Kevin B. Wright:
Credibility of Anonymous Online Product Reviews: A Language Expectancy Perspective. J. Manag. Inf. Syst. 30(1): 293-324 (2013) - [c10]Matthew L. Jensen, Norah E. Dunbar, Shane Connelly, William D. Taylor, Michael G. Hughes, Bradley J. Adame, Bobby Rozzell:
Social Media on Violent Ideological Group Websites. AMCIS 2013 - [c9]Debra L. Tower, Matthew L. Jensen, Norah E. Dunbar, Aaron C. Elkins:
Don't Lie to Me: The Impact of Deception on Vocalic and Linguistic Synchrony. EISIC 2013: 262-265 - [c8]Xiang Yu, Shaoting Zhang, Yang Yu, Norah E. Dunbar, Matthew L. Jensen, Judee K. Burgoon, Dimitris N. Metaxas:
Automated analysis of interactional synchrony using robust facial tracking and expression recognition. FG 2013: 1-6 - 2012
- [j6]Paul Benjamin Lowry, Greg D. Moody, Anthony Vance, Matthew L. Jensen, Jeffrey L. Jenkins, Taylor Wells:
Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers. J. Assoc. Inf. Sci. Technol. 63(4): 755-776 (2012) - 2011
- [j5]Matthew L. Jensen, Paul Benjamin Lowry, Jeffrey L. Jenkins:
Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment. J. Manag. Inf. Syst. 28(1): 201-233 (2011) - [c7]Emre Yetgin, Matthew L. Jensen, Teresa M. Shaft:
The Differential Effects Of Technological Cues On Elaboration. AMCIS 2011 - [c6]Matthew L. Jensen:
The Effects of Compensation Disclosure and Consensus on Perceptions of Online Product Reviews. HICSS 2011: 1-10 - 2010
- [j4]Matthew L. Jensen, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Judging the Credibility of Information Gathered from Face-to-Face Interactions. ACM J. Data Inf. Qual. 2(1): 3:1-3:20 (2010) - [j3]Matthew L. Jensen, Paul Benjamin Lowry, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Technology Dominance in Complex Decision Making: The Case of Aided Credibility Assessment. J. Manag. Inf. Syst. 27(1): 175-202 (2010)
2000 – 2009
- 2009
- [j2]Judee K. Burgoon, Douglas P. Twitchell, Matthew L. Jensen, Thomas O. Meservy, Mark Adkins, John Kruse, Amit V. Deokar, Gabriel Tsechpenakis, Shan Lu, Dimitris N. Metaxas, Jay F. Nunamaker Jr., Robert Younger:
Detecting Concealment of Intent in Transportation Screening: A Proof of Concept. IEEE Trans. Intell. Transp. Syst. 10(1): 103-112 (2009) - 2008
- [p1]Matthew L. Jensen, Thomas O. Meservy, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Video-Based Deception Detection. Intelligence and Security Informatics 2008: 425-441 - 2007
- [b1]Matthew L. Jensen:
The Effects of an Expert System on Novice and Professional Decision Making with Application in Deception Detection. University of Arizona, Tucson, USA, 2007 - [c5]Matthew L. Jensen, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Computer-aided Credibility Assessment by Novice Lie-Catchers. AMCIS 2007: 159 - 2005
- [j1]Thomas O. Meservy, Matthew L. Jensen, John Kruse, Douglas P. Twitchell, Judee K. Burgoon, Dimitris N. Metaxas, Jay F. Nunamaker Jr.:
Deception Detection through Automatic, Unobtrusive Analysis of Nonverbal Behavior. IEEE Intell. Syst. 20(5): 36-43 (2005) - [c4]Judee K. Burgoon, Mark Adkins, John Kruse, Matthew L. Jensen, Thomas O. Meservy, Douglas P. Twitchell, Amit V. Deokar, Jay F. Nunamaker Jr., Shan Lu, Gabriel Tsechpenakis, Dimitris N. Metaxas, Robert Younger:
An Approach for Intent Identification by Building on Deception Detection. HICSS 2005 - [c3]Shan Lu, Gabriel Tsechpenakis, Dimitris N. Metaxas, Matthew L. Jensen, John Kruse:
Blob Analysis of the Head and Hands: A Method for Deception Detection. HICSS 2005 - [c2]Gabriel Tsechpenakis, Dimitris N. Metaxas, Mark Adkins, John Kruse, Judee K. Burgoon, Matthew L. Jensen, Thomas O. Meservy, Douglas P. Twitchell, Amit V. Deokar, Jay F. Nunamaker Jr.:
HMM-Based Deception Recognition from Visual Cues. ICME 2005: 824-827 - [c1]Thomas O. Meservy, Matthew L. Jensen, John Kruse, Judee K. Burgoon, Jay F. Nunamaker Jr.:
Automatic Extraction of Deceptive Behavioral Cues from Video. ISI 2005: 198-208
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint