Follow
David Eargle
David Eargle
University of Colorado Boulder
Verified email at daveeargle.com
Title
Cited by
Cited by
Year
Using measures of risk perception to predict information security behavior: Insights from electroencephalography (EEG)
A Vance, BB Anderson, CB Kirwan, D Eargle
Journal of the Association for Information Systems 15 (10), 2, 2014
1782014
More harm than good? How messages that interrupt can make us vulnerable
JL Jenkins, BB Anderson, A Vance, CB Kirwan, D Eargle
Information Systems Research 27 (4), 880-896, 2016
1592016
How polymorphic warnings reduce habituation in the brain: Insights from an fMRI study
BB Anderson, CB Kirwan, JL Jenkins, D Eargle, S Howard, A Vance
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
1532015
Theories used in IS research wiki
KR Larsen, G Allen, A Vance, D Eargle
Retrieved Sept 22, 2015, 2015
124*2015
How users perceive and respond to security messages: a NeuroIS research agenda and empirical study
B Brinton Anderson, A Vance, CB Kirwan, D Eargle, JL Jenkins
European Journal of Information Systems 25 (4), 364-390, 2016
1182016
From warning to wallpaper: Why the brain habituates to security warnings and what can be done about it
BB Anderson, A Vance, CB Kirwan, JL Jenkins, D Eargle
Journal of Management Information Systems 33 (3), 713-743, 2016
1022016
Kepler Mapper: A flexible Python implementation of the Mapper algorithm.
HJ Van Veen, N Saul, D Eargle, SW Mangham
Journal of Open Source Software 4 (42), 1315, 2019
882019
Enhancing Password Security through Interactive Fear Appeals: A Web-Based Field Experiment
A Vance, D Eargle, K Ouimet, D Straub
System Sciences (HICSS), 2013 46th Hawaii International Conference on, 2988-2997, 2013
872013
Your memory is working against you: How eye tracking and memory explain habituation to security warnings
BB Anderson, JL Jenkins, A Vance, CB Kirwan, D Eargle
Decision Support Systems 92, 3-13, 2016
652016
Users aren’t (necessarily) lazy: Using neurois to explain habituation to security warnings
B Anderson, A Vance, B Kirwan, D Eargle, S Howard
592014
The fog of warnings: how non-essential notifications blur with security warnings
A Vance, D Eargle, JL Jenkins, CB Kirwan, BB Anderson
Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), 407-420, 2019
442019
Do security fear appeals work when they interrupt tasks? A multi-method examination of password strength
A Vance, D Eargle, D Eggett, D Straub, K Ouimet
Management Information Systems Research Center, University of Minnesota, 2022
162022
psiTurk: An open platform for science on Amazon Mechanical Turk
D Eargle, T Gureckis, AS Rich, J McDonnell, JB Martin
Zenodo, 2021
122021
Neural correlates of gender differences and color in distinguishing security warnings and legitimate websites: a neurosecurity study
BB Anderson, CB Kirwan, D Eargle, SR Jensen, A Vance
Journal of Cybersecurity 1 (1), 109-120, 2015
102015
Using fMRI to measure stimulus generalization of software notification to security warnings
B Kirwan, B Anderson, D Eargle, J Jenkins, A Vance
Information Systems and Neuroscience: NeuroIS Retreat 2019, 93-99, 2020
72020
Kepler Mapper: A flexible Python implementation of themapper algorithm (version 1.3. 3). Zenodo
HJ van Veen, N Saul, D Eargle, SW Mangham
62019
Integrating Facial Cues of Threat into Security Warnings–An fMRI and Field Study
D Eargle, D Galletta, B Kirwan, A Vance, J Jenkins
62016
Poster: You can do better–motivational statements in password-meter feedback
D Eargle, J Godfrey, H Miao, S Stevenson, R Shay, B Ur, L Cranor
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 2015
6*2015
Your memory is working against you: How eye tracking and memory explain susceptibility to phishing
BB Anderson, J Jenkins, A Vance, CB Kirwan, D Eargle
Decision Support Systems 25 (4), 3-13, 2016
52016
Integrating social and economic models of responding to privacy messages in mobile computing: a research agenda
D Galletta, D Eargle, S Janansefat, D Kunev, SP Singh
52015
The system can't perform the operation now. Try again later.
Articles 1–20