2016
DOI: 10.1287/isre.2016.0644
|View full text |Cite
|
Sign up to set email alerts
|

More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable

Abstract: S ystem-generated alerts are ubiquitous in personal computing and, with the proliferation of mobile devices, daily activity. While these interruptions provide timely information, research shows they come at a high cost in terms of increased stress and decreased productivity. This is due to dual-task interference (DTI), a cognitive limitation in which even simple tasks cannot be simultaneously performed without significant performance loss. Although previous research has examined how DTI impacts the performance… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
3
2

Relationship

2
8

Authors

Journals

citations
Cited by 99 publications
(40 citation statements)
references
References 44 publications
0
39
0
1
Order By: Relevance
“…We evaluate the effectiveness of polymorphic warnings over time using NeuroIS. NeuroIS can be an effective approach for the evaluation of IT artifacts (vom Brocke and Liang 2014), and it has previously been shown to be effective in examining security warnings specifically (Jenkins et al 2016;Vance et al 2014). Riedl, Davis, and Hevner (2014, p. ii) explain that NeuroIS measures are beneficial "to the design of ICT artifacts."…”
Section: Polymorphic Warning Designmentioning
confidence: 99%
“…We evaluate the effectiveness of polymorphic warnings over time using NeuroIS. NeuroIS can be an effective approach for the evaluation of IT artifacts (vom Brocke and Liang 2014), and it has previously been shown to be effective in examining security warnings specifically (Jenkins et al 2016;Vance et al 2014). Riedl, Davis, and Hevner (2014, p. ii) explain that NeuroIS measures are beneficial "to the design of ICT artifacts."…”
Section: Polymorphic Warning Designmentioning
confidence: 99%
“…Since the release of the NSTC report, the National Science Foundation, Department of Homeland Security, DARPA, and other agencies have sponsored numerous funding opportunities that target extant gaps in cybersecurity literature, many of which can be addressed by IS scholars. In fact, there are many within the IS community that already have expressed interest in security-related topics, such as safe computing practices and privacy (Anderson and Agarwal 2010;Jenkins et al 2016;Sutanto et al 2014). However, one major research gap that IS scholars have currently left unexplored is the investigation of cybercriminals to enrich our understanding of how to effectively combat cybercrime Mahmood et al 2010).…”
Section: Introductionmentioning
confidence: 99%
“…We recruited participants from Amazon Mechanical Turk (MTurk). MTurk represents a large diversity of participants and the data is considered as reliable as those collected from other methods [4,19]. Following Steelman et al [38], we required all participants to be within the United States.…”
Section: Samplementioning
confidence: 99%