


default search action
Justin Scott Giboney
Person information
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Justin Scott Giboney, Elizabeth M. Bonsignore, Jason K. McDonald, Derek L. Hansen, Lucia Mata, Jon Balzotti:
Perception of "This is Not a Game": Definition and Measurement. Int. J. Hum. Comput. Interact. 40(17): 4725-4744 (2024) - [c16]Ryan M. Schuetzler, Justin Scott Giboney, Taylor M. Wells, Benjamin Richardson, Tom Meservy, Cole Sutton, Clay Posey, Jacob Steffen, Amanda Lee Hughes:
Student Interaction with Generative AI: An Exploration of an Emergent Information-Search Process. HICSS 2024: 7500-7509 - 2023
- [j18]Justin Scott Giboney, Ryan M. Schuetzler
, G. Mark Grimes:
Know your enemy: Conversational agents for security, education, training, and awareness at scale. Comput. Secur. 129: 103207 (2023) - [j17]Justin Scott Giboney, Bonnie Brinton Anderson, Geoffrey A. Wright, Shayna Oh, Quincy Taylor, Megan Warren, Kylie Johnson
:
Barriers to a cybersecurity career: Analysis across career stage and gender. Comput. Secur. 132: 103316 (2023) - 2022
- [c15]Ryan M. Schuetzler, Justin Scott Giboney, G. Mark Grimes:
Design of a Chatbot Social Engineering Victim. HICSS 2022: 1-7 - 2021
- [j16]G. Mark Grimes, Ryan M. Schuetzler
, Justin Scott Giboney:
Mental models and expectation violations in conversational AI interactions. Decis. Support Syst. 144: 113515 (2021) - [j15]Ryan M. Schuetzler, G. Mark Grimes, Justin Scott Giboney, Holly K. Rosser:
Deciding Whether and How to Deploy Chatbots. MIS Q. Executive 20(1): 4 (2021) - [c14]Justin Scott Giboney, Ryan M. Schuetzler, G. Mark Grimes, Isaac Dayley:
A Social Engineering Victim Chatbot to Teach Adversarial Thinking. AMCIS 2021 - [c13]Jacob Siebach, Justin Scott Giboney:
The Abacus: A New Architecture for Policy-based Authorization. HICSS 2021: 1-10 - 2020
- [j14]Ryan M. Schuetzler
, G. Mark Grimes, Justin Scott Giboney:
The impact of chatbot conversational skill on engagement and perceived humanness. J. Manag. Inf. Syst. 37(3): 875-900 (2020)
2010 – 2019
- 2019
- [j13]Ryan M. Schuetzler
, G. Mark Grimes, Justin Scott Giboney:
The effect of conversational agent skill on user behavior during deception. Comput. Hum. Behav. 97: 250-259 (2019) - [j12]Justin Scott Giboney, Robert O. Briggs, Jay F. Nunamaker Jr.:
Special Section: Engineering Artifacts and Processes of Information Systems. J. Manag. Inf. Syst. 36(1): 11-13 (2019) - [c12]Justin Scott Giboney, Derek L. Hansen, Jason K. McDonald, Jonathan Balzotti, Johnson Tanner, Desiree Winters, Elizabeth Bonsignore:
Theory of Experiential Career Exploration Technology (TECET): Increasing cybersecurity career interest through playable case studies. HICSS 2019: 1-10 - [c11]Jason K. McDonald, Derek L. Hansen, Jonathan Balzotti, Johnson Tanner, Desiree Winters, Justin Scott Giboney, Elizabeth Bonsignore:
Designing Authentic Cybersecurity Learning Experiences: Lessons from the Cybermatics Playable Case Study. HICSS 2019: 1-10 - 2018
- [j11]Ryan M. Schuetzler
, Justin Scott Giboney
, G. Mark Grimes, Jay F. Nunamaker Jr.:
The influence of conversational agent embodiment and conversational relevance on socially desirable responding. Decis. Support Syst. 114: 94-102 (2018) - [c10]Ryan M. Schuetzler, G. Mark Grimes, Justin Scott Giboney:
An Investigation of Conversational Agent Relevance, Presence, and Engagement. AMCIS 2018 - [c9]Ryan M. Schuetzler, Justin Scott Giboney, G. Mark Grimes, Jay F. Nunamaker Jr.:
The Influence of Conversational Agents on Socially Desirable Responding. HICSS 2018: 1-10 - [c8]Jared James Meyers, Derek L. Hansen, Justin Scott Giboney, Dale C. Rowe:
Training Future Cybersecurity Professionals in Spear Phishing using SiEVE. SIGITE 2018: 135-140 - 2017
- [j10]Katherine Payne, Mark J. Keith
, Ryan M. Schuetzler
, Justin Scott Giboney:
Examining the learning effects of live streaming video game instruction over Twitch. Comput. Hum. Behav. 77: 95-109 (2017) - [j9]Justin Scott Giboney, Robert O. Briggs, Jay F. Nunamaker Jr.:
Special Issue: Creating Social Value with Information. J. Manag. Inf. Syst. 34(4): 935-938 (2017) - [j8]Jay F. Nunamaker Jr., Nathan W. Twyman
, Justin Scott Giboney, Robert O. Briggs:
Creating High-Value Real-World Impact through Systematic Programs of Research. MIS Q. 41(2): 335-351 (2017) - 2016
- [j7]Justin Scott Giboney
, Jeffrey Gainer Proudfoot, Sanjay Goel, Joseph S. Valacich
:
The Security Expertise Assessment Measure (SEAM): Developing a scale for hacker expertise. Comput. Secur. 60: 37-51 (2016) - [j6]Judee K. Burgoon, Joseph A. Bonito, Paul Benjamin Lowry, Sean L. Humpherys, Gregory D. Moody, James E. Gaskin, Justin Scott Giboney:
Application of Expectancy Violations Theory to communication with and judgments about embodied agents during a decision-making task. Int. J. Hum. Comput. Stud. 91: 24-36 (2016) - [j5]Jay F. Nunamaker Jr., Judee K. Burgoon, Justin Scott Giboney:
Special Issue: Information Systems for Deception Detection. J. Manag. Inf. Syst. 33(2): 327-331 (2016) - [j4]Justin Scott Giboney, Robert O. Briggs
, Jay F. Nunamaker Jr.:
Special Issue: Designing Tools to Answer Great Information Systems Research Questions. J. Manag. Inf. Syst. 33(4): 938-941 (2016) - 2015
- [j3]Justin Scott Giboney, Susan A. Brown
, Paul Benjamin Lowry, Jay F. Nunamaker Jr.:
User acceptance of knowledge-based system recommendations: Explanations, arguments, and fit. Decis. Support Syst. 72: 1-10 (2015) - [j2]Robert O. Briggs
, Jay F. Nunamaker Jr., Justin Scott Giboney:
Special Issue: On the Contributions of Applied Science/Engineering Research to Information Systems. J. Manag. Inf. Syst. 32(3): 3-9 (2015) - 2014
- [c7]Justin Scott Giboney, David W. Wilson, Alexandra Durcikova:
An Individual's Views of the Right to Privacy of Other Individuals, Companies, and Governments: A Theoretical Perspective. AMCIS 2014 - [c6]Ryan M. Schuetzler, G. Mark Grimes, Justin Scott Giboney, Joseph Buckman:
Facilitating Natural Conversational Agent Interactions: Lessons from a Deception Experiment. ICIS 2014 - 2013
- [c5]Jay F. Nunamaker Jr., Nathan W. Twyman, Justin Scott Giboney:
Breaking out of the Design Science Box: High-Value Impact Through Multidisciplinary Design Science Programs of Research. AMCIS 2013 - 2012
- [c4]Justin Scott Giboney, Susan A. Brown
, Jay F. Nunamaker Jr.:
User Acceptance of Knowledge-Based System Recommendations: Explanations, Arguments, and Fit-Research in Progress. HICSS 2012: 3719-3727 - [c3]Jay F. Nunamaker Jr., Judee K. Burgoon, Nathan W. Twyman
, Jeffrey Gainer Proudfoot, Ryan M. Schuetzler
, Justin Scott Giboney:
Establishing a foundation for automated human credibility screening. ISI 2012: 202-211 - 2011
- [j1]Jordan B. Barlow, Justin Scott Giboney, Mark Jeffrey Keith, David W. Wilson, Ryan M. Schuetzler, Paul Benjamin Lowry, Anthony Vance
:
Overview and Guidance on Agile Development in Large Organizations. Commun. Assoc. Inf. Syst. 29: 2 (2011) - [c2]Jeffrey Gainer Proudfoot, Justin Scott Giboney, Ryan M. Schuetzler, Alexandra Durcikova:
Trends in Phishing Attacks: Suggestions for Future Research. AMCIS 2011 - 2010
- [c1]Paul Benjamin Lowry, Justin Scott Giboney, Ryan M. Schuetzler
, Jacob Richardson, Tom Gregory, John Romney, Bonnie Brinton Anderson:
The Value of Distrust in Computer-Based Decision-Making Groups. HICSS 2010: 1-10
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-21 01:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint