{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T09:34:14Z","timestamp":1761989654744},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,23]]},"DOI":"10.23919\/mipro55190.2022.9803621","type":"proceedings-article","created":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T21:03:21Z","timestamp":1656363801000},"page":"1019-1024","source":"Crossref","is-referenced-by-count":3,"title":["Digital Behavioral Biometrics and Privacy: Methods for Improving Business Processes without Compromising Customer Privacy"],"prefix":"10.23919","author":[{"given":"J. S.","family":"Valacich","sequence":"first","affiliation":[{"name":"University of Arizona,Management Information Systems Department,Tucson,AZ,USA"}]},{"given":"J. L.","family":"Jenkins","sequence":"additional","affiliation":[{"name":"Brigham Young University,Information Systems Department,Provo,UT,USA"}]},{"given":"D.","family":"Cisic","sequence":"additional","affiliation":[{"name":"University of Rijeka,Department of Informatics,Rijeka,Croatia"}]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1167\/6.9.11"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1080\/02724980343000666"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0084677"},{"key":"ref11","article-title":"Fraudulent application detection system and method of use","author":"valacich","year":"2019","journal-title":"U S Patent No"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00527"},{"journal-title":"Behavioral data analysis with R & Python Customer-driven data for real business results","year":"2021","author":"buisson","key":"ref13"},{"journal-title":"Crawl walk run advancing analytics maturity with Google marketing platform","year":"2021","author":"loban","key":"ref14"},{"journal-title":"Friction The untapped force that can be your most powerful advantage","year":"2019","author":"dooley","key":"ref15"},{"journal-title":"Designing for 5 types of e-commerce shoppers","year":"2014","author":"schade","key":"ref16"},{"key":"ref17","article-title":"Behaviorally measuring ease-of-use by analyzing users&#x2019; mouse cursor movements","author":"jenkins","year":"2015","journal-title":"Special Interest Group on Human-Computer Interaction"},{"key":"ref18","article-title":"Exploring the effect of arousal and valence on mouse interaction","author":"grimes","year":"2013","journal-title":"International Conference on Information Systems"},{"key":"ref19","article-title":"Mind over mouse: The effect of cognitive load on mouse movement behavior","author":"grimes","year":"2015","journal-title":"International Conference on Information Systems"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.95.3.340"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2011.00059"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1037\/h0055392"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2017\/41.1.01"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9280.2009.02448.x"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1993060.1993062"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9280.2008.02041.x"},{"key":"ref8","article-title":"A multi-experimental examination of analyzing mouse cursor trajectories to gauge subject uncertainty","author":"jenkins","year":"2015","journal-title":"Americas Conference on Information Systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1177\/0894439315626360"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1201\/9781315366760"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3758\/BF03195938"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450056"},{"key":"ref20","article-title":"Investigating the effect of insurance fraud on mouse usage in human-computer interactions","author":"hibbeln","year":"2014","journal-title":"International Conference on Information Systems"},{"key":"ref22","article-title":"Human-computer interaction movement indicators of response biases in online surveys","author":"jenkins","year":"2018","journal-title":"International Conference on Information Systems"},{"key":"ref21","article-title":"Assessing credibility by monitoring changes in typing behavior: The keystroke dynamics deception detection model","author":"grimes","year":"2013","journal-title":"Hawaii International Conference on Computer and Systems Sciences Symposium on Rapid Screening Technologies Deception Detection and Credibility Assessment"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1080\/02681102.2013.814040"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2016.0644"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3758\/BRM.42.1.226"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1080\/07380569.2019.1565905"}],"event":{"name":"2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO)","start":{"date-parts":[[2022,5,23]]},"location":"Opatija, Croatia","end":{"date-parts":[[2022,5,27]]}},"container-title":["2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9803295\/9803050\/09803621.pdf?arnumber=9803621","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T00:40:51Z","timestamp":1659660051000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9803621\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,23]]},"references-count":31,"URL":"https:\/\/doi.org\/10.23919\/mipro55190.2022.9803621","relation":{},"subject":[],"published":{"date-parts":[[2022,5,23]]}}}