{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T06:02:10Z","timestamp":1775023330014,"version":"3.50.1"},"reference-count":64,"publisher":"MIS Quarterly","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6,1]]},"abstract":"<jats:p>Research in the fields of information systems and human-computer interaction has shown that habituation\u2014 decreased response to repeated stimulation\u2014is a serious threat to the effectiveness of security warnings. Although habituation is a neurobiological phenomenon that develops over time, past studies have only examined this problem cross-sectionally. Further, past studies have not examined how habituation influences actual security warning adherence in the field. For these reasons, the full extent of the problem of habituation is unknown.<\/jats:p>\n               <jats:p>We address these gaps by conducting two complementary longitudinal experiments. First, we performed an experiment collecting fMRI and eye-tracking data simultaneously to directly measure habituation to security warnings as it develops in the brain over a five-day workweek. Our results show not only a general decline of participants\u2019 attention to warnings over time but also that attention recovers at least partially between workdays without exposure to the warnings. Further, we found that updating the appearance of a warning\u2014 that is, a polymorphic design\u2014substantially reduced habituation of attention.<\/jats:p>\n               <jats:p>Second, we performed a three-week field experiment in which users were naturally exposed to privacy permission warnings as they installed apps on their mobile devices. Consistent with our fMRI results, users\u2019 warning adherence substantially decreased over the three weeks. However, for users who received polymorphic permission warnings, adherence dropped at a substantially lower rate and remained high after three weeks, compared to users who received standard warnings. Together, these findings provide the most complete view yet of the problem of habituation to security warnings and demonstrate that polymorphic warnings can substantially improve adherence.1<\/jats:p>","DOI":"10.25300\/misq\/2018\/14124","type":"journal-article","created":{"date-parts":[[2018,6,7]],"date-time":"2018-06-07T15:09:30Z","timestamp":1528384170000},"page":"355-380","source":"Crossref","is-referenced-by-count":108,"title":["Tuning Out Security Warnings: A Longitudinal Examination of Habituation Through fMRI, Eye Tracking, and Field Experiments1"],"prefix":"10.25300","volume":"42","author":[{"given":"Anthony","family":"Vance","sequence":"first","affiliation":[{"name":"Information Systems Department, Marriott School of Business, Brigham Young University, Provo, UT 84602 U.S.A."}]},{"given":"Jeffrey L.","family":"Jenkins","sequence":"additional","affiliation":[{"name":"Information Systems Department, Marriott School of Business, Brigham Young University, Provo, UT 84602 U.S.A."}]},{"given":"Bonnie Brinton","family":"Anderson","sequence":"additional","affiliation":[{"name":"Information Systems Department, Marriott School of Business, Brigham Young University, Provo, UT 84602 U.S.A."}]},{"given":"Daniel K.","family":"Bjornn","sequence":"additional","affiliation":[{"name":"Department of Psychology, Brigham Young University, Provo, UT 84602 U.S.A.\u2008dbjornn@byu.edu, kirwan@byu.edu"}]},{"given":"C. Brock","family":"Kirwan","sequence":"additional","affiliation":[{"name":"Department of Psychology and Neuroscience Center, Brigham Young University, Provo, UT 84602 U.S.A."}]}],"member":"10933","published-online":{"date-parts":[[2018,6,1]]},"reference":[{"issue":"4","key":"2025082212165325200_b1-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.dss.2016.09.010","article-title":"Your Memory Is Working Against You: How Eye Tracking and Memory Explain Susceptibility to Phishing","volume":"25","author":"Anderson","year":"2016","journal-title":"Decision Support Systems"},{"key":"2025082212165325200_b2-01_14124_ra_vancejenkins","article-title":"Users Aren\u2019t (Necessarily) Lazy: Using NeuroIS to Explain Habituation to Security Warnings","author":"Anderson","year":"2014"},{"issue":"4","key":"2025082212165325200_b3-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1057\/ejis.2015.21","article-title":"How Users Perceive and Respond to Security Messages: A NeuroIS Research Agenda and Empirical Study","volume":"25","author":"Anderson","year":"2016","journal-title":"European Journal of Information Systems"},{"issue":"3","key":"2025082212165325200_b4-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1080\/07421222.2016.1243947","article-title":"From Warnings to Wallpaper: Why the Brain Habituates to Security Warnings and What Can Be Done About It","volume":"33","author":"Anderson","year":"2016","journal-title":"Journal of Management Information Systems"},{"key":"2025082212165325200_b5-01_14124_ra_vancejenkins","unstructured":"Android\n          . 2016. \u201cAndroid Developers Guide\u201d (https:\/\/developer.android.com\/guide\/topics\/permissions\/requesting.html)."},{"issue":"2","key":"2025082212165325200_b6-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1016\/j.nlm.2008.07.007","article-title":"Habituation of the Orienting Reflex and the Development of Preliminary Process Theory","volume":"92","author":"Barry","year":"2009","journal-title":"Neurobiology of Learning and Memory"},{"issue":"1","key":"2025082212165325200_b7-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2307\/3250956","article-title":"Validation in Information Systems Research: A State-of-the-Art Assessment","volume":"25","author":"Boudreau","year":"2001","journal-title":"MIS Quarterly"},{"issue":"11","key":"2025082212165325200_b8-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"2207","DOI":"10.1080\/00140139508925263","article-title":"Interaction of Signal Word and Colour on Warning Labels: Differences in Perceived Hazard and Behavioural Compliance","volume":"38","author":"Braun","year":"1995","journal-title":"Ergonomics"},{"key":"2025082212165325200_b9-01_14124_ra_vancejenkins","first-page":"105","article-title":"Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It","author":"Bravo-Lillo","year":"2014"},{"key":"2025082212165325200_b10-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","DOI":"10.1145\/2501604.2501610","article-title":"Your Attention Please: Designing Security-Decision UIs to Make Genuine Risks Harder to Ignore","author":"Bravo-Lillo","year":"2013"},{"key":"2025082212165325200_b11-01_14124_ra_vancejenkins","first-page":"76","article-title":"Improving Security Decisions with Polymorphic and Audited Dialogs","author":"Brustoloni","year":"2007"},{"key":"2025082212165325200_b12-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1016\/j.neuroimage.2014.06.027","article-title":"Applications of Multivariate Modeling to Neuro-imaging Group Analysis: A Comprehensive Alternative to Uni-variate General Linear Model","volume":"99","author":"Chen","year":"2014","journal-title":"NeuroImage"},{"key":"2025082212165325200_b13-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"2349","DOI":"10.1002\/(SICI)1097-0258(19971030)16:20<2349::AID-SIM667>3.0.CO;2-E","article-title":"Tutorial in Biostatistics: Using the General Linear Mixed Model to Analyse Unbalanced Repeated Measures and Longitudinal Data","volume":"16","author":"Cnaan","year":"1997","journal-title":"Statistics in Medicine"},{"issue":"2","key":"2025082212165325200_b14-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1038\/nn.3920","article-title":"Visual Recognition Memory, Manifested as Long-Term Habituation, Requires Synaptic Plasticity in V1","volume":"18","author":"Cooke","year":"2015","journal-title":"Nature Neuroscience"},{"issue":"3","key":"2025082212165325200_b15-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1006\/cbmr.1996.0014","article-title":"AFNI: Software for Analysis and Visualization of Functional Magnetic Resonance Neuroimages","volume":"29","author":"Cox","year":"1996","journal-title":"Computers and Biomedical Research"},{"issue":"2","key":"2025082212165325200_b16-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"373","DOI":"10.2307\/20721433","article-title":"What Does the Brain Tell Us About Trust and Distrust? Evidence from a Functional Neuroimaging Study","volume":"34","author":"Dimoka","year":"2010","journal-title":"MIS Quarterly"},{"issue":"3","key":"2025082212165325200_b17-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"811","DOI":"10.2307\/41703482","article-title":"How to Conduct a Functional Magnetic Resonance (fMRI) Study in Social Science Research","volume":"36","author":"Dimoka","year":"2012","journal-title":"MIS Quarterly"},{"issue":"3","key":"2025082212165325200_b18-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"679","DOI":"10.2307\/41703475","article-title":"On the Use of Neurophysiological Tools in IS Research: Developing a Research Agenda for NeuroIS","volume":"36","author":"Dimoka","year":"2012","journal-title":"MIS Quarterly"},{"issue":"4","key":"2025082212165325200_b19-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1287\/isre.1100.0284","article-title":"Research Commentary\u2014NeuroIS: The Potential of Cognitive Neuroscience for Information Systems Research","volume":"22","author":"Dimoka","year":"2011","journal-title":"Information Systems Research"},{"key":"2025082212165325200_b20-01_14124_ra_vancejenkins","first-page":"1065","article-title":"You\u2019ve Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings","author":"Egelman","year":"2008"},{"key":"2025082212165325200_b21-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1007\/978-3-642-39884-1_5","article-title":"The Importance of Being Earnest [in Security Warnings]","volume-title":"Financial Cryptography and Data Security","author":"Egelman","year":"2013"},{"key":"2025082212165325200_b22-01_14124_ra_vancejenkins","first-page":"2893","article-title":"Improving SSL Warnings: Comprehension and Adherence","author":"Felt","year":"2015"},{"issue":"12","key":"2025082212165325200_b23-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/S1353-4858(10)70147-1","article-title":"Usability Versus Complexity\u2014Striking the Balance in End-User Security","volume":"2010","author":"Furnell","year":"2010","journal-title":"Network Security"},{"issue":"1","key":"2025082212165325200_b24-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.tics.2005.11.006","article-title":"Repetition and the Brain: Neural Models of Stimulus-Specific Effects","volume":"10","author":"Grill-Spector","year":"2006","journal-title":"Trends in Cognitive Sciences"},{"key":"2025082212165325200_b25-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1037\/h0029810","article-title":"Habituation: A Dual-Process Theory","volume":"77","author":"Groves","year":"1970","journal-title":"Psychological Review"},{"issue":"1","key":"2025082212165325200_b26-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1167\/8.1.9","article-title":"More Efficient Scanning for Familiar Faces","volume":"8","author":"Heisz","year":"2008","journal-title":"Journal of Vision"},{"key":"2025082212165325200_b27-01_14124_ra_vancejenkins","first-page":"133","article-title":"So Long, and No Thanks for the Externalities: The Rational Rejection of Security Advice by Users","author":"Herley","year":"2009"},{"issue":"4","key":"2025082212165325200_b28-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"880","DOI":"10.1287\/isre.2016.0644","article-title":"More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable","volume":"27","author":"Jenkins","year":"2016","journal-title":"Information Systems Research"},{"issue":"1","key":"2025082212165325200_b29-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/0169-8141(95)00033-X","article-title":"Pharmaceutical Container Labels: Enhancing Preference Perceptions with Alternative Designs and Pictorials","volume":"18","author":"Kalsher","year":"1996","journal-title":"International Journal of Industrial Ergonomics"},{"key":"2025082212165325200_b30-01_14124_ra_vancejenkins","first-page":"1","article-title":"Don\u2019t Work. Can\u2019t Work? Why It\u2019s Time to Rethink Security Warnings","author":"Krol","year":"2012"},{"key":"2025082212165325200_b31-01_14124_ra_vancejenkins","first-page":"187","article-title":"Depress Phishing by CAPTCHA with OTP","author":"Leung","year":"2009"},{"key":"2025082212165325200_b32-01_14124_ra_vancejenkins","volume-title":"Generalized Linear Mixed Models","author":"McCulloch","year":"2001"},{"issue":"2","key":"2025082212165325200_b33-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.nlm.2008.09.012","article-title":"Habituation Revisited: An Updated and Revised Description of the Behavioral Characteristics of Habituation","volume":"92","author":"Rankin","year":"2009","journal-title":"Neurobiology of Learning and Memory"},{"key":"2025082212165325200_b34-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","DOI":"10.17705\/1CAIS.02715","article-title":"On the Foundations of NeuroIS: Reflections on the Gmunden Retreat 2009","volume":"27","author":"Riedl","year":"2010","journal-title":"Communications of the Association for Information Systems"},{"issue":"10","key":"2025082212165325200_b35-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"i","DOI":"10.17705\/1jais.00377","article-title":"Towards a NeuroIS Research Methodology: Intensifying the Discussion on Methods, Tools, and Measurement","volume":"15","author":"Riedl","year":"2014","journal-title":"Journal of the Association for Information Systems"},{"issue":"2","key":"2025082212165325200_b36-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"397","DOI":"10.2307\/20721434","article-title":"Are There Neural Gender Differences in Online Trust? An fMRI Study on the Perceived Trustworthiness of eBay Offers","volume":"34","author":"Riedl","year":"2010","journal-title":"MIS Quarterly"},{"key":"2025082212165325200_b37-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-45091-8","volume-title":"Fundamentals of NeuroIS: Information Systems and the Brain","author":"Riedl","year":"2016"},{"issue":"4","key":"2025082212165325200_b38-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"83","DOI":"10.2753\/MIS0742-1222300404","article-title":"Trusting Humans and Avatars: A Brain Imaging Study Based on Evolution Theory","volume":"30","author":"Riedl","year":"2014","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"2025082212165325200_b39-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1167\/7.2.17","article-title":"Measuring Visual Clutter","volume":"7","author":"Rosenholtz","year":"2007","journal-title":"Journal of Vision"},{"issue":"1","key":"2025082212165325200_b40-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1080\/15389580490269074","article-title":"The Design of Child Restraint System (CRS) Labels and Warnings Affects Overall CRS Usability","volume":"5","author":"Rudin-Brown","year":"2004","journal-title":"Traffic Injury Prevention"},{"issue":"6","key":"2025082212165325200_b41-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1111\/1467-9280.00288","article-title":"Amnesia Is a Deficit in Relational Memory","volume":"11","author":"Ryan","year":"2000","journal-title":"Psychological Science"},{"issue":"2","key":"2025082212165325200_b42-01_14124_ra_vancejenkins","first-page":"189","article-title":"Competitive Short-Term and Long-Term Memory Processes in Spatial Habituation","volume":"37","author":"Sanderson","year":"2011","journal-title":"Journal of Experimental Psychology: Animal Behavior Processes"},{"key":"2025082212165325200_b43-01_14124_ra_vancejenkins","unstructured":"Sawers, P.\n          \u20082014. \u201cAndroid Users Have an Average of 95 Apps Installed on Their Phones, According to Yahoo Aviate Data,\u201d The Next Web (https:\/\/thenextweb.com\/apps\/2014\/08\/26\/android-users-average-95-apps-installed-phones-according-yahoo-aviate-data\/#.tnw_p8IqFXt0)."},{"key":"2025082212165325200_b44-01_14124_ra_vancejenkins","first-page":"51","article-title":"The Emperor\u2019s New Security Indicators","author":"Schechter","year":"2007"},{"key":"2025082212165325200_b45-01_14124_ra_vancejenkins","first-page":"3055","article-title":"Large-Scale Assessment of Mobile Notifications","author":"Shirazi","year":"2014"},{"issue":"2","key":"2025082212165325200_b46-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1101\/lm.043851.116","article-title":"When Eye Movements Express Memory for Old and New Scenes in the Absence of Awareness and Independent of Hippocampus","volume":"24","author":"Smith","year":"2017","journal-title":"Learning & Memory"},{"issue":"3","key":"2025082212165325200_b47-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"963","DOI":"10.1177\/009286159703100340","article-title":"The Influence of Pictorials on Evaluations of Prescription Medication Instructions","volume":"31","author":"Sojourner","year":"1997","journal-title":"Drug Information Journal"},{"key":"2025082212165325200_b48-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1146\/annurev.ph.25.030163.002553","article-title":"Higher Nervous Functions: The Orienting Reflux","volume":"25","author":"Sokolov","year":"1963","journal-title":"Annual Review of Physiology"},{"key":"2025082212165325200_b49-01_14124_ra_vancejenkins","first-page":"3:1","article-title":"On the Challenges in Usable Security Lab Studies: Lessons Learned from Replicating a Study on SSL Warnings","author":"Sotirakopoulos","year":"2011"},{"issue":"7","key":"2025082212165325200_b50-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1016\/j.tics.2005.05.013","article-title":"Interval Timing: Memory, Not a Clock","volume":"9","author":"Staddon","year":"2005","journal-title":"Trends in Cognitive Sciences"},{"key":"2025082212165325200_b51-01_14124_ra_vancejenkins","unstructured":"Statista\n          . 2017. \u201cCumulative Number of Apps Downloaded from the Google Play as of May 2016 (in Billions)\u201d (https:\/\/www.statista.com\/statistics\/281106\/number-of-android-app-downloads-from-google-play\/)."},{"issue":"24","key":"2025082212165325200_b52-01_14124_ra_vancejenkins","first-page":"380","article-title":"Validation Guidelines for IS Positivist Research","volume":"13","author":"Straub","year":"2004","journal-title":"Communications of the Association for Information Systems"},{"key":"2025082212165325200_b53-01_14124_ra_vancejenkins","first-page":"399","article-title":"Crying Wolf: An Empirical Study of SSL Warning Effectiveness","author":"Sunshine","year":"2009"},{"key":"2025082212165325200_b54-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","DOI":"10.4324\/9781315665023","volume-title":"Learning and Memory: Basic Principles, Processes, and Procedures","author":"Terry","year":"2015","edition":"4th"},{"issue":"2","key":"2025082212165325200_b55a-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.nlm.2008.07.011","article-title":"Habituation: A History","volume":"92","author":"Thompson","year":"2009","journal-title":"Neurobiology of Learning and Memory"},{"issue":"10","key":"2025082212165325200_b55-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"679","DOI":"10.17705\/1jais.00375","article-title":"Using Measures of Risk Perception to Predict Information Security Behavior: Insights from Electroencephalography (EEG)","volume":"15","author":"Vance","year":"2014","journal-title":"Journal of the Association for Information Systems"},{"issue":"4","key":"2025082212165325200_b56-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1509\/jmr.13.0593","article-title":"Predicting Advertising Success Beyond Traditional Measures: New Insights from Neurophysiological Methods and Market Response Modeling","volume":"52","author":"Venkatraman","year":"2015","journal-title":"Journal of Marketing Research"},{"issue":"4","key":"2025082212165325200_b57-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"211","DOI":"10.2753\/MIS0742-1222300408","article-title":"Guidelines for Neuroscience Studies in Information Systems Research","volume":"30","author":"vom Brocke","year":"2014","journal-title":"Journal of Management Information Systems"},{"issue":"3","key":"2025082212165325200_b58-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/08874417.2013.11645627","article-title":"Application Strategies for Neuroscience in Information Systems Design Science Research","volume":"53","author":"vom Brocke","year":"2013","journal-title":"Journal of Computer Information Systems"},{"key":"2025082212165325200_b59-01_14124_ra_vancejenkins","first-page":"95","article-title":"Priming in STM: An Information-Processing Mechanism for Self-Generated or Retrieval-Generated Depression in Performance","volume-title":"Habituation: Perspectives from Child Development, Animal Behavior, and Neurophysiology","author":"Wagner","year":"1976"},{"key":"2025082212165325200_b60-01_14124_ra_vancejenkins","first-page":"53","article-title":"Habituation and Memory","volume-title":"Mechanisms of Learning and Motivation: A Memorial Volume to Jerzy Konorski","author":"Wagner","year":"1979"},{"issue":"3","key":"2025082212165325200_b61-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"194","DOI":"10.17705\/1jais.00424","article-title":"Neural Correlates of Protection Motivation for Secure IT Behaviors: An fMRI Examination","volume":"17","author":"Warkentin","year":"2016","journal-title":"Journal of the Association for Information Systems"},{"key":"2025082212165325200_b62-01_14124_ra_vancejenkins","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1146\/annurev.psych.55.090902.141555","article-title":"The Psychology and Neuroscience of Forgetting","volume":"55","author":"Wixted","year":"2004","journal-title":"Annual Review of Psychology"},{"key":"2025082212165325200_b63-01_14124_ra_vancejenkins","first-page":"51","article-title":"Communication-Human Information Processing (C-HIP) Model","volume-title":"Handbook of Warnings","author":"Wogalter","year":"2006"}],"container-title":["MIS Quarterly"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/misq.umn.edu\/misq\/article-pdf\/42\/2\/355\/6139\/01_14124_ra_vancejenkins.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/misq.umn.edu\/misq\/article-pdf\/42\/2\/355\/6139\/01_14124_ra_vancejenkins.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:18:53Z","timestamp":1755879533000},"score":1,"resource":{"primary":{"URL":"https:\/\/misq.umn.edu\/misq\/article\/42\/2\/355\/1716\/Tuning-Out-Security-Warnings-A-Longitudinal"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,1]]},"references-count":64,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2018,6,1]]},"published-print":{"date-parts":[[2018,6,1]]}},"URL":"https:\/\/doi.org\/10.25300\/misq\/2018\/14124","relation":{},"ISSN":["0276-7783","2162-9730"],"issn-type":[{"value":"0276-7783","type":"print"},{"value":"2162-9730","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,1]]}}}