Jeffrey G. Proudfoot, Ph.D.

Affiliations: 
2014 Management Information Systems University of Arizona, Tucson, AZ 
Area:
Management Business Administration, Organizational, General Business Administration
Google:
"Jeffrey Proudfoot"

Parents

Sign in to add mentor
Jay F. Nunamaker grad student 2014 University of Arizona
 (Identifying deception using novel technology-based approaches to uncover concealed information.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Cram WA, D'arcy J, Proudfoot JG. (2019) Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance Management Information Systems Quarterly. 43: 525-554
Jenkins JL, Proudfoot JG, Valacich JS, et al. (2019) Sleight of Hand: Identifying Concealed Information by Monitoring Mouse-Cursor Movements Journal of the Association For Information Systems. 20: 1-32
Cram WA, Proudfoot JG, D’Arcy J. (2017) Organizational information security policies: a review and research framework European Journal of Information Systems. 26: 605-641
Clements JA, Boyle R, Proudfoot JG. (2016) Exploring political skill and deception International Journal of Sociology and Social Policy. 36: 138-156
Proudfoot JG, Jenkins JL, Burgoon JK, et al. (2016) More Than Meets the Eye: How Oculometric Behaviors Evolve Over the Course of Automated Deception Detection Interactions Journal of Management Information Systems. 33: 332-360
Proudfoot JG, Boyle R, Schuetzler RM. (2016) Man vs. machine: Investigating the effects of adversarial system use on end-user behavior in automated deception detection interviews Decision Support Systems. 85: 23-33
Giboney JS, Proudfoot JG, Goel S, et al. (2016) The Security Expertise Assessment Measure (SEAM): Developing a scale for hacker expertise Computers and Security. 60: 37-51
Proudfoot JG, Jenkins JL, Burgoon JK, et al. (2015) Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews 2015 Ieee International Conference On Intelligence and Security Informatics: Securing the World Through An Alignment of Technology, Intelligence, Humans and Organizations, Isi 2015. 97-102
Twyman NW, Proudfoot JG, Schuetzler RM, et al. (2015) Robustness of multiple indicators in automated screening systems for deception detection Journal of Management Information Systems. 32: 215-245
Wilson DW, Schuetzler RM, Dorn B, et al. (2015) When disclosure is involuntary: Empowering users with control to reduce concerns 2015 International Conference On Information Systems: Exploring the Information Frontier, Icis 2015
See more...