Jeffrey G. Proudfoot, Ph.D.
Affiliations: | 2014 | Management Information Systems | University of Arizona, Tucson, AZ |
Area:
Management Business Administration, Organizational, General Business AdministrationGoogle:
"Jeffrey Proudfoot"Parents
Sign in to add mentorJay F. Nunamaker | grad student | 2014 | University of Arizona | |
(Identifying deception using novel technology-based approaches to uncover concealed information.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Cram WA, D'arcy J, Proudfoot JG. (2019) Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance Management Information Systems Quarterly. 43: 525-554 |
Jenkins JL, Proudfoot JG, Valacich JS, et al. (2019) Sleight of Hand: Identifying Concealed Information by Monitoring Mouse-Cursor Movements Journal of the Association For Information Systems. 20: 1-32 |
Cram WA, Proudfoot JG, D’Arcy J. (2017) Organizational information security policies: a review and research framework European Journal of Information Systems. 26: 605-641 |
Clements JA, Boyle R, Proudfoot JG. (2016) Exploring political skill and deception International Journal of Sociology and Social Policy. 36: 138-156 |
Proudfoot JG, Jenkins JL, Burgoon JK, et al. (2016) More Than Meets the Eye: How Oculometric Behaviors Evolve Over the Course of Automated Deception Detection Interactions Journal of Management Information Systems. 33: 332-360 |
Proudfoot JG, Boyle R, Schuetzler RM. (2016) Man vs. machine: Investigating the effects of adversarial system use on end-user behavior in automated deception detection interviews Decision Support Systems. 85: 23-33 |
Giboney JS, Proudfoot JG, Goel S, et al. (2016) The Security Expertise Assessment Measure (SEAM): Developing a scale for hacker expertise Computers and Security. 60: 37-51 |
Proudfoot JG, Jenkins JL, Burgoon JK, et al. (2015) Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews 2015 Ieee International Conference On Intelligence and Security Informatics: Securing the World Through An Alignment of Technology, Intelligence, Humans and Organizations, Isi 2015. 97-102 |
Twyman NW, Proudfoot JG, Schuetzler RM, et al. (2015) Robustness of multiple indicators in automated screening systems for deception detection Journal of Management Information Systems. 32: 215-245 |
Wilson DW, Schuetzler RM, Dorn B, et al. (2015) When disclosure is involuntary: Empowering users with control to reduce concerns 2015 International Conference On Information Systems: Exploring the Information Frontier, Icis 2015 |