Jeffrey G. Proudfoot
Jeffrey G. Proudfoot
Associate Professor, Bentley University; Research Affiliate, Cybersecurity at MIT Sloan
Verified email at bentley.edu
Title
Cited by
Cited by
Year
Organizational information security policies: a review and research framework
WA Cram, JG Proudfoot, J D’arcy
European Journal of Information Systems 26 (6), 605-641, 2017
1252017
Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time …
JL Jenkins, M Grimes, JG Proudfoot, PB Lowry
Information Technology for Development 20 (2), 196-213, 2014
872014
Seeing the forest and the trees: a meta-analysis of the antecedents to information security policy compliance
WA Cram, J D'arcy, JG Proudfoot
MIS Quarterly 43 (2), 525-554, 2019
722019
Patterns of nonverbal behavior associated with truth and deception: Illustrations from three experiments
JK Burgoon, JG Proudfoot, R Schuetzler, D Wilson
Journal of Nonverbal Behavior 38 (3), 325-354, 2014
362014
Saving face on Facebook: Privacy concerns, social benefits, and impression management
JG Proudfoot, D Wilson, JS Valacich, MD Byrd
Behaviour & Information Technology 37 (1), 16-37, 2018
342018
Saving face on Facebook: privacy concerns, social benefits, and impression management
DW Wilson, JG Proudfoot, JS Valacich
35th International Conference on Information Systems: Building a Better …, 2014
332014
Robustness of multiple indicators in automated screening systems for deception detection
NW Twyman, JG Proudfoot, RM Schuetzler, AC Elkins, DC Derrick
Journal of Management Information Systems 32 (4), 215-245, 2015
262015
More than meets the eye: How oculometric behaviors evolve over the course of automated deception detection interactions
JG Proudfoot, JL Jenkins, JK Burgoon, JF Nunamaker Jr
Journal of Management Information Systems 33 (2), 332-360, 2016
222016
Establishing a foundation for automated human credibility screening
JF Nunamaker, JK Burgoon, NW Twyman, JG Proudfoot, R Schuetzler, ...
2012 IEEE International Conference on Intelligence and Security Informatics …, 2012
212012
The security expertise assessment measure (SEAM): Developing a scale for hacker expertise
JS Giboney, JG Proudfoot, S Goel, JS Valacich
Computers & Security 60, 37-51, 2016
192016
Seeing the forest and the trees: A meta-analysis of information security policy compliance literature
WA Cram, J Proudfoot, J D'Arcy
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
122017
Sleight of hand: Identifying concealed information by monitoring mouse-cursor movements
JL Jenkins, J Proudfoot, J Valacich, GM Grimes, JF Nunamaker Jr
Journal of the Association for Information Systems 20 (1), 3, 2019
102019
Alternative cues in concealed information testing
NW Twyman, JK Burgoon, AC Elkins, JG Proudfoot
Hawaii International Conference on System Sciences (HICSS), 2013
92013
Man vs. machine: Investigating the effects of adversarial system use on end-user behavior in automated deception detection interviews
JG Proudfoot, R Boyle, RM Schuetzler
Decision Support Systems 85, 23-33, 2016
82016
Eye tracking and the CIT: Utilizing oculometric cues to identify familiarity with wanted persons
JG Proudfoot, NW Twyman, JK Burgoon
Hawaii International Conference on System Sciences (HICSS), 2013
82013
Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews
JG Proudfoot, JL Jenkins, JK Burgoon, JF Nunamaker
2015 IEEE International Conference on Intelligence and Security Informatics …, 2015
72015
Trends in phishing attacks: Suggestions for future research
JG Proudfoot, JS Giboney, RM Schuetzler, A Durcikova
62011
The HealthCare. gov project
JL Gogan, EJ Davidson, J Proudfoot
Journal of Information Technology Teaching Cases 6 (2), 99-110, 2016
52016
Saving face on Facebook: Impression management as motivation to use social networks
D Wilson, J Proudfoot
52014
Evaluating the feasibility of using noncontact sensors to conduct a targetless concealed information test
JG Proudfoot
2013 European Intelligence and Security Informatics Conference, 269-272, 2013
52013
The system can't perform the operation now. Try again later.
Articles 1–20