Jeffrey Proudfoot

According to our database1, Jeffrey Proudfoot authored at least 26 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The Importance of Board Member Actions for Cybersecurity Governance and Risk Management.
MIS Q. Executive, 2023

2022
Regulatory Facilitators and Impediments Impacting Cybersecurity Maturity.
Proceedings of the 28th Americas Conference on Information Systems, 2022

2021
When enough is enough: Investigating the antecedents and consequences of information security fatigue.
Inf. Syst. J., 2021

2020
Maximizing Employee Compliance with Cybersecurity Policies.
MIS Q. Executive, 2020

Too Busy to Be Manipulated: How Multitasking with Technology Improves Deception Detection in Collaborative Teamwork.
J. Manag. Inf. Syst., 2020

2019
Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance.
MIS Q., 2019

Sleight of Hand: Identifying Concealed Information by Monitoring Mouse-Cursor Movements.
J. Assoc. Inf. Syst., 2019

2018
Saving face on Facebook: privacy concerns, social benefits, and impression management.
Behav. Inf. Technol., 2018

2017
Organizational information security policies: a review and research framework.
Eur. J. Inf. Syst., 2017

Seeing the forest and the trees: A meta-analysis of information security policy compliance literature.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
More Than Meets the Eye: How Oculometric Behaviors Evolve Over the Course of Automated Deception Detection Interactions.
J. Manag. Inf. Syst., 2016

Man vs. machine: Investigating the effects of adversarial system use on end-user behavior in automated deception detection interviews.
Decis. Support Syst., 2016

The Security Expertise Assessment Measure (SEAM): Developing a scale for hacker expertise.
Comput. Secur., 2016

Embodied Conversational Agent-Based Deception Detection: Concealed Information Test Using Automated Electrodermal, Vocal, and Oculmentric Measurements.
Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016, 2016

2015
Robustness of Multiple Indicators in Automated Screening Systems for Deception Detection.
J. Manag. Inf. Syst., 2015

Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

When Disclosure is Involuntary: Empowering Users with Control to Reduce Concerns.
Proceedings of the International Conference on Information Systems, 2015

2014
Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals.
Inf. Technol. Dev., 2014

Saving Face on Facebook: Privacy Concerns, Social Benefits, and Impression Management.
Proceedings of the International Conference on Information Systems, 2014

2013
A Systems Approach to Countermeasures in Credibility Assessment Interviews.
Proceedings of the International Conference on Information Systems, 2013

Mitigating Threats to Collaboration and CMC: Identifying Antecedents of Online Deviance.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Evaluating the Feasibility of Using Noncontact Sensors to Conduct a Targetless Concealed Information Test.
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013

The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resource Allocation.
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013

2012
Establishing a foundation for automated human credibility screening.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

A Comparison of Invasive and Noninvasive Sensors in the Concealed Information Test.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

2011
Trends in Phishing Attacks: Suggestions for Future Research.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011


  Loading...