Jeffrey Proudfoot
According to our database1,
Jeffrey Proudfoot
authored at least 26 papers
between 2011 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
The Importance of Board Member Actions for Cybersecurity Governance and Risk Management.
MIS Q. Executive, 2023
2022
Proceedings of the 28th Americas Conference on Information Systems, 2022
2021
When enough is enough: Investigating the antecedents and consequences of information security fatigue.
Inf. Syst. J., 2021
2020
Too Busy to Be Manipulated: How Multitasking with Technology Improves Deception Detection in Collaborative Teamwork.
J. Manag. Inf. Syst., 2020
2019
Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance.
MIS Q., 2019
Sleight of Hand: Identifying Concealed Information by Monitoring Mouse-Cursor Movements.
J. Assoc. Inf. Syst., 2019
2018
Saving face on Facebook: privacy concerns, social benefits, and impression management.
Behav. Inf. Technol., 2018
2017
Eur. J. Inf. Syst., 2017
Seeing the forest and the trees: A meta-analysis of information security policy compliance literature.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
2016
More Than Meets the Eye: How Oculometric Behaviors Evolve Over the Course of Automated Deception Detection Interactions.
J. Manag. Inf. Syst., 2016
Man vs. machine: Investigating the effects of adversarial system use on end-user behavior in automated deception detection interviews.
Decis. Support Syst., 2016
The Security Expertise Assessment Measure (SEAM): Developing a scale for hacker expertise.
Comput. Secur., 2016
Embodied Conversational Agent-Based Deception Detection: Concealed Information Test Using Automated Electrodermal, Vocal, and Oculmentric Measurements.
Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016, 2016
2015
Robustness of Multiple Indicators in Automated Screening Systems for Deception Detection.
J. Manag. Inf. Syst., 2015
Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015
Proceedings of the International Conference on Information Systems, 2015
2014
Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals.
Inf. Technol. Dev., 2014
Saving Face on Facebook: Privacy Concerns, Social Benefits, and Impression Management.
Proceedings of the International Conference on Information Systems, 2014
2013
Proceedings of the International Conference on Information Systems, 2013
Mitigating Threats to Collaboration and CMC: Identifying Antecedents of Online Deviance.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
Evaluating the Feasibility of Using Noncontact Sensors to Conduct a Targetless Concealed Information Test.
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013
The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resource Allocation.
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013
2012
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012
2011
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011