Browse

Browse

Back to Homepage

Jeffrey Proudfoot

Assistant Professor, Information and Process Management
Coordinator, GB310 Core Course - Business Processes and Systems
Ph.D., University of Arizona, 2014
M.S., University of Utah, 2010
B.S., University of Utah, 2008
Office: Smith Technology Center 402 | 781.891._2068 | jproudfoot@bentley.edu
                       


Expand All
Collapse All

Bio

Jeffrey Proudfoot is an Assistant Professor in the Information and Process Management Department at Bentley University. He completed B.S. and M.S. degrees in Information Systems, specializing in information security, at the University of Utah before completing a Ph.D. in Management Information Systems at the University of Arizona. Jeff’s research centers on behavioral information security and insider threat detection. His work has been published in a number of premier journals, including MIS Quarterly, Journal of Management Information Systems, Journal of the Association for Information Systems, European Journal of Information Systems, Decision Support Systems, and Computers & Security. His body of work also includes authorship on an applied information security textbook and proceedings in premier technology-focused conferences, including the International Conference on Information Systems (ICIS), IEEE, and the Hawaii International Conference on System Sciences (HICSS). Jeff has contributed to over $1 million in Department of Homeland Security (DHS), Center for Identification Technology Research (CITeR), and National Science Foundation (NSF) grants, of which over $500k was awarded with Jeff operating as a PI or a co-PI. His prior research affiliations include the Center for the Management of Information (CMI) and the National Center for Border Security and Immigration (BORDERS), a Department of Homeland Security Center of Excellence.

Teaching Interests

Business and process management, enterprise systems, information security

Research Interests

Behavioral information security, insider threat detection

Consulting/Practice Interests

Defense, homeland security, cybersecurity, insider threat detection

Awards and Honors

2019, Nominee, Best Associate Editor Award, International Conference on Information Systems (ICIS)
2019, Nominee, Joseph Cronin Advisor and Mentor of the Year Award, Bentley University
2018, Best Associate Editor Award, International Conference on Information Systems (ICIS)
2017, Best Reviewer Award, 16th Annual Pre-ICIS Workshop on HCI Research in MIS
2016, Nominee, Joseph Cronin Advisor and Mentor of the Year Award, Bentley University
2016, Outstanding Reviewer Award, International Conference on Information Systems (ICIS)
2015, Best Reviewer Award, Communications of the Association for Information Systems
2012, Teaching Award, MIS Department, Eller College of Management, University of Arizona
2011, Finalist for Best Poster, Americas Conference on Information Systems
2010, Teaching Award, OIS Department, David Eccles School of Business, University of Utah
2009, Graduate Teaching Scholarship, David Eccles School of Business, University of Utah

Publications

Journal Article(s)
Jenkins, J. L., Proudfoot, J. G., Valacich, J. S., Grimes, G. M., Nunamaker, Jr., J. F. (2019). Sleight of Hand: Identifying Concealed Information by Monitoring Mouse-Cursor Movements. Journal of the Association for Information Systems, 20 (1), 1-32.

Cram, W. A., D'Arcy, J., Proudfoot, J. G. (2019). Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance. MIS Quarterly, 43 (2), 525-554.

Proudfoot, J. G., Wilson, D. W., Valacich, J. S., Byrd, M. D. (2018). Saving face on Facebook: Privacy concerns, social benefits, and impression management. Behaviour and Information Technology, 37 (1), 16-37.

Boyle, R. J., Clements, J. A., Proudfoot, J. G. (2018). Measuring deception: A look at antecedents to deceptive intent. American Journal of Psychology, 131 (3), 347-367.

Cram, W. A., Proudfoot, J. G., D'Arcy, J. (2017). Organizational Information Security Policies: A Review and Research Framework. European Journal of Information Systems, 26 (6), 605–641.

Gogan, J. L., Davidson, E., Proudfoot, J. G. (2016). HealthCare.Gov: A project management horror story. Journal of Information Technology -- Teaching Cases, 6, 45-55. (link)

Clements, J. A., Boyle, R. J., Proudfoot, J. G. (2016). Exploring political skill and deception. International Journal of Sociology and Social Policy, 36 (3/4), 138-156.

Giboney, J. S., Proudfoot, J. G., Goel, S., Valacich, J. S. (2016). The Security Assessment Measure (SEAM): Developing a Scale for Hacker Expertise. Computers & Security, 60, 37-51.

Proudfoot, J. G., Jenkins, J. L., Burgoon, J. K., Nunamaker, Jr., J. F. (2016). More Than Meets the Eye: How Oculometric Behaviors Evolve Over the Course of Automated Deception Detection Interactions. Journal of Management Information Systems, 33 (2), 332-360.

Twyman, N. W., Proudfoot, J. G., Schuetzler, R. M., Elkins, A. C., Derrick, D. C. (2016). Robustness of multiple indicators in automated screening systems for deception detection. Journal of Management Information Systems, 32 (4), 215-245.

Proudfoot, J. G., Boyle, R. J., Schuetzler, R. S. (2016). Man vs. machine: Investigating the effects of adversarial system use on end-user behavior in automated deception detection interviews. Decision Support Systems, 85, 23-33. (link)

Burgoon, J. K., Proudfoot, J. G., Schuetzler, R., Wilson, D. (2014). Patterns of nonverbal behavior associated with truth and deception: Illustrations from three experiments. Journal of Nonverbal Behavior, 38, 325-354.

Jenkins, J. L., Grimes, M., Proudfoot, J. G., Lowery, P. B. (2014). Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time fear appeals. Information Technology for Development, 20 (2), 196-213.

Books
Boyle, R. J, Proudfoot, J. G. (2013). Applied Information Security: A Hands-On Guide to Information Security Software (2nd Edition). New Jersey: Pearson.

Conference Proceeding(s)
Twyman, N. W., Proudfoot, J. G., Case, E., Cameron, A., Burgoon, J. K., Twitchell, D. (2019). Information-Rich but Attention-Poor: Investigating Deception Detection Accuracy in an Increasingly Polychronic World. Hawaii International Conference on System Sciences (HICSS).

Grimes, G. M., Proudfoot, J. G., Valacich, J. S., Jenkins, J. S., Twyman, N. W., Burgoon, J. K. (2017). Controlled Realism in Deception Research. Hawaii International Conference on System Sciences (HICSS).

Cram, W. A., Proudfoot, J. G., D'Arcy, J. (2017). Seeing the Forest and the Trees: A Meta-Analysis of Information Security Policy Compliance Literature. Hawaii International Conference on System Sciences (HICSS), Hawaii, HI.

Jenkins, J. L., Proudfoot, J. G., Valacich, J. S., Nunamaker, Jr., J. F. (2017). Sleight of hand: Identifying malicious insider threats through the monitoring of mouse-cursor movements. Hawaii International Conference on System Sciences (HICSS), Hawaii, HI.

Proudfoot, J. G., Elkins, A. C. (2017). It’s not the answer, it’s the question: Exploring the impact of question relevance on user perceptions and behavior in automated deception detection interactions. Hawaii International Conference on System Sciences (HICSS), Hawaii, HI.

Elkins, A., Proudfoot, J. G., Twyman, N. W., Burgoon, J. K., Nunamaker, Jr., J. F. (2016). Embodied conversational agent-based deception detection: Concealed information test using automated electrodermal, vocal, and oculometric measurements. SAI / IEEE Intelligent Systems Conference, London, U. K..

Proudfoot, J. G., Jenkins, J. L., Burgoon, J. K., Nunamaker, Jr., J. F. (2015). Deception is in the Eye of the Communicator: Investigating Pupil Diameter Variations in Automated Deception Detection Interviews. IEEE International Conference on Intelligence and Security Informatics (ISI), Baltimore, MD.

Gogan, J. L., Proudfoot, J. G. (2015). Information Security as a Service: A Call for Transdisciplinary Research. Service Management and Science Forum, Waltham, MA.

Giboney, J. S., Proudfoot, J. G., Goel, S., Valacich, J. S. (2015). Measuring Hacking Ability Using a Conceptual Expertise Task. ADFSL Conference on Digital Forensics, Security and Law, Daytona Beach, FL.

Grimes, G. M., Proudfoot, J. G., Valacich, J. S., Jenkins, J. S., Twyman, N. W., Burgoon, J. K., Marquardson, J. (2015). Lessons Learned from Successive Deception Experiments. Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Kauai, HI.

Wilson, D., Schuetzler, R., Dorn, B., Proudfoot, J. G., Valacich, J. S. (2015). When Disclosure is Involuntary: Empowering Users with Control to Reduce Concerns. International Conference on Information Systems (ICIS), Forth Worth, Texas.

Wilson, D., Proudfoot, J. G., Valacich, J. S. (2014). Saving Face on Facebook: Privacy Concerns, Social Benefits, and Impression Management. International Conference on Information Systems (ICIS), Auckland, New Zealand.

Wilson, D., Proudfoot, J. G. (2014). Saving Face on Facebook: Impression Management as Motivation to Use Social Computing Systems. Americas Conference on Information Systems (AMCIS), Detroit, Michigan.

Jenkins, J. L., Marquardson, J., Proudfoot, J. G., Valacich, J. S., Golob, E. G., Nunamaker, Jr., J. F. (2013). The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resource Allocation. Workshop on Innovation in Border Control (WIBC) at the European Intelligence and Security Informatics Conference (EISIC), Uppsala, Sweden.

Proudfoot, J. G., Boyle, R. J., Clements, J. A. (2013). Mitigating Threats to Collaboration and CMC: Identifying Antecedents of Online Deviance. Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii.

Proudfoot, J. G., Twyman, N. W., Burgoon, J. K. (2013). Eye Tracking and the CIT: Utilizing Oculometric Cues to Identify Familiarity with Wanted Persons. Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii.

Proudfoot, J. G. (2013). Evaluating the Feasibility of Using Noncontact Sensors to Conduct a Targetless Concealed Information Test. Workshop on Innovation in Border Control (WIBC) at the European Intelligence and Security Informatics Conference (EISIC), Uppsala, Sweden.

Twyman, N. W., Burgoon, J. K., Elkins, A., Proudfoot, J. G. (2013). Alternative Cues in Concealed Information Testing. Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii.

Twyman, N. W., Schuetzler, R., Proudfoot, J. G., Elkins, A. (2013). A Systems Approach to Countermeasures in Credibility Assessment Interviews. International Conference on Information Systems (ICIS), Milan, Italy.

Boyle, R. J., Clements, J. A., Proudfoot, J. G. (2012). Predicting Deceptive Behavior: Exploring Antecedents to Deceptive Behaviors. National Communication Association Convention (NCA), Orlando, FL.

Proudfoot, J. G., Twyman, N. W., Burgoon, J. K. (2012). Familiarity Recognition in Automated Screening Environments: Utilizing Eye Tracking Technology as an Intelligence Gathering Tool. Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii.

Jenkins, J. L., Proudfoot, J. G., Burns, M., Golob, E. (2012). Estimating Unknown Numbers More Precisely: A Stratified Sampling Methodology for Estimating the Baseline Population of Illegal Immigrants Passing Through Open Checkpoints. Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii.

Nunamaker, J. F., Burgoon, J. K., Twyman, N. W., Proudfoot, J. G., Schuetzler, R., Giboney, J. S. (2012). Establishing a Foundation for Automated Human Credibility Screening. Workshop on Developing Technologies and Tools for Border Security Applications at the IEEE International Conference on Intelligence and Security Informatics (ISI), Washington, D.C..

Jenkins, J. L., Proudfoot, J. G., Durcikova, A. (2012). Determinants and Impediments of Password Reuse on Deceptive Web Sites. Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii.

Proudfoot, J. G., Twyman, N. W., Burgoon, J. K. (2012). A Comparison of Invasive and Noninvasive Sensors in the Concealed Information Test. Workshop on Innovation in Border Control (WIBC) at the European Intelligence and Security Informatics Conference (EISIC), Odense, Denmark.

Conference Paper(s)
Proudfoot, J. G., Giboney, J. S., Schuetzler, R., Durcikova, A. (2011). Trends in Phishing Attacks: Suggestions for Future Research. Americas Conference on Information Systems (AMCIS), Detroit, Michigan.

Other(s)
Jenkins, J. L, Proudfoot, J. G, Marquardson, J, Gans, J, Golob, E, Nunamaker, Jr., J. F. (2014). Checking on Checkpoints: An Assessment of U.S. Border Patrol Operations, Performance, and Impacts. National Center for Border Security and Immigration (BORDERS), University of Arizona

Proudfoot, J. G. (2014). Identifying Deception Using Novel Technology-Based Approaches to Uncover Concealed Information. University of Arizona

Conference Presentations

Twyman, N. W., Proudfoot, J. G., Case, E., Camerson, A., Burgoon, J. K., Twitchell, D. (2019). "Information-Rich but Attention-Poor: Investigating Deception Detection Accuracy in an Increasingly Polychronic World." Presented at the Hawaii International Conference on System Sciences (HICSS), Maui, HI.

Grimes, G. M., Proudfoot, J. G., Valacich, J. S., Jenkins, J. L., Twyman, N. W., Burgoon, J. K. (2017). "Controlled Realism in Deception Research." Presented at the Hawaii International Conference on System Sciences (HICSS), Hawaii, HI.

Proudfoot, J. G., Elkins, A. C. (2017). "It’s not the answer, it’s the question: Exploring the impact of question relevance on user perceptions and behavior in automated deception detection interactions." Presented at the Hawaii International Conference on System Sciences (HICSS), Hawaii, HI.

Proudfoot, J. G. (2015). "Deception is in the Eye of the Communicator: Investigating Pupil Diameter Variations in Automated Deception Detection Interviews." Presented at the IEEE International Conference on Intelligence and Security Informatics (ISI), Baltimore, MD.

Wilson, D., Proudfoot, J. G., Valacich, J. S. (2014). "Saving Face on Facebook: Privacy Concerns, Social Benefits, and Impression Management." Presented at the International Conference on Information Systems (ICIS), Auckland, New Zealand.

Proudfoot, J. G., Twyman, N., Schuetzler, R., Elkins, A. (2013). "A Systems Approach to Countermeasures in Credibility Assessment Interviews." Presented at the International Conference on Information Systems (ICIS), Milan.

Proudfoot, J. G., . (2013). "Evaluating the Feasibility of using Noncontact Sensors to Conduct a Targetless Concealed Information Test." Presented at the Workshop on Innovation in Border Control (WIBC) at the European Intelligence and Security Informatics Conference (EISIC), Uppsala, Sweden.

Proudfoot, J. G., Jenkins, J., Marquardson, J., Valacich, J., Golob, E., Nunamaker, J. J., . (2013). "The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resources Allocation." Presented at the Workshop on Innovation in Border Control (WIBC) at the European Intelligence and Security Informatics Conference (EISIC), Uppsala, Sweden.

Proudfoot, J. G. (2013). "Eye Tracking and the CIT: Utilizing Oculometric Cues to Identify Familiarity with Wanted Persons." Presented at the Hawaii International Conference on System Sciences (HICSS), Maui, HI.

Proudfoot, J. G. (2013). "Mitigating Threats to Collaboration and CMC: Identifying Antecedents of Online Deviance." Presented at the Hawaii International Conference on System Sciences (HICSS), Maui, HI.

Proudfoot, J. G. (2012). "Determinants and Impediments of Passoword Reuse on Deceptive Web Sites." Presented at the Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii.

Proudfoot, J. G. (2012). "Familiarity Recognition in Automated Screening Environments: Utilizing Eye Tracking Technology as an Intelligence gathering Tool." Presented at the Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii.

Service

Department Service
Assurance of Learning Champion, 2016

University Service
GB 310 Core Course Coordinator for GB Core, 2018 - 2020
Mentor (Faculty) for Honors Capstone Project, 2019 - 2020
Course Developer for Bentley University Degree Completion Program (DCP403), 2016 - 2019
IPM Department Representative for Undergraduate Academic Programs Fair - 2019
First Year Seminar Advisor - 2017
IPM Department Representative for Office of Undergraduate Admission Open House - 2016
Mentor (Faculty) for Honors Capstone Project, 2015 - 2016
IPM Department Representative for Office of Undergraduate Admission Open House for Accepted Students - 2016
IPM Department Representative for Student Government Association & Office of Academic Services Majors/Minors Fair - 2015
IPM Department Representative for Office of Undergraduate Admission Open House for Accepted Students - 2015
IPM Department Representative for Student Government Association & Office of Academic Services Majors/Minors Fair - 2014
IPM Department Representative for Office of Undergraduate Admission Open House - 2014

Professional Service
Editor (Associate), Conference for IS Strategy & Governance, European Conference on Information Systems (ECIS), 2019 - Present
Editor (Associate), Conference for Digital Learning Environment and Future IS Curriculum, International Conference on Information Systems (ICIS), 2018 - Present
Conference/Workshop Track Chair for Minitrack on Cognitive, Affective, and Conversational HCI at the Amercas Conference on Information Systems (AMCIS), 2016 - Present
Conference/Workshop Organizer for Symposium on Credibility Assessment and Screening Technologies (CAST) at the Hawaii International Conference on System Sciences (HICSS), 2016 - Present
Webmaster for 2019 International Conference on Information Systems, 2017 - 2019
Reviewer, Journal Article for Information Systems Journal - 2019
Reviewer, Conference Paper for Hawaii International Conference on System Sciences - 2019
Reviewer, Conference Paper for Hawaii International Conference on System Sciences - 2019
Reviewer, Journal Article for Journal of Intellectual Capital - 2019
Reviewer, Journal Article for Electronic Commerce Research and Applications - 2019
Reviewer, Conference Paper for European Conference on Information Systems - 2019
Reviewer, Conference Paper for European Conference on Information Systems - 2019
Reviewer, Journal Article for Information & Management - 2019
Reviewer, Journal Article for AIS Transactions on Replication Research - 2018
Reviewer, Journal Article for Information Systems Reseaerch - 2018
Reviewer, Conference Paper for Hawaii International Conference on System Sciences - 2018
Reviewer, Conference Paper for Hawaii International Conference on System Sciences - 2018
Reviewer, Conference Paper for Hawaii International Conference on System Sciences - 2018
Editor (Associate), Conference for Information Systems Curriculum and Education Track, International Conference on Information Systems, 2017 - 2018
Reviewer, Journal Article for Journal of Management Information Systems - 2018
Reviewer, Journal Article for Information Systems Management - 2018
Reviewer, Journal Article for Journal of Management Information Systems - 2018
Reviewer, Journal Article for Communications of the Association for Information Systems - 2018
Reviewer, Journal Article for Electronic Commerce Research and Applications - 2018
Reviewer, Journal Article for AIS Transactions on Replication Research - 2018
Reviewer, Conference Paper for Hawaii International Conference on System Sciences - 2017
Reviewer, Journal Article for Journal of Management Information Systems - 2017
Reviewer, Conference Paper for International Conference on Information Systems - 2017
Reviewer, Journal Article for Communications of the Association for Information Systems - 2017
Reviewer, Conference Paper for Hawaii International Conference on System Sciences - 2017
Reviewer, Journal Article for Information Systems Journal - 2017
Reviewer, Journal Article for Journal of Management Information Systems - 2017
Reviewer, Conference Paper for International Conference on Information Systems - 2017
Reviewer, Conference Paper for International Conference on Information Systems - 2017
Task Force Member for Weber State University, IS&T Program Review - 2017
Reviewer, Conference Paper for Americas Conference on Information Systems - 2017
Reviewer, Journal Article for Journal of the Association for Information Systems - 2017
Reviewer, Journal Article for Fusio: The Bentley Undergraduate Research Journal - 2017
Reviewer, Conference Paper for Americas Conference on Information Systems - 2016
Reviewer, Conference Paper for Hawaii International Conference on System Sciences - 2016
Reviewer, Journal Article for Journal of the Association for Information Systems - 2016
Reviewer, Conference Paper for Hawaii International Conference on System Sciences - 2016
Reviewer, Conference Paper for Hawaii International Conference on System Sciences - 2016
Reviewer, Journal Article for Journal of Management Information Systems - 2016
Reviewer, Journal Article for Journal of Management Information Systems - 2016
Reviewer, Conference Paper for International Conference on Information Systems - 2016
Reviewer, Conference Paper for Annual Symposium on Information Assurance - 2016
Reviewer, Conference Paper for European Conference on Information Systems - 2016
Reviewer, Conference Paper for European Conference on Information Systems - 2016
Reviewer, Journal Article for Communications of the Association for Information Systems - 2015
Reviewer, Conference Paper for International Conference on Information Systems - 2015
Reviewer, Conference Paper for International Conference on Information Systems - 2015
Reviewer, Conference Paper for International Conference on Information Systems - 2015
Reviewer, Journal Article for Journal of Management Information Systems - 2015
Reviewer, Conference Paper for Annual Symposium on Information Assurance - 2015
Reviewer, Conference Paper for European Conference on Information Systems - 2015
Reviewer, Conference Paper for European Conference on Information Systems - 2015
Reviewer, Conference Paper for Americas Conference on Information Systems - 2014
Reviewer, Conference Paper for Hawaii International Conference on System Sciences - 2014
Reviewer, Conference Paper for Hawaii International Conference on System Sciences - 2012
Conference Volunteer for International Conference on Information Systems - 2012
Reviewer, Conference Paper for International Conference on Information Systems - 2011