Bio
Jeffrey Proudfoot is an Associate Professor in the Computer Information Systems Department at Bentley University and a Research Affiliate in the Cybersecurity at MIT Sloan (CAMS) center at the Massachusetts Institute of Technology (MIT). Jeff’s research has covered a number of cybersecurity topic areas, including insider threat detection and security policies / compliance. He is currently focusing on cybersecurity governance, including regulatory response and board governance of cyber risk. He has published over 50 scholarly works with many appearing in premier academic and practitioner outlets, including The Wall Street Journal, MIS Quarterly, MIS Quarterly Executive, Journal of Management Information Systems, Journal of the Association for Information Systems, Information Systems Journal, and European Journal of Information Systems. Jeff has also contributed to the completion of numerous sponsored research projects funded by a variety of stakeholders, including the Department of Homeland Security (DHS), Center for Identification Technology Research (CITeR), and National Science Foundation (NSF) (these projects exceed $1 million in funding). His projects have been conducted in partnership with industry leaders, including Google and Boston Consulting Group (BCG) and he has presented his work to a variety of stakeholders, including: corporate executives, Fortune-50 board directors, cybersecurity companies, members of the United States Congress and Senate, Department of Homeland Security officials, and defense/intelligence agencies. He has also conducted research in association with the Department of Homeland Security National Center for Border Security and Immigration (BORDERS) and the Center for the Management of Information (CMI). His research, teaching, and service contributions have been recognized with a number of awards and honors. Before joining Bentley, he completed a Ph.D. in Management Information Systems at the University of Arizona.
Professional Memberships
Association for Information Systems 2012 - PresentAwards and Honors
2021, Outstanding Scholarly Contribution Award, Bentley University2020, Best Paper Award (2019), Journal of the Association for Information Systems (JAIS)2019, Outstanding Associate Editor Award, International Conference on Information Systems (ICIS)2019, Nominee, Joseph Cronin Advisor and Mentor of the Year Award, Bentley University2018, Best Associate Editor Award, International Conference on Information Systems (ICIS)2017, Best Reviewer Award, 16th Annual Pre-ICIS Workshop on HCI Research in MIS2016, Nominee, Joseph Cronin Advisor and Mentor of the Year Award, Bentley University2016, Outstanding Reviewer Award, International Conference on Information Systems (ICIS)2015, Best Reviewer Award, Communications of the Association for Information Systems2012, Teaching Award, MIS Department, Eller College of Management, University of Arizona2011, Finalist for Best Poster, Americas Conference on Information Systems2010, Teaching Award, OIS Department, David Eccles School of Business, University of Utah2009, Graduate Teaching Scholarship, David Eccles School of Business, University of UtahPublications
Journal Articles
Proudfoot, J. G., Cram, W. A., Madnick, S. (2024). Weathering the Storm: Examining How Organizations Navigate the Sea of Cybersecurity Regulations. European Journal of Information Systems. (Link)Proudfoot, J. G., Cram, W., Madnick, S., Coden, M. (2023). The Importance of Board Member Actions for Cybersecurity Governance and Risk Management. Management Information Systems Quarterly Executive (MISQE), (22) 4 235-250. Cram, W. A., Proudfoot, J. G., D'Arcy, J. (2021). When enough is enough: Investigating the antecedents and consequences of information security fatigue. Information Systems Journal, (31) 4 521-549. Cram, W. A., Proudfoot, J. G., D'Arcy, J. (2020). Optimizing Employee Compliance with Cybersecurity Policies: What Organizations Should Start and Stop Doing. MIS Quarterly Executive, (19) 3 135-150. Twyman, N. W., Proudfoot, J. G., Camerson, A., Case, E., Burgoon, J. K., Twitchell, D. (2020). Too Busy to Be Manipulated: How Multitasking with Technology Improves Deception Detection in Collaborative Teamwork. Journal of Management Information Systems, (37) 2 377-395. Cram, W. A., D'Arcy, J., Proudfoot, J. G. (2019). Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance. MIS Quarterly, (43) 2 525-554. Jenkins, J. L., Proudfoot, J. G., Valacich, J. S., Grimes, G. M., Nunamaker, Jr., J. F. (2019). Sleight of Hand: Identifying Concealed Information by Monitoring Mouse-Cursor Movements. Journal of the Association for Information Systems (2019 JAIS Best Paper Award), (20) 1 1-32. Boyle, R. J., Clements, J. A., Proudfoot, J. G. (2018). Measuring deception: A look at antecedents to deceptive intent. American Journal of Psychology, (131) 3 347-367. Proudfoot, J. G., Wilson, D. W., Valacich, J. S., Byrd, M. D. (2018). Saving face on Facebook: Privacy concerns, social benefits, and impression management. Behaviour and Information Technology, (37) 1 16-37. Cram, W. A., Proudfoot, J. G., D'Arcy, J. (2017). Organizational Information Security Policies: A Review and Research Framework. European Journal of Information Systems, (26) 6 605–641. Proudfoot, J. G., Jenkins, J. L., Burgoon, J. K., Nunamaker, Jr., J. F. (2016). More Than Meets the Eye: How Oculometric Behaviors Evolve Over the Course of Automated Deception Detection Interactions. Journal of Management Information Systems, (33) 2 332-360. Giboney, J. S., Proudfoot, J. G., Goel, S., Valacich, J. S. (2016). The Security Assessment Measure (SEAM): Developing a Scale for Hacker Expertise. Computers & Security, (60) 37-51. Twyman, N. W., Proudfoot, J. G., Schuetzler, R. M., Elkins, A. C., Derrick, D. C. (2016). Robustness of multiple indicators in automated screening systems for deception detection. Journal of Management Information Systems, (32) 4 215-245. Proudfoot, J. G., Boyle, R. J., Schuetzler, R. S. (2016). Man vs. machine: Investigating the effects of adversarial system use on end-user behavior in automated deception detection interviews. Decision Support Systems, (85) 23-33. (Link)Clements, J. A., Boyle, R. J., Proudfoot, J. G. (2016). Exploring political skill and deception. International Journal of Sociology and Social Policy, (36) 3/4 138-156. Gogan, J. L., Davidson, E., Proudfoot, J. G. (2016). HealthCare.Gov: A project management horror story. Journal of Information Technology -- Teaching Cases, (6) 45-55. (Link)Jenkins, J. L., Grimes, M., Proudfoot, J. G., Lowery, P. B. (2014). Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time fear appeals. Information Technology for Development, (20) 2 196-213. Burgoon, J. K., Proudfoot, J. G., Schuetzler, R., Wilson, D. (2014). Patterns of nonverbal behavior associated with truth and deception: Illustrations from three experiments. Journal of Nonverbal Behavior, (38) 325-354.
Books
Boyle, R. J., Proudfoot, J. G. (2013). Applied Information Security: A Hands-On Guide to Information Security Software (2nd Edition). New Jersey: Pearson
Conference Proceedings
Proudfoot, J. G.Madnick, S. (2024). Cybersecurity Regulation Development and Dissemination Deficiencies Harming Organizational Cybersecurity Outcomes 23rd Annual Security Conference. Proudfoot, J. G.Madnick, S. (2022). Regulatory Facilitators and Impediments Impacting Cybersecurity Maturity. Americas Conference on Information Systems (AMCIS). van Rensburg, N.Madnick, S.Proudfoot, J. G.Rezek, C. (2022). Insights Gained While Exploring Regulation and Cybersecurity Maturity 21st Annual Security Conference. Twyman, N. W.Proudfoot, J. G.Case, E.Cameron, A.Burgoon, J. K.Twitchell, D. (2019). Information-Rich but Attention-Poor: Investigating Deception Detection Accuracy in an Increasingly Polychronic World Hawaii International Conference on System Sciences (HICSS). Proudfoot, J. G.Elkins, A. C. (2017). It’s not the answer, it’s the question: Exploring the impact of question relevance on user perceptions and behavior in automated deception detection interactions Hawaii International Conference on System Sciences (HICSS), Hawaii, HI. Jenkins, J. L.Proudfoot, J. G.Valacich, J. S.Nunamaker, Jr., J. F. (2017). Sleight of hand: Identifying malicious insider threats through the monitoring of mouse-cursor movements Hawaii International Conference on System Sciences (HICSS), Hawaii, HI. Cram, W. A.Proudfoot, J. G.D'Arcy, J. (2017). Seeing the Forest and the Trees: A Meta-Analysis of Information Security Policy Compliance Literature Hawaii International Conference on System Sciences (HICSS), Hawaii, HI. Grimes, G. M.Proudfoot, J. G.Valacich, J. S.Jenkins, J. S.Twyman, N. W.Burgoon, J. K. (2017). Controlled Realism in Deception Research Hawaii International Conference on System Sciences (HICSS). Elkins, A.Proudfoot, J. G.Twyman, N. W.Burgoon, J. K.Nunamaker, Jr., J. F. (2016). Embodied conversational agent-based deception detection: Concealed information test using automated electrodermal, vocal, and oculometric measurements SAI / IEEE Intelligent Systems Conference, London, U. K.. Wilson, D.Schuetzler, R.Dorn, B.Proudfoot, J. G.Valacich, J. S. (2015). When Disclosure is Involuntary: Empowering Users with Control to Reduce Concerns International Conference on Information Systems (ICIS), Forth Worth, Texas. Grimes, G. M.Proudfoot, J. G.Valacich, J. S.Jenkins, J. S.Twyman, N. W.Burgoon, J. K.Marquardson, J. (2015). Lessons Learned from Successive Deception Experiments Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Kauai, HI. Giboney, J. S.Proudfoot, J. G.Goel, S.Valacich, J. S. (2015). Measuring Hacking Ability Using a Conceptual Expertise Task ADFSL Conference on Digital Forensics, Security and Law, Daytona Beach, FL. Gogan, J. L.Proudfoot, J. G. (2015). Information Security as a Service: A Call for Transdisciplinary Research Service Management and Science Forum, Waltham, MA. Proudfoot, J. G.Jenkins, J. L.Burgoon, J. K.Nunamaker, Jr., J. F. (2015). Deception is in the Eye of the Communicator: Investigating Pupil Diameter Variations in Automated Deception Detection Interviews IEEE International Conference on Intelligence and Security Informatics (ISI), Baltimore, MD. Wilson, D.Proudfoot, J. G. (2014). Saving Face on Facebook: Impression Management as Motivation to Use Social Computing Systems Americas Conference on Information Systems (AMCIS), Detroit, Michigan. Wilson, D.Proudfoot, J. G.Valacich, J. S. (2014). Saving Face on Facebook: Privacy Concerns, Social Benefits, and Impression Management International Conference on Information Systems (ICIS), Auckland, New Zealand. Twyman, N. W.Schuetzler, R.Proudfoot, J. G.Elkins, A. (2013). A Systems Approach to Countermeasures in Credibility Assessment Interviews International Conference on Information Systems (ICIS), Milan, Italy. Twyman, N. W.Burgoon, J. K.Elkins, A.Proudfoot, J. G. (2013). Alternative Cues in Concealed Information Testing Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii. Proudfoot, J. G. (2013). Evaluating the Feasibility of Using Noncontact Sensors to Conduct a Targetless Concealed Information Test Workshop on Innovation in Border Control (WIBC) at the European Intelligence and Security Informatics Conference (EISIC), Uppsala, Sweden. Proudfoot, J. G.Twyman, N. W.Burgoon, J. K. (2013). Eye Tracking and the CIT: Utilizing Oculometric Cues to Identify Familiarity with Wanted Persons Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii. Proudfoot, J. G.Boyle, R. J.Clements, J. A. (2013). Mitigating Threats to Collaboration and CMC: Identifying Antecedents of Online Deviance Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii. Jenkins, J. L.Marquardson, J.Proudfoot, J. G.Valacich, J. S.Golob, E. G.Nunamaker, Jr., J. F. (2013). The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resource Allocation Workshop on Innovation in Border Control (WIBC) at the European Intelligence and Security Informatics Conference (EISIC), Uppsala, Sweden. Proudfoot, J. G.Twyman, N. W.Burgoon, J. K. (2012). A Comparison of Invasive and Noninvasive Sensors in the Concealed Information Test Workshop on Innovation in Border Control (WIBC) at the European Intelligence and Security Informatics Conference (EISIC), Odense, Denmark. Jenkins, J. L.Proudfoot, J. G.Durcikova, A. (2012). Determinants and Impediments of Password Reuse on Deceptive Web Sites Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii. Nunamaker, J. F.Burgoon, J. K.Twyman, N. W.Proudfoot, J. G.Schuetzler, R.Giboney, J. S. (2012). Establishing a Foundation for Automated Human Credibility Screening Workshop on Developing Technologies and Tools for Border Security Applications at the IEEE International Conference on Intelligence and Security Informatics (ISI), Washington, D.C.. Jenkins, J. L.Proudfoot, J. G.Burns, M.Golob, E. (2012). Estimating Unknown Numbers More Precisely: A Stratified Sampling Methodology for Estimating the Baseline Population of Illegal Immigrants Passing Through Open Checkpoints Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii. Proudfoot, J. G.Twyman, N. W.Burgoon, J. K. (2012). Familiarity Recognition in Automated Screening Environments: Utilizing Eye Tracking Technology as an Intelligence Gathering Tool Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii. Boyle, R. J.Clements, J. A.Proudfoot, J. G. (2012). Predicting Deceptive Behavior: Exploring Antecedents to Deceptive Behaviors National Communication Association Convention (NCA), Orlando, FL.
Conference Papers
Proudfoot, J. G., Giboney, J. S., Schuetzler, R., Durcikova, A. (2011). Trends in Phishing Attacks: Suggestions for Future ResearchAmericas Conference on Information Systems (AMCIS), Detroit, Michigan.
Other(s)
Proudfoot, J. G., Pearlson, K. (2024). As Boards Focus More on Cybersecurity, Are They Missing One of the Biggest Threats?The Wall Street Journal. (Link)Jenkins, J. L., Proudfoot, J. G., Marquardson, J., Gans, J., Golob, E., Nunamaker, Jr., J. F. (2014). Checking on Checkpoints: An Assessment of U.S. Border Patrol Operations, Performance, and ImpactsNational Center for Border Security and Immigration (BORDERS), University of Arizona. Proudfoot, J. G. (2014). Identifying Deception Using Novel Technology-Based Approaches to Uncover Concealed InformationUniversity of Arizona. Presentations
Proudfoot, J. G., Madnick, S. (2024). “Cybersecurity regulation development and dissemination deficiencies harming organizational cybersecurity outcomes” Presented at the23rd Annual Security ConferenceProudfoot, J. G., Madnick, S. (2024). “Leadership in the Digital Era: Empowering Boards for Effective Cybersecurity Risk Management” Presented at theCybersecurity at MIT Sloan (CAMS) Quarterly Members WorkshopProudfoot, J. G. (2023). “Exploring the Human Element of Security: Leveraging Research to Inform Practice” Presented at theNetragard Annual Meeting Greater Boston Area, MA Proudfoot, J. G. (2022). “Cybersecurity Regulation and Maturity with Dr. Jeffrey Proudfoot” Presented at theCyber Ways Podcast https://cyberwayspodcast.buzzsprout.com/1848477/11110467-cybersecurity-regulation-and-maturity-with-dr-jeffrey-proudfoot Proudfoot, J. G., Madnick, S. (2022). “Regulatory Facilitators and Impediments Impacting Cybersecurity Maturity” Presented at theAmericas Conference on Information Systems (AMCIS) Minneapolis, MN Proudfoot, J. G., Madnick, S. (2022). “Charting A Course For Organizations To Navigate Cybersecurity Regulations” Presented at theCybersecurity at MIT Sloan (CAMS) Quarterly Members WorkshopProudfoot, J. G., Madnick, S. (2022). “Investigating Regulatory Operationalization and Its Impacts on Cybersecurity” Presented at theCybersecurity at MIT Sloan (CAMS) Members MeetingProudfoot, J. G. (2021). “Exploring the Human Element of Security: Leveraging Research to Inform Practice” Presented at theNetragard Annual Meeting Greater Boston Area, MA Proudfoot, J. G., Madnick, S. (2021). “Investigating the Interaction of Regulatory Compliance and Cybersecurity Maturity” Presented at theCybersecurity at MIT Sloan (CAMS) Members MeetingProudfoot, J. G., Madnick, S. (2021). “Exploring the Interaction of Regulatory Compliance and Cybersecurity Maturity Using Grounded Theory” Presented at the20th Annual Security ConferenceProudfoot, J. G. (2020). “The Regs Made Me Do It! Exploring the Interplay between Regulatory Compliance and Cybersecurity” Presented at theCybersecurity at MIT Sloan (CAMS) MeetingTwyman, N. W., Proudfoot, J. G., Case, E., Camerson, A., Burgoon, J. K., Twitchell, D. (2019). “Information-Rich but Attention-Poor: Investigating Deception Detection Accuracy in an Increasingly Polychronic World” Presented at theHawaii International Conference on System Sciences (HICSS) Maui, HI Grimes, G. M., Proudfoot, J. G., Valacich, J. S., Jenkins, J. L., Twyman, N. W., Burgoon, J. K. (2017). “Controlled Realism in Deception Research” Presented at theHawaii International Conference on System Sciences (HICSS) Hawaii, HI Proudfoot, J. G., Elkins, A. C. (2017). “It’s not the answer, it’s the question: Exploring the impact of question relevance on user perceptions and behavior in automated deception detection interactions” Presented at theHawaii International Conference on System Sciences (HICSS) Hawaii, HI Proudfoot, J. G. (2015). “Deception is in the Eye of the Communicator: Investigating Pupil Diameter Variations in Automated Deception Detection Interviews” Presented at theIEEE International Conference on Intelligence and Security Informatics (ISI) Baltimore, MD Proudfoot, J. G. (2015). “It’s What’s on the Inside that Counts: New Technologies for Identifying Insider Threats” Presented at theCybersecurity at MIT Sloan (CAMS) MeetingWilson, D., Proudfoot, J. G., Valacich, J. S. (2014). “Saving Face on Facebook: Privacy Concerns, Social Benefits, and Impression Management.” Presented at theInternational Conference on Information Systems (ICIS) Auckland, New Zealand Proudfoot, J. G., Twyman, N., Schuetzler, R., Elkins, A. (2013). “A Systems Approach to Countermeasures in Credibility Assessment Interviews” Presented at theInternational Conference on Information Systems (ICIS) Milan Proudfoot, J. G. (2013). “Evaluating the Feasibility of using Noncontact Sensors to Conduct a Targetless Concealed Information Test” Presented at theWorkshop on Innovation in Border Control (WIBC) at the European Intelligence and Security Informatics Conference (EISIC) Uppsala, Sweden Proudfoot, J. G., Jenkins, J., Marquardson, J., Valacich, J., Golob, E., Nunamaker, J. J. (2013). “The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resources Allocation” Presented at theWorkshop on Innovation in Border Control (WIBC) at the European Intelligence and Security Informatics Conference (EISIC) Uppsala, Sweden Proudfoot, J. G. (2013). “Eye Tracking and the CIT: Utilizing Oculometric Cues to Identify Familiarity with Wanted Persons” Presented at theHawaii International Conference on System Sciences (HICSS) Maui, HI Proudfoot, J. G. (2013). “Mitigating Threats to Collaboration and CMC: Identifying Antecedents of Online Deviance” Presented at theHawaii International Conference on System Sciences (HICSS) Maui, HI Proudfoot, J. G. (2012). “Determinants and Impediments of Passoword Reuse on Deceptive Web Sites” Presented at theSymposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS) Maui, Hawaii Proudfoot, J. G. (2012). “Familiarity Recognition in Automated Screening Environments: Utilizing Eye Tracking Technology as an Intelligence gathering Tool” Presented at theSymposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS) Maui, Hawaii Service
Department Service
Assurance of Learning Champion for CIS Department - Assurance of Learning Champion 2016 - PresentCommittee Member for Computer Information Systems Department Search Committee - 2023Tenure-Track Faculty Evaluator for IPM Department - Tenure-Track Faculty Evaluator 2020 - 2023Committee Member for Information and Process Management Department Search Committee - 2019University Service
Task Force Member for Bentley University / Minerva Health TLN Executive Education Program 2023 - PresentGB 310 Core Course Coordinator for Bentley University - GB310 Course Coordinator 2018 - PresentIPM Department Representative for Fall Virtual Academic Preview Day - 2020Mentor (Faculty) for Honors Capstone Project 2019 - 2020Course Developer for Bentley University Degree Completion Program (DCP403) 2016 - 2019IPM Department Representative for Undergraduate Academic Programs Fair - 2019First Year Seminar Advisor - 2017IPM Department Representative for Office of Undergraduate Admission Open House - 2016Mentor (Faculty) for Honors Capstone Project 2015 - 2016IPM Department Representative for Office of Undergraduate Admission Open House for Accepted Students - 2016IPM Department Representative for Student Government Association & Office of Academic Services Majors/Minors Fair - 2015IPM Department Representative for Office of Undergraduate Admission Open House for Accepted Students - 2015IPM Department Representative for Student Government Association & Office of Academic Services Majors/Minors Fair - 2014IPM Department Representative for Office of Undergraduate Admission Open House - 2014Professional Service
Editorial Review Board Member for Management Information Systems Quarterly Executive (MISQE) 2023 - PresentReviewer (ad hoc) for MIS Quarterly Executive 2022 - PresentReviewer (ad hoc) for MIS Quarterly 2020 - PresentReviewer (ad hoc) for Information & Management 2019 - PresentReviewer (ad hoc) for AIS Transactions on Replication Research 2018 - PresentReviewer (ad hoc) for Electronic Commerce Research and Applications 2018 - PresentReviewer (ad hoc) for Information Systems Research 2018 - PresentReviewer (ad hoc) for Information Systems Journal 2017 - PresentReviewer (ad hoc) for Journal of the Association for Information Systems 2016 - PresentReviewer (ad hoc) for Journal of Management Information Systems 2015 - PresentReviewer, Conference Paper for Annual Symposium on Information Assurance 2015 - PresentReviewer (ad hoc) for Communications of the Association for Information Systems 2015 - PresentReviewer (ad hoc) for European Conference on Information Systems 2015 - PresentReviewer (ad hoc) for Americas Conference on Information Systems 2014 - PresentReviewer (ad hoc) for Hawaii International Conference on System Sciences 2012 - PresentReviewer (ad hoc) for International Conference on Information Systems 2011 - PresentEditor (Associate), Conference for Practice-Oriented Research Track, International Conference on Information Systems 2024 - 2024Special Issue Editor (MISQE Special Issue on Managing Cybersecurity to Address Increasing Digital Risk) for Management Information Systems Quarterly Executive (MISQE) 2023 - 2024Track Co-Chair for Digital Learning and IS Curricula Track, International Conference on Information Systems 2021 - 2022Conference/Workshop Organizer for Symposium on Credibility Assessment and Screening Technologies (CAST) at the Hawaii International Conference on System Sciences (HICSS) 2016 - 2022Program Evaluator for Center for Cybersecurity (CSC) at NYU Abu Dhabi 2022 - 2022Region 1 Executive Committee / AMCIS Secretary for Association for Information Systems (AIS) 2020 - 2021Editor (Associate), Conference for Rethinking IS Strategy and Governance in the Digital Age, European Conference on Information Systems (ECIS) 2020 - 2021Editor (Associate), Conference for Digital Learning Environment and Future IS Curriculum, International Conference on Information Systems (ICIS) 2018 - 2021Conference/Workshop Track Chair for Minitrack on Cognitive, Affective, and Conversational HCI at the Amercas Conference on Information Systems (AMCIS) 2016 - 2021Editorial Review Board Member for Special Section: COVID-19, Learning, Pedagogy and Educational Systems -- Communications of the Association for Information Systems (CAIS) - 2020Editor (Associate), Conference for IS Strategy & Governance, European Conference on Information Systems (ECIS) 2019 - 2020Webmaster for 2019 International Conference on Information Systems 2017 - 2019Reviewer, Journal Article for Journal of Intellectual Capital - 2019Editor (Associate), Conference for Information Systems Curriculum and Education Track, International Conference on Information Systems 2017 - 2018Reviewer, Journal Article for Information Systems Management - 2018Task Force Member for Weber State University, IS&T Program Review - 2017Reviewer, Journal Article for Fusio: The Bentley Undergraduate Research Journal - 2017Conference Volunteer for International Conference on Information Systems - 2012