Jeffrey Proudfoot

  • Associate Professor, Computer Information Systems
  • Research Affiliate, Massachusetts Institute of Technology (MIT), Cybersecurity at MIT Sloan (CAMS)
  • Business Core Coordinator, GB310 - Business Processes and Systems, Bentley University
  • Ph.D. University of Arizona
  • M.S. University of Utah
  • B.S. University of Utah

Teaching Interests

Business process management, ERP systems, information security

Research Interests

Cybersecurity regulations, corporate board governance of cyber risk, behavioral information security, deception/insider threat detection

Consulting/Practice Interests

Information security

Bio

Jeffrey Proudfoot is an Associate Professor in the Computer Information Systems Department at Bentley University and a Research Affiliate in the Cybersecurity at MIT Sloan (CAMS) center at the Massachusetts Institute of Technology (MIT). Jeff’s research has covered a number of cybersecurity topic areas, including insider threat detection and security policies and compliance. He is currently focusing his work on cybersecurity governance, including regulatory response and board governance of cyber risk. He has published over 50 scholarly works with many appearing in premier academic and practitioner outlets, including The Wall Street Journal, MIS Quarterly, MIS Quarterly Executive, Journal of Management Information Systems, Journal of the Association for Information Systems, Information Systems Journal, and European Journal of Information Systems. Jeff has also contributed to the completion of numerous sponsored research projects funded by a variety of stakeholders, including the Department of Homeland Security (DHS), Center for Identification Technology Research (CITeR), and National Science Foundation (NSF) (these projects exceed $1 million in funding). His projects have been conducted in partnership with industry leaders, including Google and Boston Consulting Group (BCG) and he has presented his work to a variety of stakeholders, including: corporate executives, Fortune-50 board directors, cybersecurity companies, members of the United States Congress and Senate, Department of Homeland Security officials, and defense/intelligence agencies. He has also conducted research in association with the Department of Homeland Security National Center for Border Security and Immigration (BORDERS) and the Center for the Management of Information (CMI). His research, teaching, and service contributions have been recognized with a number of awards and honors. Before joining Bentley, he completed a Ph.D. in Management Information Systems at the University of Arizona.

Professional Memberships

  • Association for Information Systems 2012 - Present
  • Awards and Honors

  • 2021, Outstanding Scholarly Contribution Award, Bentley University
  • 2020, Best Paper Award (2019), Journal of the Association for Information Systems (JAIS)
  • 2019, Outstanding Associate Editor Award, International Conference on Information Systems (ICIS)
  • 2019, Nominee, Joseph Cronin Advisor and Mentor of the Year Award, Bentley University
  • 2018, Best Associate Editor Award, International Conference on Information Systems (ICIS)
  • 2017, Best Reviewer Award, 16th Annual Pre-ICIS Workshop on HCI Research in MIS
  • 2016, Nominee, Joseph Cronin Advisor and Mentor of the Year Award, Bentley University
  • 2016, Outstanding Reviewer Award, International Conference on Information Systems (ICIS)
  • 2015, Best Reviewer Award, Communications of the Association for Information Systems
  • 2012, Teaching Award, MIS Department, Eller College of Management, University of Arizona
  • 2011, Finalist for Best Poster, Americas Conference on Information Systems
  • 2010, Teaching Award, OIS Department, David Eccles School of Business, University of Utah
  • 2009, Graduate Teaching Scholarship, David Eccles School of Business, University of Utah
  • Publications

    Journal Articles


  • Proudfoot, J. G., Pearlson, K. (2024). As Boards Focus More on Cybersecurity, Are They Missing One of the Biggest Threats?. The Wall Street Journal. (Link)
  • Proudfoot, J. G., Cram, W., Madnick, S., Coden, M. (2023). The Importance of Board Member Actions for Cybersecurity Governance and Risk Management. Management Information Systems Quarterly Executive (MISQE), (22) 4 235-250.
  • Cram, W. A., Proudfoot, J. G., D'Arcy, J. (2021). When enough is enough: Investigating the antecedents and consequences of information security fatigue. Information Systems Journal, (31) 4 521-549.
  • Cram, W. A., Proudfoot, J. G., D'Arcy, J. (2020). Optimizing Employee Compliance with Cybersecurity Policies: What Organizations Should Start and Stop Doing. MIS Quarterly Executive, (19) 3 135-150.
  • Twyman, N. W., Proudfoot, J. G., Camerson, A., Case, E., Burgoon, J. K., Twitchell, D. (2020). Too Busy to Be Manipulated: How Multitasking with Technology Improves Deception Detection in Collaborative Teamwork. Journal of Management Information Systems, (37) 2 377-395.
  • Cram, W. A., D'Arcy, J., Proudfoot, J. G. (2019). Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance. MIS Quarterly, (43) 2 525-554.
  • Jenkins, J. L., Proudfoot, J. G., Valacich, J. S., Grimes, G. M., Nunamaker, Jr., J. F. (2019). Sleight of Hand: Identifying Concealed Information by Monitoring Mouse-Cursor Movements. Journal of the Association for Information Systems (2019 JAIS Best Paper Award), (20) 1 1-32.
  • Boyle, R. J., Clements, J. A., Proudfoot, J. G. (2018). Measuring deception: A look at antecedents to deceptive intent. American Journal of Psychology, (131) 3 347-367.
  • Proudfoot, J. G., Wilson, D. W., Valacich, J. S., Byrd, M. D. (2018). Saving face on Facebook: Privacy concerns, social benefits, and impression management. Behaviour and Information Technology, (37) 1 16-37.
  • Cram, W. A., Proudfoot, J. G., D'Arcy, J. (2017). Organizational Information Security Policies: A Review and Research Framework. European Journal of Information Systems, (26) 6 605–641.
  • Proudfoot, J. G., Jenkins, J. L., Burgoon, J. K., Nunamaker, Jr., J. F. (2016). More Than Meets the Eye: How Oculometric Behaviors Evolve Over the Course of Automated Deception Detection Interactions. Journal of Management Information Systems, (33) 2 332-360.
  • Giboney, J. S., Proudfoot, J. G., Goel, S., Valacich, J. S. (2016). The Security Assessment Measure (SEAM): Developing a Scale for Hacker Expertise. Computers & Security, (60) 37-51.
  • Twyman, N. W., Proudfoot, J. G., Schuetzler, R. M., Elkins, A. C., Derrick, D. C. (2016). Robustness of multiple indicators in automated screening systems for deception detection. Journal of Management Information Systems, (32) 4 215-245.
  • Proudfoot, J. G., Boyle, R. J., Schuetzler, R. S. (2016). Man vs. machine: Investigating the effects of adversarial system use on end-user behavior in automated deception detection interviews. Decision Support Systems, (85) 23-33. (Link)
  • Clements, J. A., Boyle, R. J., Proudfoot, J. G. (2016). Exploring political skill and deception. International Journal of Sociology and Social Policy, (36) 3/4 138-156.
  • Gogan, J. L., Davidson, E., Proudfoot, J. G. (2016). HealthCare.Gov: A project management horror story. Journal of Information Technology -- Teaching Cases, (6) 45-55. (Link)
  • Jenkins, J. L., Grimes, M., Proudfoot, J. G., Lowery, P. B. (2014). Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time fear appeals. Information Technology for Development, (20) 2 196-213.
  • Burgoon, J. K., Proudfoot, J. G., Schuetzler, R., Wilson, D. (2014). Patterns of nonverbal behavior associated with truth and deception: Illustrations from three experiments. Journal of Nonverbal Behavior, (38) 325-354.

    Books


  • Boyle, R. J., Proudfoot, J. G. (2013). Applied Information Security: A Hands-On Guide to Information Security Software (2nd Edition). New Jersey: Pearson

  • Conference Proceedings


  • Proudfoot, J. G.Madnick, S. (2024). Cybersecurity Regulation Development and Dissemination Deficiencies Harming Organizational Cybersecurity Outcomes 23rd Annual Security Conference.
  • Proudfoot, J. G.Madnick, S. (2022). Regulatory Facilitators and Impediments Impacting Cybersecurity Maturity. Americas Conference on Information Systems (AMCIS).
  • van Rensburg, N.Madnick, S.Proudfoot, J. G.Rezek, C. (2022). Insights Gained While Exploring Regulation and Cybersecurity Maturity 21st Annual Security Conference.
  • Twyman, N. W.Proudfoot, J. G.Case, E.Cameron, A.Burgoon, J. K.Twitchell, D. (2019). Information-Rich but Attention-Poor: Investigating Deception Detection Accuracy in an Increasingly Polychronic World Hawaii International Conference on System Sciences (HICSS).
  • Proudfoot, J. G.Elkins, A. C. (2017). It’s not the answer, it’s the question: Exploring the impact of question relevance on user perceptions and behavior in automated deception detection interactions Hawaii International Conference on System Sciences (HICSS), Hawaii, HI.
  • Jenkins, J. L.Proudfoot, J. G.Valacich, J. S.Nunamaker, Jr., J. F. (2017). Sleight of hand: Identifying malicious insider threats through the monitoring of mouse-cursor movements Hawaii International Conference on System Sciences (HICSS), Hawaii, HI.
  • Cram, W. A.Proudfoot, J. G.D'Arcy, J. (2017). Seeing the Forest and the Trees: A Meta-Analysis of Information Security Policy Compliance Literature Hawaii International Conference on System Sciences (HICSS), Hawaii, HI.
  • Grimes, G. M.Proudfoot, J. G.Valacich, J. S.Jenkins, J. S.Twyman, N. W.Burgoon, J. K. (2017). Controlled Realism in Deception Research Hawaii International Conference on System Sciences (HICSS).
  • Elkins, A.Proudfoot, J. G.Twyman, N. W.Burgoon, J. K.Nunamaker, Jr., J. F. (2016). Embodied conversational agent-based deception detection: Concealed information test using automated electrodermal, vocal, and oculometric measurements SAI / IEEE Intelligent Systems Conference, London, U. K..
  • Wilson, D.Schuetzler, R.Dorn, B.Proudfoot, J. G.Valacich, J. S. (2015). When Disclosure is Involuntary: Empowering Users with Control to Reduce Concerns International Conference on Information Systems (ICIS), Forth Worth, Texas.
  • Grimes, G. M.Proudfoot, J. G.Valacich, J. S.Jenkins, J. S.Twyman, N. W.Burgoon, J. K.Marquardson, J. (2015). Lessons Learned from Successive Deception Experiments Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Kauai, HI.
  • Giboney, J. S.Proudfoot, J. G.Goel, S.Valacich, J. S. (2015). Measuring Hacking Ability Using a Conceptual Expertise Task ADFSL Conference on Digital Forensics, Security and Law, Daytona Beach, FL.
  • Gogan, J. L.Proudfoot, J. G. (2015). Information Security as a Service: A Call for Transdisciplinary Research Service Management and Science Forum, Waltham, MA.
  • Proudfoot, J. G.Jenkins, J. L.Burgoon, J. K.Nunamaker, Jr., J. F. (2015). Deception is in the Eye of the Communicator: Investigating Pupil Diameter Variations in Automated Deception Detection Interviews IEEE International Conference on Intelligence and Security Informatics (ISI), Baltimore, MD.
  • Wilson, D.Proudfoot, J. G. (2014). Saving Face on Facebook: Impression Management as Motivation to Use Social Computing Systems Americas Conference on Information Systems (AMCIS), Detroit, Michigan.
  • Wilson, D.Proudfoot, J. G.Valacich, J. S. (2014). Saving Face on Facebook: Privacy Concerns, Social Benefits, and Impression Management International Conference on Information Systems (ICIS), Auckland, New Zealand.
  • Twyman, N. W.Schuetzler, R.Proudfoot, J. G.Elkins, A. (2013). A Systems Approach to Countermeasures in Credibility Assessment Interviews International Conference on Information Systems (ICIS), Milan, Italy.
  • Twyman, N. W.Burgoon, J. K.Elkins, A.Proudfoot, J. G. (2013). Alternative Cues in Concealed Information Testing Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii.
  • Proudfoot, J. G. (2013). Evaluating the Feasibility of Using Noncontact Sensors to Conduct a Targetless Concealed Information Test Workshop on Innovation in Border Control (WIBC) at the European Intelligence and Security Informatics Conference (EISIC), Uppsala, Sweden.
  • Proudfoot, J. G.Twyman, N. W.Burgoon, J. K. (2013). Eye Tracking and the CIT: Utilizing Oculometric Cues to Identify Familiarity with Wanted Persons Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii.
  • Proudfoot, J. G.Boyle, R. J.Clements, J. A. (2013). Mitigating Threats to Collaboration and CMC: Identifying Antecedents of Online Deviance Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii.
  • Jenkins, J. L.Marquardson, J.Proudfoot, J. G.Valacich, J. S.Golob, E. G.Nunamaker, Jr., J. F. (2013). The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resource Allocation Workshop on Innovation in Border Control (WIBC) at the European Intelligence and Security Informatics Conference (EISIC), Uppsala, Sweden.
  • Proudfoot, J. G.Twyman, N. W.Burgoon, J. K. (2012). A Comparison of Invasive and Noninvasive Sensors in the Concealed Information Test Workshop on Innovation in Border Control (WIBC) at the European Intelligence and Security Informatics Conference (EISIC), Odense, Denmark.
  • Jenkins, J. L.Proudfoot, J. G.Durcikova, A. (2012). Determinants and Impediments of Password Reuse on Deceptive Web Sites Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii.
  • Nunamaker, J. F.Burgoon, J. K.Twyman, N. W.Proudfoot, J. G.Schuetzler, R.Giboney, J. S. (2012). Establishing a Foundation for Automated Human Credibility Screening Workshop on Developing Technologies and Tools for Border Security Applications at the IEEE International Conference on Intelligence and Security Informatics (ISI), Washington, D.C..
  • Jenkins, J. L.Proudfoot, J. G.Burns, M.Golob, E. (2012). Estimating Unknown Numbers More Precisely: A Stratified Sampling Methodology for Estimating the Baseline Population of Illegal Immigrants Passing Through Open Checkpoints Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii.
  • Proudfoot, J. G.Twyman, N. W.Burgoon, J. K. (2012). Familiarity Recognition in Automated Screening Environments: Utilizing Eye Tracking Technology as an Intelligence Gathering Tool Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii.
  • Boyle, R. J.Clements, J. A.Proudfoot, J. G. (2012). Predicting Deceptive Behavior: Exploring Antecedents to Deceptive Behaviors National Communication Association Convention (NCA), Orlando, FL.

  • Conference Papers


  • Proudfoot, J. G., Giboney, J. S., Schuetzler, R., Durcikova, A. (2011). Trends in Phishing Attacks: Suggestions for Future ResearchAmericas Conference on Information Systems (AMCIS), Detroit, Michigan.

  • Other(s)


  • Jenkins, J. L., Proudfoot, J. G., Marquardson, J., Gans, J., Golob, E., Nunamaker, Jr., J. F. (2014). Checking on Checkpoints: An Assessment of U.S. Border Patrol Operations, Performance, and ImpactsNational Center for Border Security and Immigration (BORDERS), University of Arizona.
  • Proudfoot, J. G. (2014). Identifying Deception Using Novel Technology-Based Approaches to Uncover Concealed InformationUniversity of Arizona.
  • Presentations

  • Proudfoot, J. G., Madnick, S. (2024). “Cybersecurity regulation development and dissemination deficiencies harming organizational cybersecurity outcomes” Presented at the23rd Annual Security Conference
  • Proudfoot, J. G., Madnick, S. (2024). “Leadership in the Digital Era: Empowering Boards for Effective Cybersecurity Risk Management” Presented at theCybersecurity at MIT Sloan (CAMS) Quarterly Members Workshop
  • Proudfoot, J. G. (2023). “Exploring the Human Element of Security: Leveraging Research to Inform Practice” Presented at theNetragard Annual Meeting Greater Boston Area, MA
  • Proudfoot, J. G. (2022). “Cybersecurity Regulation and Maturity with Dr. Jeffrey Proudfoot” Presented at theCyber Ways Podcast https://cyberwayspodcast.buzzsprout.com/1848477/11110467-cybersecurity-regulation-and-maturity-with-dr-jeffrey-proudfoot
  • Proudfoot, J. G., Madnick, S. (2022). “Regulatory Facilitators and Impediments Impacting Cybersecurity Maturity” Presented at theAmericas Conference on Information Systems (AMCIS) Minneapolis, MN
  • Proudfoot, J. G., Madnick, S. (2022). “Charting A Course For Organizations To Navigate Cybersecurity Regulations” Presented at theCybersecurity at MIT Sloan (CAMS) Quarterly Members Workshop
  • Proudfoot, J. G., Madnick, S. (2022). “Investigating Regulatory Operationalization and Its Impacts on Cybersecurity” Presented at theCybersecurity at MIT Sloan (CAMS) Members Meeting
  • Proudfoot, J. G. (2021). “Exploring the Human Element of Security: Leveraging Research to Inform Practice” Presented at theNetragard Annual Meeting Greater Boston Area, MA
  • Proudfoot, J. G., Madnick, S. (2021). “Investigating the Interaction of Regulatory Compliance and Cybersecurity Maturity” Presented at theCybersecurity at MIT Sloan (CAMS) Members Meeting
  • Proudfoot, J. G., Madnick, S. (2021). “Exploring the Interaction of Regulatory Compliance and Cybersecurity Maturity Using Grounded Theory” Presented at the20th Annual Security Conference
  • Proudfoot, J. G. (2020). “The Regs Made Me Do It! Exploring the Interplay between Regulatory Compliance and Cybersecurity” Presented at theCybersecurity at MIT Sloan (CAMS) Meeting
  • Twyman, N. W., Proudfoot, J. G., Case, E., Camerson, A., Burgoon, J. K., Twitchell, D. (2019). “Information-Rich but Attention-Poor: Investigating Deception Detection Accuracy in an Increasingly Polychronic World” Presented at theHawaii International Conference on System Sciences (HICSS) Maui, HI
  • Grimes, G. M., Proudfoot, J. G., Valacich, J. S., Jenkins, J. L., Twyman, N. W., Burgoon, J. K. (2017). “Controlled Realism in Deception Research” Presented at theHawaii International Conference on System Sciences (HICSS) Hawaii, HI
  • Proudfoot, J. G., Elkins, A. C. (2017). “It’s not the answer, it’s the question: Exploring the impact of question relevance on user perceptions and behavior in automated deception detection interactions” Presented at theHawaii International Conference on System Sciences (HICSS) Hawaii, HI
  • Proudfoot, J. G. (2015). “Deception is in the Eye of the Communicator: Investigating Pupil Diameter Variations in Automated Deception Detection Interviews” Presented at theIEEE International Conference on Intelligence and Security Informatics (ISI) Baltimore, MD
  • Proudfoot, J. G. (2015). “It’s What’s on the Inside that Counts: New Technologies for Identifying Insider Threats” Presented at theCybersecurity at MIT Sloan (CAMS) Meeting
  • Wilson, D., Proudfoot, J. G., Valacich, J. S. (2014). “Saving Face on Facebook: Privacy Concerns, Social Benefits, and Impression Management.” Presented at theInternational Conference on Information Systems (ICIS) Auckland, New Zealand
  • Proudfoot, J. G., Twyman, N., Schuetzler, R., Elkins, A. (2013). “A Systems Approach to Countermeasures in Credibility Assessment Interviews” Presented at theInternational Conference on Information Systems (ICIS) Milan
  • Proudfoot, J. G. (2013). “Evaluating the Feasibility of using Noncontact Sensors to Conduct a Targetless Concealed Information Test” Presented at theWorkshop on Innovation in Border Control (WIBC) at the European Intelligence and Security Informatics Conference (EISIC) Uppsala, Sweden
  • Proudfoot, J. G., Jenkins, J., Marquardson, J., Valacich, J., Golob, E., Nunamaker, J. J. (2013). “The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resources Allocation” Presented at theWorkshop on Innovation in Border Control (WIBC) at the European Intelligence and Security Informatics Conference (EISIC) Uppsala, Sweden
  • Proudfoot, J. G. (2013). “Eye Tracking and the CIT: Utilizing Oculometric Cues to Identify Familiarity with Wanted Persons” Presented at theHawaii International Conference on System Sciences (HICSS) Maui, HI
  • Proudfoot, J. G. (2013). “Mitigating Threats to Collaboration and CMC: Identifying Antecedents of Online Deviance” Presented at theHawaii International Conference on System Sciences (HICSS) Maui, HI
  • Proudfoot, J. G. (2012). “Determinants and Impediments of Passoword Reuse on Deceptive Web Sites” Presented at theSymposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS) Maui, Hawaii
  • Proudfoot, J. G. (2012). “Familiarity Recognition in Automated Screening Environments: Utilizing Eye Tracking Technology as an Intelligence gathering Tool” Presented at theSymposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS) Maui, Hawaii
  • Service

    Department Service


  • Assurance of Learning Champion for CIS Department - Assurance of Learning Champion 2016 - Present
  • Committee Member for Computer Information Systems Department Search Committee - 2023
  • Tenure-Track Faculty Evaluator for IPM Department - Tenure-Track Faculty Evaluator 2020 - 2023
  • Committee Member for Information and Process Management Department Search Committee - 2019
  • University Service


  • Task Force Member for Bentley University / Minerva Health TLN Executive Education Program 2023 - Present
  • GB 310 Core Course Coordinator for Bentley University - GB310 Course Coordinator 2018 - Present
  • IPM Department Representative for Fall Virtual Academic Preview Day - 2020
  • Mentor (Faculty) for Honors Capstone Project 2019 - 2020
  • Course Developer for Bentley University Degree Completion Program (DCP403) 2016 - 2019
  • IPM Department Representative for Undergraduate Academic Programs Fair - 2019
  • First Year Seminar Advisor - 2017
  • IPM Department Representative for Office of Undergraduate Admission Open House - 2016
  • Mentor (Faculty) for Honors Capstone Project 2015 - 2016
  • IPM Department Representative for Office of Undergraduate Admission Open House for Accepted Students - 2016
  • IPM Department Representative for Student Government Association & Office of Academic Services Majors/Minors Fair - 2015
  • IPM Department Representative for Office of Undergraduate Admission Open House for Accepted Students - 2015
  • IPM Department Representative for Student Government Association & Office of Academic Services Majors/Minors Fair - 2014
  • IPM Department Representative for Office of Undergraduate Admission Open House - 2014
  • Professional Service


  • Editorial Review Board Member for Management Information Systems Quarterly Executive (MISQE) 2023 - Present
  • Reviewer (ad hoc) for MIS Quarterly Executive 2022 - Present
  • Reviewer (ad hoc) for MIS Quarterly 2020 - Present
  • Reviewer (ad hoc) for Information & Management 2019 - Present
  • Reviewer (ad hoc) for AIS Transactions on Replication Research 2018 - Present
  • Reviewer (ad hoc) for Electronic Commerce Research and Applications 2018 - Present
  • Reviewer (ad hoc) for Information Systems Research 2018 - Present
  • Reviewer (ad hoc) for Information Systems Journal 2017 - Present
  • Reviewer (ad hoc) for Journal of the Association for Information Systems 2016 - Present
  • Reviewer (ad hoc) for Journal of Management Information Systems 2015 - Present
  • Reviewer, Conference Paper for Annual Symposium on Information Assurance 2015 - Present
  • Reviewer (ad hoc) for Communications of the Association for Information Systems 2015 - Present
  • Reviewer (ad hoc) for European Conference on Information Systems 2015 - Present
  • Reviewer (ad hoc) for Americas Conference on Information Systems 2014 - Present
  • Reviewer (ad hoc) for Hawaii International Conference on System Sciences 2012 - Present
  • Reviewer (ad hoc) for International Conference on Information Systems 2011 - Present
  • Editor (Associate), Conference for Practice-Oriented Research Track, International Conference on Information Systems 2024 - 2024
  • Special Issue Editor (MISQE Special Issue on Managing Cybersecurity to Address Increasing Digital Risk) for Management Information Systems Quarterly Executive (MISQE) 2023 - 2024
  • Track Co-Chair for Digital Learning and IS Curricula Track, International Conference on Information Systems 2021 - 2022
  • Conference/Workshop Organizer for Symposium on Credibility Assessment and Screening Technologies (CAST) at the Hawaii International Conference on System Sciences (HICSS) 2016 - 2022
  • Program Evaluator for Center for Cybersecurity (CSC) at NYU Abu Dhabi 2022 - 2022
  • Region 1 Executive Committee / AMCIS Secretary for Association for Information Systems (AIS) 2020 - 2021
  • Editor (Associate), Conference for Rethinking IS Strategy and Governance in the Digital Age, European Conference on Information Systems (ECIS) 2020 - 2021
  • Editor (Associate), Conference for Digital Learning Environment and Future IS Curriculum, International Conference on Information Systems (ICIS) 2018 - 2021
  • Conference/Workshop Track Chair for Minitrack on Cognitive, Affective, and Conversational HCI at the Amercas Conference on Information Systems (AMCIS) 2016 - 2021
  • Editorial Review Board Member for Special Section: COVID-19, Learning, Pedagogy and Educational Systems -- Communications of the Association for Information Systems (CAIS) - 2020
  • Editor (Associate), Conference for IS Strategy & Governance, European Conference on Information Systems (ECIS) 2019 - 2020
  • Webmaster for 2019 International Conference on Information Systems 2017 - 2019
  • Reviewer, Journal Article for Journal of Intellectual Capital - 2019
  • Editor (Associate), Conference for Information Systems Curriculum and Education Track, International Conference on Information Systems 2017 - 2018
  • Reviewer, Journal Article for Information Systems Management - 2018
  • Task Force Member for Weber State University, IS&T Program Review - 2017
  • Reviewer, Journal Article for Fusio: The Bentley Undergraduate Research Journal - 2017
  • Conference Volunteer for International Conference on Information Systems - 2012