Jeff Proudfoot

  • Professor, Chair and CS305 Coordinator, Computer Information Systems
  • Research Affiliate, Massachusetts Institute of Technology (MIT), Massachusetts Institute of Technology (MIT), Cybersecurity at MIT Sloan (CAMS)
  • Business Core Coordinator, CS305 - Business Processes and Systems, Bentley University
  • Senior Editor, Management Information Systems Quarterly Executive (MISQE), Management Information Systems Quarterly Executive (MISQE)
  • Department Chair, Computer Information Systems, Bentley University
  • Ph.D. in Management, University of Arizona
  • M.S. in Information Systems, University of Utah
  • B.S. in Information Systems, University of Utah

Teaching Interests

Business process management, ERP systems, information security

Research Interests

Cybersecurity regulations, behavioral information security, deception/insider threat detection

Consulting/Practice Interests

Information security

Bio

Jeffrey Proudfoot is a professor in the Computer Information Systems Department at Bentley University and a Research Affiliate in the Cybersecurity at MIT Sloan (CAMS) center at the Massachusetts Institute of Technology (MIT). Jeff’s research has covered several cybersecurity topic areas, including deception detection, micro- and macro-level compliance (i.e., security policies and regulations), and board governance of cyber risk. He has published over 50 scholarly works with many appearing in premier academic and practitioner outlets, including Harvard Business Review, The Wall Street Journal, MIS Quarterly, MIS Quarterly Executive, Journal of Management Information Systems, Journal of the Association for Information Systems, Information Systems Journal, and European Journal of Information Systems. A portion of his research has been funded or supported by a variety of stakeholders, including the Department of Homeland Security (DHS), Center for Identification Technology Research (CITeR), National Science Foundation (NSF), Google, and Boston Consulting Group (BCG). Jeff has presented his work to a variety of stakeholders, including: corporate executives, Fortune-50 board directors, cybersecurity companies, members of the United States Congress and Senate, Department of Homeland Security officials, financial crime experts, and defense/intelligence agencies. He has also conducted research in association with the Department of Homeland Security National Center for Border Security and Immigration (BORDERS) and the Center for the Management of Information (CMI). His research, teaching, and service contributions have been recognized with a number of awards and honors, including the 2024 AIS Best Paper Award. Before joining Bentley, he completed a Ph.D. in Management Information Systems at the University of Arizona.

Professional Memberships

  • Association for Information Systems 2012-10-17 - Present
  • Awards and Honors

  • 2024 AIS Best Information Systems Publication Award, Association for Information Systems
  • 2021 Outstanding Scholarly Contribution Award, Bentley University
  • 2020 Best Paper Award, Journal of the Association for Information Systems (JAIS)
  • 2019 Outstanding Associate Editor Award, International Conference on Information Systems (ICIS)
  • 2019 Nominee, Joseph Cronin Advisor and Mentor of the Year Award, Bentley University
  • 2018 Best Associate Editor Award, International Conference on Information Systems (ICIS)
  • 2017 Best Reviewer Award, 16th Annual Pre-ICIS Workshop on HCI Research in MIS
  • 2016 Outstanding Reviewer Award, International Conference on Information Systems (ICIS)
  • 2016 Nominee, Joseph Cronin Advisor and Mentor of the Year Award, Bentley University
  • 2015 Best Reviewer Award, Communications of the Association for Information Systems
  • 2012 Teaching Award, MIS Department, Eller College of Management, University of Arizona
  • 2011 Finalist for Best Poster, Americas Conference on Information Systems
  • 2010 Teaching Award, OIS Department, David Eccles School of Business, University of Utah
  • 2009 Graduate Teaching Scholarship, David Eccles School of Business, University of Utah
  • Scholarly Contributions and Creative Productions

    Journal Articles


  • Proudfoot, J., Cram, W. A., Madnick, S., Coden, M. (2026). Cybersecurity Governance in the Boardroom: Persistent and Emergent Challenges with Recommendations for Action. Management Information Systems Quarterly Executive (MISQE) (Forthcoming)
  • Proudfoot, J. G., Madnick, S. (2026). Boards are Falling Short on Cybersecurity. Harvard Business Review (Link)
  • Proudfoot, J., Cram, W. A., Madnick, S., Coden, M. (2025). Weathering the storm: examining how organisations navigate the sea of cybersecurity regulations. European Journal of Information Systems, (34) 3 436-459.
  • Junglas, I., Carroll, N., Grover, V., Ives, B., Kettinger, B., Koch, H., Mocker, M., Niederman, F., Piccoli, G., Pigni, F., Proudfoot, J., Watson, R. T. (2025). Editorial Reflection on Generative AI and Doctoral Education in Information Systems. Management Information Systems Quarterly Executive (MISQE), (24) 3
  • Proudfoot, J. G., Pearlson, K. (2024). As Boards Focus More on Cybersecurity, Are They Missing One of the Biggest Threats?. The Wall Street Journal (Link)
  • Madnick, S., Proudfoot, J., Sumner, M. (2024). Special Issue Editorial: Cybersecurity and Digital Risk. Management Information Systems Quarterly Executive (MISQE), (23) 4
  • Proudfoot, J. G., Cram, W., Madnick, S., Coden, M. (2023). The Importance of Board Member Actions for Cybersecurity Governance and Risk Management. Management Information Systems Quarterly Executive (MISQE), (22) 4 235-250.
  • Cram, W. A., Proudfoot, J. G., D'Arcy, J. (2021). When enough is enough: Investigating the antecedents and consequences of information security fatigue. Information Systems Journal, (31) 4 521-549.
  • Cram, W. A., Proudfoot, J. G., D'Arcy, J. (2020). Optimizing Employee Compliance with Cybersecurity Policies: What Organizations Should Start and Stop Doing. MIS Quarterly Executive, (19) 3 135-150.
  • Twyman, N. W., Proudfoot, J. G., Camerson, A., Case, E., Burgoon, J. K., Twitchell, D. (2020). Too Busy to Be Manipulated: How Multitasking with Technology Improves Deception Detection in Collaborative Teamwork. Journal of Management Information Systems, (37) 2 377-395.
  • Cram, W. A., D'Arcy, J., Proudfoot, J. G. (2019). Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance. MIS Quarterly, (43) 2 525-554.
  • Jenkins, J. L., Proudfoot, J. G., Valacich, J. S., Grimes, G. M., Nunamaker, Jr., J. F. (2019). Sleight of Hand: Identifying Concealed Information by Monitoring Mouse-Cursor Movements. Journal of the Association for Information Systems (2019 JAIS Best Paper Award), (20) 1 1-32.
  • Boyle, R. J., Clements, J. A., Proudfoot, J. G. (2018). Measuring deception: A look at antecedents to deceptive intent. American Journal of Psychology, (131) 3 347-367.
  • Proudfoot, J. G., Wilson, D. W., Valacich, J. S., Byrd, M. D. (2018). Saving face on Facebook: Privacy concerns, social benefits, and impression management. Behaviour and Information Technology, (37) 1 16-37.
  • Cram, W. A., Proudfoot, J. G., D'Arcy, J. (2017). Organizational Information Security Policies: A Review and Research Framework. European Journal of Information Systems, (26) 6 605–641.
  • Proudfoot, J. G., Jenkins, J. L., Burgoon, J. K., Nunamaker, Jr., J. F. (2016). More Than Meets the Eye: How Oculometric Behaviors Evolve Over the Course of Automated Deception Detection Interactions. Journal of Management Information Systems, (33) 2 332-360.
  • Giboney, J. S., Proudfoot, J. G., Goel, S., Valacich, J. S. (2016). The Security Assessment Measure (SEAM): Developing a Scale for Hacker Expertise. Computers & Security, (60) 37-51.
  • Twyman, N. W., Proudfoot, J. G., Schuetzler, R. M., Elkins, A. C., Derrick, D. C. (2016). Robustness of multiple indicators in automated screening systems for deception detection. Journal of Management Information Systems, (32) 4 215-245.
  • Proudfoot, J. G., Boyle, R. J., Schuetzler, R. S. (2016). Man vs. machine: Investigating the effects of adversarial system use on end-user behavior in automated deception detection interviews. Decision Support Systems, (85) 23-33. (Link)
  • Clements, J. A., Boyle, R. J., Proudfoot, J. G. (2016). Exploring political skill and deception. International Journal of Sociology and Social Policy, (36) 4-Mar 138-156.
  • Gogan, J. L., Davidson, E., Proudfoot, J. G. (2016). HealthCare.Gov: A project management horror story. Journal of Information Technology -- Teaching Cases, (6) 45-55. (Link)
  • Jenkins, J. L., Grimes, M., Proudfoot, J. G., Lowery, P. B. (2014). Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time fear appeals. Information Technology for Development, (20) 2 196-213.
  • Burgoon, J. K., Proudfoot, J. G., Schuetzler, R., Wilson, D. (2014). Patterns of nonverbal behavior associated with truth and deception: Illustrations from three experiments. Journal of Nonverbal Behavior, (38) 325-354.
  • Books


  • Boyle, R. J., Proudfoot, J. G. (2013). Applied Information Security: A Hands-On Guide to Information Security Software (2nd Edition) New Jersey: Pearson
  • Conference Proceedings


  • Proudfoot, J. G., Bui, Q., Madnick, S., Coden, M. (2026). “Cybersecurity Challenges in Electricity Infrastructure: A Socio-Technical Perspective” 25th Annual Security Conference Las Vegas, Nevada
  • Cram, W. A., Yuan, A., Proudfoot, J., Mian, H. (2025). “Cyber Warrior or Cyber Washing? Examining the Expertise of Board Members Serving on Cybersecurity Committees” 24th Annual Security Conference Las Vegas, Nevada
  • Rivera Jimenez, J., Marabelli, M., Proudfoot, J. (2025). “Workplace Surveillance in the Age of Generative AI Platforms” International Conference on Information Systems (ICIS) Nashville, TN
  • Zeijlemaker, S., Pal, R., Proudfoot, J., Siegel, M. (2025). “Advancing Cyber Risk Management by Reducing Strategic Control Gaps” Americas Conference on Information Systems (AMCIS) Montreal, Canada
  • Kim, G., Zeijlemaker, S., Proudfoot, J., Pal, R., Siegel, M. (2025). “Balancing Risk and Reward in Cybersecurity Investment Decisions” Americas Conference on Information Systems (AMCIS) Montreal, Canada
  • Proudfoot, J. G., Madnick, S. (2024). “Cybersecurity Regulation Development and Dissemination Deficiencies Harming Organizational Cybersecurity Outcomes” 23rd Annual Security Conference Las Vegas, Nevada
  • Proudfoot, J. G., Madnick, S. (2022). “Regulatory Facilitators and Impediments Impacting Cybersecurity Maturity.” Americas Conference on Information Systems (AMCIS)
  • van Rensburg, N., Madnick, S., Proudfoot, J. G., Rezek, C. (2022). “Insights Gained While Exploring Regulation and Cybersecurity Maturity” 21st Annual Security Conference Las Vegas, Nevada
  • Twyman, N. W., Proudfoot, J. G., Case, E., Cameron, A., Burgoon, J. K., Twitchell, D. (2019). “Information-Rich but Attention-Poor: Investigating Deception Detection Accuracy in an Increasingly Polychronic World” Hawaii International Conference on System Sciences (HICSS) Maui, HI
  • Proudfoot, J. G., Elkins, A. C. (2017). “It's not the answer, it's the question: Exploring the impact of question relevance on user perceptions and behavior in automated deception detection interactions” Hawaii International Conference on System Sciences (HICSS), Hawaii, HI
  • Jenkins, J. L., Proudfoot, J. G., Valacich, J. S., Nunamaker, Jr., J. F. (2017). “Sleight of hand: Identifying malicious insider threats through the monitoring of mouse-cursor movements” Hawaii International Conference on System Sciences (HICSS), Hawaii, HI
  • Cram, W. A., Proudfoot, J. G., D'Arcy, J. (2017). “Seeing the Forest and the Trees: A Meta-Analysis of Information Security Policy Compliance Literature” Hawaii International Conference on System Sciences (HICSS), Hawaii, HI
  • Grimes, G. M., Proudfoot, J. G., Valacich, J. S., Jenkins, J. S., Twyman, N. W., Burgoon, J. K. (2017). “Controlled Realism in Deception Research” Hawaii International Conference on System Sciences (HICSS) Hawaii, HI
  • Elkins, A., Proudfoot, J. G., Twyman, N. W., Burgoon, J. K., Nunamaker, Jr., J. F. (2016). “Embodied conversational agent-based deception detection: Concealed information test using automated electrodermal, vocal, and oculometric measurements” SAI / IEEE Intelligent Systems Conference, London, U. K.
  • Wilson, D., Schuetzler, R., Dorn, B., Proudfoot, J. G., Valacich, J. S. (2015). “When Disclosure is Involuntary: Empowering Users with Control to Reduce Concerns” International Conference on Information Systems (ICIS), Forth Worth, Texas
  • Grimes, G. M., Proudfoot, J. G., Valacich, J. S., Jenkins, J. S., Twyman, N. W., Burgoon, J. K., Marquardson, J. (2015). “Lessons Learned from Successive Deception Experiments” Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Kauai, HI Kauai, HI
  • Giboney, J. S., Proudfoot, J. G., Goel, S., Valacich, J. S. (2015). “Measuring Hacking Ability Using a Conceptual Expertise Task” ADFSL Conference on Digital Forensics, Security and Law, Daytona Beach, FL Daytona Beach, FL
  • Gogan, J. L., Proudfoot, J. G. (2015). “Information Security as a Service: A Call for Transdisciplinary Research” Service Management and Science Forum, Waltham, MA Waltham, MA
  • Proudfoot, J. G., Jenkins, J. L., Burgoon, J. K., Nunamaker, Jr., J. F. (2015). “Deception is in the Eye of the Communicator: Investigating Pupil Diameter Variations in Automated Deception Detection Interviews” IEEE International Conference on Intelligence and Security Informatics (ISI), Baltimore, MD Baltimore, MD
  • Wilson, D., Proudfoot, J. G. (2014). “Saving Face on Facebook: Impression Management as Motivation to Use Social Computing Systems” Americas Conference on Information Systems (AMCIS), Detroit, Michigan Detroit, Michigan
  • Wilson, D., Proudfoot, J. G., Valacich, J. S. (2014). “Saving Face on Facebook: Privacy Concerns, Social Benefits, and Impression Management” International Conference on Information Systems (ICIS), Auckland, New Zealand
  • Twyman, N. W., Schuetzler, R., Proudfoot, J. G., Elkins, A. (2013). “A Systems Approach to Countermeasures in Credibility Assessment Interviews” International Conference on Information Systems (ICIS), Milan, Italy
  • Twyman, N. W., Burgoon, J. K., Elkins, A., Proudfoot, J. G. (2013). “Alternative Cues in Concealed Information Testing” Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii
  • Proudfoot, J. G. (2013). “Evaluating the Feasibility of Using Noncontact Sensors to Conduct a Targetless Concealed Information Test” Workshop on Innovation in Border Control (WIBC) at the European Intelligence and Security Informatics Conference (EISIC), Uppsala, Sweden
  • Proudfoot, J. G., Twyman, N. W., Burgoon, J. K. (2013). “Eye Tracking and the CIT: Utilizing Oculometric Cues to Identify Familiarity with Wanted Persons” Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii
  • Proudfoot, J. G., Boyle, R. J., Clements, J. A. (2013). “Mitigating Threats to Collaboration and CMC: Identifying Antecedents of Online Deviance” Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii
  • Jenkins, J. L., Marquardson, J., Proudfoot, J. G., Valacich, J. S., Golob, E. G., Nunamaker, Jr., J. F. (2013). “The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resource Allocation” Workshop on Innovation in Border Control (WIBC) at the European Intelligence and Security Informatics Conference (EISIC), Uppsala, Sweden
  • Proudfoot, J. G., Twyman, N. W., Burgoon, J. K. (2012). “A Comparison of Invasive and Noninvasive Sensors in the Concealed Information Test” Workshop on Innovation in Border Control (WIBC) at the European Intelligence and Security Informatics Conference (EISIC), Odense, Denmark
  • Jenkins, J. L., Proudfoot, J. G., Durcikova, A. (2012). “Determinants and Impediments of Password Reuse on Deceptive Web Sites” Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii
  • Nunamaker, J. F., Burgoon, J. K., Twyman, N. W., Proudfoot, J. G., Schuetzler, R., Giboney, J. S. (2012). “Establishing a Foundation for Automated Human Credibility Screening” Workshop on Developing Technologies and Tools for Border Security Applications at the IEEE International Conference on Intelligence and Security Informatics (ISI), Washington, D.C.
  • Jenkins, J. L., Proudfoot, J. G., Burns, M., Golob, E. (2012). “Estimating Unknown Numbers More Precisely: A Stratified Sampling Methodology for Estimating the Baseline Population of Illegal Immigrants Passing Through Open Checkpoints” Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii
  • Proudfoot, J. G., Twyman, N. W., Burgoon, J. K. (2012). “Familiarity Recognition in Automated Screening Environments: Utilizing Eye Tracking Technology as an Intelligence Gathering Tool” Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS), Maui, Hawaii
  • Boyle, R. J., Clements, J. A., Proudfoot, J. G. (2012). “Predicting Deceptive Behavior: Exploring Antecedents to Deceptive Behaviors” National Communication Association Convention (NCA), Orlando, FL
  • Presentations


  • Proudfoot, J. G., Bui, Q., Madnick, S., Coden, M. (2026). “Cybersecurity Challenges in Electricity Infrastructure: A Socio-Technical Perspective” Presented at the 25th Annual Security Conference Las Vegas, NV
  • Proudfoot, J. G., Borenstein, J. (2025). “AI Implications for Regulations and Compliance” Presented at the MIT CAMS Members Only Conference on AI and Cybersecurity Cambridge, MA
  • Proudfoot, J. (2025). “The Persisting Paradox of Regulatory Compliance and Cybersecurity Outcomes: Exploring Regulations, Boards, and the Evolving Risk Frontier” Presented at the 42nd International Symposium on Economic Crime Cambridge, U.K.
  • Proudfoot, J. (2025). “Checking on Checkpoints: How Unclear Data Collection Guidance Yielded Inconsistent Data Collection Practices at U.S. Customs and Border Protection Checkpoints” Presented at the 42nd International Symposium on Economic Crime Cambridge, U.K.
  • Proudfoot, J. G., Madnick, S. (2024). “Leadership in the Digital Era: Empowering Boards for Effective Cybersecurity Risk Management” Presented at the Cybersecurity at MIT Sloan (CAMS) Quarterly Members Workshop
  • Proudfoot, J., Madnick, S. (2024). “Cybersecurity regulation development and dissemination deficiencies harming organizational cybersecurity outcomes” Presented at the 23rd Annual Security Conference
  • Proudfoot, J. G. (2023). “Exploring the Human Element of Security: Leveraging Research to Inform Practice” Presented at the Netragard Annual Meeting Greater Boston Area, MA
  • Proudfoot, J. G. (2022). “Cybersecurity Regulation and Maturity with Dr. Jeffrey Proudfoot” Presented at the Cyber Ways Podcast https://cyberwayspodcast.buzzsprout.com/1848477/11110467-cybersecurity-regulation-and-maturity-with-dr-jeffrey-proudfoot
  • Proudfoot, J. G., Madnick, S. (2022). “Regulatory Facilitators and Impediments Impacting Cybersecurity Maturity” Presented at the Americas Conference on Information Systems (AMCIS) Minneapolis, MN
  • Proudfoot, J. G., Madnick, S. (2022). “Charting A Course For Organizations To Navigate Cybersecurity Regulations” Presented at the Cybersecurity at MIT Sloan (CAMS) Quarterly Members Workshop
  • Proudfoot, J. G., Madnick, S. (2022). “Investigating Regulatory Operationalization and Its Impacts on Cybersecurity” Presented at the Cybersecurity at MIT Sloan (CAMS) Members Meeting
  • Proudfoot, J. G. (2021). “Exploring the Human Element of Security: Leveraging Research to Inform Practice” Presented at the Netragard Annual Meeting Greater Boston Area, MA
  • Proudfoot, J. G., Madnick, S. (2021). “Investigating the Interaction of Regulatory Compliance and Cybersecurity Maturity” Presented at the Cybersecurity at MIT Sloan (CAMS) Members Meeting
  • Proudfoot, J. G., Madnick, S. (2021). “Exploring the Interaction of Regulatory Compliance and Cybersecurity Maturity Using Grounded Theory” Presented at the 20th Annual Security Conference
  • Proudfoot, J. G. (2020). “The Regs Made Me Do It! Exploring the Interplay between Regulatory Compliance and Cybersecurity” Presented at the Cybersecurity at MIT Sloan (CAMS) Meeting
  • Twyman, N. W., Proudfoot, J. G., Case, E., Camerson, A., Burgoon, J. K., Twitchell, D. (2019). “Information-Rich but Attention-Poor: Investigating Deception Detection Accuracy in an Increasingly Polychronic World” Presented at the Hawaii International Conference on System Sciences (HICSS) Maui, HI
  • Grimes, G. M., Proudfoot, J. G., Valacich, J. S., Jenkins, J. L., Twyman, N. W., Burgoon, J. K. (2017). “Controlled Realism in Deception Research” Presented at the Hawaii International Conference on System Sciences (HICSS) Hawaii, HI
  • Proudfoot, J. G., Elkins, A. C. (2017). “It's not the answer, it's the question: Exploring the impact of question relevance on user perceptions and behavior in automated deception detection interactions” Presented at the Hawaii International Conference on System Sciences (HICSS) Hawaii, HI
  • Proudfoot, J. G. (2015). “Deception is in the Eye of the Communicator: Investigating Pupil Diameter Variations in Automated Deception Detection Interviews” Presented at the IEEE International Conference on Intelligence and Security Informatics (ISI) Baltimore, MD
  • Proudfoot, J. G. (2015). “It's What's on the Inside that Counts: New Technologies for Identifying Insider Threats” Presented at the Cybersecurity at MIT Sloan (CAMS) Meeting
  • Wilson, D., Proudfoot, J. G., Valacich, J. S. (2014). “Saving Face on Facebook: Privacy Concerns, Social Benefits, and Impression Management.” Presented at the International Conference on Information Systems (ICIS) Auckland, New Zealand
  • Proudfoot, J. G., Twyman, N., Schuetzler, R., Elkins, A. (2013). “A Systems Approach to Countermeasures in Credibility Assessment Interviews” Presented at the International Conference on Information Systems (ICIS) Milan
  • Proudfoot, J. G. (2013). “Evaluating the Feasibility of using Noncontact Sensors to Conduct a Targetless Concealed Information Test” Presented at the Workshop on Innovation in Border Control (WIBC) at the European Intelligence and Security Informatics Conference (EISIC) Uppsala, Sweden
  • Proudfoot, J. G., Jenkins, J., Marquardson, J., Valacich, J., Golob, E., Nunamaker, J. J. (2013). “The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resources Allocation” Presented at the Workshop on Innovation in Border Control (WIBC) at the European Intelligence and Security Informatics Conference (EISIC) Uppsala, Sweden
  • Proudfoot, J. G. (2013). “Eye Tracking and the CIT: Utilizing Oculometric Cues to Identify Familiarity with Wanted Persons” Presented at the Hawaii International Conference on System Sciences (HICSS) Maui, HI
  • Proudfoot, J. G. (2013). “Mitigating Threats to Collaboration and CMC: Identifying Antecedents of Online Deviance” Presented at the Hawaii International Conference on System Sciences (HICSS) Maui, HI
  • Proudfoot, J. G. (2012). “Determinants and Impediments of Passoword Reuse on Deceptive Web Sites” Presented at the Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS) Maui, Hawaii
  • Proudfoot, J. G. (2012). “Familiarity Recognition in Automated Screening Environments: Utilizing Eye Tracking Technology as an Intelligence gathering Tool” Presented at the Symposium on Credibility Assessment and Information Quality in Government and Business at the Hawaii International Conference on System Sciences (HICSS) Maui, Hawaii
  • Service

    Service: Department


  • Tenure-Track Faculty Evaluator for IPM Department - Tenure-Track Faculty Evaluator 1/1/20 - 12/31/23
  • Assurance of Learning Champion for CIS Department - Assurance of Learning Champion 10/1/16 - Present
  • Service: Professional


  • Senior Editor for Management Information Systems Quarterly Executive (MISQE) 1/1/25 - Present
  • Editor (Associate), Conference for Practice-Oriented Research Track, International Conference on Information Systems 1/1/24 - 12/31/24
  • Editorial Review Board Member for Management Information Systems Quarterly Executive (MISQE) 2/1/23 - 2025-01-01
  • Special Issue Editor (MISQE Special Issue on Managing Cybersecurity to Address Increasing Digital Risk) for Management Information Systems Quarterly Executive (MISQE) 1/1/23 - 12/31/24
  • Track Co-Chair for Digital Learning and IS Curricula Track, International Conference on Information Systems 9/1/21 - 12/31/22
  • Program Evaluator for Center for Cybersecurity (CSC) at NYU Abu Dhabi 3/1/22 - 3/31/22
  • Reviewer (ad hoc) for MIS Quarterly 4/1/20 - Present
  • Region 1 Executive Committee / AMCIS Secretary for Association for Information Systems (AIS) 8/1/20 - 12/31/21
  • Editor (Associate), Conference for Rethinking IS Strategy and Governance in the Digital Age, European Conference on Information Systems (ECIS) 1/1/20 - 12/31/21
  • Editor (Associate), Conference for IS Strategy & Governance, European Conference on Information Systems (ECIS) 1/1/19 - 12/31/20
  • Reviewer (ad hoc) for AIS Transactions on Replication Research 1/1/18 - Present
  • Reviewer (ad hoc) for Electronic Commerce Research and Applications 1/1/18 - Present
  • Reviewer (ad hoc) for Information Systems Research 1/1/18 - Present
  • Editor (Associate), Conference for Digital Learning Environment and Future IS Curriculum, International Conference on Information Systems (ICIS) 1/1/18 - 12/31/21
  • Editor (Associate), Conference for Information Systems Curriculum and Education Track, International Conference on Information Systems 11/1/17 - 7/31/18
  • Reviewer (ad hoc) for Information Systems Journal 1/1/17 - Present
  • Webmaster for 2019 International Conference on Information Systems 7/1/17 - 12/31/19
  • Reviewer (ad hoc) for Journal of the Association for Information Systems 8/1/16 - Present
  • Conference/Workshop Organizer for Symposium on Credibility Assessment and Screening Technologies (CAST) at the Hawaii International Conference on System Sciences (HICSS) 1/1/16 - 12/31/22
  • Conference/Workshop Track Chair for Minitrack on Cognitive, Affective, and Conversational HCI at the Amercas Conference on Information Systems (AMCIS) 1/1/16 - 12/31/21
  • Reviewer (ad hoc) for Journal of Management Information Systems 5/1/15 - Present
  • Reviewer (ad hoc) for Communications of the Association for Information Systems 1/1/15 - Present
  • Reviewer (ad hoc) for European Conference on Information Systems 1/1/15 - Present
  • Reviewer (ad hoc) for Americas Conference on Information Systems 1/1/14 - Present
  • Reviewer (ad hoc) for Hawaii International Conference on System Sciences 1/1/12 - Present
  • Reviewer (ad hoc) for International Conference on Information Systems 1/1/11 - Present
  • Service: University


  • Department Chair for Bentley University, Department Chair, Computer Information Systems 7/1/24 - Present
  • Task Force Member for Bentley University / Minerva Health TLN Executive Education Program 6/1/23 - Present
  • Mentor (Faculty) for Honors Capstone Project 5/1/19 - 5/31/20
  • GB 310 Core Course Coordinator for Bentley University - GB310 Course Coordinator 1/1/18 - Present
  • Course Developer for Bentley University Degree Completion Program (DCP403) 5/1/16 - 12/31/19
  • Mentor (Faculty) for Honors Capstone Project 5/1/15 - 5/31/16