Jeffrey Proudfoot

Associate Professor of Computer Information Systems at Bentley University

Schools

  • Bentley University

Links

Biography

Bentley University

Jeffrey Proudfoot is an Associate Professor in the Computer Information Systems Department at Bentley University and a Research Affiliate in the Cybersecurity at MIT Sloan (CAMS) center at the Massachusetts Institute of Technology (MIT). Jeff’s research explores a number of topics, including cybersecurity regulations, behavioral information security, and deception/insider threat detection. He has published over 40 scholarly works with many appearing in premier information systems journals, including MIS Quarterly, MIS Quarterly Executive, Journal of Management Information Systems, Journal of the Association for Information Systems, Information Systems Journal, and European Journal of Information Systems. Jeff has also contributed to the completion of numerous sponsored research projects funded by a variety of stakeholders, including the Department of Homeland Security (DHS), Center for Identification Technology Research (CITeR), and National Science Foundation (NSF) (these projects exceed $1 million in funding). He has presented his work to a variety of stakeholders, including: members of the United States Congress and Senate, Department of Homeland Security officials, and defense/intelligence agencies. He has also conducted research in association with the Department of Homeland Security National Center for Border Security and Immigration (BORDERS) and the Center for the Management of Information (CMI). His research, teaching, and service contributions have been recognized with a number of awards and honors. Before joining Bentley, he completed a Ph.D. in Management Information Systems at the University of Arizona.

Education

  • Ph.D. University of Arizona
  • M.S. University of Utah
  • B.S. University of Utah

Teaching Interests

Business process management, ERP systems, information security

Research Interests

Cybersecurity regulations, behavioral information security, deception/insider threat detection

Consulting/Practice Interests

Information security

Awards and Honors

  • 2021, Outstanding Scholarly Contribution Award, Bentley University
  • 2020, Best Paper Award (2019), Journal of the Association for Information Systems (JAIS)
  • 2019, Outstanding Associate Editor Award, International Conference on Information Systems (ICIS)
  • 2019, Nominee, Joseph Cronin Advisor and Mentor of the Year Award, Bentley University
  • 2018, Best Associate Editor Award, International Conference on Information Systems (ICIS)
  • 2017, Best Reviewer Award, 16th Annual Pre-ICIS Workshop on HCI Research in MIS
  • 2016, Nominee, Joseph Cronin Advisor and Mentor of the Year Award, Bentley University
  • 2016, Outstanding Reviewer Award, International Conference on Information Systems (ICIS)
  • 2015, Best Reviewer Award, Communications of the Association for Information Systems
  • 2012, Teaching Award, MIS Department, Eller College of Management, University of Arizona
  • 2011, Finalist for Best Poster, Americas Conference on Information Systems
  • 2010, Teaching Award, OIS Department, David Eccles School of Business, University of Utah
  • 2009, Graduate Teaching Scholarship, David Eccles School of Business, University of Utah

Publications

Journal Articles

  • Cram, W. A., Proudfoot, J. G., D'Arcy, J. (2021). When enough is enough: Investigating the antecedents and consequences of information security fatigue. Information Systems Journal, (31) 4 521-549.
  • Cram, W. A., Proudfoot, J. G., D'Arcy, J. (2020). Optimizing Employee Compliance with Cybersecurity Policies: What Organizations Should Start and Stop Doing. MIS Quarterly Executive, (19) 3 135-150.
  • Twyman, N. W., Proudfoot, J. G., Camerson, A., Case, E., Burgoon, J. K., Twitchell, D. (2020). Too Busy to Be Manipulated: How Multitasking with Technology Improves Deception Detection in Collaborative Teamwork. Journal of Management Information Systems, (37) 2 377-395.
  • Cram, W. A., D'Arcy, J., Proudfoot, J. G. (2019). Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance. MIS Quarterly, (43) 2 525-554.
  • Jenkins, J. L., Proudfoot, J. G., Valacich, J. S., Grimes, G. M., Nunamaker, Jr., J. F. (2019). Sleight of Hand: Identifying Concealed Information by Monitoring Mouse-Cursor Movements. Journal of the Association for Information Systems (2019 JAIS Best Paper Award), (20) 1 1-32.
  • Boyle, R. J., Clements, J. A., Proudfoot, J. G. (2018). Measuring deception: A look at antecedents to deceptive intent. American Journal of Psychology, (131) 3 347-367.
  • Proudfoot, J. G., Wilson, D. W., Valacich, J. S., Byrd, M. D. (2018). Saving face on Facebook: Privacy concerns, social benefits, and impression management. Behaviour and Information Technology, (37) 1 16-37.
  • Cram, W. A., Proudfoot, J. G., D'Arcy, J. (2017). Organizational Information Security Policies: A Review and Research Framework. European Journal of Information Systems, (26) 6 605–641.
  • Proudfoot, J. G., Jenkins, J. L., Burgoon, J. K., Nunamaker, Jr., J. F. (2016). More Than Meets the Eye: How Oculometric Behaviors Evolve Over the Course of Automated Deception Detection Interactions. Journal of Management Information Systems, (33) 2 332-360.
  • Giboney, J. S., Proudfoot, J. G., Goel, S., Valacich, J. S. (2016). The Security Assessment Measure (SEAM): Developing a Scale for Hacker Expertise. Computers & Security, (60) 37-51.
  • Twyman, N. W., Proudfoot, J. G., Schuetzler, R. M., Elkins, A. C., Derrick, D. C. (2016). Robustness of multiple indicators in automated screening systems for deception detection. Journal of Management Information Systems, (32) 4 215-245.
  • Proudfoot, J. G., Boyle, R. J., Schuetzler, R. S. (2016). Man vs. machine: Investigating the effects of adversarial system use on end-user behavior in automated deception detection interviews. Decision Support Systems, (85) 23-33. (Link)
  • Clements, J. A., Boyle, R. J., Proudfoot, J. G. (2016). Exploring political skill and deception. International Journal of Sociology and Social Policy, (36) 3/4 138-156.
  • Gogan, J. L., Davidson, E., Proudfoot, J. G. (2016). HealthCare.Gov: A project management horror story. Journal of Information Technology -- Teaching Cases, (6) 45-55. (Link)
  • Jenkins, J. L., Grimes, M., Proudfoot, J. G., Lowery, P. B. (2014). Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time fear appeals. Information Technology for Development, (20) 2 196-213.
  • Burgoon, J. K., Proudfoot, J. G., Schuetzler, R., Wilson, D. (2014). Patterns of nonverbal behavior associated with truth and deception: Illustrations from three experiments. Journal of Nonverbal Behavior, (38) 325-354.
  • Proudfoot, J. G., Cram, W., Madnick, S., Coden, M. (). Insights on Cybersecurity Governance and Risk Management for Boards Of Directors. Management Information Systems Quarterly Executive (MISQE). Forthcoming.

Books

  • Boyle, R. J., Proudfoot, J. G. (2013). Applied Information Security: A Hands-On Guide to Information Security Software (2nd Edition). New Jersey: Pearson

Read about executive education

Other experts

Looking for an expert?

Contact us and we'll find the best option for you.

Something went wrong. We're trying to fix this error.