Seeing the forest and the trees: a meta-analysis of the antecedents to information security policy compliance WA Cram, J D'arcy, JG Proudfoot MIS quarterly 43 (2), 525-554, 2019 | 296 | 2019 |
Organizational information security policies: a review and research framework WA Cram, JG Proudfoot, J D’arcy European Journal of Information Systems 26, 605-641, 2017 | 292 | 2017 |
Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time … JL Jenkins, M Grimes, JG Proudfoot, PB Lowry Information Technology for Development 20 (2), 196-213, 2014 | 125 | 2014 |
Saving face on Facebook: Privacy concerns, social benefits, and impression management JG Proudfoot, D Wilson, JS Valacich, MD Byrd Behaviour & Information Technology 37 (1), 16-37, 2018 | 82 | 2018 |
Patterns of nonverbal behavior associated with truth and deception: Illustrations from three experiments JK Burgoon, JG Proudfoot, R Schuetzler, D Wilson Journal of Nonverbal Behavior 38, 325-354, 2014 | 56 | 2014 |
When enough is enough: Investigating the antecedents and consequences of information security fatigue WA Cram, JG Proudfoot, J D'Arcy Information Systems Journal, 2020 | 48 | 2020 |
More than meets the eye: How oculometric behaviors evolve over the course of automated deception detection interactions JG Proudfoot, JL Jenkins, JK Burgoon, JF Nunamaker Jr Journal of Management Information Systems 33 (2), 332-360, 2016 | 48 | 2016 |
Robustness of multiple indicators in automated screening systems for deception detection NW Twyman, JG Proudfoot, RM Schuetzler, AC Elkins, DC Derrick Journal of Management Information Systems 32 (4), 215-245, 2015 | 43 | 2015 |
Saving face on Facebook: privacy concerns, social benefits, and impression management D Wilson, J Proudfoot, J Valacich | 36 | 2014 |
The security expertise assessment measure (SEAM): Developing a scale for hacker expertise JS Giboney, JG Proudfoot, S Goel, JS Valacich Computers & Security 60, 37-51, 2016 | 32 | 2016 |
Sleight of hand: Identifying concealed information by monitoring mouse-cursor movements JL Jenkins, J Proudfoot, JS Valacich, GM Grimes, JF Nunamaker Jr Journal of the Association for Information Systems 20 (1), 3, 2019 | 29 | 2019 |
Establishing a foundation for automated human credibility screening JF Nunamaker, JK Burgoon, NW Twyman, JG Proudfoot, R Schuetzler, ... 2012 IEEE International Conference on Intelligence and Security Informatics …, 2012 | 28 | 2012 |
Seeing the forest and the trees: A meta-analysis of information security policy compliance literature WA Cram, J Proudfoot, J D'Arcy MIS Quarterly 43 (2), 525-554, 2017 | 18 | 2017 |
Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews JG Proudfoot, JL Jenkins, JK Burgoon, JF Nunamaker 2015 IEEE International Conference on Intelligence and Security Informatics …, 2015 | 14 | 2015 |
Man vs. machine: Investigating the effects of adversarial system use on end-user behavior in automated deception detection interviews JG Proudfoot, R Boyle, RM Schuetzler Decision Support Systems 85, 23-33, 2016 | 12 | 2016 |
Too busy to be manipulated: How multitasking with technology improves deception detection in collaborative teamwork NW Twyman, JG Proudfoot, AF Cameron, E Case, JK Burgoon, ... Journal of Management Information Systems 37 (2), 377-395, 2020 | 11 | 2020 |
Maximizing Employee Compliance with Cybersecurity Policies. WA Cram, JG Proudfoot, J D'Arcy MIS Quarterly Executive 19 (3), 2020 | 10 | 2020 |
When disclosure is involuntary: Empowering users with control to reduce concerns DW Wilson, RM Schuetzler, B Dorn, JG Proudfoot | 10 | 2015 |
Eye tracking and the CIT: Utilizing oculometric cues to identify familiarity with wanted persons JG Proudfoot, NW Twyman, JK Burgoon Hawaii International Conference on System Sciences (HICSS), 2013 | 9 | 2013 |
Alternative cues in concealed information testing NW Twyman, JK Burgoon, AC Elkins, JG Proudfoot Hawaii International Conference on System Sciences (HICSS), 2013 | 9 | 2013 |