Jeffrey Gainer Proudfoot

  • Citations Per Year
Learn More
Automated human credibility screening is an emerging research area that has potential for high impact in fields as diverse as homeland security and accounting fraud detection. Systems that conduct interviews and make credibility judgments can provide objectivity, improved accuracy, and greater reliability to credibility assessment practices, need to be(More)
Use of online social networks is nearly ubiquitous. Use of these services generally entails substantial personal disclosure and elicits significant privacy concerns. This research uses Social Exchange Theory and the impression management literature to examine how privacy concerns can be counterbalanced by the perceived social benefits afforded by a social(More)
Countermeasures, or techniques for hiding guilt during a credibility assessment examination, have long been an important topic in cognitive psychology and criminal justice fields. With recent IS research on automated screening systems, understanding the potential for countermeasures in this new paradigm is of increasing importance. This paper reports on a(More)
One of the most common and costly forms of deception and fraud online is phishing. Due to the ramifications of successful phishing attacks, security experts and researchers seek to better understand this phenomenon. Prior phishing research has addressed the “bait” and “hook” components of phishing attacks, the human-computer interaction that takes place as(More)
Rapid screening requires identifying individuals concealing information promptly and noninvasively. The standard Concealed Information Test (CIT) is not conducive to a rapid screening context, however, researchers are investigating the ability to conduct adaptations of the CIT using noninvasive sensors. The purpose of this paper is to propose a study that(More)
The standard Concealed Information Test (CIT) requires the use of target items to elicit physiological response differences between those concealing information and those naïve to target items. Interpersonal Deception Theory contends that deceivers often exhibit both strategic and nonstrategic behaviors in an attempt to appear truthful. This paper(More)
This study investigates the effectiveness of an automatic system for detection of deception by individuals with the use of multiple indicators of such potential deception. Deception detection research in the information systems discipline has postulated increased accuracy through a new class of screening systems that automatically conduct interviews and(More)
Proper resource allocation at Border Patrol checkpoints is essential for effective and efficient screening. Improper resource allocation can lead to flushing-i.e., allowing cars to pass through a checkpoint without screening-or cost inefficiencies. To better inform resource allocation, we present a prototype simulation that models the major processes of an(More)