Jeffrey Gainer Proudfoot

Learn More
Automated human credibility screening is an emerging research area that has potential for high impact in fields as diverse as homeland security and accounting fraud detection. Systems that conduct interviews and make credibility judgments can provide objectivity, improved accuracy, and greater reliability to credibility assessment practices, need to be(More)
Use of online social networks is nearly ubiquitous. Use of these services generally entails substantial personal disclosure and elicits significant privacy concerns. This research uses Social Exchange Theory and the impression management literature to examine how privacy concerns can be counterbalanced by the perceived social benefits afforded by a social(More)
Rapid screening requires identifying individuals concealing information promptly and noninvasively. The standard Concealed Information Test (CIT) is not conducive to a rapid screening context, however, researchers are investigating the ability to conduct adaptations of the CIT using noninvasive sensors. The purpose of this paper is to propose a study that(More)
The standard Concealed Information Test (CIT) requires the use of target items to elicit physiological response differences between those concealing information and those naïve to target items. Interpersonal Deception Theory contends that deceivers often exhibit both strategic and nonstrategic behaviors in an attempt to appear truthful. This paper(More)
Countermeasures, or techniques for hiding guilt during a credibility assessment examination, have long been an important topic in cognitive psychology and criminal justice fields. With recent IS research on automated screening systems, understanding the potential for countermeasures in this new paradigm is of increasing importance. This paper reports on a(More)
Proper resource allocation at Border Patrol checkpoints is essential for effective and efficient screening. Improper resource allocation can lead to flushing-i.e., allowing cars to pass through a checkpoint without screening-or cost inefficiencies. To better inform resource allocation, we present a prototype simulation that models the major processes of an(More)
Technology is a catalyst for communication and collaboration, and the use of information systems for these applications is prevalent. While there are countless benefits associated with communication and collaboration tools, detriments do exist. One pitfall is the prevalence of deviant behaviors online which can jeopardize the effectiveness of these tools.(More)