Export 25 results:
Filters: First Letter Of Last Name is C and Author is Curry,Michael  [Clear All Filters]
Conference Papers
M. Curry and Marshall, B., Affordance Perception in Risk Adverse IT Adoption: An Agenda to Identify Drivers of Risk Consideration and Control Adoption in Individual Technology Choices, in 2015 Pre-ICIS Workshop on Accounting Information Systems, 2015.
B. Marshall, Shadbad, F., Curry, M., and Biros, D., Do Measures of Security Compliance Intent Equal Non-Compliance Scenario Agreement?, in WISP2022: 2022 Workshop on Information Security and Privacy (WISP), Copenhagen, Denmark, Dec. 2022, 2022.
B. Marshall, Shadbad, F., Curry, M., and Biros, D., Do Measures of Security Compliance Intent Equal Non-Compliance Scenario Agreement?, in WISP2022: 2022 Workshop on Information Security and Privacy (WISP), Copenhagen, Denmark, Dec. 2022, 2022.
B. Marshall, Curry, M., and Reitsma, R., Does Using CobiT Improve IT Solution Proposals?, in AAA Annual Meeting, IS Section, 2010.
M. Curry, Marshall, B., Crossler, R., and Correia, J., Fear Appeals Versus Priming in Ransomware Training, in Pre-ICIS Workshop on Information Security and Privacy (WISP 2018), 2018.
M. Curry, Marshall, B., and Crossler, R., Hope for change in individual security behavior assessments, in 2016 Pre-ICIS Workshop on Accounting Information Systems, 2016.
M. Curry, Marshall, B., and Crossler, R. E., Identifying potentially risky insider on-compliance using machine learning to assess multiple protection motivation behaviors, in WISP2021: 2021 Workshop on Information Security and Privacy (WISP), 2019.
B. Marshall, Curry, M., and Reitsma, R., IT Governance Norms and IT Success, in 2nd annual Pre‐ICIS Workshop on Accounting Information Systems, December 2010, Saint Louis, MO, U.S.A., 2010.
B. Marshall, Curry, M., and Kawalek, P., The Moderating Power of IT Bias on User Acceptance of Technology, in Sixth Annual Pre-ICIS Workshop on Accounting Information Systems, Auckland, 2014.
Journal Articles
M. Curry, Marshall, B., and Kawalek, P., Improving IT Assessment with IT Artifact Affordance Perception Priming, International Journal of Accounting Information Systems, vol. 19, pp. 17-28, 2015.
M. Curry, Marshall, B., Crossler, R. E., and Correia, J., InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior, Data Base for Advances in Information Systems, vol. 49, no. SI, 2018.
M. Curry, Marshall, B., Correia, J., and Crossler, R. E., InfoSec Process Action Model (IPAM): Targeting Insider's Weak Password Behavior, Journal of Information Systems, vol. 33, no. 3, pp. 201-225, 2019.
M. Curry, Marshall, B., and Kawalek, P., IT Artifact Bias: How exogenous predilections influence organizational information system paradigms, International Journal of Information Management, vol. 34, no. 4, pp. 427-436, 2014.
B. Marshall, Curry, M., Correia, J., and Crossler, R. E., Machine Learning and Survey-based Predictors of InfoSec Non-Compliance, ACM Transactions on Management Information Systems, 2021.
B. Marshall, Curry, M., Correia, J., and Crossler, R. E., Machine Learning and Survey-based Predictors of InfoSec Non-Compliance, ACM Transactions on Management Information Systems, vol. 13, no. 2, pp. 1-20, 2021.
M. Curry, Marshall, B., and Kawalek, P., A Normative Model for Assessing SME IT Effectiveness, Communications of the IIMA, vol. 15, no. 1, 2017.
B. Marshall, Curry, M., and Reitsma, R., Organizational Information Technology Norms and IT Quality, Communications of the IIMA, vol. 11, no. 4, 2011.