Export 7 results:
Filters: First Letter Of Title is I and Author is Marshall,Byron  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
I
M. Curry, Marshall, B., and Crossler, R. E., Identifying potentially risky insider on-compliance using machine learning to assess multiple protection motivation behaviors, in WISP2021: 2021 Workshop on Information Security and Privacy (WISP), 2019.
M. Curry, Marshall, B., and Kawalek, P., Improving IT Assessment with IT Artifact Affordance Perception Priming, International Journal of Accounting Information Systems, vol. 19, pp. 17-28, 2015.
M. Curry, Marshall, B., Crossler, R. E., and Correia, J., InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior, Data Base for Advances in Information Systems, vol. 49, no. SI, 2018.
M. Curry, Marshall, B., Correia, J., and Crossler, R. E., InfoSec Process Action Model (IPAM): Targeting Insider's Weak Password Behavior, Journal of Information Systems, vol. 33, no. 3, pp. 201-225, 2019.
M. Curry, Marshall, B., and Kawalek, P., IT Artifact Bias: How exogenous predilections influence organizational information system paradigms, International Journal of Information Management, vol. 34, no. 4, pp. 427-436, 2014.
B. Marshall, Curry, M., and Reitsma, R., IT Governance Norms and IT Success, in 2nd annual Pre‐ICIS Workshop on Accounting Information Systems, December 2010, Saint Louis, MO, U.S.A., 2010.
B. Zhu and Marshall, B., Is It You or the Message: Why Do People Pass Along Micro-Blogging Messages?, in The Eleventh Workshop on e-Business (WeB'12), Orlando, Florida, 2012.