Export 7 results:
Filters: First Letter Of Title is I and Author is Curry,Michael  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
M. Curry, Marshall, B., and Crossler, R. E., Identifying potentially risky insider on-compliance using machine learning to assess multiple protection motivation behaviors, in WISP2021: 2021 Workshop on Information Security and Privacy (WISP), 2019.
M. Curry, Marshall, B., Correia, J., and Crossler, R. E., InfoSec Process Action Model (IPAM): Targeting Insider's Weak Password Behavior, Journal of Information Systems, vol. 33, no. 3, pp. 201-225, 2019.
M. Curry, Marshall, B., Crossler, R. E., and Correia, J., InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior, Data Base for Advances in Information Systems, vol. 49, no. SI, 2018.
M. Curry, Marshall, B., and Kawalek, P., Improving IT Assessment with IT Artifact Affordance Perception Priming, International Journal of Accounting Information Systems, vol. 19, pp. 17-28, 2015.
M. Curry, Marshall, B., and Kawalek, P., IT Artifact Bias: How exogenous predilections influence organizational information system paradigms, International Journal of Information Management, vol. 34, no. 4, pp. 427-436, 2014.
M. Curry, IT Effectiveness Norms and Organizational Success: a Literature Review, Doctoral Symposium. Manchester, UK, 2012.
M. Curry, Internet Marketing: How to Use SEO and Social Networking to Reach Clients, Monthly IMC PDX Meeting. Portland, OR, 2009.