B. Marshall, Chen, H., and Kaza, S.,
“Using Importance Flooding to Identify Interesting Networks of Criminal Activity”,
Journal of the Association for Information Science and Technology, vol. 59, no. 13, pp. 2099-2114, 2008.
B. Marshall, Curry, M., and Reitsma, R.,
“IT Governance Norms and IT Success”, in
2nd annual Pre‐ICIS Workshop on Accounting Information Systems, December 2010, Saint Louis, MO, U.S.A., 2010.
B. Marshall, Shadbad, F., Curry, M., and Biros, D.,
“Do Measures of Security Compliance Intent Equal Non-Compliance Scenario Agreement?”, in
WISP2022: 2022 Workshop on Information Security and Privacy (WISP), Copenhagen, Denmark, Dec. 2022, 2022.
B. Marshall, Su, H., McDonald, D., Eggers, S., and Chen, H.,
“Aggregating Automatically Extracted Regulatory Pathway Relations”,
IEEE Transactions on Information Technology in Biomedicine, vol. 10, no. 1, pp. 100- 108, 2006.
B. Marshall, Curry, M., Correia, J., and Crossler, R. E.,
“Machine Learning and Survey-based Predictors of InfoSec Non-Compliance”,
ACM Transactions on Management Information Systems, vol. 13, no. 2, pp. 1-20, 2021.
D. McDonald, Chen, H., Su, H., and Marshall, B.,
“Extracting Gene Pathway Relations Using a Hybrid Grammar: The Arizona Relation Parser”,
Bioinformatics, vol. 20, no. 18, pp. 3370-8, 2004.