Export 48 results:
Filters: Author is Marshall,Byron  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
B. Marshall, Mortenson, K., Bourne, A., Price, K., and Marshall, A., Delivering Value Beyond Efficiency with Visualized XBRL, in International Conference on Information Systems (ICIS 2009), Phoenix, AZ, 2009.
B. Marshall, Reitsma, R., and Zarske, M., Dimensional Standard Alignment in K-12 Digital Libraries: Assessment of Self-found vs. Recommended Curriculum, in Proceedings of the Joint Conference on Digital Libraries (JCDL'09), Austin, TX, 2009.
M. Curry and Marshall, B., Disentangling IT Artifact Bias, 4th Annual Pre-ICIS Workshop on Accounting Information Systems. Orlando, Florida, 2012.
B. Marshall, Shadbad, F., Curry, M., and Biros, D., Do Measures of Security Compliance Intent Equal Non-Compliance Scenario Agreement?, in WISP2022: 2022 Workshop on Information Security and Privacy (WISP), Copenhagen, Denmark, Dec. 2022, 2022.
B. Marshall, Shadbad, F., Curry, M., and Biros, D., Do Measures of Security Compliance Intent Equal Non-Compliance Scenario Agreement?, in WISP2022: 2022 Workshop on Information Security and Privacy (WISP), Copenhagen, Denmark, Dec. 2022, 2022.
B. Marshall, Curry, M., and Reitsma, R., Does Using CobiT Improve IT Solution Proposals?, in AAA Annual Meeting, IS Section, 2010.
E
B. Marshall, McDonald, D., Chen, H., and Chung, W., EBizPort: Collecting and Analyzing Business Intelligence Information, Journal of the Association for Information Science and Technology, vol. 55, no. 1, pp. 873-891, 2004.
B. Marshall and Madhusudan, T., Element Matching in Concept Maps, in Proceedings of the 2004 Joint ACM/IEEE Conference on Digital Libraries (JCDL 2004), June 7-11, 2004 , Tucson, AZ, 2004.
D. McDonald, Chen, H., Su, H., and Marshall, B., Extracting Gene Pathway Relations Using a Hybrid Grammar: The Arizona Relation Parser, Bioinformatics, vol. 20, no. 18, pp. 3370-8, 2004.
I
M. Curry, Marshall, B., and Crossler, R. E., Identifying potentially risky insider on-compliance using machine learning to assess multiple protection motivation behaviors, in WISP2021: 2021 Workshop on Information Security and Privacy (WISP), 2019.
M. Curry, Marshall, B., and Kawalek, P., Improving IT Assessment with IT Artifact Affordance Perception Priming, International Journal of Accounting Information Systems, vol. 19, pp. 17-28, 2015.
M. Curry, Marshall, B., Crossler, R. E., and Correia, J., InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior, Data Base for Advances in Information Systems, vol. 49, no. SI, 2018.
M. Curry, Marshall, B., Correia, J., and Crossler, R. E., InfoSec Process Action Model (IPAM): Targeting Insider's Weak Password Behavior, Journal of Information Systems, vol. 33, no. 3, pp. 201-225, 2019.
M. Curry, Marshall, B., and Kawalek, P., IT Artifact Bias: How exogenous predilections influence organizational information system paradigms, International Journal of Information Management, vol. 34, no. 4, pp. 427-436, 2014.
B. Marshall, Curry, M., and Reitsma, R., IT Governance Norms and IT Success, in 2nd annual Pre‐ICIS Workshop on Accounting Information Systems, December 2010, Saint Louis, MO, U.S.A., 2010.
B. Zhu and Marshall, B., Is It You or the Message: Why Do People Pass Along Micro-Blogging Messages?, in The Eleventh Workshop on e-Business (WeB'12), Orlando, Florida, 2012.
K
B. Marshall, Zhang, Y., Chen, H., Lally, A., Shen, R., Fox, E., and Cassel, L., Knowledge Management and E-Learning: the GetSmart Experience, in Proceedings of the 2003 Joint ACM/IEEE Conference on Digital Libraries (JCDL 2003), May 2003, Houston, Texas, 2003.
S
B. Marshall, (See proceeding paper above) Hope for change in individual security behavior assessments, 2016 Pre-ICIS Workshop on Accounting Information Systems. Dublin, Ireland, 2016.
B. Marshall, Reitsma, R., and Cyr, M. N., Semantics or Standards for Curriculum Search?, in Proceedings of the 7th ACM/IEEE Joint Conference on Digital Libraries, 181-182, New York, NY, 2007.
T
R. Reitsma and Marshall, B., TeachEngineering: K-12 Teacher Use Study, Special Workshop on TeachEngineering/GK-12 Integration. Boulder, CO., 2009.
S. Kaza, Xu, J., Marshall, B., and Chen, H., Topological Analysis of Criminal Activity Networks: Enhancing Transportation Security, IEEE Transactions on Intelligent Transportation Systems, vol. 10, no. 1, pp. 83 - 91, 2009.
U
B. Marshall, Reitsma, R., and Samson, C., Unraveling K-12 Standard Alignment; Report on a New Attempt, in Joint Conference on Digital Libraries, 2016.
K. D. Quiñones, Su, H., Marshall, B., Eggers, S., and Chen, H., User-Centered Evaluation of Arizona BioPathway: An Information Extraction, Integration, and Visualization System, IEEE Transactions on Information Technology in Biomedicine, vol. 11, no. 5, pp. 527-536, 2007.
B. Marshall, Chen, H., and Kaza, S., Using Importance Flooding to Identify Interesting Networks of Criminal Activity, Journal of the Association for Information Science and Technology, vol. 59, no. 13, pp. 2099-2114, 2008.
B. Marshall and Chen, H., Using Importance Flooding to Identify Interesting Networks of Criminal Activity, in Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI-2006), IEEE, San Diego, CA, 2006.
V
B. Marshall, Quiñones, K., Su, H., Eggers, S., and Chen, H., Visualizing Aggregated Biological Pathway Relations, in Proceedings of the 2005 Joint ACM/IEEE Conference on Digital Libraries (JCDL 2005), June 7-11, 2005 , Denver, CO, 2005.
B. Marshall, Mortenson, K., Bourne, A., and Price, K., Visualizing Basic Accounting Flows: Does XBRL + Model + Animation = Understanding?, International Journal of Digital Accounting Research, vol. 10, pp. 27-54, 2010.
B. Marshall, Mortenson, K., Bourne, A., Price, K., and Marshall, A., Visualizing basic accounting flows: does XBRL + model + animation = understanding?, in American Accounting Association 18th Annual Strategic and Emerging Technologies Research Workshop, New York, NY, 2009.