Follow
Dr. Michael Curry
Title
Cited by
Cited by
Year
InfoSec process action model (IPAM): Targeting insiders' weak password behavior
M Curry, B Marshall, J Correia, RE Crossler
Journal of Information Systems 33 (3), 201-225, 2019
172019
InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior
M Curry, B Marshall, RE Crossler, J Correia
The DATA BASE for Advances in Information Systems, 2018
152018
IT artifact bias: How exogenous predilections influence organizational information system paradigms
M Curry, B Marshall, P Kawalek
International Journal of Information Management 34 (4), 427-436, 2014
142014
A Normative Model for Assessing SME IT Effectiveness
M Curry, B Marshall, P Kawalek
Communications of the IIMA 15 (1), 2017
112017
Organizational information technology norms and IT quality
B Marshall, M Curry, R Reitsma
Communications of the IIMA 11 (4), 3, 2011
102011
Machine learning and survey-based predictors of InfoSec non-compliance
B Marshall, M Curry, RE Crossler, J Correia
ACM Transactions on Management Information Systems (TMIS) 13 (2), 1-20, 2021
52021
Improving IT assessment with IT artifact affordance perception priming
PK Byron Marshall, Michael Curry
International Journal of Accounting Information Systems 19 (December 2015 …, 2015
32015
Do measures of security compliance intent equal non-compliance scenario agreement?
B Marshall, FN Shadbad, M Curry, D Biros
12022
IT effectiveness efforts as predictors of organizational outcomes: a normative model for assessing IT quality
ML Curry
PQDT-UK & Ireland, 2014
12014
Statistical Analysis Methods Used in Information Systems Journals
M Curry
Manchester and UK, 2011
12011
IT Governance Norms and IT Success
B Marshall, M Curry, R Reitsma
2nd annual Pre ICIS Workshop on Accounting Information Systems, Saint Louis …, 2010
12010
Will SOC telemetry data improve predictive models of user riskiness? A work in progress
M Curry, B Marshall, FN Shadbad, S Hong
2022
FEAR APPEALS VERSUS PRIMING IN RANSOMWARE TRAINING
M Curry, B Marshall, RE Crossler, J Correia
2018
Personal Motivation Measures for Personal IT Security Behavior
B Marshall, M Curry, J Coreia, RE Crossler
2017
The system can't perform the operation now. Try again later.
Articles 1–14