@conference {1984371, title = {Do Measures of Security Compliance Intent Equal Non-Compliance Scenario Agreement?}, booktitle = {WISP2022: 2022 Workshop on Information Security and Privacy (WISP)}, year = {2022}, month = {2022}, address = {Copenhagen, Denmark, Dec. 2022}, abstract = {To better protect organizations from the threat of insiders, IS security (ISS) research frequently emphasizes IS Security Policy (ISP) behavior. The effectiveness of an assessment model is typically analyzed either using short survey statements (behavior survey) or by using scenario agreement (prospective scenario) to measure current and prospective compliance (or non-compliance) behavior. However, a significant gap is the lack of statistical evidence to demonstrate that these two measures or dependent variables (DV) sufficiently agree with one another. We report on an effort to compare and contrast two assessment models which employed alternate styles of DVs and demonstrate that the primary construct from two different ISS behavioral theories had approximately the same effect size on either of the DVs. Our findings add support for substantial (but not overly correlated) synchronization between the two DV values, since we also observe that the prospective scenario non-compliance measure resulted in lower model fit while the behavior survey compliance measures fit both models with higher accuracy. We discuss our findings and recommend that for many studies there can be value in employing both DVs.}, keywords = {Accounting, BIS}, url = {https://aisel.aisnet.org/wisp2022/19}, author = {Marshall,Byron and Shadbad,Forough and Curry,Michael and Biros,David} } @conference {1970491, title = {Do Measures of Security Compliance Intent Equal Non-Compliance Scenario Agreement?}, booktitle = {WISP2022: 2022 Workshop on Information Security and Privacy (WISP)}, year = {2022}, month = {2022}, address = {Copenhagen, Denmark, Dec. 2022}, abstract = {To better protect organizations from the threat of insiders, IS security (ISS) research frequently emphasizes IS Security Policy (ISP) behavior. The effectiveness of an assessment model is typically analyzed either using short survey statements (behavior survey) or by using scenario agreement (prospective scenario) to measure current and prospective compliance (or non-compliance) behavior. However, a significant gap is the lack of statistical evidence to demonstrate that these two measures or dependent variables (DV) sufficiently agree with one another. We report on an effort to compare and contrast two assessment models which employed alternate styles of DVs and demonstrate that the primary construct from two different ISS behavioral theories had approximately the same effect size on either of the DVs. Our findings add support for substantial (but not overly correlated) synchronization between the two DV values, since we also observe that the prospective scenario non-compliance measure resulted in lower model fit while the behavior survey compliance measures fit both models with higher accuracy. We discuss our findings and recommend that for many studies there can be value in employing both DVs.}, keywords = {Accounting, BIS}, author = {Marshall,Byron and Shadbad,Forough and Curry,Michael and Biros,David} } @booklet {1970496, title = {Will SOC Telemetry Data Improve Predictive Models of User Riskiness? A Work in Progress}, year = {2022}, month = {2022}, address = {Copenhagen, Denmark, Dec. 2022}, abstract = {This extended abstract describes our planned efforts to usefully integrate psychometric and telemetry data to help identify cybersecurity risks and more effectively analyze cybersecurity events.}, keywords = {Accounting, BIS}, author = {Curry,Michael and Marshall,Byron and Shadbad,Forough and Hong,Sanghyun} } @article {1970501, title = {Machine Learning and Survey-based Predictors of InfoSec Non-Compliance}, journal = {ACM Transactions on Management Information Systems}, year = {2021}, month = {2021}, keywords = {Accounting, BIS}, author = {Marshall,Byron and Curry,Michael and Correia,John and Crossler,Robert E} } @article {1984376, title = {Machine Learning and Survey-based Predictors of InfoSec Non-Compliance}, journal = {ACM Transactions on Management Information Systems}, volume = {13}, year = {2021}, month = {2021}, pages = {1-20}, abstract = {Survey items developed in behavioral Information Security (InfoSec) research should be practically useful in identifying individuals who are likely to create risk by failing to comply with InfoSec guidance. The literature shows that attitudes, beliefs, and perceptions drive compliance behavior and has influenced the creation of a multitude of training programs focused on improving ones{\textquoteright} InfoSec behaviors. While automated controls and directly observable technical indicators are generally preferred by InfoSec practitioners, difficult-to-monitor user actions can still compromise the effectiveness of automatic controls. For example, despite prohibition, doubtful or skeptical employees often increase organizational risk by using the same password to authenticate corporate and external services. Analysis of network traffic or device configurations is unlikely to provide evidence of these vulnerabilities but responses to well-designed surveys might. Guided by the relatively new IPAM model, this study administered 96 survey items from the Behavioral InfoSec literature, across three separate points in time, to 217 respondents. Using systematic feature selection techniques, manageable subsets of 29, 20, and 15 items were identified and tested as predictors of non-compliance with security policy. The feature selection process validates IPAM{\textquoteright}s innovation in using nuanced self-efficacy and planning items across multiple time frames. Prediction models were trained using several ML algorithms. Practically useful levels of prediction accuracy were achieved with, for example, ensemble tree models identifying 69\% of the riskiest individuals within the top 25\% of the sample. The findings indicate the usefulness of psychometric items from the behavioral InfoSec in guiding training programs and other cybersecurity control activities and demonstrate that they are promising as additional inputs to AI models that monitor networks for security events.}, keywords = {Accounting, BIS}, author = {Marshall,Byron and Curry,Michael and Correia,John and Crossler,Robert E} } @conference {1970506, title = {Identifying potentially risky insider on-compliance using machine learning to assess multiple protection motivation behaviors}, booktitle = {WISP2021: 2021 Workshop on Information Security and Privacy (WISP)}, year = {2019}, month = {2019}, abstract = {Cybersecurity researchers have made significant steps to understand the mechanisms of security policy compliance and unify theories of security behavior. However, due partly to the limitations of traditional variance model statistical methods, these studies by necessity typically focus on a single security policy issue. By contrast, new machine learning algorithms frequently employed by data scientists offer great promise as a new statistical approach for examining robust individualized interpretations of policy and can also identify potentially risky behaviors. This study proposes to explore cybersecurity training impediments of multiple protection motivation behaviors in ransomware prevention training. It demonstrates the feasibility of using machine learning with survey items from the cybersecurity research to predict non-compliance. It also illustrates a potentially novel method to statistically validate research theory through higher levels of ML prediction. This study is a work in progress and we seek feedback on its design and relevance.}, keywords = {Accounting, BIS}, url = {https://aisel.aisnet.org/wisp2019/1}, author = {Curry,Michael and Marshall,Byron and Crossler,Robert E} } @article {1970511, title = {InfoSec Process Action Model (IPAM): Targeting Insider{\textquoteright}s Weak Password Behavior}, journal = {Journal of Information Systems}, volume = {33}, year = {2019}, month = {2019}, pages = {201-225}, abstract = {The possibility of noncompliant behavior is a challenge for cybersecurity professionals and their auditors as they try to estimate residual control risk. Building on the recently proposed InfoSec Process Action Model (IPAM), this work explores how nontechnical assessments and interventions can indicate and reduce the likelihood of risky individual behavior. The multi-stage approach seeks to bridge the well-known gap between intent and action. In a strong password creation experiment involving 229 participants, IPAM constructs resulted in a marked increase in R2 for initiating compliance behavior with control expectations from 47 percent to 60 percent. Importantly, the model constructs offer measurable indications despite practical limitations on organizations{\textquoteright} ability to assess problematic individual password behavior. A threefold increase in one measure of strong password behavior suggested the process positively impacted individual cybersecurity behavior. The results suggest that the process-nuanced IPAM approach is promising both for assessing and impacting security compliance behavior.}, keywords = {Accounting, BIS}, url = {https://doi.org/10.2308/isys-52381}, author = {Curry,Michael and Marshall,Byron and Correia,John and Crossler,Robert E} } @conference {1973161, title = {Fear Appeals Versus Priming in Ransomware Training}, booktitle = {Pre-ICIS Workshop on Information Security and Privacy (WISP 2018)}, year = {2018}, month = {2018}, abstract = {Employee non-compliance is at the heart of many of today{\textquoteright}s security incidents. Training programs often employ fear appeals to motivate individuals to follow policy and take action to reduce security risks. While the literature shows that fear appeals drive intent to comply, there is much less evidence of their impact after intention is formed. Building on IPAM {\textendash} a process nuanced model for compliance training and assessment {\textendash} this study contrasts the impact of fear appeals vs. self-efficacy priming on ransomware training. In our proposed study, a pool of students will participate in a three-step series of training events. Some participants will encounter enhanced fear appeals at each step while others will be presented with materials that include
priming signals intended to foster development of increased self-efficacy. Previously identified
drivers of behavior (intent, processed-nuanced forms of self-efficacy, and outcome expectations)
are measured so that the effect of the treatments can be contrasted. A scenario agreement
methodology is used to indicate behavior as a dependent variable. We expect to show that while
fear appeals are useful and help build intent to comply at the motivational stage, process-nuanced
self-efficacy treatments are expected have a stronger effect on behavior post-intentional.}, keywords = {Accounting, BIS}, url = {https://aisel.aisnet.org/wisp2018/1/}, author = {Curry,Michael and Marshall,Byron and Crossler,Rob and Correia,John} } @article {1970516, title = {InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior}, journal = {Data Base for Advances in Information Systems}, volume = {49}, year = {2018}, month = {2018}, abstract = {While much of the extant InfoSec research relies on single assessment models that predict intent to act, this article proposes a multi-stage InfoSec Process Action Model (IPAM) that can positively change individual InfoSec behavior. We believe that this model will allow InfoSec researchers to focus more directly on the process which leads to action and develop better interventions that address problematic security behaviors. Building on successful healthcare efforts which resulted in smoking cessation, regular exercise and a healthier diet, among others, IPAM is a hybrid, predictive, process approach to behavioral InfoSec improvement. IPAM formulates the motivational antecedents of intent as separate from the volitional drivers of behavior. Singular fear appeals often seen in InfoSec research are replaced by more nuanced treatments appropriately differentiated to support behavioral change as part of a process; phase-appropriate measures of self-efficacy are employed to more usefully assess the likelihood that a participant will act on good intentions; and decisional balance {\textendash}assessment of pro and con perceptions {\textendash} is monitored over time. These notions better align InfoSec research to both leading security practice and to successful comparators in healthcare. We believe IPAM can both help InfoSec research models better explain actual behavior and better inform practical security-behavior improvement initiatives.}, keywords = {Accounting, BIS}, url = {https://www.researchgate.net/publication/321138048_InfoSec_Process_Action_Model_IPAM_Systematically_Addressing_Individual_Security_Behavior}, author = {Curry,Michael and Marshall,Byron and Crossler,Robert E and Correia,John} } @article {1970526, title = {A Normative Model for Assessing SME IT Effectiveness}, journal = {Communications of the IIMA}, volume = {15}, year = {2017}, month = {2017}, abstract = {Information technology (IT) is a key enabler of modern small businesses, yet fostering reliably
effective IT systems remains a significant challenge. This paper presents a light weight IT
effectiveness model for small businesses to assess their IT and formulate strategies for
improvement. Employing an action research approach we investigate a mixed method analysis of
120 survey responses from small family businesses and user participation in 10 semi-structured
interviews. We then conduct critical reflection to identify refinements which are validated using
72 survey responses from university students. The results present compelling evidence that
employees{\textquoteright} normative patterns (norms) are a significant driver of IT effectiveness in a second
order PLS predictive model able to explain 26\% of observed variance.
A norms-based approach to IT effectiveness helps fill a significant research and managerial gap
for organizations unable or unwilling to adopt IT best practice frameworks used by large
organizations. Our findings imply that comparing norms to IT best practices may offer a less
technical approach to assessing IT operations, which may be well suited to small businesses.
Although further investigation cycles are needed to systematically test this model, we encourage
small business managers to: 1) anticipate IT risks and mitigate them; 2) identify measures of IT
performance, and monitor them, and 3) review/synchronize business and IT goals.}, keywords = {Accounting, BIS}, url = {http://scholarworks.lib.csusb.edu/ciima/vol15/iss1/3}, author = {Curry,Michael and Marshall,Byron and Kawalek,Peter} } @booklet {1973166, title = {Personal Motivation Measures for Personal IT Security Behavior}, year = {2017}, month = {2017}, keywords = {Accounting, BIS}, url = {http://aisel.aisnet.org/amcis2017/InformationSystems/Presentations/27/}, author = {Marshall,Byron and Curry,Michael and Correia,John and Crossler,Rob} } @article {1970521, title = {BA302: Microsoft Dynamics NAV ERP Exercise/Walkthrough}, year = {2016}, month = {2016}, pages = {25}, abstract = {Whether you enter the workforce as a sales manager, financial accountant or office admin, chances are that you will be working with some type of Enterprise Resource Planning (ERP) system. The purpose of this exercise/walkthrough is to familiarize you with a typical business process as it is commonly executed with the help of one of the leading ERP systems in the market today {\textendash} Microsoft Dynamics NAV. This exercise will walk you through the six steps of a typical sales process: 1) Creating a customer order; 2) Backordering an out-of-stock item; 3) Receiving the backordered item; 4) Shipping the customer the ordered items and invoicing the customer; 5) Receiving payment from the customer; 6) Making a payment to the vendor from whom we backordered. As you make your way through this exercise, you should realize that in a real company this process would be executed by different people working in different departments. They all will interact with the ERP; i.e., they all retrieve information from the ERP and store new information in it, as the sales process progresses. In this exercise you take on the role of each of these people, giving you a sense of how the sales order is processed both by the company and by the ERP.}, keywords = {Accounting, BIS}, url = {http://hdl.handle.net/1957/59858}, author = {Curry,Michael and Marshall,Byron and Raja,V.T. and Reitsma,Reindert and Wydner,Kirk} } @conference {1973171, title = {Hope for change in individual security behavior assessments}, booktitle = {2016 Pre-ICIS Workshop on Accounting Information Systems}, year = {2016}, month = {2016}, keywords = {Accounting, BIS}, author = {Curry,Michael and Marshall,Byron and Crossler,Rob} } @article {1981326, title = {(See proceeding paper above) Hope for change in individual security behavior assessments}, year = {2016}, month = {2016}, address = {Dublin, Ireland}, keywords = {Accounting, BIS}, author = {Marshall,Byron} } @conference {1973181, title = {Unraveling K-12 Standard Alignment; Report on a New Attempt}, booktitle = {Joint Conference on Digital Libraries}, year = {2016}, month = {2016}, abstract = {We present the results of an experiment which indicates that automated alignment of electronic learning objects to educational standards may be more feasible than previously implied. We highlight some important deficiencies in existing alignment systems and formulate suggestions for improved future ones. We consider how the changing substance of newer educational standards, a multi-faceted view of standard alignment, and a more nuanced view of the {\textquoteleft}alignment{\textquoteright} concept may bring the long-sought goal of automated standard alignment closer. We explore how lexical similarity of documents, a World+Method representation of semantics, and network-based analysis can yield promising results. We furthermore investigate the nature of false positives to better understand how validity of match is evaluated so as to better focus future alignment system development.}, keywords = {Accounting, BIS}, author = {Marshall,Byron and Reitsma,Reindert and Samson,Carleigh} } @conference {1973176, title = {Affordance Perception in Risk Adverse IT Adoption: An Agenda to Identify Drivers of Risk Consideration and Control Adoption in Individual Technology Choices}, booktitle = {2015 Pre-ICIS Workshop on Accounting Information Systems}, year = {2015}, month = {2015}, keywords = {Accounting, BIS}, author = {Curry,Michael and Marshall,Byron} } @article {1970531, title = {Improving IT Assessment with IT Artifact Affordance Perception Priming}, journal = {International Journal of Accounting Information Systems}, volume = {19}, year = {2015}, month = {2015}, pages = {17-28}, abstract = {Accurately assessing organizational information technology (IT) is important for accounting professionals, but also difficult. Both auditors and the professionals from whom they gather data are expected to make nuanced judgments regarding the adequacy and effectiveness of controls that protect key systems. IT artifacts (policies, procedures, and systems) are assessed in an audit because they {\textquotedblleft}afford{\textquotedblright} relevant action possibilities but perception preferences shade the results of even systematic and well-tested assessment tools. This study of 246 business students makes two important contributions. First we demonstrate that a tendency to focus on either artifact or organizational imperative systematically reduces the power of well-regarded IT measurements. Second, we demonstrate that priming is an effective intervention strategy to increase the predictive power of constructs from the familiar technology acceptance model (TAM).}, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/IJAIS\%20-\%20IT\%20Artifact\%20Affordance\%20Perception\%20Priming.pdf}, author = {Curry,Michael and Marshall,Byron and Kawalek,Peter} } @conference {1973186, title = {Weather Factors and Online Product/Service Reviews}, booktitle = {{\textquoteright}Doing IS Research in China{\textquoteright} Workshop of the Pacific Asia Conference on Information Systems (PACIS 2015)}, year = {2015}, month = {2015}, keywords = {Accounting, BIS, Business Analytics}, author = {Feng,Jiao and Yao,Zhong and Zhu,Bin and Marshall,Byron} } @article {1970541, title = {IT Artifact Bias: How exogenous predilections influence organizational information system paradigms}, journal = {International Journal of Information Management}, volume = {34}, year = {2014}, month = {2014}, pages = {427-436}, abstract = {Efforts in IS research have long sought to bridge the gap between the information technology (IT) function and strategic business interests. Efforts in IS research have long sought to bridge the gap between the information technology (IT) function and the strategic business interests. People perceive affordances (possibilities for action) in information technology artifacts differently as cognitive structures (schema) which bias individual focus. This study explores how an individual{\textquoteright}s tendency to perceive the {\textquoteleft}trees{\textquoteright} in an IT {\textquoteleft}forest{\textquoteright} (artifact preference), affects their assessment of efforts to achieve more effective IT outcomes. The effect is demonstrated using a relatively simple IT success model. Further, in a sample of 120 survey responses supported by ten semi-structured interviews we demonstrate that job role and organizational IT complexity systematically impact artifact perception. A better understanding of IT artifact bias promises to help organizations better assess information systems.}, keywords = {Accounting, BIS}, url = {http://dx.doi.org/10.1016/j.ijinfomgt.2014.02.005}, author = {Curry,Michael and Marshall,Byron and Kawalek,Peter} } @conference {1970536, title = {The Moderating Power of IT Bias on User Acceptance of Technology}, booktitle = {Sixth Annual Pre-ICIS Workshop on Accounting Information Systems}, year = {2014}, month = {2014}, address = {Auckland}, keywords = {Accounting, BIS}, author = {Marshall,Byron and Curry,Michael and Kawalek,Peter} } @article {1973191, title = {Can Intermediary-based Science Standards Crosswalking Work? Some Evidence from Mining the Standard Alignment Tool (SAT)}, journal = {Journal of the Association for Information Science and Technology}, volume = {63}, year = {2012}, month = {2012}, pages = {1843-1858}, abstract = {We explore the feasibility of intermediary-based crosswalking and alignment of K-12 science education standards. With increasing availability of K-12 science, technology, engineering and mathematics (STEM) digital library content, alignment of that content with educational standards is a significant and continuous challenge. Whereas direct, one-to-one alignment of standards is preferable but currently unsustainable in its resource demands, less resource-intensive intermediary-based alignment offers an interesting alternative. But will it work? We present the results from an experiment in which the machine-based Standard Alignment Tool (SAT) {\textemdash}incorporated in the National Science Digital Library (NSDL){\textemdash} was used to collect over half a million direct alignments between standards from different standard-authoring bodies. These were then used to compute intermediary-based alignments derived from the well-known AAAS Project 2061 Benchmarks and NSES standards. Results show strong variation among authoring bodies in their success to crosswalk with best results for those who modeled their standards on the intermediaries. Results furthermore show a strong inverse relationship between recall and precision when both intermediates where involved in the crosswalking.}, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/ReitsmaMarshallChart_StandardsCrosswalking_JASIST2012.pdf}, author = {Reitsma,Reindert and Marshall,Byron and Chart,Trevor} } @article {1977451, title = {Disentangling IT Artifact Bias}, year = {2012}, month = {2012}, address = {Orlando, Florida}, keywords = {Accounting, BIS}, author = {Curry,Michael and Marshall,Byron} } @conference {1984581, title = {Is It You or the Message: Why Do People Pass Along Micro-Blogging Messages?}, booktitle = {The Eleventh Workshop on e-Business (WeB{\textquoteright}12)}, year = {2012}, month = {2012}, address = {Orlando, Florida}, keywords = {Accounting, BIS, Business Analytics}, author = {Zhu,Bin and Marshall,Byron} } @article {1970546, title = {Organizational Information Technology Norms and IT Quality}, journal = {Communications of the IIMA}, volume = {11}, year = {2011}, month = {2011}, abstract = {The effectiveness of IT governance initiatives in improving IT{\textquoteright}s contribution to organizational success has been demonstrated but the mechanisms by which improved outcomes are realized have largely remained unexplored. Although IT governance tools such as COBIT and ITIL specify procedures and policies for the management of IT resources, the experts who developed those tools also embedded a set of core principles or {\textquoteleft}norms{\textquoteright} in the underlying frameworks. This article explores these norms and their role in the realization of organizational IT quality. Through analysis of normative messages implicitly expressed in the documentation elements provided by COBIT, we extract two norms (commitment to improvement and a risk/control perspective) thought to indicate that an organization has adopted the spirit of IT governance. Next, we model the relationship between adoption of these norms and IT quality and evaluate the model with data from a survey of 86 individuals who use, manage, and/or deliver organizational IT services. Principal component analysis is used to validate the survey items. Results show statistically significant relationships between norm adoption, participation in norm-driven activities, and organizational IT quality.}, keywords = {Accounting, BIS}, url = {http://www.iima.org/index.php?option=com_phocadownload\&view=category\&id=60:2011-volume-11-issue-4\&Itemid=68}, author = {Marshall,Byron and Curry,Michael and Reitsma,Reindert} } @conference {1984586, title = {World vs. Method: Educational Standard Formulation Impacts Document Retrieval}, booktitle = {Proceedings of the Joint Conference on Digital Libraries (JCDL{\textquoteright}11),Ottawa, Canada.}, year = {2011}, month = {2011}, abstract = {Although initiatives are underway in the educational community to consolidate disparate collections of educational standards, little has been done to explore the impact of educational standard formulation on information retrieval. Recent research contrasts two categories of educational standards: {\textquoteleft}World{\textquoteright} (topical domain-related concepts) and {\textquoteleft}Method{\textquoteright} (investigative and epistemological principles). This paper explores the information retrieval implications of the World vs. Method distinction. We find that experts are more likely to agree about which educational resources align with a Method standard but that a typical automatic standard assignment tool is more likely to assign a World standard to an educational resource. Further, a text-based information retrieval system is more likely to be accurate in retrieving documents relevant to a World standard as compared to a Method standard. These findings have implications both for educational standard formulation (combining World and Method components in a standard may improve retrieval) and for digital library builders who want to help teachers identify useful, standards-aligned learning objects.}, keywords = {Accounting, BIS}, author = {Marshall,Byron and Reitsma,Reindert} } @article {1973196, title = {Aspects of {\textquoteright}Relevance{\textquoteright} in the Alignment of Curriculum with Educational Standards}, journal = {Information Processing \& Management}, volume = {46}, year = {2010}, month = {2010}, pages = {362-376}, abstract = {Retrieval of useful digitized learning objects is a key objective for educational digital libraries, but imprecise definitions of alignment hinder the development of effective retrieval mechanisms. With over 63,000 U.S. K-12 science and mathematics education standards and a rapid proliferation of Web-enabled curriculum, retrieving curriculum that aligns with the standards to which teachers must teach is increasingly important. Previous studies of such alignment use single-dimensional and binary measures of relevance. Perhaps as a consequence they suffer from low inter-rater reliability (IRR), with experts agreeing about alignments only some 20-40\% of the time. We present the results of an experiment in which the dependent variable {\textquoteleft}alignment{\textquoteright} is operationalized using the Saracevic model of relevance in which; i.e., alignment is defined and measured through {\textquoteleft}clues{\textquoteright} from the everyday practice of K-12 teaching. Results show higher inter-rater reliability on all clues with significantly higher IRR on several specific alignment dimensions. In addition, a (linear) model of {\textquoteleft}overall alignment{\textquoteright} is derived and estimated. Both the structure and explanatory power of the model differ significantly between searching vs. assessment. These results illustrate the usefulness of clue-based relevance measures for information retrieval and have important consequences for both the formulation of automated retrieval mechanisms and the construction of a gold standard set of standard-curriculum alignments.}, keywords = {Accounting, BIS}, url = {http://www.sciencedirect.com/science/article/B6VC8-4XF7Y02-1/2/3fd5e4257f3d904d5929eeff2185c678}, author = {Reitsma,Reindert and Marshall,Byron and Zarske,Malinda} } @conference {1984386, title = {Does Using CobiT Improve IT Solution Proposals?}, booktitle = {AAA Annual Meeting, IS Section}, year = {2010}, month = {2010}, abstract = {The CobiT (Control Objectives for Information and related Technology) framework is designed to help organizations implement IT governance practices by systematically shaping identifiable IT processes to better leverage IT expenditures. The control structure advocated in CobiT embodies governance notions including business alignment, a risk/control perspective, systematic measurement, accountability, and continuous improvement. Despite the rise of internal control regulation, not all organizations have implemented systematic IT controls and many, notably small, organizations may never do so. This study explores whether exposing decision makers to CobiT positively affects the IT solutions they generate. We present a framework (drawn primarily from the structure of CobiT) for identifying normatively better IT plans as measured by application of governance principles. We report on 115 IT solution proposals created by business students. The proposals developed using CobiT more frequently took a risk/control approach, addressed the need for continuous improvement, referred to general IT processes, identified the people who should implement a solution, and proposed more measures of success. Thus, exposing decision makers to a systematic IT governance framework promises to help them generate more comprehensive solutions to IT challenges.}, keywords = {Accounting, BIS}, author = {Marshall,Byron and Curry,Michael and Reitsma,Reindert} } @conference {1984381, title = {IT Governance Norms and IT Success}, booktitle = {2nd annual Pre-ICIS Workshop on Accounting Information Systems}, year = {2010}, month = {2010}, address = {December 2010, Saint Louis, MO, U.S.A.}, abstract = {The checklists included in well-known IT governance frameworks may be a good fit for
large organizations that face regulatory pressure and a need for large-scale coordination
but may be less appropriate for smaller organizations. Core IT governance principles
embedded in the structure of CobiT, ITIL, and ISO2000 can be expressed as a set of IT
governance norms including business alignment, a risk/control perspective, systematic
measurement, accountability, and continuous improvement. In this study, we model IT
effectiveness and willingness to comply with best practices as effects of adopting these
norms. We propose a set of survey items tailored to help assess the constructs in this
model then partially validate them using principal components analysis. Survey
responses (n=86) reveal a significant connection between evidence of norm adoption in
organizations and IT success. This norms-based paradigm may be useful in bringing
some of the benefits of IT governance to the smaller organizations that are thought to
drive economic growth and employment.}, keywords = {Accounting, BIS}, author = {Marshall,Byron and Curry,Michael and Reitsma,Reindert} } @article {1969181, title = {Visualizing Basic Accounting Flows: Does XBRL + Model + Animation = Understanding?}, journal = {International Journal of Digital Accounting Research}, volume = {10}, year = {2010}, month = {2010}, pages = {27-54}, abstract = {The usefulness of XBRL (eXtensible Business Reporting Language) in facilitating efficient data sharing is clear, but widespread use of XBRL also promises to support more effective analysis processes. This format should allow managers, investors, regulators, and students to aggregate, compare and analyze financial information. This study explores an XBRL-based visualization tool that maps the organization of financial statements captured in the XBRL formalism into a graphical representation that organizes, depicts, and animates financial data. We show that our tool integrates and presents profitability, liquidity, financing, and market value data in a manner recognizable to business students. Our findings suggest the promise of XBRL-based visualization tools both in helping students grasp basic accounting concepts and in facilitating financial analysis in general.}, keywords = {Accounting, BIS}, url = {http://www.uhu.es/ijdar/10.4192/1577-8517-v10_2.pdf}, author = {Marshall,Byron and Mortenson,Kristian and Bourne,Amy and Price,Kevin} } @conference {1969176, title = {Delivering Value Beyond Efficiency with Visualized XBRL}, booktitle = {International Conference on Information Systems (ICIS 2009)}, year = {2009}, month = {2009}, address = {Phoenix, AZ}, keywords = {Accounting, BIS}, author = {Marshall,Byron and Mortenson,Kristian and Bourne,Amy and Price,Kevin and Marshall,Andrew} } @conference {1984591, title = {Dimensional Standard Alignment in K-12 Digital Libraries: Assessment of Self-found vs. Recommended Curriculum}, booktitle = {Proceedings of the Joint Conference on Digital Libraries (JCDL{\textquoteright}09), Austin, TX}, year = {2009}, month = {2009}, keywords = {Accounting, BIS}, url = {http://doi.acm.org/10.1145/1555400.1555403}, author = {Marshall,Byron and Reitsma,Reindert and Zarske,Malinda} } @article {1981331, title = {TeachEngineering: K-12 Teacher Use Study}, year = {2009}, month = {2009}, address = {Boulder, CO.}, keywords = {Accounting, BIS}, author = {Reitsma,Reindert and Marshall,Byron} } @article {1973201, title = {Topological Analysis of Criminal Activity Networks: Enhancing Transportation Security}, journal = {IEEE Transactions on Intelligent Transportation Systems}, volume = {10}, year = {2009}, month = {2009}, pages = {83 - 91}, abstract = {The security of border and transportation systems is a critical component of the national strategy for homeland security. The security concerns at the border are not independent of law enforcement in border-area jurisdictions because the information known by local law enforcement agencies may provide valuable leads that are useful for securing the border and transportation infrastructure. The combined analysis of law enforcement information and data generated by vehicle license plate readers at international borders can be used to identify suspicious vehicles and people at ports of entry. This not only generates better quality leads for border protection agents but may also serve to reduce wait times for commerce, vehicles, and people as they cross the border. This paper explores the use of criminal activity networks (CANs) to analyze information from law enforcement and other sources to provide value for transportation and border security. We analyze the topological characteristics of CAN of individuals and vehicles in a multiple jurisdiction scenario. The advantages of exploring the relationships of individuals and vehicles are shown. We find that large narcotic networks are small world with short average path lengths ranging from 4.5 to 8.5 and have scale-free degree distributions with power law exponents of 0.85{\textendash}1.3. In addition, we find that utilizing information from multiple jurisdictions provides higher quality leads by reducing the average shortest-path lengths. The inclusion of vehicular relationships and border-crossing information generates more investigative leads that can aid in securing the border and transportation infrastructure.}, keywords = {Accounting, BIS}, url = {http://dx.doi.org/10.1109/TITS.2008.2011695}, author = {Kaza,Siddharth and Xu,Jennifer and Marshall,Byron and Chen,Hsinchun} } @conference {1984331, title = {Visualizing basic accounting flows: does XBRL + model + animation = understanding?}, booktitle = {American Accounting Association 18th Annual Strategic and Emerging Technologies Research Workshop}, year = {2009}, month = {2009}, address = {New York, NY}, abstract = {The usefulness of XBRL (eXtensible Business Reporting Language) in facilitating efficient data sharing is clear, but widespread use of XBRL also promises to support more effective analysis processes. Representing traditional financial statements in this electronic and interoperable format should allow managers, investors, regulators, and importantly students to aggregate, compare and analyze financial information. Processing such data requires an understanding of the underlying paradigms embedded in consolidated sets of financial statements. This work explores the feasibility and effectiveness of an XBRL-based visualization tool, presenting an organizational framework, mapping that framework to financial statements and the XBRL formalism, and demonstrating a visual representation that organizes, depicts, and animates financial data. We show that our tool integrates and presents profitability, liquidity, financing, and market value data in a manner recognizable to business students in introductory financial accounting classes. This preliminary finding suggests the promise of XBRL-based visualization tools both in helping students grasp basic accounting concepts and in facilitating financial analysis in general.}, keywords = {Accounting, BIS}, author = {Marshall,Byron and Mortenson,Kristian and Bourne,Amy and Price,Kevin and Marshall,Andrew} } @article {1973206, title = {Using Importance Flooding to Identify Interesting Networks of Criminal Activity}, journal = {Journal of the Association for Information Science and Technology}, volume = {59}, year = {2008}, month = {2008}, pages = {2099-2114}, abstract = {Cross-jurisdictional law enforcement data sharing and analysis is of vital importance because law breakers regularly operate in multiple jurisdictions. Agencies continue to invest massive resources in various sharing initiatives despite several high-profile failures. Key difficulties include: privacy concerns, administrative issues, differences in data representation, and a need for better analysis tools. This work presents a methodology for sharing and analyzing investigation-relevant data and is potentially useful across large cross-jurisdictional data sets. The approach promises to allow crime analysts to use their time more effectively when creating link charts and performing similar analysis tasks. Many potential privacy and security pitfalls are avoided by reducing shared data requirements to labeled relationships between entities. Our importance flooding algorithm helps extract interesting networks of relationships from existing law enforcement records using user-controlled investigation heuristics, spreading activation, and path-based interestingness rules. In our experiments, several variations of the importance flooding approach outperformed relationship-weight-only methods in matching expert-selected associations. We find that accuracy in not substantially affected by reasonable variations in algorithm parameters and demonstrate that user feedback and additional, case-specific information can be usefully added to the computational model.}, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/Marshall_JASIST_ImportanceFlooding_PrePrint.pdf}, author = {Marshall,Byron and Chen,Hsinchun and Kaza,Siddharth} } @conference {1984596, title = {Semantics or Standards for Curriculum Search?}, booktitle = {Proceedings of the 7th ACM/IEEE Joint Conference on Digital Libraries, 181-182}, year = {2007}, month = {2007}, address = {New York, NY}, abstract = {Aligning digital library resources with national and state educational standards to help K-12 teachers search for relevant curriculum is an important issue in the digital library community. Aligning standards from different states promises to help teachers in one state find appropriate materials created and cataloged elsewhere. Although such alignments provide a powerful means for crosswalking standards and curriculum across states, alignment matrices are intrinsically sparse. Hence, we hypothesize that such sparseness may cause significant numbers of false negatives when used for searching curriculum. Our preliminary results confirm the false negative hypothesis, demonstrate the usefulness of term-based techniques in addressing the false negative problem, and explore ways to combine term occurrence data with standards correlations.}, keywords = {Accounting, BIS}, author = {Marshall,Byron and Reitsma,Reindert and Cyr,Martha N} } @article {1973211, title = {User-Centered Evaluation of Arizona BioPathway: An Information Extraction, Integration, and Visualization System}, journal = {IEEE Transactions on Information Technology in Biomedicine}, volume = {11}, year = {2007}, month = {2007}, pages = {527-536}, abstract = {Explosive growth in biomedical research has made automated information extraction, knowledge integration, and visualization increasingly important and critically needed. The Arizona BioPathway (ABP) system extracts and displays biological regulatory pathway information from the abstracts of journal articles. This study uses relations extracted from more than 200 PubMed abstracts presented in a tabular and graphical user interface with built-in search and aggregation functionality. This article presents a task-centered assessment of the usefulness and usability of the ABP system focusing on its relation aggregation and visualization functionalities. Results suggest that our graph-based visualization is more efficient in supporting pathway analysis tasks and is perceived as more useful and easier to use as compared to a text-based literature viewing method. Relation aggregation significantly contributes to knowledge acquisition efficiency. Together, the graphic and tabular views in the ABP Visualizer provide a flexible and effective interface for pathway relation browsing and analysis. Our study contributes to pathway-related research and biological information extraction by assessing the value of a multi-view, relation-based interface which supports user-controlled exploration of pathway information across multiple granularities.}, keywords = {Accounting, BIS}, url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=4300830\&arnumber=4300844\&count=17\&index=5}, author = {Qui{\~n}ones,Karin D. and Su,Hua and Marshall,Byron and Eggers,Shauna and Chen,Hsinchun} } @article {1973221, title = {Aggregating Automatically Extracted Regulatory Pathway Relations}, journal = {IEEE Transactions on Information Technology in Biomedicine}, volume = {10}, year = {2006}, month = {2006}, pages = {100- 108}, abstract = {Automatic tools to extract information from biomedical texts are needed to help researchers leverage the vast and increasing body of biomedical literature. While several biomedical relation extraction systems have been created and tested, little work has been done to meaningfully organize the extracted relations. Organizational processes should consolidate multiple references to the same objects over various levels of granularity, connect those references to other resources, and capture contextual information. We propose a feature decomposition approach to relation aggregation to support a five-level aggregation framework. Our BioAggregate tagger uses this approach to identify key features in extracted relation name strings. We show encouraging feature assignment accuracy and report substantial consolidation in a network of extracted relations.}, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/Marshall_IEEE_TITB_2005.pdf}, author = {Marshall,Byron and Su,Hua and McDonald,Daniel and Eggers,Shauna and Chen,Hsinchun} } @article {1973216, title = {Matching Knowledge Elements in Concept Maps Using a Similarity Flooding Algorithm}, journal = {Decision Support Systems}, volume = {42}, year = {2006}, month = {2006}, pages = {1290-1306}, abstract = {Concept mapping systems used in education and knowledge management emphasize flexibility of representation to enhance learning and facilitate knowledge capture. Collections of concept maps exhibit terminology variance, informality, and organizational variation. These factors make it difficult to match elements between maps in comparison, retrieval, and merging processes. In this work, we add an element anchoring mechanism to a similarity flooding (SF) algorithm to match nodes and substructures between pairs of simulated maps and student-drawn concept maps. Experimental results show significant improvement over simple string matching with combined recall accuracy of 91\% for conceptual nodes and concept {\textasciidieresis} link {\textasciidieresis} concept propositions in student-drawn maps.}, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/MatchKnowledgeElements_PrePrintVersion.pdf}, author = {Marshall,Byron and Chen,Hsinchun and Madhusudan,Therani} } @article {1973226, title = {Moving Digital Libraries into the Student Learning Space: the GetSmart Experience}, journal = {Journal on Educational Resources in Computing}, volume = {6}, year = {2006}, month = {2006}, abstract = {The GetSmart system was built to support theoretically sound learning processes in a digital library environment by integrating course management, digital library, and concept mapping components to support a constructivist, six-step, information search process. In the fall of 2002 more than 100 students created 1400 concept maps as part of selected computing classes offered at the University of Arizona and Virginia Tech. Those students conducted searches, obtained course information, created concept maps, collaborated in acquiring knowledge, and presented their knowledge representations. This article connects the design elements of the GetSmart system to targeted concept-map-based learning processes, describes our system and research testbed, and analyzes our system usage logs. Results suggest that students did in fact use the tools in an integrated fashion, combining knowledge representation and search activities. After concept mapping was included in the curriculum, we observed improvement in students{\textquoteright} online quiz scores. Further, we observed that students in groups collaboratively constructed concept maps with multiple group members viewing and updating map details.}, keywords = {Accounting, BIS}, url = {http://portal.acm.org/citation.cfm?doid=1217862.1217864}, author = {Marshall,Byron and Chen,Hsinchun and Shen,Rao and Fox,Edward A.} } @conference {1984601, title = {Using Importance Flooding to Identify Interesting Networks of Criminal Activity}, booktitle = {Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI-2006), IEEE}, year = {2006}, month = {2006}, address = {San Diego, CA}, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/Marshall_ISI_2006.pdf}, author = {Marshall,Byron and Chen,Hsinchun} } @conference {1984606, title = {Linking Ontological Resources Using Aggregatable Substance Identifiers to Organize Extracted Relations}, booktitle = {Proceedings of the Pacific Symposium on Biocomputing, Jan 4-8, 2005, Big Island, Hawaii}, year = {2005}, month = {2005}, abstract = {Systems that extract biological regulatory pathway relations from free-text sources are
intended to help researchers leverage vast and growing collections of research literature.
Several systems to extract such relations have been developed but little work has focused on
how those relations can be usefully organized (aggregated) to support visualization systems or
analysis algorithms. Ontological resources that enumerate name strings for different types of
biomedical objects should play a key role in the organization process. In this paper we
delineate five potentially useful levels of relational granularity and propose the use of
aggregatable substance identifiers to help reduce lexical ambiguity. An aggregatable
substance identifier applies to a gene and its products. We merged 4 extensive lexicons and
compared the extracted strings to the text of five million MEDLINE abstracts. We report on
the ambiguity within and between name strings and common English words. Our results show
an 89\% reduction in ambiguity for the extracted human substance name strings when using an
aggregatable substance approach.}, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/marshall_PSB2005.pdf}, author = {Marshall,Byron and Su,Hua and McDonald,Dan and Chen,Hsinchun} } @conference {1984611, title = {Visualizing Aggregated Biological Pathway Relations}, booktitle = {Proceedings of the 2005 Joint ACM/IEEE Conference on Digital Libraries (JCDL 2005), June 7-11, 2005 , Denver, CO}, year = {2005}, month = {2005}, abstract = {The Genescene development team has constructed an aggregation interface for automatically-extracted biomedical pathway
relations that is intended to help researchers identify and process relevant information from the vast digital library of abstracts found in the National Library of Medicine{\textquoteright}s PubMed collection.
Users view extracted relations at various levels of relational granularity in an interactive and visual node-link interface. Anecdotal feedback reported here suggests that this multigranular visual paradigm aligns well with various research tasks,
helping users find relevant articles and discover new information.}, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/Marshall_JCDL_2005_Aggregation.pdf}, author = {Marshall,Byron and Qui{\~n}ones,Karin and Su,Hua and Eggers,Shauna and Chen,Hsinchun} } @article {1973236, title = {A Case-based Reasoning Framework for Workflow Model Management}, journal = {Data and Knowledge Engineering}, volume = {50}, year = {2004}, month = {2004}, pages = {87-115}, abstract = {In order to support efficient workflow design, recent commercial workflow systems are providing templates of common business processes. These templates, called cases, can be modified individually or collectively into a new workflow to meet the business specification. However, little research has been done on how to manage workflow models, including issues such as model storage, model retrieval, model reuse and assembly. In this paper, we propose a novel framework to support workflow modeling and design by adapting workflow cases from a repository of process models. Our approach to workflow model management is based on a structured workflow lifecycle and leverages recent advances in model management and case-based reasoning techniques. Our contributions include a conceptual model of workflow cases, a similarity flooding algorithm for workflow case retrieval, and a domain-independent AI planning approach to workflow case composition. We illustrate the workflow model management framework with a prototype system called Case-Oriented Design Assistant for Workflow Modeling (CODAW).}, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/Madhusudan_DKE_CODAW.pdf}, author = {Madhusudan,Therani and Zhao,J. Leon and Marshall,Byron} } @article {1973241, title = {EBizPort: Collecting and Analyzing Business Intelligence Information}, journal = {Journal of the Association for Information Science and Technology}, volume = {55}, year = {2004}, month = {2004}, pages = {873-891}, abstract = {In this article, Marshall, McDonald, Chen, and Chung take a different approach to supporting search services to large and heterogeneous document collections. They propose development of a domain-specific collection by crawling the content of a small set of highly reputable sites, maintaining a local index of the content, and providing browsing and searching services on the specialized content. This resource, known as a vertical portal, has the potential of overcoming several problems associated with bias, update delay, reputation, and integration of scattered information. The article discusses the design of a vertical portal system{\textquoteright}s architecture called EbizPort, rationale behind its major components, and algorithms and techniques for building collections and search functions. Collection (or more broadly content) has an obvious relationship to the nature of the search interface, as it can impact the type of search functions that can be offered. Powerful search interface functions were built for EbizPort by exploiting the underlying content representation and a relatively narrow and well-defined domain focus. Particularly noteworthy are the innovative browsing functions, which include a summarizer, a categorizer, a visualizer, and a navigation side-bar. The article ends with a discussion of an evaluation study, which compared the EbizPort system with a baseline system called Brint. Results are presented on effectiveness and efficiency, usability and information quality, and quality of local collection and content retrieved from other sources (an extended search operation called meta-search service was also provided in the system). Overall, the authors find that EbizPort outperforms the baseline system, and it provides a viable way to support access to business information.}, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/Marshall_JASIST_EBizPort.pdf}, author = {Marshall,Byron and McDonald,Dan and Chen,Hsinchun and Chung,Wingyan} } @conference {1984616, title = {Element Matching in Concept Maps}, booktitle = {Proceedings of the 2004 Joint ACM/IEEE Conference on Digital Libraries (JCDL 2004), June 7-11, 2004 , Tucson, AZ}, year = {2004}, month = {2004}, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/Marshall_JCDL2004_ElementMatching.pdf}, author = {Marshall,Byron and Madhusudan,Therani} } @article {1973231, title = {Extracting Gene Pathway Relations Using a Hybrid Grammar: The Arizona Relation Parser}, journal = {Bioinformatics}, volume = {20}, year = {2004}, month = {2004}, pages = {3370-8}, abstract = {Motivation: Text-mining research in the biomedical domain has been motivated by the rapid growth of new research findings. Improving the accessibility of findings has potential to speed hypothesis generation.Results: We present the Arizona Relation Parser that differs from other parsers in its use of a broad coverage syntax-semantic hybrid grammar. While syntax grammars have generally been tested over more documents, semantic grammars have outperformed them in precision and recall. We combined access to syntax and semantic information from a single grammar. The parser was trained using 40 PubMed abstracts and then tested using 100 unseen abstracts, half for precision and half for recall. Expert evaluation showed that the parser extracted biologically relevant relations with 89\% precision. Recall of expert identified relations with semantic filtering was 35 and 61\% before semantic filtering. Such results approach the higher-performing semantic parsers. However, the AZ parser was tested over a greater variety of writing styles and semantic content. }, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/MCDONALD_BIOINFORMATICS.pdf}, author = {McDonald,Dan and Chen,Hsinchun and Su,Hua and Marshall,Byron} } @conference {1973246, title = {Knowledge Management and E-Learning: the GetSmart Experience}, booktitle = {Proceedings of the 2003 Joint ACM/IEEE Conference on Digital Libraries (JCDL 2003), May 2003, Houston, Texas}, year = {2003}, month = {2003}, abstract = {The National Science Digital Library (NSDL), launched in December 2002, is emerging as a center of innovation in digital libraries as applied to education. As a part of this extensive project, the GetSmart system was created to apply knowledge management techniques in a learning environment. The design of the system is based on an analysis of learning theory and theinformation search process. Its key notion is the integration of search tools and curriculum support with concept mapping. More than 100 students at the University of Arizona and Virginia Tech used the system in the fall of 2002. A database of more than one thousand student-prepared concept maps has been collected with more than forty thousand relationships expressed in semantic, graphical, node-link representations. Preliminary analysis of the collected data is revealing interesting knowledge representation patterns. }, keywords = {Accounting, BIS}, url = {http://people.oregonstate.edu/~marshaby/Papers/Marshall_JCDL2003_GetSmart.pdf}, author = {Marshall,Byron and Zhang,Yiwen and Chen,Hsinchun and Lally,Ann and Shen,Rao and Fox,Edward and Cassel,Lillian} }