{\rtf1\ansi\deff0\deftab360 {\fonttbl {\f0\fswiss\fcharset0 Arial} {\f1\froman\fcharset0 Times New Roman} {\f2\fswiss\fcharset0 Verdana} {\f3\froman\fcharset2 Symbol} } {\colortbl; \red0\green0\blue0; } {\info {\author Biblio 7.x}{\operator }{\title Biblio RTF Export}} \f1\fs24 \paperw11907\paperh16839 \pgncont\pgndec\pgnstarts1\pgnrestart B. Marshall, Shadbad, F., Curry, M., and Biros, D., ?Do Measures of Security Compliance Intent Equal Non-Compliance Scenario Agreement??, in WISP2022: 2022 Workshop on Information Security and Privacy (WISP), Copenhagen, Denmark, Dec. 2022, 2022.\par \par B. Marshall, Shadbad, F., Curry, M., and Biros, D., ?Do Measures of Security Compliance Intent Equal Non-Compliance Scenario Agreement??, in WISP2022: 2022 Workshop on Information Security and Privacy (WISP), Copenhagen, Denmark, Dec. 2022, 2022.\par \par M. Curry, Marshall, B., Shadbad, F., and Hong, S., ?Will SOC Telemetry Data Improve Predictive Models of User Riskiness? A Work in Progress?. Copenhagen, Denmark, Dec. 2022, 2022.\par \par B. Marshall, Curry, M., Correia, J., and Crossler, R. E., ?Machine Learning and Survey-based Predictors of InfoSec Non-Compliance?, ACM Transactions on Management Information Systems, vol. 13, no. 2, pp. 1-20, 2021.\par \par B. Marshall, Curry, M., Correia, J., and Crossler, R. E., ?Machine Learning and Survey-based Predictors of InfoSec Non-Compliance?, ACM Transactions on Management Information Systems, 2021.\par \par M. Curry, Marshall, B., and Crossler, R. E., ?Identifying potentially risky insider on-compliance using machine learning to assess multiple protection motivation behaviors?, in WISP2021: 2021 Workshop on Information Security and Privacy (WISP), 2019.\par \par M. Curry, Marshall, B., Correia, J., and Crossler, R. E., ?InfoSec Process Action Model (IPAM): Targeting Insider's Weak Password Behavior?, Journal of Information Systems, vol. 33, no. 3, pp. 201-225, 2019.\par \par M. Curry, Marshall, B., Crossler, R., and Correia, J., ?Fear Appeals Versus Priming in Ransomware Training?, in Pre-ICIS Workshop on Information Security and Privacy (WISP 2018), 2018.\par \par M. Curry, Marshall, B., Crossler, R. E., and Correia, J., ?InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior?, Data Base for Advances in Information Systems, vol. 49, no. SI, 2018.\par \par M. Curry, Marshall, B., and Kawalek, P., ?A Normative Model for Assessing SME IT Effectiveness?, Communications of the IIMA, vol. 15, no. 1, 2017.\par \par B. Marshall, Curry, M., Correia, J., and Crossler, R., ?Personal Motivation Measures for Personal IT Security Behavior?. 2017.\par \par M. Curry, Marshall, B., Raja, V. T., Reitsma, R., and Wydner, K., ?BA302: Microsoft Dynamics NAV ERP Exercise/Walkthrough?. p. 25, 2016.\par \par M. Curry, Marshall, B., and Crossler, R., ?Hope for change in individual security behavior assessments?, in 2016 Pre-ICIS Workshop on Accounting Information Systems, 2016.\par \par M. Curry and Marshall, B., ?Affordance Perception in Risk Adverse IT Adoption: An Agenda to Identify Drivers of Risk Consideration and Control Adoption in Individual Technology Choices?, in 2015 Pre-ICIS Workshop on Accounting Information Systems, 2015.\par \par M. Curry, Marshall, B., and Kawalek, P., ?Improving IT Assessment with IT Artifact Affordance Perception Priming?, International Journal of Accounting Information Systems, vol. 19, pp. 17-28, 2015.\par \par M. Curry, Marshall, B., and Kawalek, P., ?IT Artifact Bias: How exogenous predilections influence organizational information system paradigms?, International Journal of Information Management, vol. 34, no. 4, pp. 427-436, 2014.\par \par B. Marshall, Curry, M., and Kawalek, P., ?The Moderating Power of IT Bias on User Acceptance of Technology?, in Sixth Annual Pre-ICIS Workshop on Accounting Information Systems, Auckland, 2014.\par \par M. Curry and Marshall, B., ?Disentangling IT Artifact Bias?, 4th Annual Pre-ICIS Workshop on Accounting Information Systems. Orlando, Florida, 2012.\par \par M. Curry, ?IT Effectiveness Norms and Organizational Success: a Literature Review?, Doctoral Symposium. Manchester, UK, 2012.\par \par B. Marshall, Curry, M., and Reitsma, R., ?Organizational Information Technology Norms and IT Quality?, Communications of the IIMA, vol. 11, no. 4, 2011.\par \par B. Marshall, Curry, M., and Reitsma, R., ?Does Using CobiT Improve IT Solution Proposals??, in AAA Annual Meeting, IS Section, 2010.\par \par B. Marshall, Curry, M., and Reitsma, R., ?IT Governance Norms and IT Success?, in 2nd annual Pre?ICIS Workshop on Accounting Information Systems, December 2010, Saint Louis, MO, U.S.A., 2010.\par \par M. Curry, ?Internet Marketing: How to Use SEO and Social Networking to Reach Clients?, Monthly IMC PDX Meeting. Portland, OR, 2009.\par \par M. Curry, ?Lightening In a Bottle: Aligning Technology with Natural Area Goals and Strategy.?, Natural Areas Association 2009 Conference. Vancouver, WA, 2009.\par \par M. Curry, ?eConsulting to improve the client's bottom line.?, CONFAB: the Next Generation Consultant. Reno, NV, 2007.\par \par }