Drupal-Biblio47<style face="normal" font="default" size="100%">Do Measures of Security Compliance Intent Equal Non-Compliance Scenario Agreement?</style>Drupal-Biblio47<style face="normal" font="default" size="100%">Do Measures of Security Compliance Intent Equal Non-Compliance Scenario Agreement?</style>Drupal-Biblio13<style face="normal" font="default" size="100%">Will SOC Telemetry Data Improve Predictive Models of User Riskiness? A Work in Progress</style>Drupal-Biblio17<style face="normal" font="default" size="100%">Machine Learning and Survey-based Predictors of InfoSec Non-Compliance</style>Drupal-Biblio17<style face="normal" font="default" size="100%">Machine Learning and Survey-based Predictors of InfoSec Non-Compliance</style>Drupal-Biblio47<style face="normal" font="default" size="100%">Identifying potentially risky insider on-compliance using machine learning to assess multiple protection motivation behaviors</style>Drupal-Biblio17<style face="normal" font="default" size="100%">InfoSec Process Action Model (IPAM): Targeting Insider's Weak Password Behavior</style>Drupal-Biblio47<style face="normal" font="default" size="100%">Fear Appeals Versus Priming in Ransomware Training</style>Drupal-Biblio17<style face="normal" font="default" size="100%">InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior</style>Drupal-Biblio17<style face="normal" font="default" size="100%">A Normative Model for Assessing SME IT Effectiveness</style>Drupal-Biblio13<style face="normal" font="default" size="100%">Personal Motivation Measures for Personal IT Security Behavior</style>Drupal-Biblio7<style face="normal" font="default" size="100%">BA302: Microsoft Dynamics NAV ERP Exercise/Walkthrough</style>Drupal-Biblio47<style face="normal" font="default" size="100%">Hope for change in individual security behavior assessments</style>Drupal-Biblio47<style face="normal" font="default" size="100%">Affordance Perception in Risk Adverse IT Adoption: An Agenda to Identify Drivers of Risk Consideration and Control Adoption in Individual Technology Choices</style>Drupal-Biblio17<style face="normal" font="default" size="100%">Improving IT Assessment with IT Artifact Affordance Perception Priming</style>Drupal-Biblio17<style face="normal" font="default" size="100%">IT Artifact Bias: How exogenous predilections influence organizational information system paradigms</style>Drupal-Biblio47<style face="normal" font="default" size="100%">The Moderating Power of IT Bias on User Acceptance of Technology</style>Drupal-Biblio13<style face="normal" font="default" size="100%">Disentangling IT Artifact Bias</style>Drupal-Biblio13<style face="normal" font="default" size="100%">IT Effectiveness Norms and Organizational Success: a Literature Review</style>Drupal-Biblio17<style face="normal" font="default" size="100%">Organizational Information Technology Norms and IT Quality</style>Drupal-Biblio47<style face="normal" font="default" size="100%">Does Using CobiT Improve IT Solution Proposals?</style>Drupal-Biblio47<style face="normal" font="default" size="100%">IT Governance Norms and IT Success</style>Drupal-Biblio13<style face="normal" font="default" size="100%">Internet Marketing: How to Use SEO and Social Networking to Reach Clients</style>Drupal-Biblio13<style face="normal" font="default" size="100%">Lightening In a Bottle: Aligning Technology with Natural Area Goals and Strategy.</style>Drupal-Biblio13<style face="normal" font="default" size="100%">eConsulting to improve the client's bottom line.</style>