Byron Marshall

Orcid: 0000-0001-7109-6095

According to our database1, Byron Marshall authored at least 37 papers between 2003 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Machine Learning and Survey-based Predictors of InfoSec Non-Compliance.
ACM Trans. Manag. Inf. Syst., 2022

2019
InfoSec Process Action Model (IPAM): Targeting Insiders' Weak Password Behavior.
J. Inf. Syst., 2019

2018
InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior.
Data Base, 2018

2017
Personal Motivation Measures for Personal IT Security Behavior.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
Unraveling K-12 Standard Alignment: Report on a New Attempt.
Proceedings of the 16th ACM/IEEE-CS on Joint Conference on Digital Libraries, 2016

2015
Improving IT assessment with IT artifact affordance perception priming.
Int. J. Account. Inf. Syst., 2015

2014
IT artifact bias: How exogenous predilections influence organizational information system paradigms.
Int. J. Inf. Manag., 2014

2012
Can intermediary-based science standards crosswalking work? Some evidence from mining the standard alignment tool (SAT).
J. Assoc. Inf. Sci. Technol., 2012

2011
World vs. method: educational standard formulation impacts document retrieval.
Proceedings of the 2011 Joint International Conference on Digital Libraries, 2011

2010
Aspects of 'relevance' in the alignment of curriculum with educational standards.
Inf. Process. Manag., 2010

2009
Topological Analysis of Criminal Activity Networks: Enhancing Transportation Security.
IEEE Trans. Intell. Transp. Syst., 2009

Dimensional standard alignment in K-12 digital libraries: assessment of self-found vs. recommended curriculum.
Proceedings of the 2009 Joint International Conference on Digital Libraries, 2009

Delivering Value Beyond Efficiency with Visualized XBRL.
Proceedings of the International Conference on Information Systems, 2009

2008
Identifying Interesting Networks of Criminal Activity.
Proceedings of the Intelligence and Security Informatics, Techniques and Applications, 2008

Using importance flooding to identify interesting networks of criminal activity.
J. Assoc. Inf. Sci. Technol., 2008

Exploring educational standard alignment: in search of 'relevance'.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2008

2007
User-Centered Evaluation of Arizona BioPathway: An Information Extraction, Integration, and Visualization System.
IEEE Trans. Inf. Technol. Biomed., 2007

Standards or semantics for curriculum search?
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2007

2006
Aggregating Automatically Extracted Regulatory Pathway Relations.
IEEE Trans. Inf. Technol. Biomed., 2006

Moving digital libraries into the student learning space: The GetSmart experience.
ACM J. Educ. Resour. Comput., 2006

Matching knowledge elements in concept maps using a similarity flooding algorithm.
Decis. Support Syst., 2006

Using Importance Flooding to Identify Interesting Networks of Criminal Activity.
Proceedings of the Intelligence and Security Informatics, 2006

2005
Concept Matching in Informal Node-Link Knowledge Representations.
PhD thesis, 2005

Linking Ontological Resources Using Aggregatable Substance Identifiers to Organize Extracted Relations.
Proceedings of the Biocomputing 2005, 2005

Visualizing aggregated biological pathway relations.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2005

BorderSafe: Cross-Jurisdictional Information Sharing, Analysis, and Visualization.
Proceedings of the Intelligence and Security Informatics, 2005

Topological analysis of criminal activity networks in multiple jurisdictions.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

Coplink center: social network analysis and identity deception detection for law enforcement and homeland security intelligence and security informatics: a crime data mining approach to developing border safe research.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

BorderSafe: cross-jurisdictional information sharing, analysis, and visualization.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

Visualization in law enforcement.
Proceedings of the Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005

2004
EBizPort: Collecting and analyzing business intelligence information.
J. Assoc. Inf. Sci. Technol., 2004

A case-based reasoning framework for workflow model management.
Data Knowl. Eng., 2004

Extracting gene pathway relations using a hybrid grammar: the Arizona Relation Parser.
Bioinform., 2004

Element matching in concept maps.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2004

Analyzing and Visualizing Criminal Network Dynamics: A Case Study.
Proceedings of the Intelligence and Security Informatics, 2004

Cross-Jurisdictional Activity Networks to Support Criminal Investigations.
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004

2003
Convergence of Knowledge Management and E-Learning: The GetSmart Experience.
Proceedings of the ACM/IEEE 2003 Joint Conference on Digital Libraries (JCDL 2003), 2003


  Loading...