InfoSec Process Action Model (IPAM): Targeting Insiders' Weak Password Behavior

Michael Curry, Byron Marshall, John Correia, Robert E. Crossler. InfoSec Process Action Model (IPAM): Targeting Insiders' Weak Password Behavior. J. Information Systems, 33(3):201-225, 2019. [doi]

@article{CurryMCC19,
  title = {InfoSec Process Action Model (IPAM): Targeting Insiders' Weak Password Behavior},
  author = {Michael Curry and Byron Marshall and John Correia and Robert E. Crossler},
  year = {2019},
  doi = {10.2308/isys-52381},
  url = {https://doi.org/10.2308/isys-52381},
  researchr = {https://researchr.org/publication/CurryMCC19},
  cites = {0},
  citedby = {0},
  journal = {J. Information Systems},
  volume = {33},
  number = {3},
  pages = {201-225},
}