back to jjchryan homepage

Quick Links

GWU links

Publications and other stuff

Refereed Articles

  • Pettigrew, J. Andrew, and Julie Ryan, Making Successful Security Decisions: A Qualitative Evaluation, IEEE Security Privacy Magazine, Vol 10 (1), 2012
  • Amin, Rohan, Julie Ryan, and Johan Van Dorp, Detecting Targeted Malicious Email Using Persistent Threat and Recipient Oriented Features, IEEE Security Privacy Magazine, 2012, vol 10n3 (64-71)
  • Ryan, Julie J.C.H., Thomas A. Mazzuchi, Daniel J. Ryan, Juliana Lopez de la Cruz, Roger Cooke, Quantifying Information Security Risks Using Expert Judgment Elicitation, Computers and Operations Research, April 2012, v39 n4 (774-784)
  • Ryan, Julie J.C.H. and Daniel J. Ryan, Performance Metrics for Information Security Risk Management, IEEE Security and Privacy, vol. 6 no. 5, Sep/Oct 2008, pp. 38-44
  • Burgos, Carlos, Julie J.C.H. Ryan, and E. Lile Murphree, Jr, Through a Mirror Darkly: How Programmers Understand Legacy Code, Information Knowledge Systems Management, 2007, Vol. 6 Issue 3, p215-234
  • Al-Kahtani, Nouf, Julie J.C.H. Ryan, and Theresa I. Jefferson, How Saudi Female Faculty Perceive Internet Technology Usage and Potential, Information Knowledge Systems Management, 2005-2006, Vol. 5 Issue 4, p227-243
  • Ryan, Julie J.C.H. and Daniel J. Ryan, Expected Benefits of Information Security Investments, Computers and Security, Vol. 25, Issue 8. Amsterdam: Elsevier. Pages 579-588. (November 2006)
  • Ryan, Julie J.C.H., Use of Information Sharing Between Government and Industry as a Weapon, Journal of Information Warfare, Journal of Information Warfare
  • Ryan, Julie J.C.H. and Daniel J. Ryan, Proportional Hazards in Information Security, Risk Analysis, 25 no. 1 (February 2005): 141
  • Green, Annie and Julie J.C.H. Ryan, A Framework of Intangible Valuation Areas (FIVA): Aligning Business Strategy and Intangible Assets, Journal of Intellectual Capital, 6 no. 1 (2005): 43
  • Ryan, Julie J.C.H. and Corey D. Schou, On Security Education, Training and Certifications, Information Systems Control Journal, 6 (2004): 27
  • Ryan, Julie J.C.H., Information Security Tools and Practices: What Works?, IEEE Transactions on Computers, 53 no. 8 (August 2004): 1060
  • Ryan, Julie J.C.H., John Woloschek, and Barry Leven, Complexities in Conducting Information Warfare, Defense Intelligence Journal, vol 5 no. 1 (Spring 1996): 69

Essay

  • Ryan, Julie J.C.H., Why Plagiarism is So Tough to Curb, The Washington Post, Letter to the Editor, 14 December 2003
  • Ryan, Julie J.C.H., Political Engineering in Knowledge Security, VINE: The Journal of Information and Knowledge Management Systems, Vol. 36 No. 3 (Emerald Group Publishing Limited)
  • Ryan, Julie J.C.H., Managing Knowledge Security, VINE: The Journal of Information and Knowledge Management Systems, Vol. 36 No. 2 (Emerald Group Publishing Limited).
  • Ryan, Julie J.C.H., Knowledge Management Needs Security Too, VINE: The Journal of Information and Knowledge Management Systems, Vol. 36 No. 1 (Emerald Group Publishing Limited)

Monograph

  • Ryan, Julie J.C.H. and Gary Federici, Offensive Information Warfare: A Concept Exploration, Center for Naval Analyses, Alexandria, VA, 1996
  • Ryan, Julie J.C.H., Tom Thorley, and Gary Federici, Information Support to Military Operations in the Year 2000 and Beyond: Security Implications, Center for Naval Analyses, Alexandria, VA, 1993

Non-Refereed Article

  • Ryan, Daniel J. and Julie J.C.H. Ryan, The Perfect Graduate, The Information Leader: A Quarterly Journal on Information Trends, Information Resources Management College, National Defense University, Washington, DC. Winter 2007: Volume 12, No. 1.
  • Ryan, Julie J.C.H., Last Word: Stealing From Themselves, Prism Magazine, 13 no. 5 (January 2004)
  • Ryan, Julie J.C.H., Student Plagiarism in an On-Line World, Prism Magazine, (December 1998): cover story
  • Ryan, Daniel J. and Julie J.C.H. Ryan, Protection of Information – The Lessons of History, Colloquy, Vol. 19, No. 3 (September 1998): 21
  • Ryan, Daniel J. and Julie J.C.H. Ryan, Protecting The National Information Infrastructure Against Infowar, Colloquy, Vol. 17, No. 1 (July 1996): 14

Report

Invited Article

Law Review and Journal

Book Review

  • Ryan, Julie J.C.H, Review of 2025: Scenarios of U.S. and Global Society Reshaped by Science and Technology, by Joseph F. Coates, John B. Mahaffie, and Andy Hines, Rivers: Studies in the Science, Environmental Policy, and Law of Instream Flow, 6 no. 3 (1998): 222 – 224

Conferences & Workshops

Discussant

  • Ryan, Julie, Panel Discussion, Writing and Publishing on CyberSecurity, On February 12, GW Library and Vice Provost Geneva Henry hosted a panel discussion on “Writing and Publishing on Cybersecurity.” The panel explored the issues related to multidisciplinary research in cybersecurity, the challenges of communicating with a diverse audience, and other issues associated with academic endeavors related to cybersecurity. The panel members included Rhea Siers, scholar in residence and coordinator of the GW Cybersecurity Initiative; Prof. Diana Burley (GSEHD); Dr. Rohan Amin (EMSE graduate), and Prof. Julie Ryan (EMSE).

Paper Presentation

  • Ryan, Julie J.C.H., Phishers and Botnets and Worms, Oh My!, US Army Science Board, 12 October 2010.
  • Ryan, Julie J.C.H., Academic Integrity: The Difficult Conversation, Presentation made to several audiences

Proceeding

  • Ryan, Julie J.C.H. and Daniel J. Ryan, Credentialing the Digital and Multimedia Forensics Professional, American Academy of Forensics Sciences Annual Meeting 2014, Can be found listed on page 133 of the program, which can be found at the URL provided
  • Daniel J. Ryan & Julie J. C. H. Ryan, Attribution : Accountability for Cyber Incidents, Proceedings of the 2012 International Conference on Information Warfare, pp. 265-271. Seattle, WA: University of Washington, 2012
  • Ryan, Julie J.C.H and Daniel J. Ryan, Neutrality in the Context of Cyberwar, Proceedings of the Sixth International Conference on Information Warfare and Security, Washington, DC, 17-18 March 2011, 17-18 March 2011,
  • Ryan, Julie J. C. H., Daniel J. Ryan, Maeve Dion & Eneken Tikk, International Cyberlaw: A Normative Approach, Georgetown Journal of International Law, Accepted for publication, 2011 Symposium
  • Pettigrew, James A., Julie J.C.H. Ryan, Kyle Salous, and Thomas A. Mazzuchi, Decision Making by Effective Information Security Managers, Proceedings of the International Conference on Information Warfare and Security (ICIW 2010), Dayton, Ohio, March 2010.
  • Tolba, Ahmed, David Greenwood, and Julie Ryan, Promoting a Green Egypt Through the Design of a Sustainable Building Assessment Tool, Proceedings of the 2010 Industrial Engineering Research Conference, Cancun, Mexico, June 2010.
  • Schou, Corey, Julie Ryan, Leigh Armistead and James Frost, Schou, Corey, Julie Ryan, Leigh Armistead and James Frost, Proceedings of the 4th International Conference on Information Warfare, Cape Town, South Africa, March 27-28, 2009.
  • Ryan, Julie J.C.H. and Daniel J. Ryan, Understanding and Measuring Security Performance, Proceedings of the Information Security Compliance and Risk Management Institute Conference, University of Washington, June 2009.
  • Ryan, Julie J.C.H., Using the OODA Loop to Introduce Information Warfare to Students: A Tutorial, Proceedings of the Colloquium for Information Systems Security Education 2009, Seattle, Washington, June 2009.
  • Ryan, Julie J.C.H., Acquiring Software Systems for Secure Identity Management, Proceedings of the IDGA Identity Management Summit, July 2009.
  • Ryan, Julie J.C.H. and Daniel J. Ryan, Biological Systems and Models in Information Security, Proceedings of the 12th Colloquium for Information Systems Security Education, University of Texas, Dallas; Dallas, Texas, June 2-4, 2008
  • Polydys, Mary L., Daniel J. Ryan and Julie J. C. H. Ryan, Best Software Assurance Practices in Acquisition of Trusted Systems, Proceedings of the 10th Colloquium for Information Systems Security Education, University of Maryland, University Collage, Adelphi, MD, June 5-8, 2006.
  • Ryan, Julie J.C.H., Use of Information Sharing Between Government and Industry as a Weapon, Proceedings of the International Conference on Information Warfare and Security, University of Maryland Eastern Shore, 15-16 March 2006, pages 183 - 188
  • Ryan, Daniel J. and Julie J. C. H. Ryan, Daubert and Digital Forensics, Proceedings of the 2006 Cybercrime Conference. Palm Harbor, Florida: DoD Cyber Crime Center and Joint Task Force – Global Network Operations, January, 2006.
  • Ryan, Julie J.C.H., Managing the Detection Challenge, Proceedings of the Second Annual Alaska Information Assurance Workshop, August 2006.
  • Ryan, Julie J. C. H. and Daniel J. Ryan, Biological Systems and Models in Information Security, Proceedings of the Humanities and Technology Association Conference 2005. Orem, Utah: Utah Valley State College, October, 2005.
  • Ryan, Julie J.C.H., Quantifying Information Security Risks Using Expert Opinion Elicitation, Proceedings of the 2nd Japan – US Experts Workshop on Critical Information Protection (CIIP), June 2005.
  • Ryan, Julie J.C.H., Architecting Information Assurance, Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, Phoenix, Arizona, 2004. pg. 669.
  • Ryan, Julie J.C.H., ed., Proceedings of the First US-Japan Workshop on Critical Information Infrastructure Protection, published electronically October 2004
  • Ryan, Julie J.C.H., Teaching Information Security to Engineering Managers, Proceedings of the 33rd ASEE/IEEE Frontiers in Education Conference, Boulder, Colorado, November 2003.
  • Jefferson, Theresa I. and Julie J.C.H. Ryan, A Comparative Analysis of Privacy Policies of Popular E-Businesses, Proceedings of the 2003 ASEM National Conference, St. Louis, MO, 2003
  • Ryan, Julie J.C.H. and Theresa I. Jefferson, The Use, Misuse and Abuse of Statistics in Information Security Research, Proceedings of the 2003 ASEM National Conference, St. Louis, MO, 2003
  • Ryan, Julie J.C.H., The Effect of Public Budgetary and Policy Decisions on Development of Trusted Systems, Proceedings of the 2002 ASEM National Conference, Tampa, Florida, 2002, pp. 130 – 134
  • Ryan, Daniel J. and Julie J.C.H. Ryan, Institutional and Professional Liability in Information Assurance Education, Proceedings of the 2002 IEEE Workshop on Information Assurance at the United States Military Academy, West Point, NY, June 2002.
  • Ryan, Julie J.C.H., Information Assurance in Practice, Proceedings of the 2002 IEEE Workshop on Information Assurance at the United States Military Academy, West Point, NY, June 2002.
  • Ryan, Julie J.C.H., Information Warfare and the High Speed Computing Community, Proceedings from the Conference on High Speed Computing, April 1996, p 91-98.
  • Ryan, Daniel J. and Julie J.C.H. Ryan., Risk Management And Information Security, Proceedings of the Eleventh Annual Computer Security Applications Conference, Los Alamitos, CA: IEEE Computer Society Press, December 1995, 1995 (257 – 260).

Other

  • Ryan, Julie and Ryan, Daniel, Mini track on Cyber Security, Cyberwar and Cyberlaw, 9th International Conference on Cyber Warfare and Security ICCWS 2014, This mini-track featured four papers and a round-table discussion, led by the mini-track chairs.
  • National Research Council. Avoiding Technology Surprise for Tomorrow's Warfighter: A Symposium Report, National Academies Press, Washington DC, Committee For The Symposium On Avoiding Technology Surprise For Tomorrow’s Warfighter, 2009
  • David Butler, Jessica Buono, Frederick Erdtmann, Proctor Reid, Editors, Systems Engineering to Improve Traumatic Brain Injury Care in the Military Health System: Workshop Summary Workshop Steering Commitee on Systems Engineering Health Care: Tools and Technologies to Maximize the Effectiveness of Medical Mission Support to DOD, Eneken Tikk (2011) "10 Rules of Behavior for Cyber Security: Concept by Prof. Dan Ryan (National Defense University), Prof. Julie Ryan (George Washington University), Maeve Dion (Stockholm University), Eneken Tikk (NATO Cooperative Cyber Defence Centre of Excellence)." Tallinn (2011): CCD COE Publications ISBN: 0-309-12759-9, 184 pages, 6 x 9, (2008)

Non-Refereed Proceeding

Workshop

  • Ryan, Julie, GW-UCL Virtual Research Workshop, GW-UCL Virtual Research Workshop, After collaborating for two years, my University College London (UCL) colleague Sarah Bell and I coordinated with Lisa Benton-Short and the GWU Office of Sustainability to have a workshop that was partially virtual and partially in person. Over 40 people participated in both London and Washington, connected by telecommunications. There were also two people who came to Washington in person and one person who went to London. This workshop featured the presentation of many research foci and resulted in the development of joint research relationships between GWU and UCL.

Books

Book Chapters

  • Ryan, Julie J.C. and Daniel J. Ryan, Neutrality in the Context of Cyberwar, Case Studies in Information Warfare and Security for Researchers, Teachers, and Students, ISBN: 978-1-909507-06-7, Academic Conferences and Publishing International Limited Warren, Matthew (ed) pp 23-37
  • Ryan, Julie J.C.H., i-Warfare: Some Introductory Remarks, Leading Issues in Information Warfare and Security Research, ISBN: 978-1-908272-08-9 , Academic Publishing International, pp. iii - xxxi (29 pages)
  • Ryan, Julie J.C.H., Use of Information Sharing Between Government and Industry as a Weapon, Leading Issues in Information Warfare and Security Research, ISBN: 978-1-908272-08-9 , Academic Publishing International, pp 159 - 171
  • Ryan, Julie J.C.H., Daniel J. Ryan & Eneken Tikk, Cybersecurity Regulation: Using Analogies to Develop Frameworks for Regulation, International Cyber Security: Legal & Policy Proceedings, ISBN : 978-9949-9040-4-4, Eneken Tikk & Anna-Maria Talihärm (Ed.), (pp. 76-99), 2010, Tallinn, Estonia: Cooperative Cyber Defence Center of Excellence
  • Ryan, Julie J.C.H, Information Warfare: A Conceptual Framework, Seminar on Intelligence, Command, and Control (1996), ISBN : 1-879716-39-9,Proceedings of the 1996 Seminar on Intelligence, Command, and Control. Boston, MA: Harvard University Press, 1997
  • Ryan, Daniel J. and Julie J.C.H. Ryan, Protecting the NII, Information Warfare: Protecting Your Personal Security in the Electronic Age, ISBN : 978-1560251323, (New York: Thunder’s Mouth Press, 1994), 626

Presentations

Weblinks of interest