BibTeX records: Julie J. C. H. Ryan

download as .bib file

@inproceedings{DBLP:conf/hicss/SissonR16,
  author       = {Philip William Sisson and
                  Julie J. C. H. Ryan},
  editor       = {Tung X. Bui and
                  Ralph H. Sprague Jr.},
  title        = {Towards a Unified Theory of Knowledge Management {(KM)}},
  booktitle    = {49th Hawaii International Conference on System Sciences, {HICSS} 2016,
                  Koloa, HI, USA, January 5-8, 2016},
  pages        = {4313--4322},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/HICSS.2016.535},
  doi          = {10.1109/HICSS.2016.535},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/SissonR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cor/RyanMRCC12,
  author       = {Julie J. C. H. Ryan and
                  Thomas A. Mazzuchi and
                  Daniel J. Ryan and
                  Juliana Lopez de la Cruz and
                  Roger M. Cooke},
  title        = {Quantifying information security risks using expert judgment elicitation},
  journal      = {Comput. Oper. Res.},
  volume       = {39},
  number       = {4},
  pages        = {774--784},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.cor.2010.11.013},
  doi          = {10.1016/J.COR.2010.11.013},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cor/RyanMRCC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/PettigrewR12,
  author       = {James Pettigrew and
                  Julie J. C. H. Ryan},
  title        = {Making Successful Security Decisions: {A} Qualitative Evaluation},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {10},
  number       = {1},
  pages        = {60--68},
  year         = {2012},
  url          = {https://doi.org/10.1109/MSP.2011.128},
  doi          = {10.1109/MSP.2011.128},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/PettigrewR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/AminRD12,
  author       = {Rohan M. Amin and
                  Julie J. C. H. Ryan and
                  Johan Ren{\'{e}} van Dorp},
  title        = {Detecting Targeted Malicious Email},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {10},
  number       = {3},
  pages        = {64--71},
  year         = {2012},
  url          = {https://doi.org/10.1109/MSP.2011.154},
  doi          = {10.1109/MSP.2011.154},
  timestamp    = {Sun, 19 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AminRD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RyanR08,
  author       = {Julie J. C. H. Ryan and
                  Daniel J. Ryan},
  title        = {Performance Metrics for Information Security Risk Management},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {6},
  number       = {5},
  pages        = {38--44},
  year         = {2008},
  url          = {https://doi.org/10.1109/MSP.2008.125},
  doi          = {10.1109/MSP.2008.125},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RyanR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Ryan07,
  author       = {Julie J. C. H. Ryan},
  title        = {Plagiarism, Graduate Education, and Information Security},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {5},
  number       = {5},
  pages        = {62--65},
  year         = {2007},
  url          = {https://doi.org/10.1109/MSP.2007.119},
  doi          = {10.1109/MSP.2007.119},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Ryan07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iks/BurgosRM07,
  author       = {Carlos L. Burgos and
                  Julie J. C. H. Ryan and
                  Edward Lile Murphree},
  title        = {Through a mirror darkly: How programmers understand legacy code},
  journal      = {Inf. Knowl. Syst. Manag.},
  volume       = {6},
  number       = {3},
  pages        = {215--234},
  year         = {2007},
  url          = {http://content.iospress.com/articles/information-knowledge-systems-management/iks00102},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iks/BurgosRM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RyanR06,
  author       = {Julie J. C. H. Ryan and
                  Daniel J. Ryan},
  title        = {Expected benefits of information security investments},
  journal      = {Comput. Secur.},
  volume       = {25},
  number       = {8},
  pages        = {579--588},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.cose.2006.08.001},
  doi          = {10.1016/J.COSE.2006.08.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RyanR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iks/Al-KahtaniRJ06,
  author       = {Nouf K. M. Al{-}Kahtani and
                  Julie J. C. H. Ryan and
                  Theresa I. Jefferson},
  title        = {How Saudi female faculty perceive internet technology usage and potential},
  journal      = {Inf. Knowl. Syst. Manag.},
  volume       = {5},
  number       = {4},
  pages        = {227--243},
  year         = {2006},
  url          = {http://content.iospress.com/articles/information-knowledge-systems-management/iks00095},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iks/Al-KahtaniRJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Ryan04,
  author       = {Julie J. C. H. Ryan},
  title        = {Information Security Tools and Practices: What Works?},
  journal      = {{IEEE} Trans. Computers},
  volume       = {53},
  number       = {8},
  pages        = {1060--1063},
  year         = {2004},
  url          = {https://doi.org/10.1109/TC.2004.45},
  doi          = {10.1109/TC.2004.45},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/Ryan04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/Ryan04,
  author       = {Julie J. C. H. Ryan},
  title        = {Architecting information assurance},
  booktitle    = {Proceedings of the 23rd {IEEE} International Performance Computing
                  and Communications Conference, {IPCCC} 2004, April 15-17, 2004, Phoenix,
                  Arizona, {USA}},
  pages        = {669--673},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/PCCC.2004.1395131},
  doi          = {10.1109/PCCC.2004.1395131},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/Ryan04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics