Alma Cole


• Beachboard, Aytes, Cole, Hernandez, Mellor, & Massad “Improving Information Security Risk Analysis Practices for Small- and Medium-Sized Enterprises: A Research Agenda.” The Journal of Issues in Informing Science and Information Technology, Volume 5, 2008
• Cole, Mellor, Noyes “Botnets: Rise of the Machines” Conference Proceedings –6th Annual Security Conference, April 2007, Las Vegas, Nevada.
• Beachboard, Aytes, Cole, Hernandez, & Mellor “A Tentative Proposal: Improving Information Assurance Risk Analysis Models for Small- and Medium-Sized Organizations through Adoption of an Open Source Development Model.” Conference Proceedings of the 3rd annual conference on Information security curriculum development, Kennesaw


Dan Ryan


• Randall K. Nichols, Daniel J. Ryan & Julie J.C.H. Ryan (2000) Defending Your Digital Assets, New York: McGraw-Hill.
• Daniel J. Ryan, Ed., (1994) Redefining Security, Washington, DC: Joint Security Commission.
• Julie Ryan & Daniel Ryan (2013) “Neutrality in the Context of Cyberwar.” in Matthew Warren, Case Studies in Information Warfare and Security. Reading, UK: Academic Conferences and Publishing International Limited.
• Baker, David W., Brothers, Samuel I., Geradts, Zeno J., Lacey, Douglas S. Nance, Kara L., Ryan, Daniel J., Sammons, John E, and Stephenson, Peter (2012) “Digital Evolution: History, Challenges and Future Directions for the Digital and Multimedia Sciences Section.” In Douglas H. Ubelaker, Ed. (2012) Global Forensic Science: Current Issues - Future Directions. Colorado Springs: American Academy of Forensic Sciences.
• Julie J. C. H. Ryan, Daniel J. Ryan & Eneken Tikk (2010). “Cybersecurity Regulation: Using Analogies to Develop Frameworks for Regulation.” In Eneken Tikk & Anna-Maria Talihärm (Ed.), International Cyber Security: Legal & Policy Proceedings. (pp. 76-99). Tallinn, Estonia: Cooperative Cyber Defence Center of Excellence.
• Daniel J. Ryan (1998) “INFOSEC and INFOWAR: Considerations for Military Intelligence” in Oceana Publications, Cybercrime and Security. New York: Oxford University Press.
• Daniel J. Ryan & Julie J.C.H. Ryan (1996) “Protecting the National Information Infrastructure Against Infowar.” in Winn Schwartau, Information Warfare, 2nd. Ed. New York: Thunder’s Mountain Press.
• Daniel J. Ryan , Robert Shepherd, Jr., Julie J.C.H. Ryan & Enneken Tikk (2000-2013) Cases and Materials on CyberLaw, DVD, Pasadena, MD: Wyndrose Technical Group.
• Daniel J. Ryan & Julie J. C. H. Ryan (2013-2014) Cases and Materials on Scientific and Digital Evidence, DVD, Pasadena, MD: Wyndrose Technical Group.
• Daniel J. Ryan & Julie J.C.H. Ryan (1996-2013) Information Security Source Materials, DVD, Pasadena, MD: Wyndrose Technical Group.
• Co-Editor (with Dr. Julie J. C. H. Ryan), The George Washington University Journal of Information Security. Washington, DC: The George Washington University.
• Daniel J. Ryan & Julie J. C. H. Ryan (2012) Attribution : Accountability for Cyber Incidents. Proceedings of the 7th International Conference on Information Warfare and Security, pp. 265-271. Seattle, WA: University of Washington.
• Julie J. C. H. Ryan & Daniel J. Ryan. (March, 2011) Neutrality in the Context of Cyberwar. Proceedings of the 6th International Conference on Information Warfare and Security, pp. 221-7. George Washington University, Washington, DC, USA.
• Julie J.C.H. Ryan, Thomas A. Mazzuchi, Daniel J. Ryan, Juliana Lopez de la Cruz, and Roger Cooke (April, 2012) Quantifying Information Security Risks Using Expert Judgment Elicitation. Computers & Operations Research, Vol. 39, No. 4, Elsevier, pp. 774-784.
• Daniel J. Ryan , Maeve Dion, Eneken Tikk & Julie J. C. H. Ryan (Summer, 2011) International Cyberlaw: A Normative Approach. Georgetown Journal of International Law, Vol. 42, No. 4, pp. 1161-1197.
• Kara Nance & Daniel J. Ryan (January, 2011) Legal Aspects of Digital Forensics: A Research Agenda.” Proceedings of the 44th Hawaii International Conference on Systems Sciences, pp. 1-6.
• Julie J. C. H. Ryan & Daniel J. Ryan. (Sep/Oct 2008) Performance Metrics in Information Assurance Management. IEEE Security & Privacy Magazine, Vol. 6, No. 5, pp. 38-44.
• Julie J. C. H. Ryan & Daniel J. Ryan. (June, 2008) Biological Systems and Models in Information Security. Proceedings of the 12th Colloquium for Information Systems Security Education.
• Julie J. C. H. Ryan & Daniel J. Ryan. (November, 2006) Expected Benefits of Information Security Investments. Computers and Security, Vol. 25, Issue 8. Amsterdam: Elsevier. Pages 579-588.
• Mary L. Polydys, Daniel J. Ryan & Julie J. C. H. Ryan (2006) Best Software Assurance Practices in Acquisition of Trusted Systems. Proceedings of the 10th Colloquium for Information Systems Security Education, University of Maryland, University Collage, Adelphi, MD June 5-8, 2006
• B. Endicott-Popovsky, D. Ryan & D. Frincke. (September, 2005) The New Zealand Hacker Case: A Post Mortem. Proceedings of the Oxford Internet Institute Cybersafety Conference. Oxford, England: Oxford University.
• Daniel J. Ryan & Julie J. C. H. Ryan. (January, 2006) Daubert and Digital Forensics. Proceedings of the 2006 Cybercrime Conference. Palm Harbor, Florida: DoD Cyber Crime Center and Joint Task Force – Global Network Operations.
• Julie J. C. H. Ryan & Daniel J. Ryan. (2005) Proportional Hazards in Information Security. Risk Analysis: An International Journal, Vol. 25, No. 1, Society for Risk Analysis.
• Daniel J. Ryan (January, 2003) Product Liability for Security Software. IEEE Security & Privacy Magazine, Vol. 1, No. 1.
• Daniel J. Ryan & Gal Schpantzer (September 23-25, 2002 ) Forensic Readiness. Proceedings of the Forensics Workshop, University of Idaho, Moscow, Idaho.
• Daniel J. Ryan & Paul Proctor (December 19, 1995) Risk Management and Information Security. Proceedings: 11th Computer Security Applications Conference, New Orleans, Louisiana.
• Daniel J. Ryan (December, 1993) Evaluation, Certification and Accreditation of Computer Systems and Networks. Journal of the Information Systems Security Association, Vol. 1, No. 1.
• Daniel J. Ryan (Summer, 1984) The Work of the Court of Appeals: A Statistical Miscellany. 43 Md. L. Rev. 863.
• Daniel Ryan & Jolly Sienda (Oct. 17, 2011) How Prepared Will You Be for the Next Cyberrevolution? Homeland Security Today. http://www.hstoday.us/blogs/best-practices/blog/how-prepared-will-you-bewhen-the-next-cyberrevolution-occurs/d43bf7f3dc47c84ffd4822f40d9056cb.html
• Daniel J. Ryan & Julie J.C.H. Ryan (Winter, 2006) “he Perfect Graduate. The Information Leader: A Quarterly Journal on Information Trends, Vol. 12, No. 1, Washington, DC: Information Resources Management College.
• Mary Linda Polydys & Daniel J. Ryan (Fall, 2006) “nformation Resources Management: The Key to Effective Government and National Security. The Information Leader: A Quarterly Journal on Information
• Trends, Vol. 11, No.4. Washington, DC: Information Resources Management College.
• Daniel J. Ryan “Get the Picture”, Federal Computer Week, Apr. 30, 2001
• Daniel J. Ryan “Reality Check”, Federal Computer Week, Apr. 16, 2001
• Daniel J. Ryan “How to Protect Your Laptop”, Federal Computer Week, Oct. 16, 2000
• Daniel J. Ryan “Warding Off PC Spies, Federal Computer Week, Aug. 7, 2000
• Daniel J. Ryan “Cookies: Trick or Treat”, Federal Computer Week, June 19, 2000
• Daniel J. Ryan “Old-Fashioned Hacker Deceit”, Federal Computer Week, May 29, 2000
• Daniel J. Ryan “Spotting Mischief”, Federal Computer Week, Apr. 24, 2000
• Daniel J. Ryan “Making Passwords Secure”, Federal Computer Week, Apr. 10, 2000
• Daniel J. Ryan “The Composition Problem”, Federal Computer Week, March 20, 2000
• Daniel J. Ryan (February, 1999) Business Value and Third-Generating Outsourcing. Science Applications International Corporation.
• Daniel J. Ryan & Julie J.C.H. Ryan (September, 1998) Protection of Information: The Lessons of History. Colloquy, Vol. 19, No. 3, Security Affairs Support Association.
• Daniel J. Ryan & Julie J.C.H. Ryan (July, 1996) Protecting the National Information Infrastructure against INFOWAR. Colloquy, Vol. 17, No. 1, Security Affairs Support Association.
• Daniel J. Ryan (May, 1993) Economic Implications of Information Security Failures. Colloquy, Vol. 14, No. 1, Security Affairs Support Association.
• Daniel J. Ryan (1989) A White Paper on Prototyping: A New System Acquisition Methodology. Booz Allen & Hamilton White Paper Series.
• Daniel J. Ryan (1971) “Cohn-Vossen’s Extension of the Gauss-Bonnet Theorem to Non-Compact Spaces”, Master’s Thesis, University of Maryland.
• Daniel J. Ryan (1969) “The Angle Between PRI-Ambiguity Isochrones”, Cryptologic Mathematician Certification Program, National Security Agency.
• Daniel J. Ryan (1969) “Random Number Generators”, Data Systems Certification Program, National Security Agency.
• Daniel J. Ryan (1969) “The Distance Between PRI-Ambiguity Isochrones”, Cryptologic Mathematician Certification Program, National Security Agency.
• Daniel J. Ryan (1969) “Generation of Unambiguous Isochrones”, Cryptologic Mathematician Certification Program, National Security Agency.
• Daniel J. Ryan (1968) “PRI Ambiguity resolution”, Cryptologic Mathematician Certification Program, National Security Agency.
• Daniel J. Ryan (1968) “Position Fixing Using Time of Arrival”, Cryptologic Mathematician Certification Program, National Security Agency.
• 2/21/14 “Credentialing the Digital and Multimedia Forensics Professional.” 66th Annual Convention of the American Academy of Forensic Sciences. Seattle, WA.
• 10/23/13 “Cyberwar and the Laws of Armed Conflict.” Swedish Delegation, National Defense University. Washington, DC.
• 10/16/13 Panelist. “Methods to Apply Digital Forensics and Mitigate Cyber Risk.” FCW Executive Briefs, Examining Insider Threats, Digital Forensics, and Incident Response. National Press Club, Washington, DC.
• 9/24/13 Invited lecture, “Certification of Digital and Multimedia Professionals.” Third Annual (ISC)2 Security Congress. Chicago, Illinois.
• 9/17/13 Panelist. “Holistic Cyber Security Education: Balancing Breadth and Depth. 2013 NICE Workshop. National Institute of Standards and Technology. Gaithersburg, Maryland.
• 8/5/13 Invited lecture.”Cyberlaw.” National Defense University.
• 3/12/13 Panelist. “Forensic Readiness from a Legal Viewpoint.” 2013 Annual Conference of the Association of Digital Forensics, Security and Law. Richmond, VA.
• 3/11/13 Invited lecture, “Certification of Digital and Multimedia Professionals.” 2013 Annual Conference of the Association of Digital Forensics, Security and Law. Richmond, VA.
• 3/23/12 Panel Moderator: “Legal Issues in Information Warfare.” 2012 International Conference on Information Warfare. University of Washington: Seattle, WA.
• 2/15/12 “Current Events in CyberLaw” Harford Community College: Bel Air, MD.
• 1/26/12 “In the Path of Heracles: Admissibility of Digital and Multimedia Evidence.” 2012 DoD Cybercrime Conference. Atlanta, GA.
• 2/24/11 Panel Moderator, "Digital and Multimedia Forensics." 63d Annual Scientific Meeting, American Academy of Forensic Sciences. Chicago, IL.
• 2/10/11 "Cyberwar: The Laws of Armed Conflict in Cyberspace." ISSCA. Edmonton, Alberta, Canada.
• 2/10/11 "Information Security Curricula," Concordia University College of Alberta. Edmonton, Alberta, Canada.
• 10/14/10 “Cyber Incidents: The Spectrum of Possible Legal Responses,” Conference on Cyberlaw as an Element of National Power. National Defense University. Washington, DC.
• 9/9/10 Moderator, Keynote Legal Conversation. 3d Annual Washington, D.C. Space and Cyber Conference, University of Nebraska College of Law, Newseum, Washington, DC. With Col. Gary Brown, USAF, Senior Legal Advisor, United States CyberCorps, and Marc Berejka, Senior Advisor to the Secretary, Dept. of Commerce.
• 8/11/10 “Methods of Uniting a Diverse and Global Student Population in Online Courses.” Conference on Concepts and Challenges in Online Learning. Morgan State University, Baltimore, Maryland.
• 6/18/10 “Cybersecurity Regulation: Using Analogies to Develop Frameworks for Regulation”, 2010 Conference on Cyber Conflict, Cooperative Cyber Defence Center of Excellence, Tallinn, Estonia
• 9/16/09 “Biological Models in Information Security Risk management” Information Security Compliance and Risk Management Institute, Seattle, Washington
• 9/9/09 “Legal Responses to Cyber Incidents” International Cyber Conflict Legal and Policy Conference, Tallinn, Estonia
• 9/8/09 “Cyberlaw: The United States Approach” Cooperative Cyber Defense Center of Excellence, Tallinn, Estonia
• 6/3/09 “Quantitative Risk management for Information Assurance” 13th Annual Colloquium for Information Systems Security Education. Seattle, Washington
• 10/1/08 “IA Governance” SecureWorld 2008 Conference, Washington, DC
• 5/8/08 “Law and Behavior in Cyberspace” Institute for National Security Education & Research, University of Washington, Seattle, WA.
• 2/13/08 “Information Assurance Overview and Historical Lessons Learned” National Academies of Science, SOCOM Standing Committee), Washington, DC
• 12/3/07 “New Directions in CyberLaw” Federal Communications Commission, Washington, DC
• 9/18/07 “Risk Management in Information Assurance” Information Security Compliance and Risk management Institute, University of Washington, Seattle, WA.
• 6/19/07 “Risk Management in Information Assurance” Information Assurance Center, West Chester University of Pennsylvania, West Chester, PA
• 6/14/07 “Digital Forensics” National Resource Judges Program, University of Washington School of Law, Seattle, Washington
• 5/9/07 “Information Assurance: Is the Threat of Terrorism Real?” GOVSEC, Washington, DC (with Dr. Dorothy Denning, Naval Post-Graduate School)
• 4/9/07 “Public Policy and Law in Cyberspace” 3d Annual Information Assurance Symposium, Hampton University, Hampton Roads, VA
• 3/6/07 “SCADA Systems and the Law” Center for Information Assurance and Cybersecurity, University of Washington, Seattle, Washington
• 10/26/06 “Security Certification,” Federal Information Assurance Conference (FIAC) 2006, Adelphi,  Maryland
• 10/4/06 “CyberLaw: Ethics, Morality and Law in the Information Age” Federal IT Summit, FDIC Training Center, Arlington, VA
• 9/5/06 “Daubert and Digital Forensics,” 2006 Alaska Information Assurance Workshop, University of Alaska at Fairbanks, Fairbanks, Alaska
• 8/15/06 “Institutional and Professional Liability in Information Assurance Education”, Invited Keynote Speech, Eastern Pennsylvania Security Conference (EPASEC), West Chester University of Pennsylvania, West Chester, PA
• 8/14/06 “Daubert and Digital Forensics,” Eastern Pennsylvania Security Conference (EPASEC), West Chester University of Pennsylvania, West Chester, PA
• 6/5/06 “Institutional and Professional Liability in Information Assurance Education”, 10th Colloquium on Information Systems Security Education, University of Maryland University College, Adelphi, MD
• 4/27/06 “Protecting Critical Infrastructure: Data Security,” GOVSEC 2006, Washington, DC
• 3/8/06 “Federal Information Security trends and Directions,” FOSE 2006, Washington, DC
• 1/12/06 “Daubert and Digital Forensics,” 2006 Cybercrime Conference. Palm Harbor, Florida.
• 11/25/05 "Homeland Security and Information Warfare" 6th Annual conference on Information Warfare and Information Operations Conference, Deakins University, Geelong, Australia.
• 11/21/05 “Biological Systems and Models in Information Security”, IEEE, Adelaide, Australia.
• 11/21/05 "The Ideal Graduate" 1st annual Colloquium for Information Systems Security Education (Asia Pacific), Adelaide, Australia.
• 11/10/05 “Critical Infrastructure Protection, Information Assurance and Cyberlaw”. West Chester University of PA, Graduate Business Technology Center, West Chester, PA.
• 11/7/05 “CyberLaw and Information Assurance”, Hampton University, Hampton Roads, VA
• 10/25/05 “Voodoo INFOSEC”, University of Alaska at Fairbanks, Fairbanks, Alaska
• 10/13/05 “CyberLaw in Information Assurance”, Invited Lecture, Towson University, Baltimore, Maryland
• 10/7/05 “Biological Systems and Models in Information Security”, Humanities and Technology Association Conference 2005, Salt Lake City, Utah
• 6/6/05 “Teaching Information Assurance Policy and Cyberlaw”, Colloquium on Information Systems Security Education, Atlanta, GA.
• 1/7/05 “CyberLaw in Information Assurance”, Invited Lecture, Naval Post-Graduate School, Monterey, CA.
• 1/6/05 “Statistical Methods in Information Assurance”, Invited Lecture, Naval Post-Graduate School, Monterey, CA.
• 10/19/04 “Cyber Security and Academia”, (ISC)2 Institute, McLean, VA
• 9/15/04 “New Directions in Cyberlaw”, Harford Information Technology Network, Harford Community College, Aberdeen, MD
• 6/22/04 “Cyberlaw Update: Ethics, Morality and Law in the Information Age, Veterans’ Administration INFOSEC Conference, Atlanta, GA
• 6/7/04 “Institutional and Professional Liability in Information Assurance Education”, Colloquium on Information Systems Security Education, United States Military Academy, West Point, NY
• 4/30/04 “Recent Developments in CyberLaw”, Cybersecurity ’04, Norwalk Community College, Norwalk, CT
• 3/31/04 “Cryptology and the Law”, University of Maryland University College, College Park, MD
• 12/16/03 “Cyberlaw Update: Ethics, Morality and Law in the Information Age”, IEEE, Historical Electronics Museum, Baltimore, MD
• 6/26/03 “Cyberlaw Update: Ethics, Morality and Law in the Information Age, Veterans’ Administration INFOSEC Conference, San Francisco, CA
• 6/4/03 “New Directions in Cyberlaw”, Colloquium on Information Systems Security Education, Washington, D. C.
• 6/3/03 “A Research Agenda for Information Security”, Colloquium on Information Systems Security Education, Washington, D. C.
• 6/2/03 “Teaching Information Assurance Policy and Cyberlaw”, Colloquium on Information Systems Security Education, Washington, D. C.
• 5/14/03 “Teaching Information Security”, Maryland Association of Community Colleges, Columbia, Maryland
• 3/18/03 “National Perspectives on Cybersecurity”, National Security Institute, Eastern Michigan University
• 10/12/02 “Cyberlaw Tuneup”, 3d Annual George Washington University, Information Security Conference, Washington, D. C.
• 10/5/02 “Preserving Individual Liberty in an Age of Cybercrime and Terrorism”, International Association of Administrative Professionals, Philadelphia, Pennsylvania
• 9/24/02 “Legal Issues in Digital Forensics”, Forensics Workshop, University of Idaho, Moscow, Idaho
• 9/19/02 “Creating a Comprehensive Program for Information Security”, 5th Science in Savannah Symposium, Armstrong Atlantic State University, Savannah, Georgia
• 7/19/02 “Detecting and Deterring Fraud”, National Association of Federal Credit Unions, Seattle, Washington
• 6/19/02 "The Right to Know: Sharing Exploits, Personal Data, and Other Information", Panel Discussion, United States Military Academy
• 6/12/02 “Security in an Era of Globalization”, Eastern Michigan University, Ypsilanti, Michigan
• 6/3/02 “Liability in Information Assurance Education”, National Colloquium for Information Systems Security Education, Seattle, Washington
• 5/21/02 “Information Security Education”, Information Systems Security Association, Ashburn, VA
• 5/14/02 “New Directions in CyberLaw”, VA Security Conference, New Orleans, LA
• 3/1/02 “New Directions in CyberLaw”, FAA/TRW, Washington, D. C.
• 2/22/02 “The Internet: Advantages and Security Risks”, NAFCU, Orlando, FL
• 11/14/01 “New Directions in CyberLaw”, HTCIA, Washington, D. C.
• 10/2/01 “Litigation Risk”, Department of Commerce, Washington, D. C.
• 5/11/01 “Privacy and Security”, IFC Technical Conference, Washington, D. C.
• 5/1/01 “Jurisdiction in Cybercrime”, National Institute for Government Innovation, Washington, D. C.
• 4/25/01 “New Directions in CyberLaw”, FBI Infraguard, Buffalo, NY
• 4/12/01 “New Directions in CyberLaw”, National Security Agency, Ft. Meade, Maryland
• 1/18/01 “New Directions in CyberLaw”, Association of Old Crows, Ft. Meade, Maryland
• 12/7/00 “Defending Your Digital Assets”, George Washington University Technology Program for Industry, Ashburn, VA
• 12/5/00 “Risk Management”, Privacy and Security Summit, Washington, DC
• 11/10/00 “Information Security and the Law”, TIPS Seminar, Stewart Technologies, Tampa, FL
• 11/6/00 “New Directions in CyberLaw”, International Finance Corporation, Washington, DC
• 10/18/00 “Combating Cyber Crime: Investigation & Prosecution”, National Institute for Government Innovation, Las Vegas, NV
• 10/6/00 “Engineering Management and Cyberspace”, American Society for Engineering Management, Washington, DC
• 8/10/00 “Electronic Commerce and CyberLaw”, Fannie Mae, Washington, DC
• 8/7/00 “Information Security and the Law”, Housing Roundtable, e-Original,Tampa, FL
• 7/12/00 “Legal Implications of Information Operations and Assurance”, e-Government Conference, Washington, DC
• 6/19/00 “Expert Testimony in Cybercrime Cases”, National Institute for Government Innovation, Washington, DC
• 6/14/00 “E-Commerce, E-Government and Public Key Infrastructures”, Mortgage Bankers Association, Washington, DC
• 4/27/00 “E-Commerce, E-Government and Public Key Infrastructures”, Armed Forces Electronics and Communications Association, Ft. Meade, Maryland
• 4/26/00 “Computer and Network Security”, George Washington University Technology Conference, Ashburn, VA
• 2/4/00 “Issues regarding a successful partnership of Government, Industry, and Academia for Information Security”, Federal Computer Week Conference, Washington, DC
• 1/24/00 “Determining the Applicable Jurisdiction in Cybercrimes”, National Summit on Cybercrime, Washington, DC
• 9/16/99 “Encryption and e-Government”, IRMCO, Williamsburg, VA
• 6/25/99 “Protecting the National Information Infrastructure”, Joint DoD-DCI Security Commission, Washington, DC
• 2/18/99 “Information Security: Challenges and Strategies”, Oceana Conference, Miami, FL
• 2/2/99 “Trade Secrets, Information Security and Industrial Espionage”, American Bar Association, New York City
• 1/26/99 “Information Security: Challenges and Strategies”, International Security Management Association, West Palm Beach, FL


Eric Eskelsen


• "Guidelines for Secure Use of Social Media by Federal Departments and Agencies", September 2009, available at https://cio.gov/wpcontent/uploads/downloads/2012/09/Guidelines_for_Secure_Use_Social_Media_v01-0.pdf


Steven Hernandez


• Official (ISC)2 Guide to the CISSP CBK, Third Edition. Lead Editor and Author 2013.
• Official (ISC)2 Guide to the ISSAP CBK, Second Edition. Technical Editor 2013.
• Improving Information Assurance Risk Analysis Models for Small and Medium Sized Organizations: A Research Agenda. Author 2008.


Jonathan Lawson


• Robert Bloomfield, Twayne English Authors Series. Boston: G.K. Hall and Company, 1980. Collected Poems (1800-1822) by Robert Bloomfield, 5 vol. in one. Gainesville, Florida: Scholars' Facsimiles and Reprints, 1971.
• In progress: Regional Accreditation in the United States: It’s History and Future.
• "Redesigning Post-Tenure Review: Meeting Accreditation Requirements," with Ann S. Hunter. In Post-Tenure Faculty Review and Renewal: Experienced Voices -- Creative Solutions. AAHE, 2002.
• "Robert Bloomfield," British Romantic Poets (1789-1832) First Series. Ed. John Greenfield. In Dictionary of Literary Biography. Detroit, New York, London: Bruccoli Clark Layman, Gale Research Company, 1990.
• Winona State University Campus Plan 1983-1993 with James Reynolds, Winona State University, 1984. Presented to State University Board and State Legislature.
• "Robert Bloomfield," Reader's Encyclopedia of English Literature. Ed. Edgar Johnson. New York: Thomas Y. Crowell, 1979.
• "The Survival of English, A Review," Rhetoric Society Quarterly, Vol. 5, No. 1, January, 1975. Associate Editor, The Rhetoric Society Quarterly, 1974-79.
• Editorial Consultant and Pre-publication Reviewer, 1974-- : Harcourt Brace Jovanovich, D. C. Heath, Little Brown, Random House, Scott Foresman, St. Martins, and Wadsworth. (Field editing or pre-publication reviews of over twenty composition and literature texts).
• “Resonant Leadership,” A Presentation for the Academic Administration at the College of Southern Idaho, December 2, 2009.
• “Centers for Teaching and Learning,” Moderator and presenter, AASCU Academic Affairs Winter Meeting, San Diego, CA, February 7, 2005. (Invited paper).
• "The Local Impact of the Politics of Evaluation," speaker/panelist, Plenary Session, Commission On Colleges and Universities, Northwest Association of Schools and of Colleges and Universities, Bellevue, Washington, December 14, 2002.
• "Responding to Evaluation Issues and Accreditation Expectations -- Which Way to Go: Post Tenure Review or Enhanced Annual Review?" moderator and panelist with Dean Linda Hatzenbuehler et at, AAHE Conference of Faculty Roles and Rewards, Tampa, February 2, 2001. (Invited Presentation).
• "Working with Faculty -- Core Education: Facilitating Change," with Rita Rice Morris, AASCU/AARC Winter Meeting, New Orleans, LA, February 10, 2001. (Invited presentation).
• "Accreditation: Swimming in Alphabet Soup or Institutional Opportunity,: with Rita Rice Morris, AASCU/AARC Winter Meeting, San Diego, CA, February 14, 2000. (Invited presentation).
• “Making Lists; Setting Goals: A Collaborative Planning Process for Faculty and Administrators,” with Dr. Linda Hill, Faculty Senate Chair and Dean Ranaye Marsh, Sixth Annual AAHE Conference on Faculty Roles and Rewards, Orlando, FL, February 1, 1998.
• “An Innovative Approach to Study in Japan,” Coleman, Narduzzi, Lawson, Colarulli, International Education Forum, 1994. (Book Chapter).
• “Accreditation and Post Secondary Review Entities (SPREs),” Commission Chair's address at the Annual Meeting, New England Association of Schools and Colleges, Boston, MA, December 8, 1994.
• “Articulating Values and Vision in a Comprehensive University,” with Dr. Elizabeth McDaniel, 32nd Annual Meeting of the Association for General and Liberal Studies, Columbus, OH, October 8-10, 1992. (Invited paper).
• "Second State Board of Education Symposium: Accountability," Moderator, with Robert D. Kennedy, CEO and Chairman of the Board, Union Carbide Corporation; James R. Oglesby, President, National School Boards Association and David Hornbeck, Chairman of the Board, Carnegie Foundation for the Advancement of Teaching, University of Hartford, March 6, 1990.
• "The Hartford Half-Tuition Plan: Access for Inner-City Students," an interview with Jeff Cole, New England Sunday Morning, WFSB Television, October 29, 1989.
• "Beyond Those Boundaries: A Liberal Education Curriculum," with Dr. G. C. Colarulli, 27th Annual Meeting of the Association for General and Liberal Studies, Cincinnati, OH, October 29-31, 1988. (Invited paper).
• "Pulling the Levers: A Seminar on the Practical Aspects of Academic Administration," presented to the 1987 - 88 ACE Fellows Class, Mission Inn, Howie-in-the-Hills, FL, January, 1987. (Invited paper).
• "Liberal Education in the Late 1980's," Plenary Address to the 16th Annual Conference of the New England Transfer Articulation Association, Newport, RI, April, 1987. (Speaker).
• "General Education Reform in a Comprehensive University: Lessons Along the Way," with Dr. G. C. Colarulli. Association for General and Liberal Education, Atlanta, GA, November, 1985. (Invited Paper).
• "The Winona/Rochester Higher Education Controversy," a panel discussion with Ron Semple, Publisher, Winona Daily News, Dr. Andrew Edin, Chair and John Marshall Hobbes, Executive Director, Winona Area Chamber of Commerce, Group W Cable. November, 1983.
• "Liberal Learning and the Professions: A Discussion of the Influence of the Humanities on Higher Education." Part one of a four part radio series sponsored by the University of Minnesota Rochester Center and broadcast by Minnesota Public Radio, KLSE, February, 1983. (Series rebroadcast by MPR on Morning Edition and Midday, Summer, 1983.) (Discussant).
• "A Symposium on Basic Writing Skills," sponsored by the departments of English and Philosophy and the Rhetoric Society Quarterly, SCSU, 1979. (Moderator).
• "Who's Afraid of Virginia Woolf: An Actor's Viewpoint," SCSU Theater Department Symposium in conjunction with Edward Albee's brief residency, 1979. (Discussant).
• "A Symposium on Hirsh's The Philosophy of Composition," Minnesota Council of Teachers of English, Rochester, MN, Spring, 1978. (Moderator).
• "Who Should Teach Freshman Composition? The Professional and Ethical Dilemma of Staffing," Wyoming Conference on Freshman and Sophomore English, University of Wyoming, July, 1977. ERIC
• "Adopting Freshman English Texts: Unified Adoptions vs. Fragmentation," Wyoming Conference on Freshman and Sophomore English, University of Wyoming, July, 1976. ERIC
• "Graduate Admissions, Fact or Fancy?" American Association of Collegiate Registrars and Admissions Officers, Dallas, April, 1969. Abstract in College and University, Vol. 44, No. 4, 1969. (Panelist).


Julie Ryan


• Ryan, Julie J.C.H. (ed). Leading Issues in Information Warfare and Security Research (Vol 1). Reading, UK: Academic Publishing International, Ltd, 2011.
• Nichols, Randall K, Daniel J. Ryan, and Julie J.C.H. Ryan. Defending Your Digital Assets Against Hackers, Crackers, Spies, and Thieves. New York: McGraw Hill, 2000.
• Ryan, Julie J.C.H. and Gary Federici. Offensive Information Warfare: A Concept Exploration. Alexandria, VA: Center for Naval Analyses, 1996.
• Ryan, Julie J.C.H., Tom Thorley, and Gary Federici. Information Support to Military Operations in the Year 2000 and Beyond: Security Implications. Alexandria, VA: Center for Naval Analyses, 1993.
• Amin, Rohan, Julie Ryan, and Johan Van Dorp (2012). “Detecting Targeted Malicious Email Using Persistent Threat and Recipient Oriented Features”. IEEE Security & Privacy Magazine May-June 2012 v10 n 3 (64-71).
• Ryan, Julie J.C.H., Thomas A. Mazzuchi, Daniel J. Ryan, Juliana Lopez de la Cruz, Roger Cooke. “Quantifying Information Security Risks Using Expert Judgment Elicitation”, Computers and Operations Research, April 2012, v39 n4 (774-784) (ISSN: 03050548; DOI: 10.1016/j.cor.2010.11.013)
• Pettigrew, J. Andrew, and Julie Ryan. (2012) “Making Successful Security Decisions: A Qualitative Evaluation.” IEEE Security Privacy Magazine Jan-Feb 2012 v10 n1 (60-68).
• Ryan, Daniel J., Maeve Dion, Eneken Tikk & Julie J. C. H. Ryan (Summer, 2011) "International Cyberlaw: A Normative Approach." Georgetown Journal of International Law, Vol. 42, No. 4, pp. 1161-1197.
• Ryan, Julie J.C.H. and Daniel J. Ryan, "Performance Metrics for Information Security Risk Management," IEEE Security and Privacy, vol. 6 no. 5, Sep/Oct 2008, pp. 38-44.
• Burgos, Carlos, Julie J.C.H. Ryan, and E. Lile Murphree, Jr. “Through a Mirror Darkly: How Programmers Understand Legacy Code,” Information Knowledge Systems Management, 2007, Vol. 6 Issue 3, p215-234.
• Al-Kahtani, Nouf, Julie J.C.H. Ryan, and Theresa I. Jefferson. “How Saudi Female Faculty Perceive Internet Technology Usage and Potential,” Information Knowledge Systems Management, 2005-2006, Vol. 5 Issue 4, p227-243.
• Ryan, Julie J.C.H. and Daniel J. Ryan. “Expected Benefits of Information Security Investments,” Computers and Security, Vol. 25, Issue 8. Amsterdam: Elsevier. Pages 579-588. (November 2006). (http://www.sciencedirect.com/science/article/B6V8G-4KXDR1G-1/2/f3dbf2660eab68ae4bf87dde49b7f687)
• Ryan, Julie J.C.H. “Use of Information Sharing Between Government and Industry as a Weapon,” Journal of Information Warfare 5 no 2 (2006): 1 – 10.
• Ryan, Julie J.C.H. and Daniel J. Ryan. “Proportional Hazards in Information Security,” Risk Analysis 25 no. 1 (February 2005): 141.
• Green, Annie and Julie J.C.H. Ryan. “A Framework of Intangible Valuation Areas (FIVA): Aligning Business Strategy and Intangible Assets,” Journal of Intellectual Capital 6 no. 1 (2005): 43.
• Ryan, Julie J.C.H. and Corey D. Schou. “On Security Education, Training and Certifications,” Information Systems Control Journal 6 (2004): 27.
• Ryan, Julie J.C.H. “Information Security Tools and Practices: What Works?” IEEE Transactions on Computers 53 no. 8 (August 2004): 1060.
• Ryan, Julie J.C.H. “Review of 2025: Scenarios of U.S. and Global Society Reshaped by Science and Technology, by Joseph F. Coates, John B. Mahaffie, and Andy Hines,” Rivers: Studies in the Science, Environmental Policy, and Law of Instream Flow 6 no. 3 (1998): 222 – 224.
• Ryan, Julie J.C.H., John Woloschek, and Barry Leven. "Complexities in Conducting Information Warfare," Defense Intelligence Journal, vol 5 no. 1 (Spring 1996): 69.
• Ryan, Julie J.C.H., Daniel J. Ryan & Eneken Tikk (2010). “Cybersecurity Regulation: Using Analogies to Develop Frameworks for Regulation.” In Eneken Tikk & Anna-Maria Talihärm (Ed.), International Cyber Security: Legal & Policy Proceedings. (pp. 76-99). Tallinn, Estonia: Cooperative Cyber Defence Center of Excellence.
• Ryan, Julie J.C.H. “Information Warfare: A Conceptual Framework,” Proceedings of the 1996 Seminar on Intelligence, Command, and Control. Boston, MA: Harvard University Press, 1997.
• Ryan, Daniel J. and Julie J.C.H. Ryan, “Protecting the NII,” in Information Warfare: Cyberterrorism: Protecting Your Personal Security in the Electronic Age (New York: Thunder’s Mouth Press, 1994), 626.
• Daniel J. Ryan & Julie J. C. H. Ryan (2012) Attribution : Accountability for Cyber Incidents. Proceedings of the 2012 International Conference on Information Warfare, pp. 265-271. Seattle, WA: University of Washington.
• Ryan, Julie J.C.H and Daniel J. Ryan. “Neutrality in the Context of Cyberwar”, Proceedings of the Sixth International Conference on Information Warfare and Security, 17-18 March 2011, Washington, DC. Published on CD-ROM by ACI Ltd.
• Ryan, Julie J. C. H., Daniel J. Ryan, Maeve Dion & Eneken Tikk (March, 2011) "International Cyberlaw: A Normative Approach." Accepted for publication, Georgetown Journal of International Law, 2011 Symposium.
• Pettigrew, James A., Julie J.C.H. Ryan, Kyle Salous, and Thomas A. Mazzuchi, “Decision Making by Effective Information Security Managers”, Proceedings of the International Conference on Information Warfare and Security (ICIW 2010), Dayton, Ohio, March 2010.
• Tolba, Ahmed, David Greenwood, and Julie Ryan, “Promoting a Green Egypt Through the Design of a Sustainable Building Assessment Tool”, Proceedings of the 2010 Industrial Engineering Research Conference, Cancun, Mexico, June 2010.
• Schou, Corey, Julie Ryan, Leigh Armistead and James Frost. “Developing Curriculum in Information Operations: The First Steps” Proceedings of the 4th International Conference on Information Warfare, Cape Town, South Africa, March 27-28, 2009.
• Ryan, Julie J.C.H. and Daniel J. Ryan, "Biological Systems and Models in Information Security," Proceedings of the12th Colloquium for Information Systems Security Education, University of Texas, Dallas; Dallas, Texas, June 2-4, 2008. Available online at http://www.cisse.info/colloquia/cisse12/proceedings12/Start.pdf
• Polydys, Mary L., Daniel J. Ryan and Julie J. C. H. Ryan. “Best Software Assurance Practices in Acquisition of Trusted Systems,” Proceedings of the 10th Colloquium for Information Systems Security Education, University of Maryland, University Collage, Adelphi, MD June 5-8, 2006.
• Ryan, Julie J.C.H. “Use of Information Sharing Between Government and Industry as a Weapon,” Proceedings of the International Conference on Information Warfare and Security, University of Maryland Eastern Shore, 15-16 March 2006, pages 183 - 188
• Ryan, Daniel J. and Julie J. C. H. Ryan. “Daubert and Digital Forensics,” Proceedings of the 2006 Cybercrime Conference. Palm Harbor, Florida: DoD Cyber Crime Center and Joint Task Force – Global Network Operations. (January, 2006)
• Ryan, Julie J. C. H. and Daniel J. Ryan. “Biological Systems and Models in Information Security,” Proceedings of the Humanities and Technology Association Conference 2005. Orem, Utah: Utah Valley State College. (October, 2005)
• Ryan, Julie J.C.H. “Architecting Information Assurance,” Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, Phoenix, Arizona. 2004. pg. 669.
• Ryan, Julie J.C.H. “Teaching Information Security to Engineering Managers,” Proceedings of the 33rd ASEE/IEEE Frontiers in Education Conference, Boulder, Colorado. November 2003.
• Jefferson, Theresa I. and Julie J.C.H. Ryan. “A Comparative Analysis of Privacy Policies of Popular E-Businesses,” Proceedings of the 2003 ASEM National Conference, St. Louis, MO.
• Ryan, Julie J.C.H. and Theresa I. Jefferson. “The Use, Misuse and Abuse of Statistics in Information Security Research,” Proceedings of the 2003 ASEM National Conference, St. Louis, MO.
• Ryan, Julie J.C.H. "The Effect of Public Budgetary and Policy Decisions on Development of Trusted Systems," Proceedings of the 2002 ASEM National Conference, Tampa, Florida. pp. 130 – 134.
• Ryan, Daniel J. and Julie J.C.H. Ryan. “Institutional and Professional Liability in Information Assurance Education,” Proceedings of the 2002 IEEE Workshop on Information Assurance at the United States Military Academy, West Point, NY June 2002.
• Ryan, Julie J.C.H. "Information Assurance in Practice," Proceedings of the 2002 IEEE Workshop on Information Assurance at the United States Military Academy, West Point, NY June 2002.
• Ryan, Daniel J. and Julie J.C.H. Ryan. “Risk Management And Information Security,” Proceedings of the Eleventh Annual Computer Security Applications Conference, December 1995. Los Alamitos, CA: IEEE Computer Society Press, 1995 (257 – 260).
• Committee for the Review of the Master’s Degree Program for Science and Technology Intelligence Professionals. “Review of the National Defense Intelligence College’s Master’s Degree in Science and Technology Intelligence.” National Academies Press, Washington DC: 2011.
• Committee for the Symposium on Avoiding Technology Surprise for Tomorrow’s Warfighter - 2010 (2010) “Avoiding Technology Surprise for Tomorrow’s Warfighter: Symposium 2010.” National Academies Press, Washington DC: 2010. ISBN 0-309-15568-1.
• Committee For The Symposium On Avoiding Technology Surprise For Tomorrow’s Warfighter ; National Research Council. Avoiding Technology Surprise for Tomorrow's Warfighter: A Symposium Report. Washington D.C.: National Academy Press, 2009.
• Naval Studies Board. Technology for the United States Navy and Marine Corps, 2000-2035: Becoming a 21st- Century Force. Washington D.C.: National Academy Press, 1997.
• Naval Studies Board. The Navy and Marine Corps in Regional Conflict in the 21st Century. Washington D.C.: National Academy Press, 1996.
• Ryan, Julie J.C.H. Cyber Security: The Mess We’re In and Why It’s Going to Get Worse. Report GWCSPRI-2100-4, April 11, 2011. The Cyber Security Policy and Research Institute 2010-2011 Seminar Papers. Available online at http://www.cspri.seas.gwu.edu/Seminar%20Abstracts%20and%20Papers/2011-4%20Cyber%20Security-The%20Mess%20We%27re%20In%20Ryan.pdf
• Ryan, Julie J.C.H. “Phishers and Botnets and Worms, Oh My!”, Presentation to the US Army Science Board, 12 October 2010.
• Ryan, Julie J.C.H. “Academic Integrity: The Difficult Conversation.” Presentation made to several audiences.
• Ryan, Julie J.C.H. and Daniel J. Ryan, “Understanding and Measuring Security Performance”, Proceedings of the Information Security Compliance and Risk Management Institute Conference, June 2009, University of Washington.
• Ryan, Julie J.C.H. “Using the OODA Loop to Introduce Information Warfare to Students: A Tutorial”, Proceedings of the Colloquium for Information Systems Security Education 2009, Seattle, Washington, June 2009.
• Ryan, Julie J.C.H. “Acquiring Software Systems for Secure Identity Management”, Proceedings of the IDGA Identity Management Summit, July 2009.
• Ryan, Julie J.C.H. “Managing the Detection Challenge,” Proceedings of the Second Annual Alaska Information Assurance Workshop, August 2006, available online at http://assert.uaf.edu/workshop06/schedule06.html.
• Ryan, Julie J.C.H., ed. Proceedings of the First US-Japan Workshop on Critical Information Infrastructure Protection, published electronically October 2004, http://www.gwu.edu/~usjpciip/, Work supported under NSF Grant 455350.
• Ryan, Julie J.C.H. “Quantifying Information Security Risks Using Expert Opinion Elicitation,” Proceedings of the 2nd Japan – US Experts Workshop on Critical Information Protection (CIIP), June 2005, available online at http://www.doi.ics.keio.ac.jp/CIIP05/27/05-Ryan.pdf.
• Ryan, Julie J.C.H. “Information Warfare and the High Speed Computing Community,” Proceedings from the Conference on High Speed Computing, April 1996, p 91-98.
• Hughes, Julie J.C. “Prototype Testing: More Than Just a Luxury,” Booz•Allen & Hamilton Test Engineering White Paper, 1989.
• Ryan, Julie J.C.H. “Plagiarism, Education, and Information Security,” IEEE Security and Privacy. Vol. 5, no. 5, September/October 2007, pp. 62-65.
• Ryan, Daniel J. and Julie J.C.H. Ryan, “The Perfect Graduate,” The Information Leader: A Quarterly Journal on Information Trends. Information Resources Management College, National Defense University, Washington, DC. Winter 2007: Volume 12, No. 1.
• Ryan, Julie J.C.H. “Political Engineering in Knowledge Security,” VINE: The Journal of Information and Knowledge Management Systems Vol. 36 No. 3 (Emerald Group Publishing Limited).
• Ryan, Julie J.C.H. “Managing Knowledge Security,” VINE: The Journal of Information and Knowledge Management Systems Vol. 36 No. 2 (Emerald Group Publishing Limited).
• Ryan, Julie J.C.H. “Knowledge Management Needs Security Too,” VINE: The Journal of Information and Knowledge Management Systems Vol. 36 No. 1 (Emerald Group Publishing Limited).
• Ryan, Julie J.C.H. “Ask the Experts: How do Computer Hackers ‘Get Inside” a Computer?” Scientific American (January 2005): 104.
• Ryan, Julie J.C.H. “Last Word: Stealing From Themselves,” Prism Magazine 13 no. 5 (January 2004).
• Ryan, Julie J.C.H. “Why Plagiarism is So Tough to Curb,” Letter to the Editor, The Washington Post 14 December 2003.
• Ryan, Julie J.C.H. “Stopping Hackers,” .edu/magazine, v. 1 no. 1 (April 2000): 20 – 25.
• Ryan, Julie J.C.H. “Student Plagiarism in an On-Line World,” Prism Magazine, (December 1998): cover story.
• Ryan, Daniel J. and Julie J.C.H. Ryan. “Protection of Information – The Lessons of History,” Colloquy, Vol. 19, No.3 (September 1998): 21.
• Ryan, Daniel J. and Julie J.C.H. Ryan. “Protecting The National Information Infrastructure Against Infowar,” Colloquy, Vol. 17, No. 1 (July 1996): 14.


Kory Godfrey


• GAO-08-361 Homeland Security: Strategic Solution for US-VISIT Program Needs to be Better Defined, Justified, and Coordinated.
• GAO-07-1044T Homeland Security: Prospects for Biometric US-VISIT Exit Capability Remain Unclear
• GAO-07-870 Information Security: Homeland Security Needs to Immediately Address Significant Weaknesses in Systems Supporting the US-VISIT Program


Lawrence Beaty


• Al-Bassam, Ahmed; Beaty, L.H.; Wollyung, E.R. “Combined Cycle Installation with Air- Cooled Condensers in the High Desert of Saudi Arabia”, Proceedings of PowerGen, 1999.
• Davis, T. L.; Hobbs, A.O.; Beaty, L.H.; Shell, J.; Reid, R. “Combustion Turbine Capacity Augmentation Using Inlet Air Direct Contact Cooling and Compression”, PowerGen, 1995.
• Ebling, J. A.; Beaty, L.H.; Blanchard, S.K. “Combustion Turbine Inlet Air Cooling Using Ammonia-Based Refrigeration for Capacity Enhancement”, ASHRAE Trans. 1994, Volume 100, Part 1, Paper number NO-94-1-3, pages 583-586.


Amelia Phillips


• Guide to Computer Forensics and Investigations, 4th Edition, Nelson, Phillips, and Steuart, Course Technology, ISBN 1-435-49883-6, 2010
• Guide to Computer Forensics and Investigations, 3rd Edition, Nelson, Phillips, Enfinger, and Steuart, Course Technology, ISBN 1 418-06331-2, 2008
• Guide to Computer Forensics and Investigations, 2nd Edition, Nelson, Phillips. Enfinger, and Steuart, Course Technology, ISBN 0 619-21706-5, 2005
• Guide to Computer Forensics and Investigations, Nelson, Phillips, Enfinger, and Steuart, Course Technology, ISBN 0-619-13120-9, 2003
• Visual Basic 6.0, Phillips and Sprague, South West Publishing, ISBN 0-538-68821-1, 2000
• J. Ebeling, R.R. Balsbaugh, L.H. Beaty, S.K. Blanchard, “Thermal Energy Storage and Inlet Air Cooling for Combined Cycle”, ASME, IGTI 1994.
• Technical Reviewer, Lab Manual for Security+ Guide to Network Security Fundamentals, Cretard, Course Technology, ISBN 0-619-13104-7, 2003
• Technical Reviewer and Annotator for series done by Susan Baumann and Meredith Flynn – Working with MS Office 6.0, West Publishing Company, 1997, ISBN 0-314-07878-9
• MS Access advisor to authors for Office 97 Small Business Solutions, by Shelley O’Hara & Deborah Allen Rider, ISBN 0-7645-3120-4, 1998
• Distance Education from a Student Perspective, Presented May 2000 at the NISOD (National Institute for Staff and Organizational Development) Convention, Austin, TX


Ryan Ko


• Ryan K L Ko, Stephen S G Lee, Veerappa Rajan, “Understanding Cloud Failures” IEEE Spectrum 49(12), pp. 84, 2012, IEEE, 2013.
• Nick Papanikolaou, Siani Pearson, Marco Casassa Mont, Ryan K L Ko, ”A Toolkit for Automating Compliance in Cloud Computing Services”, Journal of Cloud Computing (CloudSecGov Special Issue), Accepted 9 July 2012, In press.
• Ryan K. L. Ko, ”Cloud Computing in Plain English”, ACM Crossroads, Vol. 16 Issue 3, pp. 5-6, ACM Press, 2010.
• Ryan K L Ko, E W Lee, Stephen S G Lee, "Business-OWL (BOWL)—A Hierarchical Task Network Ontology for Dynamic Business Process Decomposition and Formulation," Services Computing, IEEE Transactions on, Vol. 5, No.2, pp.246, 259, April-June 2012.
• Ryan K. L. Ko, ”A Computer Scientist’s Introductory Guide to Business Process Management (BPM)”, ACM Crossroads, Vol. 15 Issue 4, pp. 11-18, ACM Press, 2009. (2nd highest download for this journal on ACM Portal)
• Ryan K L Ko, Stephen S G Lee and E W Lee, ”Business Process Management (BPM) Standards: A Survey”, Business Process Management Journal, Emerald Publishing, Vol. 15 No. 5, Pp. 744-791, 2009.
• Ryan K L Ko, “Data Accountability in Cloud Computing”, Book Chapter, Security, Privacy and Trust in Cloud Systems, Springer, Editors Surya Nepal, Mukaddim Pathan, 2013. Book Chapter accepted 17 Feb 2013. In press.
• Ryan K L Ko, Markus Kirchberg, B S Lee, Special Issue on Trust & Security in Cloud Computing, Security & Communication Networks Journal (Wiley), Q4 2013, In press.
• Y Baek, Ryan K L Ko, Tim Marsh (Eds.), Trends and Applications of Serious Gaming and Social Media, Gaming Media and Social Effects (Springer), 2014.


David Beard


• Masticola SP, Beard DV, Comaniciu D, Justinian R, Video and Audio Monitoring for Syndromic Surveillance for Infectious Diseases, 20080279420. 2009.
• Beard DV Beard DV Beginning Programming for Accounting Students,  J. Ethics and Critical Thinking January 2008(1),18.
• Beard DV A Rigorous Programming Course To Improve Performance in 2nd  Intermediate Accounting J. Ethics and Critical Thinking, 2006(1) 1
• Beachboard, JC, Beard DV Innovations in Information Systems Education II Enterprise IS Management:  A Capstone Course for Undergraduate IS Majors, Communications of the Association of Information Systems, vol. 15 315, 2005
• Beard DV, Trimmer KJ, Peterson, T Three CIS courses for enhancing critical thinking and improving technical skills of accounting students, (reprint) Global Education Journal  2004(2), 82.
• Beard DV Conjunctive grading for assessing and motivating beginning programming students in the context of plagiarism, J. Ethics and Critical Thinking, 2004(1) 34-56.
• Beard DV, Trimmer KJ, Peterson, T Three CIS courses for enhancing critical thinking and improving technical skills of accounting students, J. Ethics and Critical Thinking, J 2003(2),  1-21.
• Beard DV Interactive Interim Techniques for Reduced Costs and a Better Mammography Workstation, J. Digital Imaging, Nov 2000, 13(4).
• Beard DV Hemminger BM Managing Remote Ultrasound with Cooperative Video: A Field Study. J. Behaviour & Information Technology, Jan1998, 17(1), 10-17
• Beard DV, et al Quick GOMS: A Visual Software Engineering Tool for Simple Rapid Time-Motion Modeling, ACM Interactions, May/June 1997, volume 4, number 3,  31-36.
• Beard DV, et al Pilot Study of Eye Movement During Mammography Interpretation: Eyetracker Results and Workstation Design Implications. J. Digital Imaging, Feb 1996.
• Beard DV, et al, Quick and Dirty GOMS: A Case Study of Computed Tomography Interpretation, J. Human Computer Interaction 11:157-180, 1996.
• Beard DV, et al Interpretation Time of Serial Chest CT Examinations with Stacked-Metaphor Workstation versus Film Alternator, J. Radiology, 197:753-758, 1995.
• Beard DV, et al Eye-Movement During CT Interpretation: Eyetracker Results & Image-Display-Time Implications J. Digital Imaging, Nov.1994; 7(2):189.
• Beard DV, et al Computed Tomography Interpretations with a Low Cost Workstation: A Timing Study. J. Digital Imaging, Aug 1994; 7(3):133-139.
• Hemminger BM Beard DV Review of 3D Imaging in Medicine, J. Academic Radiology 1994.
• Beard DV, Hemminger BM, Denelsbeck KM, Johnston RE How many screens does a CT workstation need? J. Digital Imaging, May1994; 7(2):69-76.
• Beard DV, et al, J. Investigative Radiology, 1993; 28(8):732-734.
• Beard DV Review of Computed Digital Radiography in Clinical Practice, J. Investigative Radiology 1993;28(1):90.
• Beard DV, et al. Single-Screen Workstation vs. Film Alternator for fast CT Interpretation, J. Radiology, 1993; 187(2):1-6.
• Beard DV Computer Human Interaction for Image Information Systems, J. American Society for Information Science, 1991; 42(8):600-608.
• Beard DV, Johnston RE, Toki O, & Wilcox C  A Study of Radiologists Viewing Multiple Computed Tomography Studies Using an Eyetracking Device, J. Digital Imaging,  Nov. 1990;3(4):230-237.
• Beard DV Designing a Radiology Workstation: A Focus on Navigation During the Interpretation Task, J. Digital Imaging, Aug. 1990;3(3):152-163.
• Beard DV, Palaniappan M, Humm A, et al. A Visual Calendar for Scheduling Group Meetings, ACM - CSCW 1990 134.
• Beard DV, Parrish D, Stevenson D A Cost Analysis of Film Image Management & Four PACS systems based on Four Network Protocols, J. Digital Imaging, 1990;3(2):108-118.
• Beard DV Walker JQ Navigation Techniques to Improve the Display of Large Two Dimensional Spaces, J. Behaviour & Information Technology, 1990;9(6):451-466.
• Beard DV, Parker KR, Ottaway TA, Davey WF, Schou CD, Requiring a Systems Analysis and Design Course for a Computer Science Major, FECS’13, Las Vegas NV, July 2013.
• Mamykina L, Goose S, Hedqvist D, Beard DV Deconstructing Nursing narratives for trend analysis, ACM CHI 2004.
• Beard DV, Trimmer KJ, Smith, KA A Rigorous Programming Course for Improved Problem solving Skills and a Better CPA, ASBBS, Las Vegas NV Feb 2003.
• Beard DV Trimmer KJ Systems Analysis and Design and the Improved Accountant, SAIS Savannah, GA – March, 2003.
• Beard DV Beginning Programming for Accounting Students using Object-Oriented Visual Basic.NET: Avoiding a Disaster, ASBBS Las Vegas NV Feb 2003.
• Beard DV, Trimmer KJ, Bezik MA, Peterson T, Smith, KA A CIS Database Management and Design Course: Better for Accounting Majors than Traditional AIS, ASBBS, Las Vegas NV Feb 2002.
• Beard DV, Bezik MA, Trimmer KJ, Smith KA, Systems Analysis and Design: Better for Accounting Majors than traditional AIS? Third Annual AIS Educator Conference, Estes Park Colorado, August, 2001.
• Beard DV, Smith, KA Beginning Programming Course for Accounting: Relative Performance of Declared CIS and Accounting Majors, ASBBS, Las Vegas NV Feb 2001.
• Beard DV, et al QGOMS: A Direct-Manipulation Tool for Simple GOMS Models, ACM - CHI 1996 Vol 2 25
• Beard DV, Molina P, Denelsbeck KM, Hemminger BM, et. al. Stacked-Metaphor Workstation Faster than Film for Serial Staging CT, CAR, Berlin 1995.
• Soltys M, Beard DV, et. al Experimentally Evaluating Manual Registration of Multiple Modality 3D Medical Imaging Data, SPIE Medical Imaging, 1995.
• Hemminger BM, Molina PL, Braeuning PM, Detterbeck FC, Egan TM, Pisano ED, & Beard DV Clinical Applications of Realtime Volume Rendering, SPIE Medical Imaging , 1995.
• Beard DV, Hemminger KM, Denelsbeck KM, Johnston RE Cognitive Load during CT Interpretation, SPIE Medical Imaging: Image Perception, 1994.
• Beard DV, Eberly DH, et al. Interacting with image hierarchies for fast and accurate object segmentation, SPIE Medical Imaging: Image Processing, 1994.
• Beard DV, Faith RE, Eberly D, Pizer SM, Kurak C, Johnston RE The Magic Crayon: An Object Definition & Volume Calculation Testbed, SPIE Medical Imaging, 1993.
• Beard DV, Hemminger BM, Denelsbeck KM, Brown PH A Time-motion Comparison of Several Radiology Workstation Designs and Film, SCAR,1992.
• Beard DV, Hemminger BM, Brown P, Perry R, Thompson R Remote consultation with a multiple screen FilmPlane radiology workstation, SPIE Medical Imaging, 1992.
• Beard DV, Brown P, Misra R Scrolling Radiologic Images:  Requirements, Designs, & Analyses, CAR, Berlin 1991.
• Beard DV, Perry R, Muller K, et al. Evaluation of Total Workstation Interpretation Quality with CT: A Pilot Study, SPIE Medical Imaging 1991.
• Beard DV, Johnson RE, Pisano E, et al A Radiology Workstation for Mammography: Preliminary Observations, Eyetracker Studies, & Design, SPIE Medical Imaging 1991.
• Beard DV A Computer Human Interaction Approach for Evolving Complex Tools, Advances in Nuclear Science and Engineering Working Conference, 2012.
• Beard DV Comparison of an accounting department’s CPA pass rates and national pass rates normalized for ACT scores Conference on Ethics and Critical Thinking, Kings College PA Dec 2008.
• Beard DV Beginning Programming for Accounting Students, Conference on Ethics and Critical Thinking Dallas Tx, Dec 2007.
• Beard DV Negotiating Software Project Cost Estimates, Conflict Resolution and Negotiation Conference, Minnesota State University, Oct 2007.
• Beard DV Critical Thinking and Intellectual Rigor, Conference on Ethics and Critical Thinking, Dallas TX, Dec 2006
• Beachboard, JC, Beard DV Enterprise IS Management:  A Capstone Course for Undergraduate IS Majors, Proceedings of the 46th Annual Fall Conference Mountain Plains Management Assoc., 2000.
• Beard DV A Rigorous Programming Course To Improve Performance in 2nd  Intermediate Accounting Conference on Ethics and Critical Thinking, Dallas TX, Dec 2005.
• Beard DV International Software Development and Extreme Programming, Business Entrepreneurs Conference, Southwest Missouri State University Business School, 25Feb05
• Beard DV On choosing employees in an age of rampant college cheating, Business Entrepreneurs, Missouri State University School of Business 2004
• Beard DV How to write an Fundable NIH Proposal, Workshop, Siemens Corporate Research, Princeton, NJ, Nov 2003.
• Beard DV Frischmann P, Introduction of critical and analytical thinking in an accounting program through advanced CIS courses, American Accounting Association Western Regional Meeting, Breckenridge CO, 2003.
• Beard DV Smith KA A Beginning Programming Course for the CPA Fourth Annual AIS Educator Conference, 2002.
• Beard DV Trimmer KJ, Bezik MA, Smith KA Accommodating Accounting Majors in a Required CIS Beginning Programming Course: Approach and Results IAIM Dec 2001.
• Beard DV & Smith KA Designing a Beginning Programming Course for Both Accounting and CIS Majors: Approach and Results MPMC, 2001
• Schou, C, Frost, J, Beard DV Applications of Group Process Support Systems (GPSS) National INFORMS 96, 1996.
• Schou, C, Frost, J, Beard DV Structure of an Undergraduate MMT Curriculum, National INFORMS 96, 1996.
• Beard DV Cost-effective Teleradiology, invited workshop at the 1996 Idaho Conference on Health Care, Oct 1996.
• Beard DV Interpretation of Multiple Chest CT Examinations: Stacked Workstation versus Film, Presented at the AIMA Summer Conference, Medical Imaging Group, Boston, 1995.
• Rosenman J, Beard DV, Soltys M A new method to simultaneously view multiple medical images, ASTRO 1995.
• Hemminger BM, Beard DV, et al Realtime 3D visualizations for Surgical Procedure Planning, Demonstration at RSNA InfoRad, Nov. 1994.
• Perry JR, Rosenman J, Soltys M, Reavis R, Chen J, Liu A, Beard DV, Pizer SM 3D Image Fusion of Lung Perfusion SPECT & Chest CT Data in Radiation Treatment Planning for Lung Cancer Patients, World Federation of Nuclear Med. & Biology, 1994.
• Robinson EN & Beard DV Relational Database Design: Evaluation of Recognition, Isolation & Treatment of Hospitalized Patients with Tuberculosis, AIMA Sym. on Computer Applications in Medical Care, 1994.
• Beard DV Fast & accurate medical image interpretation using electronic lightboxes, invited pres: RSNA InfoRad, 1992.
• Beard DV Hemminger BM, Medical Imaging Workstations, RSNA InfoRad 1992.
• Beard DV, Hemminger BM, Keefe B, Mittelstaedt CA Remote Ultrasound: A Pilot Study, Pres. at AUR 1992.
• Beard DV, Hemminger BM, Mauro MA, Perry JR A Speed and Accuracy Comparison of Film vs. Electronic Display,  AUR 1992.


Dennis Longley


• 1986 Use of Expert Systems in the Analysis of Key Management Schemes,(with S Rigby), IFIP Sec 86 Monte Carlo
• 1987 Expert Systems Applied to Analysis of Key Management Schemes - Computers and Security, Vol 6 No Feb
• 1989 Information Security - Hong Kong Computer Conference
• 1992 An Automatic Search for Security Flaws in Key Management Schemes, (with S Rigby) Computers and Security, Vol 11 No 1 March 1992 pp. 75-89
• 1992 A Language for Describing Information and Physical Security Architectures, (with W Caelli and A Tickle), proceedings of the IFIP Sec'92 Conference, Singapore
• 1993 Complementarity Attacks and Control Vectors, (with S M Matyas) publication in IBM Systems Journal Vol 32, No 2  
• 1993 Risk Data Repository: A Novel Approach to Security Risk Modelling (with A Anderson and A Tickle) Proceeding IFIP Sec 1993
• 1994 Effect of Key Generators on the Automatic Search for Flaws in Key Management Schemes (with S Vasudevan)  Computers and Security,Vol 13 No.4,  pp 335 - 347
• 1994 Security Modelling for Organisations (with A Anderson and L F Kwok), 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA.
• 1995 The Electronic Office: A Strategic Approach to Managing the Risk  Government Security ‘95 Conference, Canberra   1995
• 1997 A Security Officer’s Workbench, (with LF Kwok), Computers and Security, Vol 15, No 8, 1996
• 1997 Information Security Management Standards, (with LF Kwok), IFIP Sec  ‘97, Cophenhagen
• 1997 Implementation of Key Escrow with Key Vectors to Minimise Potential Misuse of Key, (with W Caelli) Awarded Best Paper Prize, National Information Systems Security Conference, Baltimore.
• 1999 Information Security Management and Modelling (with LF Kwok) Information Security Management and Computer Security Vol 7, No. 1 1999
• 2003 Electronic Information Security Documentation (with LF Kwok and P Fung) Australasian Information Security Workshop, Adelaide.
• 2004 Security Modelling for Risk Analysis (with LF Kwok) IFIP Sec Conference, Toulouse
• 2006 Security Risk Analysis for Complex Systems (with M Branagan and R Dawson) ISSAC Johannesburg
• 2008 Feasibility of  Automated Information Security Compliance Auditing (with W Caelli, M Branagan and LF Kwok) IFIP Sec Milan
• 2010 A Business Continuity Management (BCM) Simulator (with W Caelli,and  LF Kwok) IFIP Brisbane
• 2012 A Model and a Simulator for Disaster Recovery (with W Caelli, and LF Kwok) International Journal for Risk Management and  Business Continuity.
• 1986 Dictionary of Personal Computing and Communication  (with M Shain), MacMillan Publishers
• 1987 Dictionary of Data and Computer Security, (with M Shain), MacMillan Publishers
• 1988 Dictionary of Information Technology  (3rd edition), (with M Shain)
• 1989 Information Security for Managers, (with W Caelli and M Shain), (Editors), Macmillan Publishers Ltd (UK)  ISBN 0-333-46203-3
• 1990 Data Security, Chapter 14 of textbook Information Security and the Law edited by C Edwards and I Walden, Macmillan Publishers Ltd (UK)
• 1991 Information Security Handbook, (with W Caelli and M Shain), (Editors), Macmillan Publishers Ltd (UK)  ISBN 0-333-51172-7
• 1992 Dictionary of Information Security, (with M Shain and W Caelli), (Editors), Macmillan Publishers Ltd (UK)


Kevin Parker


• Chao, J. C., Parker, K. R., & Davey, B. (2013). Navigating the framework jungle for teaching web application development. Journal of Issues in Informing Science and Information Technology, 10, 95-109.
• Chao, J. C., Parker, K. R., & Fontana, A. (2011). Developing a social media interactive learning environment. Journal of Issues in Informing Science and Information Technology, 8, 323-334.
• Park, J., Fables, W., Parker, K. R., & Nitse, P. S. (2010). The role of culture in business intelligence. International Journal of Business Intelligence Research, 1 (3), 1-14.
• Parker, K. R. (2010). Selecting software tools for IS/IT curricula. Education and Information Technologies (Special Issue on Information Systems Curriculum), 15 (4), 255-275.
• Parker, K. R. (2010). The reference list formatter: An object-oriented development project. Interdisciplinary Journal of Information, Knowledge, and Management, 5, 23-48.
• Trimmer, K., Parker, K. R., & Schou, C. (2009). Functional requirements: The reference monitor and use case. Academy of Information and Management Sciences Journal, 12 (2), 113-119.
• Parker, K. R., Nitse, P. S., & Tay, A. (2009). The impact of inaccurate color on customer retention and CRM. Informing Science: the International Journal of an Emerging Transdiscipline, 12, 105-112.
• Parker, K. R., Williams, R. F, Nitse, P. S., & Tay, A. (2008). Use of the normalized word vector approach in document classification for an LKMC. Journal of Issues in Informing Science and Information Technology, 5.
• Trimmer, K., Parker, K. R., & Schou, C. (2007). Forcing early implementation of information assurance precepts throughout the design phase. Journal of Informatics Education Research, 9 (1), 95-120.
• Parker, K. R., & Chao, J. (2007). Wiki as a teaching tool. Interdisciplinary Journal of Knowledge and Learning Objects, 3, 57-72.
• Parker, K. R., & Nitse, P. S. (2007). Bilgi yönetim merkezleri olarak kütüphaneler. (C. Aydýn, Trans.). Journal of Turkish Librarianship, 21 (1), 88-103. Parker, K. R., Chao, J. T., Ottaway, T. A., & Chang, J. (2006). A formal language selection process for introductory programming courses. Journal of Information Technology Education, 5, 133-151.
• Parker, K. R., Ottaway, T. A., & Chao, J. T. (2006). Criteria for the selection of a programming language for introductory courses. International Journal of Knowledge and Learning, 2 (1/2), 119-139.
• Parker, K. R. (2005). Lost river wind riders: A project for teaching database design. Communications of the Association for Information Systems, 16 (24), 475-494.
• Beachboard, J. C., & Parker, K. R. (2005). Understanding information technology: What dgraduates from business-oriented IS curricula need tknow? Journal of Issues in Informing Science and Information Technology, 2, 219-236.
• Parker, K. R., Nitse, P. S., & Flowers K. A. (2005). Libraries as knowledge management centers. Library Management Journal (Special Issue on Digital Libraries in the Knowledge Era: Knowledge Management and Semantic Web Technology), 26 (4/5), 176-189.
• Parker, K. R., & Nitse, P. S. (2005). Improving competitive intelligence for knowledge management systems. International Journal of Internet and Enterprise Management (Special Issue on Business Intelligence for Competitive Advantages), 3 (1), 24-45.
• Parker, K. R., LeRouge, C., & Trimmer, K. (2005). Alternative instructional strategies in an IS curriculum. Journal of Information Technology Education, 4, 43-60.
• Nitse, P. S., Parker, K. R., Ottaway, T. A., & Krumwiede, D. W. (2004). The impact of color in the e-commerce marketing of fashions: An exploratory study. European Journal of Marketing, 38 (7/8), 898-915.
• Parker, K. R. (2004). A data model validation approach for relational database design courses. Journal of Issues in Informing Science and Information Technology, 1, 813-825.
• Nitse, P. S., & Parker, K. R. (2003). Library science, knowledge management, competitive intelligence: Archive theory the common link. The Reference Librarian, 38 (79/80), 395-407.
• Parker, K. R. (2003). A database design case: Teton whitewater kayak. Journal of Information Systems Education (Special Issue on IS Teaching Cases), 14 (3), 271-274.
• Nitse, P. S., Parker, K. R., & Dishman, P. L. (2003). Multi-class interest profile applications in the intelligence process. Marketing Intelligence and Planning, 21 (5), 263-271.
• Parker, K. R. (2002). Using and enhancing online lecture materials. Mountain Plains Journal of Business and Economics, 3.
• Saxby, C. L., Parker, K. R., Nitse, P. S., & Dishman, P. L. (2002). Environmental scanning and organizational culture. Marketing Intelligence and Planning, 20 (1), 28-34.

Referred Chapters
• Parker, K. R., & Davey, B. (2012). The history of computer language selection. In A. Tatnall (Ed.), Reflections on the History of Computing: Preserving Memories and Sharing Stories (pp. 166-179). Boston, MA: Springer.
• Davey, B., & Parker, K. R. (2010). Turning points in computer education. In A. Tatnall (Ed.), IFIP International Federation for Information Processing, Vol. 325 History of Computing: Learning from the Past (pp. 159-168). Boston, MA: Springer.
• Parker, K. R., & Chao, J. (2008). Weaving a knowledge web with wikis. In M. D. Lytras, R. D. Tennyson, & P. Ordóñez de Pablos (Eds.), Knowledge Networks: The Social Software Perspective (pp. 28-45). Hershey, PA: Information Science Reference.
• Parker, K. R., Nitse, P. S., & Davey, B. (2008). History of computing education trends: The emergence of competitive intelligence. In J. Impagliazz (Ed.), IFIP International Federation for Information Processing, Vol. 269 History of Computing and Education 3 (pp. 113-127). Boston, MA: Springer.
• Davey, B., & Parker, K. R. (2006). Language history ‒ A tale of twcountries. In J. Impagliazz(Ed.), IFIP International Federation for Information Processing, Vol. 215 History of Computing and Education 2 (pp. 139-151). Boston, MA: Springer.
• Parker, K. R. (2006). Enabling technologies for the semantic web. In M. D. Lytras, & A. Naeve (Eds.), Intelligent Learning Infrastructures for Knowledge Intensive Organizations: A Semantic Web Perspective (pp. 39-56). Hershey, PA: Information Science Reference.
• Parker, K. R., & Nitse, P. S. (2006). Competitive intelligence gathering. In D. G. Schwartz (Ed.), Encyclopedia of Knowledge Management (pp. 44-50). Hershey, PA: Information Science Reference.

Referred Proceeding
• Beard, D.V., Parker, K. R., Ottaway, T.A., Davey, W.F., & Schou, C.D. (2013). Requiring a systems analysis and design course for a computer science major. Proceedings of the 9th International Conference on Frontiers in Education: Computer Science & Computer Engineering, FECS 2013, July 22-25, Las Vegas, Nevada, USA. CSREA Press.
• Parker, K. R., & Davey, B. (2011). Applied learning with the virtual teaching assistant. Proceedings of the Seventeenth Americas Conference on Information Systems, Detroit, MI: August 4-7, Paper 24.
• Davey, B., Parker, K. R., & Lukaitis, A. (2011). e-Government and the elderly: A twcountry comparison. Proceedings of the Seventeenth Americas Conference on Information Systems, Detroit, MI: August 4-7, Paper 171.
• Davey, B., & Parker, K. R. (2010). Technology in education: An agile systems approach. Proceedings of 2010 Informing Science + Information Technology Education (InSITE) Conference, Cassino, Italy: June 21-24 (pp. 297-306).
• Trimmer, K., Parker, K. R., & Schou, C. (2008). Functional requirements: The reference monitor and use case. Proceedings of the Academy of Information and Management Sciences, Reno, NV: October 15-17 (p. 264).
• Chin, K. L., Chang, E., Atkinson, D., & Parker, K. R. (2007). Ontology-based IT pedagogical knowledge framework. Proceedings of the 2007 Computer Science & Information Technology Education Conference, Mauritius: November 16-18 (pp. 155-166).
• Parker, K. R., Davis, T., & Ward, D. M. (2007). Herbicide damage tracking system: An IS case study. Proceedings of the North American Case Research Association, 21 (10), Keystone, CO: October 18-20 (p. 58).
• Trimmer, K., Parker, K., & Creelman, J. (2006). Lessons learned in a collaborative development project–documentation for physical therapy education. Proceedings of the International Conference on Informatics Education Research, Milwaukee, WI: December 9-10.
• Ottaway, T. A., Parker, K. R., & Chao, J. T. (2006). The selection of a language for introductory programming courses: An exploratory survey. Proceedings of the Western Decision Sciences Institute, Waikoloa, HI: April 11-15 (pp. 270-272).
• Schou, C., Trimmer, K., & Parker, K. R. (2005). Forcing early binding of security using a design reference monitor concept in systems analysis and design courses. Proceedings of the International Conference on Informatics Education and Research, Las Vegas, NV: December 9-11 (pp. 321-331).
• Nitse, P. S., & Parker, K. R. (2005). Gathering information in the digital age using the semantic web. Frontiers of e-Business Research, Tampere, Finland: September 26-28 (pp. 603-614).
• Parker, K. R., Trimmer, K., & LeRouge, C. (2005). The REA ontology as an alternative tdata flow diagrams. Proceedings of the 2005 Americas Conference on Information Systems, Omaha, NE: August 11-14 (pp. 2793-2801).
• Nitse, P. S., & Parker, K. R. (2005). Integrating knowledge management and competitive intelligence intboth the retailing and services businesses. Proceedings of the 12th International Conference on Recent Advances in Retailing and Services Science, Orlando, FL: July 21-24.
• Bezik, M. H., Smith, K., & Parker, K. R. (2005). SPUD's - A computer-assisted interactive project for use in intermediate accounting courses. 2005 Western Region American Accounting Association Meeting, Sacramento, CA: April 29-30.
• Parker, K. R., Trimmer, K., & LeRouge, C. (2005). The correspondence between the REA ontology and data flow diagrams. 2005 Western Region American Accounting Association Meeting, Sacramento, CA: April 29-30.
• Trimmer, K., & Parker, K. R. (2004). Revising instructional strategies in systems analysis and design. Proceedings of the 2004 International Conference on Informatics Education Research, Washington, DC: December 10-12.
• Nitse, P. S., & Parker, K. R. (2004). Consumer perception of color depicted on e-commerce websites: An exploratory study. Proceedings of the 11th International EIRASS Conference on Recent Advances in Retailing and Services Science, Prague, Czechoslovakia: July 10-13.
• Krumwiede, D., Parker, K. R., Nitse, P. S., & Ottaway, T. A. (2004). Customer sensitivity telectronically reproduced color products: Its effect on the operation of return goods. Distribution Business Management Association Annual Conference Proceedings, Chicago, IL: May 18-20 (pp. 1-9).
• Parker, K. R., & Nitse, P. S. (2004). The impact of color inaccuracies on e-commerce sites. Proceedings of the Information Technology & Global Business Research Conference, Cancun, Mexico: March 10-13 (pp. 50-56).
• Beachboard, J. C., & Parker, K. R. (2003). How much is enough? Teaching information technology in a business-oriented IS curriculum. Proceedings of the 2003 Americas Conference on Information Systems, Tampa, FL: August 4-6 (pp. 3026-3031).
• Krumwiede, D., Nitse, P. S., Parker, K. R., & Ottaway, T. A. (2003). Returning internet purchased color sensitive products: The effect on the supply chain. Proceedings of the 7th International Conference of the Decision Sciences Institute, Shanghai, China: July 4-8.
• Ottaway, T. A., & Parker, K. R. (2002). A conceptual model of structural adaptation in agent-based workflow management systems. Proceedings of the 2002 Americas Conference on Information Systems, Dallas, TX: August 9-11 (pp. 1476-1483).
• Nitse, P. S., Parker, K. R., Ottaway, T. A., & Krumwiede, D. W. (2002). The impact of consumer perception on e-commerce transactions. Proceedings of the International Applied Business Research Conference, PuertVallarta, Mexico: March 14-19, CD-ROM.
• Parker, K. R. (2001). Techniques tenhance online lecture materials. Proceedings of the 2001 Mountain Plains Management Conference, Pocatello, ID: October 17-19.
• Aytes, K., & Parker, K. R. (2001). Using the web tcreate a dynamic, interactive learning environment. Proceedings of the 2001 Mountain Plains Management Conference, Pocatello, ID: October 17-19.
• LeBlanc, R., & Parker, K. R. (2001). A customer-based framework for understanding e-commerce relationships. Proceedings of the International Business & Economics Research Conference 2001, Reno, NV: October 8-12. Received Best Paper Award.
• Parker, K., & Nitse, P. S. (2001). Improving competitive intelligence gathering for knowledge management systems. Proceedings of the 2001 International Symposium on Information Systems and Engineering (ISE'2001-Workshop: Knowledge Management Systems: Concepts, Technologies and Applications), Las Vegas, NV: June 25-28 (pp. 122-128).
• Parker, K. R., & Nitse, P. S. (2000). A multi-class interest profile (M-CLIP) for online competitive intelligence systems. Proceedings of the Society of Competitive Intelligence Professionals (SCIP) Academic Conference on Competitive Intelligence: Curriculum and Research, Philadelphia, PA: December 8.

 

James Frost


Books & Monographs
• Frost, James, Schou, Corey, and Springer, John, “Principles of Computer Security – Security+ and Beyond, Project Book”, 2004.
• Frost, James, and Schou, Corey, eDACUM IX.  Monograph Update of Existing NSTISSC Training Standards – Systems Administrator for the Federal government, July 2000.
• Frost, James, and Schou, Corey.  eDACUM VIII.  Risk management monograph for the Federal government, July 1999.
• eDACUM VII The Certifier’s Roles and Skills, Monograph, Department of Defense, 481 pages, Frost, Schou June 1999 Monograph)
• Frost, James, Development of a model of facilitation for case studies education in Health Professions: An exploratory, observational study. May 2000.

Journals
• Frost, J. Hamlin, A. (2012). INTERNATIONAL STUDENT ATTITUDES CONCERNING ACADEMIC DISHONESTY SITUATIONS. The 8th International Conference on Frontiers in Education: Computer Science and Computer Engineering, FECS'12. Las Vagas, NV.
• Frost, J., Hamlin, A. Ethical Posture Comparisons Between Male and Female International Business Students. Proceedings of the Mountain Plains Management Conference, 2012, Kearney, NB. 
• Frost, James. Hamlin, Alan, Barczyk, Casmir, Powell, Greg. (2012). A COMPARISON OF UNIVERSITY EFFORTS TO CONTAIN ACADEMIC DISHONESTY. Journal of Legal, Ethical and Regulatory Issues (JLERI).
• Frost, James, Hamlin, Alan, Barczyk, Casimir C., A Survey of Professor Reactions to Scenarios of Academic Dishonesty in American Universities, Journal of Business Inquiry, Dec. 2006.
• Schou, Corey, Frost, James, and Maconachy, William V., Building an Educational Response to Terrorism: A Multifaceted Problem, A Multidimensional Response, Information Systems Control Journal, Vol. 6, 2004.
• Frost, James and Gantt, Gamewell, Forensic Authentication and Non-Repudiation Techniques to Deter Plagiarism,” Mountain Plains Journal of Business and Economics, 2004
• Schou, Corey D., Frost, James., Homeland security and Information Assurance in Biomedical Informatics Systems, IEEE Engineering in Medicine and Biology, January/February 2004.
• Frost, James, Maconachy, William V., Schou, Corey, and Springer, John.D., "Building an Educational Response to Terrorism:  A Multifaceted Problem, A Multidimensional Response," Information Systems Control Journal, Vol. 6, 2004.
• Frost James and Gantt, Gamewell, An Investigation of Plagiarism and Electronic Agents to Assist in Detecting Plagiarism, Mountain Plains Journal of Business and Economics, 2002.
• Schou, Corey D., Frincke, Deborah, Reynolds, Charles (Pat), Frost, James, Davis, James, Meeting the Information Assurance Crisis — Now”; EDPACS EDP Audit and Control Systems, December, 2000.

Proceedings and Presentations
• Frost, James, The Proper Use of Organizational Policy to Cope with a Vibrant Threat to the American Way of Life - Corporate Espionage, in the Proceedings of The Cyber Security Symposium: Public-Private Partnerships, Moscow, ID, April 8th, 2014
• Frost, James, A Model to Motivate Students in a Flipped Information Assurance Class, in the Proceedings of the Allied Academies’ Spring International Conference, Nashville, TN, March 27, 2014.
• Frost, James, The Proper Use of Organizational Policy to cope with the Vibrant Threat to the American Way of Life - Corporate Espionage, Cyber Security Symposium 2014, 2014. 
• Frost, James, A Model  to Motivate Students in a Flipped Instruction Information Assurance Class, Academy of Educational, Leadership, Volume 19, Number 1, Allied Academies International Conference, Nashville, Tennessee, March 26-29, 2014
• Frost, James, A Model for Motivating Students in a Flipped Instruction CIS Class, Proceedings of the Mountain Plains Management Conference, 2013.
• Frost, James, Corporate Espionage: Threatening the American Way of Life. Proceedings of the Mountain Plains Management Conference, 2013.
• University Student Perceptions About Technology-Driven Privacy Issues, oral presentation at Mountain Plains Management Conference, 2013. 
• Frost, James, Emerging Concerns for Information Assurance Students.  The 6th Annual
• Information Assurance Symposium, February 2012. 
• Frost, J., Hamlin, A. Ethical Posture Comparisons Between Male and Female International Business Students. Proceedings of the Mountain Plains Management Conference, 2012, Kearney, NB. 
• Frost, James C., and Hamlin, Alan, A Gender-based Comparison of the Ethics of International Business Students, presented at the Mountain Plains Management Conference, Oct. 2012.
• Frost, James C., Espionage, an enhancement to Business School Curriculum, presented at the Mountain Plains Management Conference, Oct. 2012.
• Frost, James and Schou, Corey, Critical Thinking and Ethics Integrated Across the Information Assurance Curriculum, ACEIS 2009: The Second Annual Conference on Education in Information Security, February 2009.
• Frost, James and Albright, Frederick, It is Poor Craftsmen that Blame Their Tools as a Response to Death by PowerPoint, in the Proceedings of the Mountain Plains Management Conference at Idaho State University, Oct 2008.
• Carstenson, Larry, Barczyk, Casimir, Frost, James, Hamlin, Alan, How to organize a Mountain Plains Management Conference, panel discussion at the Mountain Plains Management Conference at Idaho State University, Oct 2008. 
• Frost, James, Hamlin, Alan, Barczyk, Casimir C., A Comparison of Professor Reactions to Scenarios of Academic Dishonesty at Three American Universities, Proceedings of the Mountain Plains Management Conference at the University of Nebraska, Oct 2007.
• Frost, James, Hamlin, Alan, Barczyk, Casimir C., A Survey of Professor Reactions to Scenarios of Academic Dishonesty in American Universities, Mountain Plains Management Conference, Oct. 2006.
• E.S. Lohse, K. Turley-Ames, C. Schou, A. Strickland, D. Sammons, and J. Frost. Graphical Representations and Expertise: Archaeological Types, paper presented at the 59th Annual Northwest Anthropological Conference: "Beyond Description from Data to Understanding," Seattle, WA, March 29 – April 1, 2006.
• Schou, C., Frost, J., and Ryan, J., Developing Secure Code for Information Assurance, Academic Days on Trustworthy Computing, 2006.
• Frost, James and Schou, Corey, Integration of Ethics into the Computer Information Systems Curriculum via The People Component Of The McCumber Model, IFIP 11.8, Symposium on Security, May 2005.
• Frost, James C., and Adamcik, Barbara, “The Effect of a Knowledge Survey on Student Performance on Essay Exams in a Computer Information System Class,” Mountain Plains Management Conference, October, 2005.
• Frost, James, and Schou, Corey, “Integrating ethics in security education via the people component of the McCumber model,” accepted for May, 2005 presentation at The Fourth World Conference on Information Security Education at Russian Ministry of Education, Moscow Engineering Physics Institute.
• Frost, James, Home Security, Southeast Idaho Health Care Conference on Computing, Dec. 2004.
• Frost, James, “A Tool for Education - Knowledge Surveys,” Mountain Plains Management Conference, Oct. 2004.
• Frost, James and Gantt, Gamewell, Deterring plagiarism: Useful forensic techniques aid in the task, Mountain Plains Management Conference, Oct. 2003.
• Frost, James and Schou, Corey, Social Engineering Opportunities in Business, National Association of Purchasing Management, September 2003.
• Frost, James, Cyber Security Strategy: Meeting the Multi-National Business Challenge, Business Partners Conference, February 2003.
• Frost, James and Gantt, Gamewell, An Investigation of Plagiarism and Electronic Agents to Assist in Detecting Plagiarism, Mountain Plains Management Conference, Oct. 2002.
• Frost, James, Workshop on Group Decision Support Systems, Mountain Plains Management Conference, Oct. 2001.
• Corey D., Deborah Frincke, James Davis, James Frost, Information Security Education: A Worldwide Workforce Crisis, WISE2 Proceedings, IFIP 11.8, Perth, Australia, June 2001.
• Schou, Corey D., James Frost, GigaPoP Applications for Security Education, Intermountain GigaPoP, May 2001, Idaho Falls, Idaho.
• Schou, Corey D., James Frost, Maconachy, William, Security/Privacy: Building Confidence in Electronic Transactions; Association of Governmental Accountants., Coeur d’Alene, Idaho, April 2001.
• Frost, James, "Security vs. Privacy: Technologies and Ethics where Goals Meet Reality," Eastern Idaho Forum for Information Technology, Feb 2001.
• Schou, Corey, Frincke, D., Reynolds, C., Frost, J., Davis, J., “Meeting the Information Assurance Crisis — Now”; EDPACS EDP Audit and Control Systems, December, 2000.
• Frost, James, Adamcik, Barbara and Schou, Corey An Analysis Of Instructors’ Leadership Styles Using the Blake and Mouton’s Leadership Model, Mountain Plains Conference, Oct. 2000.
• Schou, Corey, Frost, James, Wingert, Nathan, Maconachy, W. Victor, Using Electronic Technology to Resolve Organizational Differences and Develop e-Curriculum, TechLearn Conference, Nov. 2000.
• Corey Schou, James Frost, Technology Initiatives: State Board Of Education October, 2000.
• Corey Schou, James Frost;Information Assurance - Lost in Risk??, Farm Bureau National Managers Meeting, August, 2000,
• Frost, James, and Schou, Corey, eDACUM IX.  Monograph Update of Existing NSTISSC Training Standards – Systems Administrator for the Federal government, July 2000.
• Frost, James, Past and Future Concerns for the Potato Industry: A compilation of issues and rankings of those issues.  Presented to the Annual Meeting of the Potato Growers of Idaho, Dec. 9-10, 1998.
• Frost, James, Schou, Corey, Wingert, Nathan. Group Decision Support Technology for Decision Making.  Workshop at Idaho State University for the Rocky Mountain International Business Association, April 11, 1997.
• Frost, James, Group Decision Support Systems for Meeting ISO 9000 Requirements, presented at American Society for Quality Control Conference in Idaho Falls on March 10, 1996.
• Aytes, Kregg, J., Frost, Jim, and Johnson, Jeff J. Supporting Distributed GDSS. ACM SIGOIS Bulletin, 15(2), December 1994, 18-20.
• Frost, J., Aytes, K., Schou, C., and Dunn, S. ISO 9000 Requirements and Electronic Group Support. 9th annual Engineering Conference, ACM Refereed Proceedings. October 1994
• Schou, C., Dunn, S., Aytes, K., and Frost, J. Applying Emerging Group Support Technologies to Meet ISO 9000 Requirements. Presented at Pacific Basin Interface - Second Annual Conference on Global Business Environment and Strategy. August 11-13, 1994. Sun Valley, ID.
• Aytes, Kregg, J. Frost and J. Johnson. "Supporting Distributed GDSS." Presented at Workshop on CSCW Infrastructure and Multimedia. Computer Supported Cooperative Work '94, Chapel Hill, NC.

MONOGRAPHS
• Schou, Corey, Frost, James, eDACUM X Final Report, Standards for Systems Security Administrator, Senior Systems Security Manager, and Information Systems Security Manager, Department of Defense, Washington, DC, October, 2003 (resulted in CNSS standards 4012, 4013, 4014), 2005.
• Schou, Corey, Frost, James, eDACUM XI, Risk Analyst, Oct. 2005.
• Schou, Corey, Frost, James, eDACUM XII, System Certifier, Oct 2006.
• Schou, Corey, Frost, James, eDACUM XIII, Risk Management, Oct. 2007.
• Schou, C.D., and Frost, J., Standard Committee for National Security Systems – CNSS Standard 4011, Information Assurance, Knowledge, Skill and Ability Compendium, to be published, July 2007.

NIATEC National Science Foundation Information Assurance Directorate Department of Homeland Security CISSE Scholarship For Service