Julie J. C. H. Ryan

Learn More
Survey data on information security trends and concerns are used to justify increased expenditures on security tools and technologies. Students use the data to support term paper analyses. Government officials use these data to justify program initiatives and to berate companies for inadequate security. The numbers, however, are anecdotal, are not(More)
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond spam, or phishing designed to trick users into revealing personal information, targeted malicious email facilitates computer network exploitation and the gathering of sensitive information from(More)
Maximum likelihood confirmatory factor analysis was applied to the Wechsler Intelligence Scale for Children-Third Edition (WISC-III; Wechsler, 1991) data of a mixed clinical sample of 318 children. Analyses were designed to determine which of nine hypothesized oblique factor solutions could best explain intelligence as measured by the WISC-III in the(More)