Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
3562 open access dissertations and theses found for:
if(Breach)  »   Refine Search
3.
Outcomes of psychological contract breach and violation
by Miller, David, M.S.  California State University, Long Beach. 2010: 79 pages; 1490312.
5.
Effects of Group Apology and Reparation after Breach of Psychological Contract
by Alongi, Anthony, M.S.  Rochester Institute of Technology. 2011: 48 pages; 1501417.
6.
The impact of data breaches on market value of firms in the E-Commerce marketplace
by Washington, Kevin D., D.B.A.  Capella University. 2016: 84 pages; 10102712.
7.
The Impact of Human Systems Integration on Major Defense Acquisition Program Success
by Algarin, Liana Michelle, D.Sc.  The George Washington University. 2016: 176 pages; 10076303.
8.
Representation of dam-breach geometry using quadtree local mesh refinement
by McGrath, Marcus Z., M.S.  The University of Mississippi. 2013: 120 pages; 1540533.
9.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
10.
Construction and characterization of a single stage dual diaphragm gas gun
by Helminiak, Nathaniel Steven, M.S.  Marquette University. 2017: 295 pages; 10641398.
11.
Applying Random Forest to Mitigate Cybersecurity Data Breaches in Small Businesses
by Liguori, Patricia Ann, D.Engr.  The George Washington University. 2018: 177 pages; 10928320.
13.
Lived narratives, everyday trauma, and the aftermath of the Bosnian war: Human rights as living practice
by Richards, Jessie Woolley, Ph.D.  The University of Utah. 2016: 215 pages; 10163084.
14.
State Responsibility under International Law the 2003 U.S. Invasion of Iraq
by Issa, Carla Maria, M.A.  The American University of Paris (France). 2016: 56 pages; 13871616.
15.
Analysis Of Decision Factors For The Application Of Information Access Controls Within The Organization
by Foerster, Carl A., D.Sc.  The George Washington University. 2013: 165 pages; 3553953.
16.
An Analysis of Data Security Standards at Hedge Funds
by Zambotti, Michael J., M.S.  Utica College. 2017: 66 pages; 10283770.
17.
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches
by Osei-Amanfi, Michael, D.B.A.  Grand Canyon University. 2018: 359 pages; 13423232.
20.
Hydrodynamics and Salt Dispersion in Intermittently Closed Bar-Built Estuaries
by Williams, Megan E., Ph.D.  University of California, Berkeley. 2014: 115 pages; 10185496.
22.
A matrix for small business owners to better protect their network
by Labossiere, Dennis L., M.S.  Utica College. 2016: 76 pages; 1605731.
23.
Perceived Corporate Hypocrisy: Scale Development in the Context of US Retail Employees
by Goswami, Saheli, Ph.D.  University of Missouri - Columbia. 2017: 312 pages; 13869859.
24.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
25.
Cybersecurity IR: A Thematic-analysis of Practitioner Plans, Policies, and Guidelines
by Fox, Michael B., Ph.D.  Trident University International. 2019: 192 pages; 13904714.
27.
Performing asexuality through narratives of sexual identity
by Sundrud, Janet L., M.A.  San Jose State University. 2011: 126 pages; 1512069.
28.
Protecting Digital Evidence during Natural Disasters: Why It Is Important
by Dodrill, Charles A., M.S.  Utica College. 2018: 66 pages; 10788395.
1 - 30 of 3562 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest