Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
70 open access dissertations and theses found for:
if(Computer-crime)  »   Refine Search
2.
Cyber-Terrorism: Finding a Common Starting Point
by Biller, Jeffrey Thomas, LL.M.  The George Washington University. 2012: 106 pages; 1515265.
5.
Understanding the Impact of Hacker Innovation upon IS Security Countermeasures
by Zadig, Sean M., Ph.D.  Nova Southeastern University. 2016: 240 pages; 10162159.
6.
Misinterpretation of Digital Evidence: Recommendations to Improve Data Integrity
by Bednar-Schadle, Teresa, M.S.  Utica College. 2018: 73 pages; 13423713.
7.
Information technology-related operational risk: An empirical study
by Goldstein, James Charles, Jr., Ph.D.  Syracuse University. 2009: 164 pages; 3410001.
9.
The effect of password management procedures on the entropy of user selected passwords
by Enamait, John D., Ph.D.  Indiana State University. 2012: 153 pages; 3507494.
10.
The legal, community policing, and resource challenges of dealing with advance fee fraud
by Miller, Kim, Ph.D.  Capella University. 2016: 173 pages; 10036422.
12.
A synthesized definition and analysis of computer ethics
by Hall, Brian Richard, D.Sc.  Robert Morris University. 2014: 332 pages; 3622702.
13.
Toward hardware-oriented defensive network infrastructure
by Chen, Hao, Ph.D.  State University of New York at Binghamton. 2015: 194 pages; 3713553.
16.
The Impact of Mindfulness on Non-malicious Spillage within Images on Social Networking Sites
by Landress, Angela D., Ph.D.  Nova Southeastern University. 2018: 100 pages; 10842441.
19.
Leadership styles and information security in small businesses: An empirical investigation
by Bhattacharya, Debasis, D.B.A.  University of Phoenix. 2008: 252 pages; 3324059.
20.
An investigation of the determinants of employees' decisions to use organizational computing resources for non-work purposes
by Campbell, Stephen Matthew, Ph.D.  The University of North Carolina at Charlotte. 2010: 177 pages; 3412543.
21.
A Prudent Access Control Behavioral Intention Model for the Healthcare Domain
by Mussa, Constance C., Ph.D.  Nova Southeastern University. 2011: 247 pages; 3474092.
22.
Examining the relationship between organization systems and information security awareness
by Tintamusik, Yanarong, D.B.A.  Northcentral University. 2010: 183 pages; 3411167.
23.
The relationship between cell phone use and identity theft
by Saunders, Lewis O., Ph.D.  Walden University. 2014: 135 pages; 3615824.
24.
Nation State Threat Actions Against Critical Energy Infrastructures
by Garner, Michael Wilson, Jr., M.S.  Utica College. 2017: 43 pages; 10686214.
25.
Machine Learning for the Automated Identification of Cyberbullying and Cyberharassment
by Ducharme, Daniel N., Ph.D.  University of Rhode Island. 2017: 145 pages; 10259474.
26.
Byzantine survivable routing for mobile ad hoc networks
by Holmer, David, Ph.D.  The Johns Hopkins University. 2007: 101 pages; 3267877.
27.
Pure Creations Midwifery Services, LLC
by Chan, Rene, M.S.  California State University, Long Beach. 2019: 66 pages; 13856885.
28.
Integrated hardware/software approaches to software security for embedded systems
by Gelbart, Olga, D.Sc.  The George Washington University. 2008: 137 pages; 3297440.
30.
Bitcoin regulations and investigations: A proposal for U.S. policies
by Fawcett, Jay Palmer, M.S.  Utica College. 2017: 71 pages; 10244196.
1 - 30 of 70 displayed.
  1    2    3   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest