Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
21313 open access dissertations and theses found for:
if(Corporate fraud detection)  »   Refine Search
36.
Punishing the Penitent: Disproportionate Fines in Recent FCPA Enforcements and Suggested Improvements
by Hinchey, Bruce Andrew, LL.M.  The George Washington University. 2010: 91 pages; 1483988.
38.
Addressing the cybersecurity Malicious Insider threat
by Schluderberg, Larry E., M.S.  Utica College. 2014: 79 pages; 1571095.
39.
Three essays on corporate governance
by Marshall, Cassandra D., Ph.D.  Indiana University. 2011: 150 pages; 3491494.
40.
41.
42.
Leadership styles and information security in small businesses: An empirical investigation
by Bhattacharya, Debasis, D.B.A.  University of Phoenix. 2008: 252 pages; 3324059.
44.
Perceptions of U.S. SEC regulators on the effectiveness of SOX 404: A case study
by Fortune, Nicole P., D.M.  University of Phoenix. 2011: 320 pages; 10099844.
45.
The changing role of the mortgage underwriter from 1995–2010: A phenomenological study
by Calvert, Susan Kay, D.M.  University of Phoenix. 2011: 137 pages; 3514794.
47.
Operational Losses: Lessons from Seven of the Largest Rogue Trading Events in History
by Morat, Patricio Leonel, M.S.  The University of North Carolina at Charlotte. 2017: 158 pages; 10278918.
49.
Attributes of identity document credibility: A synthesis of expert knowledge
by Henry, Kenneth Robert St. Leger, Ph.D.  Florida International University. 2008: 121 pages; 3325592.
52.
Cyber Incident Anomaly Detection Using Multivariate Analysis and Machine Learning
by Campbell, Ronald K., D.Engr.  The George Washington University. 2018: 121 pages; 10784357.
55.
Parental payment abuse within the Supplemental Security Income program
by Taylor-King, Darlean, Ph.D.  Walden University. 2008: 154 pages; 3342465.
56.
A comparison of unsupervised learning techniques for detection of medical abuse in automobile claims
by Yang, Li, M.S.  California State University, Long Beach. 2012: 35 pages; 1521650.
57.
Thwarting malicious and selfish behavior in commodity Wi -Fi networks
by Ma, Liran, D.Sc.  The George Washington University. 2008: 123 pages; 3320933.
58.
59.
Spectral Analysis of Directed Graphs using Matrix Perturbation Theory
by Li, Yuemeng, Ph.D.  The University of North Carolina at Charlotte. 2017: 143 pages; 10618933.
60.
How Can Truth-Claims of Voter Fraud Influence Public Policy? A Political Discourse Analysis
by Williams, Gregory T., Ph.D.  Fielding Graduate University. 2019: 285 pages; 13861751.
31 - 60 of 21313 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest