Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
2577 open access dissertations and theses found for:
if(Cyber deterrence)  »   Refine Search
181.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
182.
An online peer support program for cyberbullying: A grant writing project
by Quimpo, Kathy, M.S.W.  California State University, Long Beach. 2014: 62 pages; 1591613.
184.
Female youth and victimization: An examination of traditional and cybermethods of bullying
by Brar, Gurjeet K., M.S.  California State University, Long Beach. 2012: 98 pages; 1522210.
185.
Remotely piloted aircraft: Evolution, diffusion, and the future of air warfare
by Kreuzer, Michael P., Ph.D.  Princeton University. 2014: 441 pages; 3642106.
186.
Distributive benefits and American House elections: Outcomes and voter heterogeneity
by Sidman, Andrew Heath, Ph.D.  State University of New York at Stony Brook. 2007: 254 pages; 3334939.
187.
The Needs of At-Risk Residents and the Design of Community Policing in Detroit
by Kashani, Reza, Psy.D.  Ashford University. 2019: 201 pages; 13862597.
188.
189.
Peer victimization among youth with anxiety disorders
by Cohen, Jeremy, Ph.D.  Temple University. 2013: 114 pages; 3552314.
190.
A Comprehensive Bullying Prevention and Intervention Program a Grant Proposal
by Gasca, Karla, M.S.W.  California State University, Long Beach. 2018: 62 pages; 10784467.
192.
Cybersecurity Workforce Alert: Women's Perspectives on Factors Influencing Female Interest
by Pifer, Carrie L., Ed.D.  Frostburg State University. 2017: 172 pages; 10744000.
193.
The Nature and Impact of Cyberbullying on the Middle School Student
by Pilkey, Jacqueline K., Ed.D.  Walden University. 2011: 168 pages; 3458135.
194.
EventShop: An Information Engine for Processing Massive Heterogeneous Spatio-Temporal Data Streams
by Gao, Mingyan, Ph.D.  University of California, Irvine. 2012: 202 pages; 3544084.
195.
Cybersecurity of wireless implantable medical devices
by Ash, Sarah L., M.S.  Utica College. 2016: 51 pages; 10109631.
196.
Business continuity planning: Identifying gaps, patterns and justifications
by Bethany, Michael P., M.S.  California State University, Long Beach. 2014: 169 pages; 1526894.
197.
An Event Management Framework to Aid Solution Providers in Cybersecurity
by Leon, Ryan James, D.Engr.  The George Washington University. 2018: 114 pages; 10745141.
204.
A grant proposal for program "Tech Connect": Bridging the generations through technology coaching
by Rus, Emily L., M.S.W.  California State University, Long Beach. 2017: 72 pages; 10263550.
205.
A new scada dataset for intrusion detection research
by Turnipseed, Ian P., M.S.  Mississippi State University. 2015: 69 pages; 1596111.
206.
PLC code vulnerabilities through SCADA systems
by Valentine, Sidney E., Ph.D.  University of South Carolina. 2013: 136 pages; 3561883.
208.
Applying Random Forest to Mitigate Cybersecurity Data Breaches in Small Businesses
by Liguori, Patricia Ann, D.Engr.  The George Washington University. 2018: 177 pages; 10928320.
209.
Bullying victimization among adolescent students: A qualitative study
by Lara, Cecy, M.S.W.  California State University, Long Beach. 2015: 52 pages; 1590123.
210.
Prison ministry and balancing philosophies of justice: History and case studies
by Morrissette, William J., Ph.D.  Salve Regina University. 2010: 274 pages; 3436837.
181 - 210 of 2577 displayed.
« First < Previous |   4    5    6    7    8    9    10    11    12    13    14   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest