Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
21800 open access dissertations and theses found for:
if(Cyber policies)  »   Refine Search
1.
Cyber terrorrism threats
by Gobran, Ashraf, M.S.  Utica College. 2015: 48 pages; 1588500.
3.
Hyper-connectivity: Intricacies of national and international cyber securities
by Dawson, Maurice, Ph.D.  London Metropolitan University (United Kingdom). 2017: 530 pages; 10800987.
4.
Cyber-harassment in higher education: A study of institutional policies and procedures
by Schaefer-Ramirez, Victoria Ann, Ed.D.  Pepperdine University. 2017: 182 pages; 10265669.
5.
How U.S. political and socio-economic trends promotes hacktivist activity
by Aviles, Grisselle, M.S.  Utica College. 2015: 85 pages; 1590361.
7.
Cyber-Terrorism: Finding a Common Starting Point
by Biller, Jeffrey Thomas, LL.M.  The George Washington University. 2012: 106 pages; 1515265.
8.
Cyber Agility for Attack Deterrence and Deception
by Jafarian, Jafar Haadi, Ph.D.  The University of North Carolina at Charlotte. 2017: 200 pages; 10686943.
9.
Cybersecurity IR: A Thematic-analysis of Practitioner Plans, Policies, and Guidelines
by Fox, Michael B., Ph.D.  Trident University International. 2019: 192 pages; 13904714.
10.
11.
Defending Cross-Site Request Forgery (CSRF) Attacks on Web Applications
by Shaikh, Roshan, D.P.S.  Pace University. 2019: 182 pages; 13904278.
12.
A Study of Educators Experience in Managing Cyberbullying
by Gutierrez, Gilbert, EDD/CI  University of Phoenix. 2018: 128 pages; 10933381.
13.
Electronic discovery
by Keck, Andrew G., M.S.  Utica College. 2016: 58 pages; 10101099.
14.
A policy analysis examining cyber bullying at the national, state and local level
by Price, Jennifer A.||||||Birk, Sarah L.||||||Meisenheimer, Jeffrey W., Ed.D.  Saint Louis University. 2013: 165 pages; 3624109.
16.
Cyber bear: Russian cyber threat to its neighbors and America
by Mshvidobadze, Khatuna, M.S.  Utica College. 2014: 68 pages; 1571750.
22.
Cyber Mobs: A Model for Improving Protections for Internet Users
by Lazarus, Seth A., M.S.  Utica College. 2017: 79 pages; 10271260.
23.
24.
Attacking bullying; an examination of anti-bullying legislation and policies
by Toso, Tamara Marrella, Ph.D.  Alvernia University. 2012: 210 pages; 3505717.
25.
Cross-Layer Design for Secure and Resilient Control of Cyber-Physical Systems in Smart Cities
by Xu, Zhiheng, Ph.D.  New York University Tandon School of Engineering. 2018: 225 pages; 10840627.
26.
Industrie 4.0 – gestaltung cyber-physischer logistiksysteme zur unterstützung des logistikmanagements in der smart factory
by Roy, Daniel Thomas, Ph.D.  Technische Universitaet Berlin (Germany). 2017: 13815733.
27.
The Role and Impact of Cyber Security Mentoring
by Ellithorpe, James O., Ph.D.  Walden University. 2016: 467 pages; 10126660.
28.
Reasons for non-compliance with mandatory information assurance policies by a trained population
by Shelton, D. Cragin, D.Sc.  Capitol Technology University. 2014: 243 pages; 3741052.
29.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
1 - 30 of 21800 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest