Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
81 open access dissertations and theses found for:
if(Cyber-crime)  »   Refine Search
31.
32.
Validating the OCTAVE Allegro Information Systems Risk Assessment Methodology: A Case Study
by Keating, Corland G., Ph.D.  Nova Southeastern University. 2014: 130 pages; 3611814.
33.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
34.
Bitcoin regulations and investigations: A proposal for U.S. policies
by Fawcett, Jay Palmer, M.S.  Utica College. 2017: 71 pages; 10244196.
35.
How Distributed Ledger Technology is Transforming the Financial Marketplace
by Bougas, Michelle, M.S.  Utica College. 2016: 72 pages; 10245691.
36.
Windows hibernation and memory forensics
by Ayers, Amy L., M.S.  Utica College. 2015: 67 pages; 1586690.
37.
The Role and Impact of Cyber Security Mentoring
by Ellithorpe, James O., Ph.D.  Walden University. 2016: 467 pages; 10126660.
38.
Modeling Intention to Use Deep Packet Inspection Technology in the United Arab Emirates
by Miller, Alfred Howard, Ph.D.  Northcentral University. 2012: 325 pages; 3492475.
39.
40.
Toward hardware-oriented defensive network infrastructure
by Chen, Hao, Ph.D.  State University of New York at Binghamton. 2015: 194 pages; 3713553.
42.
Leadership styles and information security in small businesses: An empirical investigation
by Bhattacharya, Debasis, D.B.A.  University of Phoenix. 2008: 252 pages; 3324059.
43.
Successful Operational Cyber Security Strategies for Small Businesses
by Barosy, Wileen, D.B.A.  Walden University. 2019: 125 pages; 13898243.
45.
Art Loss and Databases: The Quest for a Free Single Unified System
by Foley, Thomas, M.A.  Sotheby's Institute of Art - New York. 2015: 87 pages; 10185640.
46.
The Exceptionalist's Approach to Private Sector Cybersecurity: A Marque and Reprisal Model
by Hopkins, Michael Todd, LL.M.  The George Washington University. 2011: 88 pages; 1505935.
47.
Cyber Mobs: A Model for Improving Protections for Internet Users
by Lazarus, Seth A., M.S.  Utica College. 2017: 79 pages; 10271260.
48.
Traveling Domain Theory: A Comparative Approach for Cyberspace Theory Development
by McCarthy, Thomas David, Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2012: 343 pages; 3516575.
49.
Academic honesty in the digital age
by Ananou, T. Simeon, D.Ed.  Indiana University of Pennsylvania. 2014: 194 pages; 3615494.
50.
53.
An Exploratory Study of the Impact of School Websites on the Perception of Public Schools
by Safanova, Angelica Jimenez, Ed.D.  New Jersey City University. 2017: 181 pages; 10745088.
54.
Network traffic analysis through statistical signal processing methods
by AsSadhan, Basil Abdullah, Ph.D.  Carnegie Mellon University. 2009: 104 pages; 3394005.
55.
A Security Visualization Analysis Methodology for Improving Network Intrusion Detection Efficiency
by Freet, David Nathan, Ph.D.  Indiana State University. 2017: 148 pages; 10261868.
56.
Defending Cross-Site Request Forgery (CSRF) Attacks on Web Applications
by Shaikh, Roshan, D.P.S.  Pace University. 2019: 182 pages; 13904278.
57.
Continuity and Change: Structural Realism and International Stability in the Information Age
by Mitsutomi, Yuichiro, M.A.  The George Washington University. 2011: 105 pages; 1502439.
58.
Schemes for Surviving Advanced Persistent Threats
by Mehresh, Ruchika, Ph.D.  State University of New York at Buffalo. 2013: 159 pages; 3598713.
59.
The globalization of Turkish organized crime and the policy response
by Cengiz, Mahmut, Ph.D.  George Mason University. 2010: 354 pages; 3435745.
31 - 60 of 81 displayed.
« First < Previous |   1    2    3   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest