COMING SOON! PQDT Open is getting a new home!

ProQuest Open Access Dissertations & Theses will remain freely available as part of a new and enhanced search experience at www.proquest.com.

Questions? Please refer to this FAQ.

Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
165 open access dissertations and theses found for:
if(Cybercrime)  »   Refine Search
1.
Forensic Accountants' Strategies and Cybercrime Mitigation
by Okechukwu, Joseph Chukwudi, D.B.A.  Northcentral University. 2020: 201 pages; 27830687.
2.
Darknets, cybercrime & the onion router: Anonymity & security in cyberspace
by Yetter, Richard B., M.S.  Utica College. 2015: 102 pages; 1586579.
4.
Leadership styles and information security in small businesses: An empirical investigation
by Bhattacharya, Debasis, D.B.A.  University of Phoenix. 2008: 252 pages; 3324059.
5.
Modeling Intention to Use Deep Packet Inspection Technology in the United Arab Emirates
by Miller, Alfred Howard, Ph.D.  Northcentral University. 2012: 325 pages; 3492475.
6.
The relationship between cell phone use and identity theft
by Saunders, Lewis O., Ph.D.  Walden University. 2014: 135 pages; 3615824.
8.
Cyber-Terrorism: Finding a Common Starting Point
by Biller, Jeffrey Thomas, LL.M.  The George Washington University. 2012: 106 pages; 1515265.
9.
Transnational Organized Crime in the Balkans from a Cultural Perspective
by Wong, Tomasina, M.S.  Utica College. 2020: 56 pages; 28257440.
10.
Digital Image Source Authentication
by Schippers, David A., D.Sc.  Capitol Technology University. 2018: 223 pages; 27828526.
11.
Misinterpretation of Digital Evidence: Recommendations to Improve Data Integrity
by Bednar-Schadle, Teresa, M.S.  Utica College. 2018: 73 pages; 13423713.
13.
Cyber Mobs: A Model for Improving Protections for Internet Users
by Lazarus, Seth A., M.S.  Utica College. 2017: 79 pages; 10271260.
16.
17.
The Exceptionalist's Approach to Private Sector Cybersecurity: A Marque and Reprisal Model
by Hopkins, Michael Todd, LL.M.  The George Washington University. 2011: 88 pages; 1505935.
18.
Protecting the Commercial Connected Truck from Vulnerabilities Through Secure Software Development – A Case Study
by McWhite, Maureen C., D.I.T.  Capella University. 2020: 111 pages; 27832866.
19.
An Examination of User Detection of Business eMail Compromise amongst Corporate Professionals
by Aviv, Shahar Sean, Ph.D.  Nova Southeastern University. 2019: 141 pages; 27667282.
22.
Exploring internet users' vulnerability to online dating fraud: Analysis of routine activities theory factors
by Garrett, Elena Victorovna, M.S.  The University of Texas at Dallas. 2014: 124 pages; 1583633.
23.
A Cybersecurity Strategy for the Small Business
by Perez, Cesar, M.S.  Utica College. 2020: 49 pages; 28092738.
24.
Behavioral Biometrics and the Insider Threat
by Rash, Matthew, M.S.  Utica College. 2017: 60 pages; 10273200.
25.
Methodologies and Tools to Study Malicious Ecosystems
by miramirkhani, najmehalsadat, Ph.D.  State University of New York at Stony Brook. 2020: 147 pages; 27738172.
26.
The effects of conformity and training in a phishing context: Conforming to the school of phish
by Jones, Matt, M.A.  The University of Alabama in Huntsville. 2015: 43 pages; 10182209.
27.
Successful Operational Cyber Security Strategies for Small Businesses
by Barosy, Wileen, D.B.A.  Walden University. 2019: 125 pages; 13898243.
28.
Maintaining Small Retail Business Profitability by Reducing Cyberattacks
by Phillips, Ira J., Jr., D.B.A.  Walden University. 2020: 141 pages; 28024279.
29.
Analysis and Detection of the Silent Thieves
by Perez, Jon, M.S.  Utica College. 2018: 94 pages; 10931156.
30.
How U.S. political and socio-economic trends promotes hacktivist activity
by Aviles, Grisselle, M.S.  Utica College. 2015: 85 pages; 1590361.
1 - 30 of 165 displayed.
  1    2    3    4    5    6   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest