Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
118 open access dissertations and theses found for:
if(Cybercrime)  »   Refine Search
31.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
32.
A Security Strategy for the United States of America
by Pedersen, Christian E.||||||Payne, Michael A.||||||Gagner, Cari, M.P.P.  Pepperdine University. 2014: 91 pages; 1594924.
33.
Creating urgency in tech support scam telephone conversations
by Tabron, Judith L., M.A.  Hofstra University. 2016: 99 pages; 10253641.
34.
Exploring Crisis Management in U.S. Small Businesses
by Williams, Jon, D.B.A.  Northcentral University. 2016: 117 pages; 10109613.
37.
Permeable Socialization Flow and Hacker Code Switching Practice: A Metacognitive, Situated Approach
by DiGiovanni, Frank Christopher, Ed.D.  University of Pennsylvania. 2018: 283 pages; 10977668.
39.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
40.
A synthesized definition and analysis of computer ethics
by Hall, Brian Richard, D.Sc.  Robert Morris University. 2014: 332 pages; 3622702.
41.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
42.
An Analysis of Data Security Standards at Hedge Funds
by Zambotti, Michael J., M.S.  Utica College. 2017: 66 pages; 10283770.
43.
45.
46.
Addressing the cybersecurity Malicious Insider threat
by Schluderberg, Larry E., M.S.  Utica College. 2014: 79 pages; 1571095.
47.
A policy analysis of phishing countermeasures
by Sheng, Xinguang (Steve), Ph.D.  Carnegie Mellon University. 2009: 181 pages; 3383412.
48.
Critical Infrastructure: Legislative Factors for Preventing a "Cyber-Pearl Harbor"
by Palmer, Robert Kenneth, LL.M.  The George Washington University. 2013: 75 pages; 1545831.
49.
Strategies to Minimize the Effects of Information Security Threats on Business Performance
by Okoye, Stella Ifeyinwa, D.B.A.  Walden University. 2017: 197 pages; 10606454.
50.
Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study
by Varnadore, Michael Ray, DM/IST  University of Phoenix. 2018: 208 pages; 10808067.
53.
Structuring Disincentives for Online Criminals
by Leontiadis, Nektarios, Ph.D.  Carnegie Mellon University. 2014: 370 pages; 3691274.
57.
59.
The healthy relationships safe communities project: a teen dating violence prevention program: a grant proposal
by Myers, Kellisa Christine, M.S.W.  California State University, Long Beach. 2015: 69 pages; 1590137.
60.
S4h: A Peer-to-Peer Search Engine with Explicit Trust
by Cowan, Greg, M.S.  Rensselaer Polytechnic Institute. 2019: 49 pages; 13813168.
31 - 60 of 118 displayed.
« First < Previous |   1    2    3    4   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest