COMING SOON! PQDT Open is getting a new home!

ProQuest Open Access Dissertations & Theses will remain freely available as part of a new and enhanced search experience at www.proquest.com.

Questions? Please refer to this FAQ.

Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
68 open access dissertations and theses found for:
if(Cybercriminals)  »   Refine Search
2.
Forensic Accountants' Strategies and Cybercrime Mitigation
by Okechukwu, Joseph Chukwudi, D.B.A.  Northcentral University. 2020: 201 pages; 27830687.
4.
Analysis and Detection of the Silent Thieves
by Perez, Jon, M.S.  Utica College. 2018: 94 pages; 10931156.
5.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
6.
An Examination of User Detection of Business eMail Compromise amongst Corporate Professionals
by Aviv, Shahar Sean, Ph.D.  Nova Southeastern University. 2019: 141 pages; 27667282.
7.
Darknets, cybercrime & the onion router: Anonymity & security in cyberspace
by Yetter, Richard B., M.S.  Utica College. 2015: 102 pages; 1586579.
8.
Leadership styles and information security in small businesses: An empirical investigation
by Bhattacharya, Debasis, D.B.A.  University of Phoenix. 2008: 252 pages; 3324059.
9.
10.
An Exploration of Countermeasures to Defend Against Weaponized AI Malware Exploiting Facial Recognition
by Jalaluddin, Arooj Zafar, D.Sc.  Capitol Technology University. 2020: 197 pages; 28094887.
11.
Successful Operational Cyber Security Strategies for Small Businesses
by Barosy, Wileen, D.B.A.  Walden University. 2019: 125 pages; 13898243.
12.
IT Security Managers' Strategies for Mitigating Data Breaches in Texas School Districts
by Nwankwo, Mercy Ikhuoria, D.I.T.  Walden University. 2020: 273 pages; 28150989.
14.
Misinterpretation of Digital Evidence: Recommendations to Improve Data Integrity
by Bednar-Schadle, Teresa, M.S.  Utica College. 2018: 73 pages; 13423713.
15.
Evolving Ransomware Attacks on Healthcare Providers
by Al Qartah, Ayed, M.S.  Utica College. 2020: 70 pages; 28093945.
16.
Impact of Information Breaches on Health Care Records
by Antony Arockiasamy, Anton, Ph.D.  Walden University. 2021: 123 pages; 28318026.
17.
How U.S. political and socio-economic trends promotes hacktivist activity
by Aviles, Grisselle, M.S.  Utica College. 2015: 85 pages; 1590361.
18.
A Cybersecurity Strategy for the Small Business
by Perez, Cesar, M.S.  Utica College. 2020: 49 pages; 28092738.
20.
The Impact of Mindfulness on Non-malicious Spillage within Images on Social Networking Sites
by Landress, Angela D., Ph.D.  Nova Southeastern University. 2018: 100 pages; 10842441.
21.
An analysis of open source security software products downloads
by Barta, Brian J., Ph.D.  Capella University. 2014: 101 pages; 3613581.
22.
Methodologies and Tools to Study Malicious Ecosystems
by miramirkhani, najmehalsadat, Ph.D.  State University of New York at Stony Brook. 2020: 147 pages; 27738172.
23.
Protecting the Commercial Connected Truck from Vulnerabilities Through Secure Software Development – A Case Study
by McWhite, Maureen C., D.I.T.  Capella University. 2020: 111 pages; 27832866.
24.
Transnational Organized Crime in the Balkans from a Cultural Perspective
by Wong, Tomasina, M.S.  Utica College. 2020: 56 pages; 28257440.
25.
Microsoft 365 and Exchange Server Hybrid Forensics
by Carlson, Alex, M.S.  Utica College. 2019: 71 pages; 27670117.
27.
A matrix for small business owners to better protect their network
by Labossiere, Dennis L., M.S.  Utica College. 2016: 76 pages; 1605731.
28.
Cybersecurity Workforce Alert: Women's Perspectives on Factors Influencing Female Interest
by Pifer, Carrie L., Ed.D.  Frostburg State University. 2017: 172 pages; 10744000.
30.
The effects of conformity and training in a phishing context: Conforming to the school of phish
by Jones, Matt, M.A.  The University of Alabama in Huntsville. 2015: 43 pages; 10182209.
1 - 30 of 68 displayed.
  1    2    3   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest