Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
16906 open access dissertations and theses found for:
if(Cyberspace operations)  »   Refine Search
2.
Continuity and Change: Structural Realism and International Stability in the Information Age
by Mitsutomi, Yuichiro, M.A.  The George Washington University. 2011: 105 pages; 1502439.
3.
Cyber War in a Small War Environment
by Hermann, Rory Michael, Jr., M.S.  Utica College. 2017: 56 pages; 10271200.
4.
Cybersecurity Decision Patterns as Adaptive Knowledge Encoding in Cybersecurity Operations
by Willett, Keith D., Ph.D.  Stevens Institute of Technology. 2016: 228 pages; 10241522.
5.
Traveling Domain Theory: A Comparative Approach for Cyberspace Theory Development
by McCarthy, Thomas David, Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2012: 343 pages; 3516575.
6.
U.S. and NATO Cyber Defense: Bridging the Resource Gap with a Centralized Market Structure
by Lipke, Alexa, M.A.  The George Washington University. 2016: 71 pages; 10189713.
8.
Exploring cybersecurity requirements in the defense acquisition process
by Zeng, Kui, D.Sc.  Capitol Technology University. 2016: 292 pages; 10165487.
9.
The Exceptionalist's Approach to Private Sector Cybersecurity: A Marque and Reprisal Model
by Hopkins, Michael Todd, LL.M.  The George Washington University. 2011: 88 pages; 1505935.
10.
Darknets, cybercrime & the onion router: Anonymity & security in cyberspace
by Yetter, Richard B., M.S.  Utica College. 2015: 102 pages; 1586579.
11.
Anonymous and the virtual collective: Visuality and social movements in cyberspace
by Burford, Caitlyn M. R., M.A.  Northern Arizona University. 2013: 138 pages; 1550096.
13.
Iranian Cyber Espionage
by Spataro, Jason G., M.S.  Utica College. 2019: 72 pages; 13877649.
14.
Cyber-Terrorism: Finding a Common Starting Point
by Biller, Jeffrey Thomas, LL.M.  The George Washington University. 2012: 106 pages; 1515265.
16.
17.
19.
The Times They are A Changin': Cross Cultural Perceptions of Sexual Harassment in Cyberspace
by Cai, Qin, M.A.  Southern Illinois University at Edwardsville. 2015: 82 pages; 1599115.
20.
The Rhetoric of Deliberate Deception: What Catfishing Can Teach Us
by Kottemann, Kathrin L., Ph.D.  University of Louisiana at Lafayette. 2015: 175 pages; 3712554.
21.
Reimagined: How the U.S. Defense Department Responds to Triggers and Organizes to Balance against Threats
by Roman, Javier Alexsandro, M.A.  The University of Texas at San Antonio. 2019: 100 pages; 13881251.
22.
23.
Rhetoric, the First Amendment, and cyberbullying: An examination of space and place in American law
by Primack, Alvin Jack, M.A.  California State University, Long Beach. 2016: 130 pages; 10105279.
24.
Translating Contemporary Japanese Culture: Novels and Animation
by Haga, Tadahiko, Ph.D.  State University of New York at Stony Brook. 2012: 220 pages; 3519050.
27.
The Gamer, The Citizen: The Technological Shift of Socio-Economic Interests in China
by Vassallo, Francisco Restituyo, M.A.  The American University of Paris (France). 2016: 62 pages; 10305866.
28.
Synergistic network operations
by Raza, Saqib, Ph.D.  University of California, Davis. 2010: 173 pages; 3427427.
29.
Development and Application of ITS Operations Evaluation Models (ITSOEMs)
by Murthy, Gummadavelly Narasimha, Ph.D.  University of South Florida. 2012: 290 pages; 3545392.
1 - 30 of 16906 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest