COMING SOON! PQDT Open is getting a new home!

ProQuest Open Access Dissertations & Theses will remain freely available as part of a new and enhanced search experience at www.proquest.com.

Questions? Please refer to this FAQ.

Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
13605 open access dissertations and theses found for:
if(Dangerous permissions)  »   Refine Search
1.
Analyzing Consumer’s Awareness of Protecting Personally Identifiable Information on Android Smartphones
by Capellman, Douglas D., D.B.A.  Capitol Technology University. 2018: 184 pages; 27547726.
2.
Relationship between User Privacy and Application Permissions in Smartphone Platforms
by Caushaj, Eralda, Ph.D.  Oakland University. 2017: 159 pages; 10639215.
4.
Boycott Ethics
by Pickard, Caleb, Ph.D.  University of Colorado at Boulder. 2019: 223 pages; 27542888.
5.
Privilege Leakage in Practical Systems
by Grace, Michael C., Ph.D.  North Carolina State University. 2017: 114 pages; 10969800.
6.
Users' privacy and security behaviors on mobile devices
by Blount, Charles Lenward, M.S.  University of Maryland, Baltimore County. 2014: 106 pages; 1571723.
7.
Stampede Theory: Mapping and Treating Dangerous Misinformation at Scale
by Feldman, Philip, Ph.D.  University of Maryland, Baltimore County. 2020: 399 pages; 27830588.
8.
The dangerous reality: Sexual risk taking among college women
by Greybar Milliken, Shannon J., Ed.D.  DePaul University. 2013: 134 pages; 3586284.
9.
Cell phone contraband in Georgia prison: How dangerous is it?
by Williams, Angela, D.M.IST.  University of Phoenix. 2014: 116 pages; 3691996.
10.
A Most Dangerous Science: Discipline and German Political Philosophy, 1600-1648
by Staley, Maxwell Reed, Ph.D.  University of California, Berkeley. 2018: 135 pages; 10930815.
11.
Towards Effective Third-Party Application Dialogs: Solutions for Improved Attention and Comprehension
by Javed, Yousra, Ph.D.  The University of North Carolina at Charlotte. 2017: 211 pages; 10618024.
12.
Thucydides' dangerous world: Dual forms of danger in classical Greek interstate relations
by Grissom, Daryl Edward, Ph.D.  University of Maryland, College Park. 2012: 520 pages; 3553343.
13.
Mapping dangerous bodies: The historical geopolitics and spatial regulation of the freak show
by Squitieri, Todd, M.A.  The William Paterson University of New Jersey. 2013: 43 pages; 1530980.
17.
Detection and Prevention of Misuse of Software Components
by Ting, Dai, Ph.D.  National University of Singapore (Singapore). 2015: 141 pages; 10005992.
18.
Improving the Quality of Security Policies
by Hwang, JeeHyun, Ph.D.  North Carolina State University. 2014: 146 pages; 3584006.
19.
Automatic Program State Exploration Techniques for Security Analysis of Android Apps
by Johnson, Ryan, Ph.D.  George Mason University. 2019: 211 pages; 27667472.
20.
Social Ontology and Social Normativity
by Donohue, Brian Joshua, Ph.D.  State University of New York at Buffalo. 2020: 177 pages; 27738506.
21.
Precisely serializable snapshot isolation
by Revilak, Stephen A., Ph.D.  University of Massachusetts Boston. 2011: 176 pages; 3490005.
22.
Designing Privacy Notices: Supporting User Understanding and Control
by Kelley, Patrick Gage, Ph.D.  Carnegie Mellon University. 2013: 177 pages; 3573455.
24.
Novel Techniques of Using Diversity in Software Security and Information Hiding
by Han, Jin, Ph.D.  Singapore Management University (Singapore). 2012: 153 pages; 3539462.
25.
Accommodative mandatory access control
by Thomas, Jacques D., Ph.D.  Purdue University. 2011: 236 pages; 3506071.
26.
Enforcing role-based access control on a social network
by Anderson, James Carold, M.S.  East Carolina University. 2012: 240 pages; 1518475.
27.
Automated Vulnerability Assessment of Mobile Device Vulnerabilities
by Shambra, Stephen M., M.S.  Mississippi State University. 2017: 83 pages; 10264418.
28.
Scalable role & organization based access control and its administration
by Zhang, Zhixiong, Ph.D.  George Mason University. 2008: 131 pages; 3313522.
29.
An Empirical Study of Privacy Risk Assessment Methodologies in Cloud Computing Environments
by Pauley, Wayne A., Jr., Ph.D.  Nova Southeastern University. 2012: 222 pages; 3499794.
1 - 30 of 13605 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest