Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
42613 open access dissertations and theses found for:
if(Data breaches)  »   Refine Search
1.
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches
by Osei-Amanfi, Michael, D.B.A.  Grand Canyon University. 2018: 359 pages; 13423232.
2.
The impact of data breaches on market value of firms in the E-Commerce marketplace
by Washington, Kevin D., D.B.A.  Capella University. 2016: 84 pages; 10102712.
4.
Applying Random Forest to Mitigate Cybersecurity Data Breaches in Small Businesses
by Liguori, Patricia Ann, D.Engr.  The George Washington University. 2018: 177 pages; 10928320.
7.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
8.
An Analysis of Data Security Standards at Hedge Funds
by Zambotti, Michael J., M.S.  Utica College. 2017: 66 pages; 10283770.
11.
The Impact of Human Systems Integration on Major Defense Acquisition Program Success
by Algarin, Liana Michelle, D.Sc.  The George Washington University. 2016: 176 pages; 10076303.
13.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
14.
A matrix for small business owners to better protect their network
by Labossiere, Dennis L., M.S.  Utica College. 2016: 76 pages; 1605731.
16.
Successful Operational Cyber Security Strategies for Small Businesses
by Barosy, Wileen, D.B.A.  Walden University. 2019: 125 pages; 13898243.
19.
Validating the OCTAVE Allegro Information Systems Risk Assessment Methodology: A Case Study
by Keating, Corland G., Ph.D.  Nova Southeastern University. 2014: 130 pages; 3611814.
21.
Understanding the Impact of Hacker Innovation upon IS Security Countermeasures
by Zadig, Sean M., Ph.D.  Nova Southeastern University. 2016: 240 pages; 10162159.
23.
Financial and patient impact of electronic health records on small physician practice: A Delphi Study
by Sines, Chad Christopher, D.B.A.  University of Phoenix. 2014: 188 pages; 3692000.
25.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
27.
The Impact of Mindfulness on Non-malicious Spillage within Images on Social Networking Sites
by Landress, Angela D., Ph.D.  Nova Southeastern University. 2018: 100 pages; 10842441.
28.
User Information Security Behavior in Professional Virtual Communities: A Technology Threat Avoidance Approach
by Forrester, Vivienne V., Ph.D.  Nova Southeastern University. 2019: 149 pages; 13899278.
30.
The effect of password management procedures on the entropy of user selected passwords
by Enamait, John D., Ph.D.  Indiana State University. 2012: 153 pages; 3507494.
1 - 30 of 42613 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest