Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
51172 open access dissertations and theses found for:
if(Feeral Information Security Management Act)  »   Refine Search
181.
Attributes effecting software testing estimation; is organizational trust an issue?
by Hammoud, Wissam, D.M.IST.  University of Phoenix. 2013: 172 pages; 3583478.
183.
185.
Guidelines for Healthcare Providers When User Testing Computerized Provider Order Entry
by Whiteside, Martin P., M.S.  University of California, Davis. 2013: 143 pages; 1565738.
188.
191.
The impact of power of attorney abuse on the elderly: A case study
by Presto, Sylvia, D.Sc.  New Jersey City University. 2015: 149 pages; 3730744.
192.
Use of double-loop learning to combat advanced persistent threat: Multiple case studies
by Lamb, Christopher J., Ph.D.  Capella University. 2013: 151 pages; 3607034.
193.
Improving Retention of Stem Students Using Data Mining Design: A Quantitative Study
by Amin, Awatif, DM/IST  University of Phoenix. 2019: 166 pages; 13886708.
194.
195.
The role of nurses in health care reform: A project report
by Oparnica, Danica, M.S.N.  California State University, Long Beach. 2013: 69 pages; 1527336.
196.
Darknets, cybercrime & the onion router: Anonymity & security in cyberspace
by Yetter, Richard B., M.S.  Utica College. 2015: 102 pages; 1586579.
197.
An analysis of open source security software products downloads
by Barta, Brian J., Ph.D.  Capella University. 2014: 101 pages; 3613581.
199.
A human-centered approach to improving the user experience of software updates
by Mathur, Arunesh, M.S.  University of Maryland, College Park. 2016: 111 pages; 10161060.
200.
Security measures to reduce violence in hospital settings
by Diaz, George M., M.H.A.  California State University, Long Beach. 2011: 46 pages; 1493012.
203.
Informational privacy protections: Do state laws offer public health leaders the flexibility they need?
by O'Connor, Jean C., Dr.P.H.  The University of North Carolina at Chapel Hill. 2009: 137 pages; 3387969.
204.
205.
An Empirical Investigation of the Antecedents and Validity of Five Theory Bases of Logistics Outsourcing Decisions
by Mathien, Lorena D., Ph.D.  State University of New York at Buffalo. 2013: 404 pages; 3554476.
206.
The relationship between cell phone use and identity theft
by Saunders, Lewis O., Ph.D.  Walden University. 2014: 135 pages; 3615824.
207.
209.
Bridging scientific model outputs with emergency response needs in catastrophic earthquake responses
by Johannes, Tay W., Ph.D.  The George Washington University. 2010: 161 pages; 3397309.
210.
Confirming the Stankosky Knowledge Management Framework
by Ternes, Carl D., Jr., D.Sc.  The George Washington University. 2011: 298 pages; 3479076.
181 - 210 of 51172 displayed.
« First < Previous |   4    5    6    7    8    9    10    11    12    13    14   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest