Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
46458 open access dissertations and theses found for:
if(Feeral Information Security Management Act)  »   Refine Search
242.
244.
The Influence of Language Choice in Acceptable Use Polices on Students' Locus of Control
by Lickteig, Stacy L., Ed.D.  University of Nebraska at Omaha. 2017: 132 pages; 10289757.
246.
Housing strategies for Transitional Age Youth (TAY) in the child welfare system: A grant proposal
by Cooper, Merchuria, M.S.W.  California State University, Long Beach. 2016: 68 pages; 1604886.
247.
Best practices to establish successful mobile health service in a healthcare setting
by Andrews, Kathy M., Ed.D.  Pepperdine University. 2016: 160 pages; 10251009.
248.
The effect of shared dynamic understanding on willingness to contribute information: Design and analysis of a mega-collaborative interface
by Newlon, Christine Mae, Ph.D.  Indiana University - Purdue University Indianapolis. 2016: 358 pages; 10159859.
249.
Serenity Home Care, LLC Home Health Agency for the Elderly Population in Orange County, CA
by Godinez, Nereida, M.S.  California State University, Long Beach. 2017: 70 pages; 10600836.
251.
Counterterrorism Policy towards Boko Haram in Nigeria during 2009-2015
by Ojelade, Steve Olufemi, Ph.D.  Walden University. 2018: 230 pages; 10982497.
255.
All-hazards and active shooter web-based training: Beneficial to the transportation security administration workforce
by Medina, Amira Jean, M.S.  California State University, Long Beach. 2016: 75 pages; 10096064.
257.
A matrix for small business owners to better protect their network
by Labossiere, Dennis L., M.S.  Utica College. 2016: 76 pages; 1605731.
258.
Oversight: Accountability in the American Recovery and Reinvestment Act
by Selinger, William Jay, LL.M.  The George Washington University. 2011: 72 pages; 1505941.
259.
Critical Infrastructure: Legislative Factors for Preventing a "Cyber-Pearl Harbor"
by Palmer, Robert Kenneth, LL.M.  The George Washington University. 2013: 75 pages; 1545831.
260.
Addressing the cybersecurity Malicious Insider threat
by Schluderberg, Larry E., M.S.  Utica College. 2014: 79 pages; 1571095.
261.
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches
by Osei-Amanfi, Michael, D.B.A.  Grand Canyon University. 2018: 359 pages; 13423232.
262.
A framework for collecting, extracting and managing event identity information from textual content in social media
by Mahata, Debanjan, Ph.D.  University of Arkansas at Little Rock. 2015: 206 pages; 10117973.
263.
Data Governance Importance and Effectiveness: Health System Employee Perception
by Stephens, Joshua J., D.H.A.  Central Michigan University. 2018: 175 pages; 10751061.
264.
Civil -military relations in democratizing Taiwan, 1986–2007
by Tzeng, Yi-suo, Ph.D.  The George Washington University. 2009: 235 pages; 3349651.
267.
Perceptions of school violence: School personnel views of violent behavior and preparedness
by Henriques, Jeanine M., Ph.D.  Capella University. 2010: 128 pages; 3433745.
268.
Successful Operational Cyber Security Strategies for Small Businesses
by Barosy, Wileen, D.B.A.  Walden University. 2019: 125 pages; 13898243.
269.
Neocare equipment, L.LC.
by Johnson, Brittany, M.S.  California State University, Long Beach. 2017: 63 pages; 10260423.
270.
Chasing the Climate Change Momentum: Linking DOD's Operational Energy Program Recommendations for the Department of Defense
by Didawick, Holly Higgins, LL.M.  The George Washington University. 2019: 71 pages; 13883074.
241 - 270 of 46458 displayed.
« First < Previous |   6    7    8    9    10    11    12    13    14    15    16   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest