Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
46533 open access dissertations and theses found for:
if(Feeral Information Security Management Act)  »   Refine Search
33.
Factors influencing the quality of EHR performance: An exploratory qualitative study
by Rhodes, Harry B., Ph.D.  Capella University. 2016: 235 pages; 10252643.
34.
User Information Security Behavior in Professional Virtual Communities: A Technology Threat Avoidance Approach
by Forrester, Vivienne V., Ph.D.  Nova Southeastern University. 2019: 149 pages; 13899278.
35.
The Role and Impact of Cyber Security Mentoring
by Ellithorpe, James O., Ph.D.  Walden University. 2016: 467 pages; 10126660.
36.
Bridging scientific model outputs with emergency response needs in catastrophic earthquake responses
by Johannes, Tay W., Ph.D.  The George Washington University. 2010: 161 pages; 3397309.
37.
Transboundary agreement: Case studies of marine mammal management in the bering strait
by Aho, Kelsey B., M.A.  University of Alaska Fairbanks. 2016: 165 pages; 10245619.
40.
Data governance: The missing approach to improving data quality
by Barker, James M., DM/IST  University of Phoenix. 2016: 293 pages; 10248424.
41.
Executive security awareness primer
by Toussaint, Gregory W., M.S.  Utica College. 2015: 66 pages; 1586318.
42.
Parental payment abuse within the Supplemental Security Income program
by Taylor-King, Darlean, Ph.D.  Walden University. 2008: 154 pages; 3342465.
43.
National Security and Wind Farms: Can They Co-Exist?
by Jameson, Sharoiha Pualani Kanehailua, LL.M.  The George Washington University. 2013: 77 pages; 1545818.
44.
An exploratory investigation of organizational security climate in a highly regulated environment
by Bitzer, Edward George, III, Ph.D.  Colorado State University. 2010: 125 pages; 3433677.
45.
Information security: A study of decision-making factors
by Griffith, Ronald E., II, Ph.D.  Capella University. 2009: 104 pages; 3342228.
46.
47.
Exploring the relationship between planning and training, and response to campus safety incidents
by Harvey, Kimberly M., Ph.D.  University of Missouri - Saint Louis. 2011: 164 pages; 3487753.
49.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
50.
Information Withholding and the Management of Productivity in Teams
by Drumheller, Dolores, Ph.D.  Walden University. 2013: 197 pages; 3560469.
51.
Cybersecurity Decision Patterns as Adaptive Knowledge Encoding in Cybersecurity Operations
by Willett, Keith D., Ph.D.  Stevens Institute of Technology. 2016: 228 pages; 10241522.
53.
Professional certification: Does the security industry need a new yardstick?
by Mathews, Timothy J., D.Sc.  New Jersey City University. 2015: 282 pages; 3730746.
54.
White House computer adoption and information policy from 1969 – 1979
by Laprise, John Paul, Ph.D.  Northwestern University. 2009: 261 pages; 3386523.
60.
Altering the Deal: Explaining Variation in U.S. Intelligence Reform
by Melancon, Louis P., Ph.D.  The George Washington University. 2019: 225 pages; 10978619.
31 - 60 of 46533 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest