Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
50971 open access dissertations and theses found for:
if(Feeral Information Security Management Act)  »   Refine Search
31.
Executive security awareness primer
by Toussaint, Gregory W., M.S.  Utica College. 2015: 66 pages; 1586318.
32.
Decision-Making by Effective Information Security Managers
by Pettigrew, James Andrew, III, Ph.D.  The George Washington University. 2012: 359 pages; 3502331.
33.
Factors influencing the quality of EHR performance: An exploratory qualitative study
by Rhodes, Harry B., Ph.D.  Capella University. 2016: 235 pages; 10252643.
34.
Hyper-connectivity: Intricacies of national and international cyber securities
by Dawson, Maurice, Ph.D.  London Metropolitan University (United Kingdom). 2017: 530 pages; 10800987.
35.
The Clery Act and its influence on the success of the college/university mission.
by Hurley, Ronald J., D.Sc.  New Jersey City University. 2015: 158 pages; 3730743.
36.
Strategies to Minimize the Effects of Information Security Threats on Business Performance
by Okoye, Stella Ifeyinwa, D.B.A.  Walden University. 2017: 197 pages; 10606454.
37.
Quantitative analyses of software vulnerabilities
by Joh, HyunChul, Ph.D.  Colorado State University. 2011: 224 pages; 3489881.
38.
Prioritizing Security Controls Using Multiple Criteria Decision Making for Home Users
by Waxler, John, D.Engr.  The George Washington University. 2018: 96 pages; 10784166.
39.
Measuring the impact of training in the implementation of project management information systems
by McCarty, Andrew, Ph.D.  University of Maryland, College Park. 2012: 275 pages; 3553152.
40.
The Role and Impact of Cyber Security Mentoring
by Ellithorpe, James O., Ph.D.  Walden University. 2016: 467 pages; 10126660.
41.
Examining the relationship between organization systems and information security awareness
by Tintamusik, Yanarong, D.B.A.  Northcentral University. 2010: 183 pages; 3411167.
47.
It is risky business: Three essays on ensuring reliability, security and privacy in technology-mediated settings
by Anderson, Catherine L., Ph.D.  University of Maryland, College Park. 2010: 228 pages; 3409866.
48.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
49.
PCAOB inspections and audit quality: Evidence from cross-listed securities
by Stewart, Errol G. G., Ph.D.  Florida Atlantic University. 2012: 120 pages; 3530685.
50.
Data Governance: The Missing Approach to Improving Data Quality
by Barker, James M., DM/IST  University of Phoenix. 2016: 293 pages; 10248424.
51.
52.
Adoption of the Health Information Exchange (HIE) System and the Role of the Healthcare Leadership
by Ashfaque, Muhammad Faisal, Ph.D.  Pepperdine University. 2020: 337 pages; 28025142.
53.
Information technology-related operational risk: An empirical study
by Goldstein, James Charles, Jr., Ph.D.  Syracuse University. 2009: 164 pages; 3410001.
56.
A Prudent Access Control Behavioral Intention Model for the Healthcare Domain
by Mussa, Constance C., Ph.D.  Nova Southeastern University. 2011: 247 pages; 3474092.
57.
Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study
by Varnadore, Michael Ray, DM/IST  University of Phoenix. 2018: 208 pages; 10808067.
58.
Strategies for Implementation of Electronic Health Records
by Vassell-Webb, Carlene, D.B.A.  Walden University. 2019: 187 pages; 22585138.
60.
Weary Giants of Flesh and Steel: Three Articles on the State and Information Security
by Herr, Trey, Ph.D.  The George Washington University. 2016: 317 pages; 10076294.
31 - 60 of 50971 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest