Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
51172 open access dissertations and theses found for:
if(Feeral Information Security Management Act)  »   Refine Search
62.
Graph-based Event Correlation for Network Security Defense
by Neise, Patrick, D.Engr.  The George Washington University. 2018: 96 pages; 10785425.
63.
64.
Knowledge management practices in U.S. federal agencies: The catalyst for E-Government transformation
by Rhoads, Elsa P., D.Sc.  The George Washington University. 2006: 265 pages; 3407418.
66.
67.
Data-Driven Decision Making as a Tool to Improve Software Development Productivity
by Brown, Mary Erin, Ph.D.  Walden University. 2013: 242 pages; 3591716.
69.
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches
by Osei-Amanfi, Michael, D.B.A.  Grand Canyon University. 2018: 359 pages; 13423232.
70.
71.
Analyzing Historical Data Breaches to Improve Public Cloud Security Postures
by Zhou, Yucheng, D.Engr.  The George Washington University. 2020: 125 pages; 27664530.
72.
An exploratory investigation of physician champions for hospital-based information technology implementations
by Branagan, Linda G., Ph.D.  Alliant International University, San Francisco Bay. 2010: 149 pages; 3436974.
74.
75.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
76.
A framework for the governance of information security
by Edwards, Charles K., Ph.D.  Nova Southeastern University. 2013: 228 pages; 3607548.
77.
Global scale identity management
by Tambasco, Michael J., M.S.  Utica College. 2015: 60 pages; 1600350.
78.
The Sarbanes -Oxley Act and the choice of bond market by foreign firms
by Gao, Yu, Ph.D.  The University of Chicago. 2007: 80 pages; 3272967.
80.
Environmental Impacts on Guam's Water Security and Sustainable Management of the Resource
by Khalaj-Teimoury, Masoud, Ph.D.  University of Alaska Fairbanks. 2018: 76 pages; 10787879.
81.
82.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
83.
An Automated System for Rapid and Secure Device Sanitization
by LaBarge, Ralph S., Ph.D.  The George Washington University. 2014: 113 pages; 3620600.
84.
Understanding Controls to Detect and Mitigate Malicious Privileged User Abuse
by Harris, Clyde Devince, D.Sc.  Capitol Technology University. 2020: 210 pages; 28088128.
86.
Policy Analysis of the Homeland Security Act of 2002
by Huchim, Jennifer, M.S.W.  California State University, Long Beach. 2018: 62 pages; 10751639.
87.
Formally ensuring the permissibility of obligations in security and privacy policies
by Chowdhury, Omar Haider, Ph.D.  The University of Texas at San Antonio. 2013: 306 pages; 3594559.
90.
Incorporating Personal Health Records into the Disease Management of Rural Heart Failure Patients
by Baron, Karen Parsley, Ph.D.  Nova Southeastern University. 2012: 200 pages; 3544408.
61 - 90 of 51172 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest