Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
46427 open access dissertations and theses found for:
if(Feeral Information Security Management Act)  »   Refine Search
63.
In the Name of Homeland Security: A Legal History of Post-9/11 Labor Policy at US Customs
by Marquis, Arthur-David, M.A.  State University of New York Empire State College. 2017: 78 pages; 10256835.
67.
Business continuity planning: Identifying gaps, patterns and justifications
by Bethany, Michael P., M.S.  California State University, Long Beach. 2014: 169 pages; 1526894.
68.
Examining the relationship between organization systems and information security awareness
by Tintamusik, Yanarong, D.B.A.  Northcentral University. 2010: 183 pages; 3411167.
70.
Emergency management leadership response to extreme events in higher education settings
by Fuller, Cynthia Michele, Ph.D.  University of Phoenix. 2015: 150 pages; 3736203.
71.
Analysis Of Decision Factors For The Application Of Information Access Controls Within The Organization
by Foerster, Carl A., D.Sc.  The George Washington University. 2013: 165 pages; 3553953.
73.
Emergent Network Defense
by Crane, Earl Newell, Ph.D.  The George Washington University. 2013: 167 pages; 3548491.
74.
Building trust into utility cloud computing
by Krautheim, Frank John, Ph.D.  University of Maryland, Baltimore County. 2010: 144 pages; 3422891.
75.
Prioritizing Security Controls Using Multiple Criteria Decision Making for Home Users
by Waxler, John, D.Engr.  The George Washington University. 2018: 96 pages; 10784166.
76.
Quantitative analyses of software vulnerabilities
by Joh, HyunChul, Ph.D.  Colorado State University. 2011: 224 pages; 3489881.
77.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
78.
Informational privacy protections: Do state laws offer public health leaders the flexibility they need?
by O'Connor, Jean C., Dr.P.H.  The University of North Carolina at Chapel Hill. 2009: 137 pages; 3387969.
81.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
82.
An Analysis of Data Security Standards at Hedge Funds
by Zambotti, Michael J., M.S.  Utica College. 2017: 66 pages; 10283770.
86.
It is risky business: Three essays on ensuring reliability, security and privacy in technology-mediated settings
by Anderson, Catherine L., Ph.D.  University of Maryland, College Park. 2010: 228 pages; 3409866.
88.
Enhancing the Design of a Cybersecurity Risk Management Solution for Communities of Trust
by Fulford, James E., Jr., D.B.A.  University of South Florida. 2018: 180 pages; 10979126.
90.
The California Trust Act of 2013: the illusion of trust. A policy analysis
by Gonzalez-Arzola, Ariana, M.S.W.  California State University, Long Beach. 2014: 92 pages; 1527942.
61 - 90 of 46427 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest