Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
26817 open access dissertations and theses found for:
if(Financial privacy)  »   Refine Search
1.
Online privacy sensitivity and gender: A case study of a highly -educated adult population
by Clifford, Brian Patrick, Ph.D.  Capella University. 2008: 123 pages; 3336862.
2.
Problem-based privacy analysis (propan) – a computer-aided privacy requirements engineering method
by Meis, Rene, Ph.D.  Universitaet Duisburg-Essen (Germany). 2018: 13844395.
5.
A Longitudinal Study of Privacy Awareness in the Digital Age and the Influence of Knowledge
by Williams, Therese L., Ph.D.  University of Arkansas at Little Rock. 2017: 159 pages; 10282929.
6.
An Analysis of Privacy in Intelligent Transportation Systems (ITS) and Location Based Services (LBS)
by Cottrill, Caitlin D., Ph.D.  University of Illinois at Chicago. 2011: 306 pages; 3551251.
7.
The Relationship between Privacy Notice Formats and Consumer Disclosure Decisions: A Quantitative Study
by Carlton, Alexys Mercedes, D.B.A.  Northcentral University. 2019: 102 pages; 13856998.
9.
Client-centric Privacy Protection For Location-based Services
by Pingley, Aniket, D.Sc.  The George Washington University. 2011: 185 pages; 3469606.
10.
The use of information: How new technology is changing discussions of privacy
by Corliss, Michael, M.A.L.S.  Georgetown University. 2010: 130 pages; 1475484.
11.
Designing Privacy Notices: Supporting User Understanding and Control
by Kelley, Patrick Gage, Ph.D.  Carnegie Mellon University. 2013: 177 pages; 3573455.
12.
13.
Securing location privacy in vehicular applications and communications
by Corser, George P., Ph.D.  Oakland University. 2016: 165 pages; 10169186.
14.
New notions and mechanisms for statistical privacy
by Groce, Adam Dowlin, Ph.D.  University of Maryland, College Park. 2014: 168 pages; 3644113.
15.
Enhancing privacy in cryptographic protocols
by Shin, Ji Sun, Ph.D.  University of Maryland, College Park. 2009: 146 pages; 3359424.
16.
The path of resistance: An explanation of the American resistance to the European Right to be Forgotten through a path dependence analysis
by van der Linden-Gonzales, Sabrina Elizabeth, M.A.  California State University, Long Beach. 2016: 124 pages; 10124521.
18.
An investigation of data privacy and utility using machine learning as a gauge
by Mivule, Kato, D.Sc.  Bowie State University. 2014: 262 pages; 3619387.
19.
Informational privacy protections: Do state laws offer public health leaders the flexibility they need?
by O'Connor, Jean C., Dr.P.H.  The University of North Carolina at Chapel Hill. 2009: 137 pages; 3387969.
20.
Strategies Church Financial Leaders Use for Financial Sustainability during Economic Crises
by Jackson, Jessie Hyman, D.B.A.  Walden University. 2018: 147 pages; 13422045.
21.
How Distributed Ledger Technology is Transforming the Financial Marketplace
by Bougas, Michelle, M.S.  Utica College. 2016: 72 pages; 10245691.
22.
Randomization based privacy preserving categorical data analysis
by Guo, Ling, Ph.D.  The University of North Carolina at Charlotte. 2010: 127 pages; 3439261.
23.
It is risky business: Three essays on ensuring reliability, security and privacy in technology-mediated settings
by Anderson, Catherine L., Ph.D.  University of Maryland, College Park. 2010: 228 pages; 3409866.
24.
Formally ensuring the permissibility of obligations in security and privacy policies
by Chowdhury, Omar Haider, Ph.D.  The University of Texas at San Antonio. 2013: 306 pages; 3594559.
26.
Three Papers on Firm and Consumer Behavior in Online Markets
by Chang, Jieun, Ph.D.  University of Colorado at Boulder. 2013: 111 pages; 3561932.
27.
An Approach for Designing Secure and High Performance Cloud Systems
by Gai, Keke, Ph.D.  Pace University. 2017: 221 pages; 10635446.
28.
Protecting Privacy of Data in the Internet of Things with Policy Enforcement Fog Module
by Al-Hasnawi, Abduljaleel, Ph.D.  Western Michigan University. 2018: 130 pages; 13877008.
29.
An Empirical Study of Privacy Risk Assessment Methodologies in Cloud Computing Environments
by Pauley, Wayne A., Jr., Ph.D.  Nova Southeastern University. 2012: 222 pages; 3499794.
30.
Users' privacy and security behaviors on mobile devices
by Blount, Charles Lenward, M.S.  University of Maryland, Baltimore County. 2014: 106 pages; 1571723.
1 - 30 of 26817 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest