Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
905 open access dissertations and theses found for:
if(Hacker)  »   Refine Search
1.
Permeable Socialization Flow and Hacker Code Switching Practice: A Metacognitive, Situated Approach
by DiGiovanni, Frank Christopher, Ed.D.  University of Pennsylvania. 2018: 283 pages; 10977668.
2.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
3.
How U.S. political and socio-economic trends promotes hacktivist activity
by Aviles, Grisselle, M.S.  Utica College. 2015: 85 pages; 1590361.
4.
Understanding the Impact of Hacker Innovation upon IS Security Countermeasures
by Zadig, Sean M., Ph.D.  Nova Southeastern University. 2016: 240 pages; 10162159.
5.
The impact of Internet message boards for Latino parents of autistic children: A qualitative study
by Martinez, Diana M., M.S.W.  California State University, Long Beach. 2009: 41 pages; 1466287.
6.
Detection of malware via side channel information
by Quinn, Rian, Ph.D.  State University of New York at Binghamton. 2012: 169 pages; 3522519.
7.
Innovation Infrastructures to Transform the Mexican Internet Industry: The Case of the Startup Community
by Cervantes, Ruy, Ph.D.  University of California, Irvine. 2013: 188 pages; 3565417.
8.
Anonymous and the virtual collective: Visuality and social movements in cyberspace
by Burford, Caitlyn M. R., M.A.  Northern Arizona University. 2013: 138 pages; 1550096.
9.
Cybersecurity of wireless implantable medical devices
by Ash, Sarah L., M.S.  Utica College. 2016: 51 pages; 10109631.
10.
The Impact of Auditory Hallucinations and Symptom Severity on Anxiety Levels in Schizophrenia
by Jones, Melissa L., Psy.D.  The Chicago School of Professional Psychology. 2015: 96 pages; 3715810.
11.
User Interface Design, Database Connectivity, and Security in Fortified Cards
by Pradhan, Sayli H., M.S.  California State University, Long Beach. 2017: 46 pages; 10638557.
12.
14.
15.
Investigating Staff Morale in an Elementary School Setting
by Pendino, Bethany, Ed.D.  Lindenwood University. 2012: 168 pages; 3494690.
16.
Cyber-Terrorism: Finding a Common Starting Point
by Biller, Jeffrey Thomas, LL.M.  The George Washington University. 2012: 106 pages; 1515265.
17.
A study of security in cloud computing
by Bhayal, Savita, M.S.  California State University, Long Beach. 2011: 68 pages; 1504430.
18.
Do test items that induce overconfidence make unskilled performers unaware?
by Hartwig, Marissa K., Ph.D.  Kent State University. 2013: 59 pages; 3618886.
19.
A matrix for small business owners to better protect their network
by Labossiere, Dennis L., M.S.  Utica College. 2016: 76 pages; 1605731.
21.
Effects of Geographic and Demographic Dispersion on the Performance of Systems Engineering Teams
by Segura Morales, Marco Antonio, Ph.D.  The George Washington University. 2014: 109 pages; 3622672.
22.
The Pirate Mode of Production: Intellectual Property and Labor within Neoliberal Restructuring
by Mueller, Gavin C., Ph.D.  George Mason University. 2016: 204 pages; 10140226.
23.
Nation State Threat Actions Against Critical Energy Infrastructures
by Garner, Michael Wilson, Jr., M.S.  Utica College. 2017: 43 pages; 10686214.
24.
Honeypot with Honeypot Management System for web applications
by Karia, Rutu, M.S.  California State University, Long Beach. 2011: 85 pages; 1504488.
25.
The Affordable Care Act and Its Triple Aim: An Analysis of the American Welfare State in Transition
by Evans, Ethan James, Ph.D.  University of California, Davis. 2016: 186 pages; 10182832.
26.
The Vulnerabilities of Autonomous Vehicles
by Wierzynski, Amanda J., M.S.  Utica College. 2019: 125 pages; 13881137.
27.
Cyber bear: Russian cyber threat to its neighbors and America
by Mshvidobadze, Khatuna, M.S.  Utica College. 2014: 68 pages; 1571750.
30.
The Google Chrome operating system forensic artifacts
by Corbin, George, M.S.  Utica College. 2014: 68 pages; 1571599.
1 - 30 of 905 displayed.
  1    2    3    4    5    6    7    8    9    10   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest