Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
47450 open access dissertations and theses found for:
if(IT Security)  »   Refine Search
31.
An exploratory investigation of organizational security climate in a highly regulated environment
by Bitzer, Edward George, III, Ph.D.  Colorado State University. 2010: 125 pages; 3433677.
33.
34.
The impact of dynamic IT capability and organizational culture on firm performance
by Xiao, Li, Ph.D.  The George Washington University. 2007: 126 pages; 3296995.
36.
Information security: A study of decision-making factors
by Griffith, Ronald E., II, Ph.D.  Capella University. 2009: 104 pages; 3342228.
39.
Prioritizing Security Controls Using Multiple Criteria Decision Making for Home Users
by Waxler, John, D.Engr.  The George Washington University. 2018: 96 pages; 10784166.
40.
Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats
by Lombardo, Gary, Ph.D.  Capella University. 2018: 121 pages; 10751570.
41.
Cybersecurity Decision Patterns as Adaptive Knowledge Encoding in Cybersecurity Operations
by Willett, Keith D., Ph.D.  Stevens Institute of Technology. 2016: 228 pages; 10241522.
42.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
43.
Executive security awareness primer
by Toussaint, Gregory W., M.S.  Utica College. 2015: 66 pages; 1586318.
45.
47.
National Security and Wind Farms: Can They Co-Exist?
by Jameson, Sharoiha Pualani Kanehailua, LL.M.  The George Washington University. 2013: 77 pages; 1545818.
49.
The Role and Impact of Cyber Security Mentoring
by Ellithorpe, James O., Ph.D.  Walden University. 2016: 467 pages; 10126660.
50.
Flexible Architectures for Enhanced Security
by Chang, Jed Kao-Tung, Ph.D.  University of California, Irvine. 2012: 149 pages; 3518799.
51.
Advocating for Strategic it: Phenomenological Study of Nonprofit it Leaders
by Bunch, Trevor, D.I.T.  Capella University. 2018: 189 pages; 10746227.
52.
Perceived Security and Usage of a Mobile Payment Application
by Sieger, Hanul, Eng.D.  Technische Universitaet Berlin (Germany). 2015: 132 pages; 10703767.
53.
Estimating the Fiscal Impacts of the Homeland Security Grants on State and Local Public Safety Spending
by Kirschner, Charlotte L., Ph.D.  The George Washington University. 2012: 256 pages; 3474049.
54.
Improving the Quality of Security Policies
by Hwang, JeeHyun, Ph.D.  North Carolina State University. 2014: 146 pages; 3584006.
56.
Strategies to Minimize the Effects of Information Security Threats on Business Performance
by Okoye, Stella Ifeyinwa, D.B.A.  Walden University. 2017: 197 pages; 10606454.
57.
An Analysis of Data Security Standards at Hedge Funds
by Zambotti, Michael J., M.S.  Utica College. 2017: 66 pages; 10283770.
59.
You think it, they ink it: Interactive service encounters in the tattoo industry
by Glynn, Sarah Jane, Ph.D.  Vanderbilt University. 2017: 169 pages; 10753390.
60.
Professional certification: Does the security industry need a new yardstick?
by Mathews, Timothy J., D.Sc.  New Jersey City University. 2015: 282 pages; 3730746.
31 - 60 of 47450 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest