Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
50384 open access dissertations and theses found for:
if(Information security)  »   Refine Search
4.
Identifying Factors Contributing towards Information Security Maturity in an Organization
by Edwards, Madhuri M., Ph.D.  Nova Southeastern University. 2018: 245 pages; 10746212.
5.
Executive security awareness primer
by Toussaint, Gregory W., M.S.  Utica College. 2015: 66 pages; 1586318.
8.
Validating the OCTAVE Allegro Information Systems Risk Assessment Methodology: A Case Study
by Keating, Corland G., Ph.D.  Nova Southeastern University. 2014: 130 pages; 3611814.
9.
An economic analysis of airport baggage routing and airline security
by Sozi, Johny Leonard, M.S.  University of Maryland, Baltimore County. 2011: 140 pages; 1497447.
10.
Understanding the Impact of Hacker Innovation upon IS Security Countermeasures
by Zadig, Sean M., Ph.D.  Nova Southeastern University. 2016: 240 pages; 10162159.
11.
Quantitative analyses of software vulnerabilities
by Joh, HyunChul, Ph.D.  Colorado State University. 2011: 224 pages; 3489881.
14.
Decision-Making by Effective Information Security Managers
by Pettigrew, James Andrew, III, Ph.D.  The George Washington University. 2012: 359 pages; 3502331.
17.
Information security: A study of decision-making factors
by Griffith, Ronald E., II, Ph.D.  Capella University. 2009: 104 pages; 3342228.
19.
Hyper-connectivity: Intricacies of national and international cyber securities
by Dawson, Maurice, Ph.D.  London Metropolitan University (United Kingdom). 2017: 530 pages; 10800987.
20.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
21.
Prioritizing Security Controls Using Multiple Criteria Decision Making for Home Users
by Waxler, John, D.Engr.  The George Washington University. 2018: 96 pages; 10784166.
24.
Strategies to Minimize the Effects of Information Security Threats on Business Performance
by Okoye, Stella Ifeyinwa, D.B.A.  Walden University. 2017: 197 pages; 10606454.
27.
Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats
by Lombardo, Gary, Ph.D.  Capella University. 2018: 121 pages; 10751570.
30.
An Examination of User Detection of Business eMail Compromise amongst Corporate Professionals
by Aviv, Shahar Sean, Ph.D.  Nova Southeastern University. 2019: 141 pages; 27667282.
1 - 30 of 50384 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest