Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
52412 open access dissertations and theses found for:
if(Information source)  »   Refine Search
61.
Exploring Wet Roadway Safety and Drainage Characteristics at Multiple Data Scales
by Crimmins, Michael C., M.S.V.  Villanova University. 2020: 72 pages; 27956455.
62.
Student dropouts and non-attainment prevention in Nepal using GIS
by Shakya, Lokesh Ratna, D.M.  University of Phoenix. 2015: 205 pages; 10089498.
63.
Examining the Influence of Gender and Age on Acceptance Rates of Bitcoin
by Siquian, John Vincent , D.B.A.  Grand Canyon University. 2020: 208 pages; 27741724.
64.
Asset Reuse of Images From a Repository
by Herman, Deirdre, Ph.D.  Walden University. 2014: 129 pages; 3610257.
65.
Data Governance: The Missing Approach to Improving Data Quality
by Barker, James M., DM/IST  University of Phoenix. 2016: 293 pages; 10248424.
69.
Collective innovation: Novelty, reuse and their interplay
by Kyriakou, Harris, Ph.D.  Stevens Institute of Technology. 2016: 131 pages; 10188943.
70.
Measuring the impact of training in the implementation of project management information systems
by McCarty, Andrew, Ph.D.  University of Maryland, College Park. 2012: 275 pages; 3553152.
71.
Data Governance Importance and Effectiveness: Health System Employee Perception
by Stephens, Joshua J., D.H.A.  Central Michigan University. 2018: 175 pages; 10751061.
72.
Understanding the Value of Enterprise Architecture for Organizations: A Grounded Theory Approach
by Nassiff, Edwin, Ph.D.  Nova Southeastern University. 2012: 134 pages; 3523496.
73.
Subsystem contexts and policy information: Conditional effects on information in congressional hearings
by Jatkowski, Walter J., III, Ph.D.  The University of Oklahoma. 2012: 454 pages; 3547850.
75.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
77.
Validating the OCTAVE Allegro Information Systems Risk Assessment Methodology: A Case Study
by Keating, Corland G., Ph.D.  Nova Southeastern University. 2014: 130 pages; 3611814.
78.
Exploiting Human Factors in User Authentication
by Gupta, Payas, Ph.D.  Singapore Management University (Singapore). 2013: 170 pages; 3601349.
80.
81.
Investigating Familiarity's Contribution to Source Recognition
by Mollison, Matthew V., M.A.  University of Colorado at Boulder. 2010: 90 pages; 1487896.
83.
Constructing a Community Response Grid (CRG): The Dublin, Ohio Case Study
by Freund, John F., III, Ph.D.  Nova Southeastern University. 2012: 127 pages; 3506032.
85.
Understanding Controls to Detect and Mitigate Malicious Privileged User Abuse
by Harris, Clyde Devince, D.Sc.  Capitol Technology University. 2020: 210 pages; 28088128.
86.
The effect of password management procedures on the entropy of user selected passwords
by Enamait, John D., Ph.D.  Indiana State University. 2012: 153 pages; 3507494.
87.
88.
An effective methodology for processing and analyzing large, complex spacecraft data streams
by Teymourlouei, Haydar, D.Sc.  Bowie State University. 2013: 109 pages; 3558443.
89.
Relationship Between Perceived Usefulness, Ease of Use, and Acceptance of Business Intelligence Systems
by Sandema-Sombe, Christina Ndiwa, D.B.A.  Walden University. 2019: 158 pages; 27543035.
90.
61 - 90 of 52412 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest