Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
48339 open access dissertations and theses found for:
if(Information technology security)  »   Refine Search
4.
Identifying Factors Contributing towards Information Security Maturity in an Organization
by Edwards, Madhuri M., Ph.D.  Nova Southeastern University. 2018: 245 pages; 10746212.
6.
Executive security awareness primer
by Toussaint, Gregory W., M.S.  Utica College. 2015: 66 pages; 1586318.
8.
Quantitative analyses of software vulnerabilities
by Joh, HyunChul, Ph.D.  Colorado State University. 2011: 224 pages; 3489881.
9.
An economic analysis of airport baggage routing and airline security
by Sozi, Johny Leonard, M.S.  University of Maryland, Baltimore County. 2011: 140 pages; 1497447.
10.
Understanding the Impact of Hacker Innovation upon IS Security Countermeasures
by Zadig, Sean M., Ph.D.  Nova Southeastern University. 2016: 240 pages; 10162159.
11.
Validating the OCTAVE Allegro Information Systems Risk Assessment Methodology: A Case Study
by Keating, Corland G., Ph.D.  Nova Southeastern University. 2014: 130 pages; 3611814.
14.
Decision-Making by Effective Information Security Managers
by Pettigrew, James Andrew, III, Ph.D.  The George Washington University. 2012: 359 pages; 3502331.
16.
Factors influencing the quality of EHR performance: An exploratory qualitative study
by Rhodes, Harry B., Ph.D.  Capella University. 2016: 235 pages; 10252643.
17.
Information security: A study of decision-making factors
by Griffith, Ronald E., II, Ph.D.  Capella University. 2009: 104 pages; 3342228.
21.
Hyper-connectivity: Intricacies of national and international cyber securities
by Dawson, Maurice, Ph.D.  London Metropolitan University (United Kingdom). 2017: 530 pages; 10800987.
22.
Prioritizing Security Controls Using Multiple Criteria Decision Making for Home Users
by Waxler, John, D.Engr.  The George Washington University. 2018: 96 pages; 10784166.
23.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
25.
Strategies to Minimize the Effects of Information Security Threats on Business Performance
by Okoye, Stella Ifeyinwa, D.B.A.  Walden University. 2017: 197 pages; 10606454.
26.
Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats
by Lombardo, Gary, Ph.D.  Capella University. 2018: 121 pages; 10751570.
1 - 30 of 48339 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest