Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
51040 open access dissertations and theses found for:
if(Information)  »   Refine Search
62.
Open source UAV platform development for aerial photography
by Richards, Daniel L., M.S.  California State University, Long Beach. 2015: 123 pages; 1587919.
63.
Exploiting Human Factors in User Authentication
by Gupta, Payas, Ph.D.  Singapore Management University (Singapore). 2013: 170 pages; 3601349.
64.
Data-Driven Decision Making as a Tool to Improve Software Development Productivity
by Brown, Mary Erin, Ph.D.  Walden University. 2013: 242 pages; 3591716.
66.
Development, testing, and refining the failure to rescue sepsis sniffer
by Harrison, Andrew Marc, Ph.D.  College of Medicine - Mayo Clinic. 2015: 121 pages; 3702545.
67.
Attributes effecting software testing estimation; is organizational trust an issue?
by Hammoud, Wissam, D.M.IST.  University of Phoenix. 2013: 172 pages; 3583478.
70.
An Automated System for Rapid and Secure Device Sanitization
by LaBarge, Ralph S., Ph.D.  The George Washington University. 2014: 113 pages; 3620600.
71.
72.
A Deep Learning Approach to Detecting Covert Channels in the Domain Name System
by Peña, Tomás Antonio, T.D.  Capitol Technology University. 2020: 206 pages; 27735496.
73.
Recovery, Resilience and Beyond: ICT Use During Ongoing Disruption
by Semaan, Bryan Christopher, Ph.D.  University of California, Irvine. 2011: 271 pages; 3499143.
74.
Rethinking the Scientific Database: Exploring the Feasibility of Building a New Scientific Abstract Database
by Krieglstein, Daniel, Ph.D.  Illinois Institute of Technology. 2018: 167 pages; 10827846.
75.
Understanding the Impact of Hacker Innovation upon IS Security Countermeasures
by Zadig, Sean M., Ph.D.  Nova Southeastern University. 2016: 240 pages; 10162159.
76.
e-Science Data Environments: A View from the Lab Floor
by Kowalczyk, Stacy T., Ph.D.  Indiana University. 2011: 256 pages; 3491487.
77.
Information technology-related operational risk: An empirical study
by Goldstein, James Charles, Jr., Ph.D.  Syracuse University. 2009: 164 pages; 3410001.
78.
The Impact of Mindfulness on Non-malicious Spillage within Images on Social Networking Sites
by Landress, Angela D., Ph.D.  Nova Southeastern University. 2018: 100 pages; 10842441.
80.
Improving Enterprise Data Governance Through Ontology and Linked Data
by DeStefano, R.J., D.P.S.  Pace University. 2016: 150 pages; 10097925.
81.
Understanding Controls to Detect and Mitigate Malicious Privileged User Abuse
by Harris, Clyde Devince, D.Sc.  Capitol Technology University. 2020: 210 pages; 28088128.
82.
Contradictions and Opportunities in Mobile Care Management (“mCare”): An Observational Analytic Cohort Study
by Crowley, Patrick Kenyon, Ph.D.  University of Maryland, College Park. 2019: 102 pages; 27546607.
84.
Validating the OCTAVE Allegro Information Systems Risk Assessment Methodology: A Case Study
by Keating, Corland G., Ph.D.  Nova Southeastern University. 2014: 130 pages; 3611814.
86.
Big data analytics solutions: The implementation challenges in the financial services industry
by Ojo, Michael O., D.Sc.  Robert Morris University. 2016: 115 pages; 10111816.
87.
An effective methodology for processing and analyzing large, complex spacecraft data streams
by Teymourlouei, Haydar, D.Sc.  Bowie State University. 2013: 109 pages; 3558443.
90.
Analysis Of Decision Factors For The Application Of Information Access Controls Within The Organization
by Foerster, Carl A., D.Sc.  The George Washington University. 2013: 165 pages; 3553953.
61 - 90 of 51040 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest