Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
13445 open access dissertations and theses found for:
if(Insider threats)  »   Refine Search
1.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
2.
Addressing the cybersecurity Malicious Insider threat
by Schluderberg, Larry E., M.S.  Utica College. 2014: 79 pages; 1571095.
3.
Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats
by Lombardo, Gary, Ph.D.  Capella University. 2018: 121 pages; 10751570.
4.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
5.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
7.
Defeating Insider Attacks via Autonomic Self-Protective Networks
by Sibai, Faisal M., Ph.D.  George Mason University. 2012: 139 pages; 3503962.
8.
A matrix for small business owners to better protect their network
by Labossiere, Dennis L., M.S.  Utica College. 2016: 76 pages; 1605731.
9.
Behavioral Assessment Teams Using Threat Assessment at Flagship Universities in New England
by Graney, Daniel D., Ed.D.  Johnson & Wales University. 2011: 166 pages; 3457223.
10.
Behavioral Biometrics and the Insider Threat
by Rash, Matthew, M.S.  Utica College. 2017: 60 pages; 10273200.
11.
Two essays on stock repurchases and insider trading
by Jategaonkar, Shrikant Prabhakar, Ph.D.  The University of Arizona. 2009: 111 pages; 3355009.
13.
The Impact of Mindfulness on Non-malicious Spillage within Images on Social Networking Sites
by Landress, Angela D., Ph.D.  Nova Southeastern University. 2018: 100 pages; 10842441.
14.
Lone -insider boards: Improved monitoring or a recipe for disaster?
by Martin, John A., Ph.D.  The Florida State University. 2008: 110 pages; 3340737.
15.
Susceptibility to Social Engineering: Human Vulnerabilities
by Schroeder, Chelsea, M.S.  Utica College. 2019: 41 pages; 27670795.
17.
Three essays on corporate governance
by Marshall, Cassandra D., Ph.D.  Indiana University. 2011: 150 pages; 3491494.
18.
Executive roles and insider trading
by Knewtson, Heather Susan, Ph.D.  Washington State University. 2011: 136 pages; 3460398.
19.
Information Security Risk Analysis and Advanced Persistent Threat: A Multiple Case Study
by Zuhdi, Barham, D.B.A.  Northcentral University. 2018: 178 pages; 10837747.
21.
Strategies to Minimize the Effects of Information Security Threats on Business Performance
by Okoye, Stella Ifeyinwa, D.B.A.  Walden University. 2017: 197 pages; 10606454.
23.
Schemes for Surviving Advanced Persistent Threats
by Mehresh, Ruchika, Ph.D.  State University of New York at Buffalo. 2013: 159 pages; 3598713.
24.
Cyber terrorrism threats
by Gobran, Ashraf, M.S.  Utica College. 2015: 48 pages; 1588500.
25.
Sustainability and Spirituality: Common Threads and Common Threats
by Chavez, Felicia India, Ph.D.  Pacifica Graduate Institute. 2017: 458 pages; 10278487.
26.
The transition of worldviews: Collective information behavior during the 2006 Thai coup d'├ętat
by Choemprayong, Songphan, Ph.D.  The University of North Carolina at Chapel Hill. 2010: 406 pages; 3428346.
27.
Terror in Plainview: Terrorist-Gang Threats of Biological Weapons Usage
by Dones, D. Darell, Ph.D.  George Mason University. 2012: 242 pages; 3515298.
28.
System Threats and Gender Differences in Sexism and Gender Stereotypes
by Kuchynka, Sophie, M.A.  University of South Florida. 2015: 80 pages; 1597535.
29.
The randomized controlled trial under investigation: Threats to validity posed by participant preferences
by Floyd, Anna Hillary Landis, Ph.D.  State University of New York at Stony Brook. 2009: 190 pages; 3401703.
30.
Modeling Superfund: A hazardous waste bargaining model with rational threats
by Taft, Mary Anderson, Ph.D.  University of Massachusetts Amherst. 2000: 108 pages; 9988845.
1 - 30 of 13445 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest