Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
13051 open access dissertations and theses found for:
if(Insider threats)  »   Refine Search
1.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
2.
Addressing the cybersecurity Malicious Insider threat
by Schluderberg, Larry E., M.S.  Utica College. 2014: 79 pages; 1571095.
4.
The accessibility of insider threats on a corporate network
by Denison, Stephen, M.S.  Utica College. 2015: 62 pages; 1604807.
5.
Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats
by Lombardo, Gary, Ph.D.  Capella University. 2018: 121 pages; 10751570.
6.
Behavioral Biometrics and the Insider Threat
by Rash, Matthew, M.S.  Utica College. 2017: 60 pages; 10273200.
7.
The Impact of Mindfulness on Non-malicious Spillage within Images on Social Networking Sites
by Landress, Angela D., Ph.D.  Nova Southeastern University. 2018: 100 pages; 10842441.
8.
Two essays on stock repurchases and insider trading
by Jategaonkar, Shrikant Prabhakar, Ph.D.  The University of Arizona. 2009: 111 pages; 3355009.
9.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
10.
Defeating Insider Attacks via Autonomic Self-Protective Networks
by Sibai, Faisal M., Ph.D.  George Mason University. 2012: 139 pages; 3503962.
11.
Lone -insider boards: Improved monitoring or a recipe for disaster?
by Martin, John A., Ph.D.  The Florida State University. 2008: 110 pages; 3340737.
13.
A matrix for small business owners to better protect their network
by Labossiere, Dennis L., M.S.  Utica College. 2016: 76 pages; 1605731.
16.
Strategies to Minimize the Effects of Information Security Threats on Business Performance
by Okoye, Stella Ifeyinwa, D.B.A.  Walden University. 2017: 197 pages; 10606454.
17.
Leadership styles and information security in small businesses: An empirical investigation
by Bhattacharya, Debasis, D.B.A.  University of Phoenix. 2008: 252 pages; 3324059.
19.
Executive roles and insider trading
by Knewtson, Heather Susan, Ph.D.  Washington State University. 2011: 136 pages; 3460398.
20.
Multi-Species Conservation in the Context of Global Change
by Lawson, Dawn Marie, Ph.D.  University of California, Davis. 2011: 188 pages; 3474413.
21.
An Approach for Designing Secure and High Performance Cloud Systems
by Gai, Keke, Ph.D.  Pace University. 2017: 221 pages; 10635446.
22.
The effects of CEO succession on corporate restructuring and strategy change
by Chiu, Shih-Chi, Ph.D.  University of Missouri - Columbia. 2010: 113 pages; 3488920.
25.
An Analysis of Data Security Standards at Hedge Funds
by Zambotti, Michael J., M.S.  Utica College. 2017: 66 pages; 10283770.
27.
The transition of worldviews: Collective information behavior during the 2006 Thai coup d'├ętat
by Choemprayong, Songphan, Ph.D.  The University of North Carolina at Chapel Hill. 2010: 406 pages; 3428346.
28.
29.
Understanding Federal Cybersecurity Culture: An Expert Perspective on Current and Ideal State
by Sousane, Richard, Ed.D.  The George Washington University. 2018: 198 pages; 10785377.
1 - 30 of 13051 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest