Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
196 open access dissertations and theses found for:
if(Phishing)  »   Refine Search
1.
A policy analysis of phishing countermeasures
by Sheng, Xinguang (Steve), Ph.D.  Carnegie Mellon University. 2009: 181 pages; 3383412.
2.
Techniques for detecting zero day phishing websites
by Blasi, Michael, M.S.  Iowa State University. 2009: 89 pages; 1465719.
3.
Unbiased Phishing Detection Using Domain Name Based Features
by Shirazi, Hossein, M.S.  Colorado State University. 2018: 72 pages; 10826588.
4.
The effects of conformity and training in a phishing context: Conforming to the school of phish
by Jones, Matt, M.A.  The University of Alabama in Huntsville. 2015: 43 pages; 10182209.
5.
Navigating the Malweb: Authentication Schemes for Mobile Devices
by Niu, Yuan, Ph.D.  University of California, Davis. 2011: 116 pages; 3474442.
6.
Cyber Incident Anomaly Detection Using Multivariate Analysis and Machine Learning
by Campbell, Ronald K., D.Engr.  The George Washington University. 2018: 121 pages; 10784357.
7.
Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study
by Varnadore, Michael Ray, DM/IST  University of Phoenix. 2018: 208 pages; 10808067.
8.
An Examination of User Detection of Business eMail Compromise amongst Corporate Professionals
by Aviv, Shahar Sean, Ph.D.  Nova Southeastern University. 2019: 141 pages; 27667282.
9.
The Effects of Inhibitory Control and Perceptual Attention on Cyber Security
by Pearson, Ed, III, Ph.D.  Mississippi State University. 2019: 144 pages; 13423953.
10.
Awareness of malicious social engineering among facebook users
by Slonka, Kevin J., D.Sc.  Robert Morris University. 2014: 140 pages; 3620246.
11.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
12.
The relationship between cell phone use and identity theft
by Saunders, Lewis O., Ph.D.  Walden University. 2014: 135 pages; 3615824.
13.
Proactive cyberfraud detection through infrastructure analysis
by Kalafut, Andrew J., Ph.D.  Indiana University. 2010: 153 pages; 3423688.
14.
A structure based technique for spam detection and email classification
by Desai, Varun, M.S.  California State University, Long Beach. 2016: 56 pages; 10017844.
15.
Exploring internet users' vulnerability to online dating fraud: Analysis of routine activities theory factors
by Garrett, Elena Victorovna, M.S.  The University of Texas at Dallas. 2014: 124 pages; 1583633.
16.
Iranian Cyber Espionage
by Spataro, Jason G., M.S.  Utica College. 2019: 72 pages; 13877649.
17.
Susceptibility to Social Engineering: Human Vulnerabilities
by Schroeder, Chelsea, M.S.  Utica College. 2019: 41 pages; 27670795.
18.
20.
Systemic effects of human factors in information security
by Kelley, Timothy D., Ph.D.  Indiana University. 2014: 153 pages; 3665483.
23.
Executive security awareness primer
by Toussaint, Gregory W., M.S.  Utica College. 2015: 66 pages; 1586318.
24.
An Analysis of Data Security Standards at Hedge Funds
by Zambotti, Michael J., M.S.  Utica College. 2017: 66 pages; 10283770.
25.
A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches
by Osei-Amanfi, Michael, D.B.A.  Grand Canyon University. 2018: 359 pages; 13423232.
26.
Improving Computer Security Dialogs: An Exploration of Attention and Habituation
by Bravo-Lillo, Cristian, Ph.D.  Carnegie Mellon University. 2014: 206 pages; 3690479.
27.
A Protection Motivation Theory Approach to Healthcare Cybersecurity: A Multiple Case Study
by Towbin, Ross Stuart, D.B.A.  Northcentral University. 2019: 170 pages; 13809084.
28.
User-defined key pair protocol
by Hassan, Omar, M.S.  Rochester Institute of Technology. 2013: 41 pages; 1550513.
29.
Reasons for non-compliance with mandatory information assurance policies by a trained population
by Shelton, D. Cragin, Dr.sc.  Capitol Technology University. 2014: 243 pages; 3692148.
1 - 30 of 196 displayed.
  1    2    3    4    5    6    7   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest