Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
298 open access dissertations and theses found for:
if(Scam)  »   Refine Search
1.
Exploring internet users' vulnerability to online dating fraud: Analysis of routine activities theory factors
by Garrett, Elena Victorovna, M.S.  The University of Texas at Dallas. 2014: 124 pages; 1583633.
2.
Creating urgency in tech support scam telephone conversations
by Tabron, Judith L., M.A.  Hofstra University. 2016: 99 pages; 10253641.
3.
Awareness of malicious social engineering among facebook users
by Slonka, Kevin J., D.Sc.  Robert Morris University. 2014: 140 pages; 3620246.
5.
A financial abuse prevention program for older adults: A grant proposal
by Flamenco, Erica, M.S.W.  California State University, Long Beach. 2015: 59 pages; 1586856.
6.
Measurement and Performance Analysis of Pneumatic Braking Systems on Heavy Vehicles
by Martonovich, Mathew, M.S.  University of Colorado at Denver. 2017: 181 pages; 10688437.
7.
Proactive cyberfraud detection through infrastructure analysis
by Kalafut, Andrew J., Ph.D.  Indiana University. 2010: 153 pages; 3423688.
8.
Modernizing Check Fraud Detection with Machine Learning
by Rose, Lydia M., M.S.  Utica College. 2018: 64 pages; 13421455.
9.
Examination of Insider Threats: A Growing Concern
by Hartline, Cecil L., Jr., M.S.  Utica College. 2017: 72 pages; 10687276.
11.
A policy analysis of phishing countermeasures
by Sheng, Xinguang (Steve), Ph.D.  Carnegie Mellon University. 2009: 181 pages; 3383412.
12.
Minding the verge: Moderating webcasts+chat in a multi-section online undergraduate course
by Hamerly, Don Wade, Ph.D.  The University of Texas at Austin. 2009: 246 pages; 3372455.
13.
Intimate speculation: The flows and futures of private agency adoption in the United States
by Mariner, Kathryn A., Ph.D.  The University of Chicago. 2015: 315 pages; 3711295.
14.
Eco-evolutionary dynamics in a coastal marsh sedge resurrected from a century long seed bank
by Gentile, Rachel M., Ph.D.  University of Notre Dame. 2015: 163 pages; 3746516.
15.
Using TBPS To Identify Functionally Distinct GABAA Receptors In The Rodent CNS
by Othman, Nidaa A., Ph.D.  The George Washington University. 2011: 277 pages; 3445385.
17.
Models for Accountability to Combat Non-Compliance in Carbon Trading
by Werber, Jessica Marin, LL.M.  The George Washington University. 2011: 69 pages; 1502055.
18.
Navigating the Malweb: Authentication Schemes for Mobile Devices
by Niu, Yuan, Ph.D.  University of California, Davis. 2011: 116 pages; 3474442.
19.
The relationship between cell phone use and identity theft
by Saunders, Lewis O., Ph.D.  Walden University. 2014: 135 pages; 3615824.
21.
The role of TRIP8b in neuronal HCN channel trafficking and function
by Lewis, Alan Seth, Ph.D.  Northwestern University. 2010: 242 pages; 3426603.
22.
23.
Feature Selection for Diffusion Methods Within a Supervised Context
by Le, Minh-Tam, Ph.D.  Yale University. 2014: 135 pages; 3582256.
25.
Executive security awareness primer
by Toussaint, Gregory W., M.S.  Utica College. 2015: 66 pages; 1586318.
27.
A matrix for small business owners to better protect their network
by Labossiere, Dennis L., M.S.  Utica College. 2016: 76 pages; 1605731.
28.
Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study
by Varnadore, Michael Ray, DM/IST  University of Phoenix. 2018: 208 pages; 10808067.
29.
Medical marijuana and the media
by Vickovic, Samuel G., M.S.  California State University, Long Beach. 2010: 110 pages; 1486533.
30.
Thailand's struggle for democracy
by Moreira, John, M.A.L.S.  Georgetown University. 2011: 127 pages; 1503278.
1 - 30 of 298 displayed.
  1    2    3    4    5    6    7    8    9    10   Next >
Copyright © 2019 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest