Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
16402 open access dissertations and theses found for:
if(Security)  »   Refine Search
1.
Identifying Factors Contributing towards Information Security Maturity in an Organization
by Edwards, Madhuri M., Ph.D.  Nova Southeastern University. 2018: 245 pages; 10746212.
3.
An exploratory investigation of organizational security climate in a highly regulated environment
by Bitzer, Edward George, III, Ph.D.  Colorado State University. 2010: 125 pages; 3433677.
4.
Decision-Making by Effective Information Security Managers
by Pettigrew, James Andrew, III, Ph.D.  The George Washington University. 2012: 359 pages; 3502331.
5.
Hyper-connectivity: Intricacies of national and international cyber securities
by Dawson, Maurice, Ph.D.  London Metropolitan University (United Kingdom). 2017: 530 pages; 10800987.
6.
7.
Improving the Quality of Security Policies
by Hwang, JeeHyun, Ph.D.  North Carolina State University. 2014: 146 pages; 3584006.
10.
Strategies to Minimize the Effects of Information Security Threats on Business Performance
by Okoye, Stella Ifeyinwa, D.B.A.  Walden University. 2017: 197 pages; 10606454.
11.
Interagency Coordination of Security Operations at a Large U.S. Seaport
by Levy, Edmund B., Ph.D.  Walden University. 2015: 150 pages; 3705026.
12.
Executive security awareness primer
by Toussaint, Gregory W., M.S.  Utica College. 2015: 66 pages; 1586318.
13.
Professional certification: Does the security industry need a new yardstick?
by Mathews, Timothy J., D.Sc.  New Jersey City University. 2015: 282 pages; 3730746.
14.
National Security and Wind Farms: Can They Co-Exist?
by Jameson, Sharoiha Pualani Kanehailua, LL.M.  The George Washington University. 2013: 77 pages; 1545818.
15.
A Grassroots Approach to Peace and Security in West Africa
by Block, Lisa, M.A.  The American University of Paris (France). 2013: 114 pages; 10305824.
16.
Leadership styles and information security in small businesses: An empirical investigation
by Bhattacharya, Debasis, D.B.A.  University of Phoenix. 2008: 252 pages; 3324059.
17.
Formal security analysis: Secrecy, authentication and attestation
by Li, Li, Ph.D.  National University of Singapore (Singapore). 2015: 152 pages; 10006040.
19.
The effects of experimentally induced attachment security on children's fear reactions
by Stupica, Brandi Shawn, Ph.D.  University of Maryland, College Park. 2012: 242 pages; 3543490.
21.
A Prudent Access Control Behavioral Intention Model for the Healthcare Domain
by Mussa, Constance C., Ph.D.  Nova Southeastern University. 2011: 247 pages; 3474092.
23.
The Role and Impact of Cyber Security Mentoring
by Ellithorpe, James O., Ph.D.  Walden University. 2016: 467 pages; 10126660.
27.
An examination of the relationship between levels of food security and depression
by Svojse, Erica K., M.A.  The University of Wisconsin - Milwaukee. 2014: 70 pages; 1566450.
28.
A framework for the governance of information security
by Edwards, Charles K., Ph.D.  Nova Southeastern University. 2013: 228 pages; 3607548.
29.
Integrated hardware/software approaches to software security for embedded systems
by Gelbart, Olga, D.Sc.  The George Washington University. 2008: 137 pages; 3297440.
30.
Formal End-to-End Verification of Information-Flow Security for Complex Systems
by Costanzo, David, Ph.D.  Yale University. 2016: 165 pages; 10584941.
1 - 30 of 16402 displayed.
  1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2018 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest