Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
48354 open access dissertations and theses found for:
if(Sticky information)  »   Refine Search
62.
Validating the OCTAVE Allegro Information Systems Risk Assessment Methodology: A Case Study
by Keating, Corland G., Ph.D.  Nova Southeastern University. 2014: 130 pages; 3611814.
64.
A Deep Learning Approach to Detecting Covert Channels in the Domain Name System
by Peña, Tomás Antonio, T.D.  Capitol Technology University. 2020: 206 pages; 27735496.
65.
Recovery, Resilience and Beyond: ICT Use During Ongoing Disruption
by Semaan, Bryan Christopher, Ph.D.  University of California, Irvine. 2011: 271 pages; 3499143.
68.
An Examination of User Detection of Business eMail Compromise amongst Corporate Professionals
by Aviv, Shahar Sean, Ph.D.  Nova Southeastern University. 2019: 141 pages; 27667282.
70.
Volunteered geographic information in Wikipedia
by Hardy, Darren, Ph.D.  University of California, Santa Barbara. 2010: 259 pages; 3439644.
71.
Information food webs: A quantitative inquiry using a biological food web methodology
by Finnegan, Roger J., Ph.D.  Capella University. 2010: 111 pages; 3426513.
73.
74.
75.
Freedom of Information in the Age of Terrorism: The Mosaic Theory in Practice
by Cooper, Harry R., Ph.D.  Capitol Technology University. 2018: 173 pages; 10902463.
76.
Assessing Knowledge Management Values by Using Intellectual Capital to Measure Organizational Performance
by Nguyen, Thuan Luong, Ph.D.  Nova Southeastern University. 2016: 246 pages; 10249504.
77.
78.
Data Governance Importance and Effectiveness: Health System Employee Perception
by Stephens, Joshua J., D.H.A.  Central Michigan University. 2018: 175 pages; 10751061.
79.
Understanding variations in acceptance and use of tablet technology by students at a public four-year university
by Neufeld, Philip Glenn, Ed.D.  California State University, Fresno. 2015: 278 pages; 3714940.
81.
Executive security awareness primer
by Toussaint, Gregory W., M.S.  Utica College. 2015: 66 pages; 1586318.
82.
Improving Enterprise Data Governance Through Ontology and Linked Data
by DeStefano, R.J., D.P.S.  Pace University. 2016: 150 pages; 10097925.
83.
Identifying Factors Contributing towards Information Security Maturity in an Organization
by Edwards, Madhuri M., Ph.D.  Nova Southeastern University. 2018: 245 pages; 10746212.
84.
85.
The effect of password management procedures on the entropy of user selected passwords
by Enamait, John D., Ph.D.  Indiana State University. 2012: 153 pages; 3507494.
86.
Quantitative analyses of software vulnerabilities
by Joh, HyunChul, Ph.D.  Colorado State University. 2011: 224 pages; 3489881.
87.
An Investigation of College Students' Facebook Use in Their Personal Learning Environments
by Wang, Yiran, Ph.D.  University of California, Irvine. 2017: 169 pages; 10623291.
89.
Use of double-loop learning to combat advanced persistent threat: Multiple case studies
by Lamb, Christopher J., Ph.D.  Capella University. 2013: 151 pages; 3607034.
90.
Data Governance: The Missing Approach to Improving Data Quality
by Barker, James M., DM/IST  University of Phoenix. 2016: 293 pages; 10248424.
61 - 90 of 48354 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest