Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
21996 open access dissertations and theses found for:
if(Usable security)  »   Refine Search
31.
Identifying Factors Contributing towards Information Security Maturity in an Organization
by Edwards, Madhuri M., Ph.D.  Nova Southeastern University. 2018: 245 pages; 10746212.
33.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
34.
Decision-Making by Effective Information Security Managers
by Pettigrew, James Andrew, III, Ph.D.  The George Washington University. 2012: 359 pages; 3502331.
35.
36.
An attack-resistant and rapid recovery desktop system
by Deshane, Todd, Ph.D.  Clarkson University. 2010: 149 pages; 3428987.
37.
An exploratory investigation of organizational security climate in a highly regulated environment
by Bitzer, Edward George, III, Ph.D.  Colorado State University. 2010: 125 pages; 3433677.
38.
State Responsibility under International Law the 2003 U.S. Invasion of Iraq
by Issa, Carla Maria, M.A.  The American University of Paris (France). 2016: 56 pages; 13871616.
39.
Cybersecurity Decision Patterns as Adaptive Knowledge Encoding in Cybersecurity Operations
by Willett, Keith D., Ph.D.  Stevens Institute of Technology. 2016: 228 pages; 10241522.
40.
Information security: A study of decision-making factors
by Griffith, Ronald E., II, Ph.D.  Capella University. 2009: 104 pages; 3342228.
42.
Integrated Threat Management: An Alternative Approach to Regional Security System for ECOWAS
by Mohammed-Bashar, Farouck, Ph.D.  Walden University. 2020: 187 pages; 28148996.
43.
Strategies to Minimize the Effects of Information Security Threats on Business Performance
by Okoye, Stella Ifeyinwa, D.B.A.  Walden University. 2017: 197 pages; 10606454.
46.
Improving the Quality of Security Policies
by Hwang, JeeHyun, Ph.D.  North Carolina State University. 2014: 146 pages; 3584006.
47.
Measurement and Improvement of the Tor User Experience
by Gallagher, Kevin, Ph.D.  New York University Tandon School of Engineering. 2020: 134 pages; 27735239.
51.
52.
A Longitudinal Study of Privacy Awareness in the Digital Age and the Influence of Knowledge
by Williams, Therese L., Ph.D.  University of Arkansas at Little Rock. 2017: 159 pages; 10282929.
54.
Nothing for Us Without Us?: the Impact of Popular Participation on Security Sector Reform Progress in Transitional States
by Detzner, Sarah Michelle, Ph.D.  Fletcher School of Law and Diplomacy (Tufts University). 2019: 467 pages; 22620101.
55.
Predicting the Adoption of Big Data Security Analytics for Detecting Insider Threats
by Lombardo, Gary, Ph.D.  Capella University. 2018: 121 pages; 10751570.
56.
Formal security analysis: Secrecy, authentication and attestation
by Li, Li, Ph.D.  National University of Singapore (Singapore). 2015: 152 pages; 10006040.
57.
58.
Leadership styles and information security in small businesses: An empirical investigation
by Bhattacharya, Debasis, D.B.A.  University of Phoenix. 2008: 252 pages; 3324059.
59.
Executive security awareness primer
by Toussaint, Gregory W., M.S.  Utica College. 2015: 66 pages; 1586318.
60.
Interagency Coordination of Security Operations at a Large U.S. Seaport
by Levy, Edmund B., Ph.D.  Walden University. 2015: 150 pages; 3705026.
31 - 60 of 21996 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest