Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
21996 open access dissertations and theses found for:
if(Usable security)  »   Refine Search
92.
Estimating the Fiscal Impacts of the Homeland Security Grants on State and Local Public Safety Spending
by Kirschner, Charlotte L., Ph.D.  The George Washington University. 2012: 256 pages; 3474049.
93.
Light-Weight Accountable Privacy Preserving Protocol in Cloud Computing Based on a Third-Party Auditor
by Ben Haj Frej, Mohamed, Ph.D.  University of Bridgeport. 2019: 110 pages; 27743650.
94.
Reasons for non-compliance with mandatory information assurance policies by a trained population
by Shelton, D. Cragin, D.Sc.  Capitol Technology University. 2014: 243 pages; 3741052.
96.
Analyzing Historical Data Breaches to Improve Public Cloud Security Postures
by Zhou, Yucheng, D.Engr.  The George Washington University. 2020: 125 pages; 27664530.
97.
Surface wind speed distributions: Implications for climate and wind power
by Capps, Scott Blair, Ph.D.  University of California, Irvine. 2009: 136 pages; 3380326.
98.
A Case Study in Safety Engineering Processes for Security Engineering Use
by Hall, Jeffery, D.Sc.  Capitol Technology University. 2018: 165 pages; 27835541.
99.
Exploiting Human Factors in User Authentication
by Gupta, Payas, Ph.D.  Singapore Management University (Singapore). 2013: 170 pages; 3601349.
100.
Attachment, Childhood Religious Education, and Adolescent Religiosity
by Jones, Gary, Ph.D.  Indiana University. 2020: 86 pages; 27834159.
102.
An examination of the relationship between levels of food security and depression
by Svojse, Erica K., M.A.  The University of Wisconsin - Milwaukee. 2014: 70 pages; 1566450.
103.
The politics of deservingness: Discourses of gender, race, *class, and age in the 2005 Social Security debates
by Beechey, Susanne N., Ph.D.  The George Washington University. 2008: 258 pages; 3297154.
104.
Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study
by Varnadore, Michael Ray, DM/IST  University of Phoenix. 2018: 208 pages; 10808067.
105.
Integrated hardware/software approaches to software security for embedded systems
by Gelbart, Olga, D.Sc.  The George Washington University. 2008: 137 pages; 3297440.
106.
Apollo: End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation
by Wu, Hua, Ph.D.  The George Washington University. 2020: 248 pages; 27666292.
107.
A policy analysis of the Americans with Disability Act of 1990
by Hankins, Shanitha, M.S.W.  California State University, Long Beach. 2010: 122 pages; 1486645.
109.
User Information Security Behavior in Professional Virtual Communities: A Technology Threat Avoidance Approach
by Forrester, Vivienne V., Ph.D.  Nova Southeastern University. 2019: 149 pages; 13899278.
110.
Information Security Risk Analysis and Advanced Persistent Threat: A Multiple Case Study
by Zuhdi, Barham, D.B.A.  Northcentral University. 2018: 178 pages; 10837747.
111.
Creation of a covert communications network for evasion of surveillance
by Nish, Rose, M.S.  University of the Pacific. 2016: 65 pages; 10117064.
112.
A framework for the governance of information security
by Edwards, Charles K., Ph.D.  Nova Southeastern University. 2013: 228 pages; 3607548.
113.
Formally ensuring the permissibility of obligations in security and privacy policies
by Chowdhury, Omar Haider, Ph.D.  The University of Texas at San Antonio. 2013: 306 pages; 3594559.
114.
Extensible Performance-aware Runtime Integrity Measurement
by Delgado, Brian G., Ph.D.  Portland State University. 2020: 234 pages; 27741720.
115.
Flexible Architectures for Enhanced Security
by Chang, Jed Kao-Tung, Ph.D.  University of California, Irvine. 2012: 149 pages; 3518799.
116.
It is risky business: Three essays on ensuring reliability, security and privacy in technology-mediated settings
by Anderson, Catherine L., Ph.D.  University of Maryland, College Park. 2010: 228 pages; 3409866.
117.
Performance and security in VOIP
by Patel, Malkesh M., M.S.  California State University, Long Beach. 2016: 38 pages; 10141531.
118.
An exploratory study of contracted security officers' retention
by de los Santos Lozano, Gerardo, Ed.D.  Pepperdine University. 2012: 162 pages; 3503832.
91 - 120 of 21996 displayed.
« First < Previous |   1    2    3    4    5    6    7    8    9    10    11   Next >
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest