Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
2411 open access dissertations and theses found for:
sub(Information Technology)  »   Refine Search
152.
The semiconductor industry and emerging technologies: A study using a modified Delphi method
by Jordan, Edgar A., D.B.A.  University of Phoenix. 2010: 183 pages; 3442759.
153.
155.
Health care professionals' perceptions of the use of electronic medical records
by Adeyeye, Adebisi, D.H.A.  University of Phoenix. 2015: 133 pages; 10011612.
156.
Using analytics to encourage student responsibility for learning and identify course designs that help
by Fritz, John Lance, Ph.D.  University of Maryland, Baltimore County. 2016: 229 pages; 10118996.
157.
158.
IT strategy and web-based transaction technology in small organizations
by Posey, Risette, Ph.D.  The Florida State University. 2008: 137 pages; 3340752.
159.
An Exploratory Study of the Role of Technology in the Rise of Homeschooling
by Andrade, Albert G., Ph.D.  Ohio University. 2008: 203 pages; 10630818.
160.
Roles Educators Play in a 1:1 Technology Program
by Salwei, Heidi, M.Ed.  Minot State University. 2017: 79 pages; 10281466.
161.
Towards a New Model of Information Validation: Modeling the Information Validation Process of Police Investigators
by Nizich, Michael P., Ph.D.  Long Island University, C. W. Post Center. 2015: 203 pages; 3723294.
165.
Information Security Risk Analysis and Advanced Persistent Threat: A Multiple Case Study
by Zuhdi, Barham, D.B.A.  Northcentral University. 2018: 178 pages; 10837747.
166.
Exploring Strategies for Successful Implementation of Electronic Health Records
by Warren, Richard Alton, D.B.A.  Walden University. 2017: 168 pages; 10635162.
167.
An Automated System for Rapid and Secure Device Sanitization
by LaBarge, Ralph S., Ph.D.  The George Washington University. 2014: 113 pages; 3620600.
169.
It is risky business: Three essays on ensuring reliability, security and privacy in technology-mediated settings
by Anderson, Catherine L., Ph.D.  University of Maryland, College Park. 2010: 228 pages; 3409866.
170.
Executive security awareness primer
by Toussaint, Gregory W., M.S.  Utica College. 2015: 66 pages; 1586318.
172.
Understanding Library Space Planning
by Gstalder, Steven Herbert, Ed.D.  University of Pennsylvania. 2017: 222 pages; 10289537.
173.
Exploiting Human Factors in User Authentication
by Gupta, Payas, Ph.D.  Singapore Management University (Singapore). 2013: 170 pages; 3601349.
176.
An effective methodology for processing and analyzing large, complex spacecraft data streams
by Teymourlouei, Haydar, D.Sc.  Bowie State University. 2013: 109 pages; 3558443.
177.
Supporting source code comprehension during software evolution and maintenance
by Alhindawi, Nouh, Ph.D.  Kent State University. 2013: 226 pages; 3618939.
178.
A Qualitative Study of Social Barriers to Digitizing Medical Records
by Belcher, Kenneth L., II, Ph.D.  Northcentral University. 2012: 137 pages; 3532617.
180.
The Role and Impact of Cyber Security Mentoring
by Ellithorpe, James O., Ph.D.  Walden University. 2016: 467 pages; 10126660.
151 - 180 of 2411 displayed.
« First < Previous |   3    4    5    6    7    8    9    10    11    12    13   Next >
Copyright © 2018 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest