Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
2408 open access dissertations and theses found for:
sub(Information Technology)  »   Refine Search
182.
Designing an Exploratory Text Analysis Tool for Humanities and Social Sciences Research
by Shrikumar, Aditi, Ph.D.  University of California, Berkeley. 2013: 169 pages; 3616576.
183.
184.
White House computer adoption and information policy from 1969 – 1979
by Laprise, John Paul, Ph.D.  Northwestern University. 2009: 261 pages; 3386523.
185.
A continuous monitoring framework to manage cybersecurity against insider threats
by Shariati, Behnam, Ph.D.  The George Washington University. 2016: 143 pages; 10149475.
186.
Development, testing, and refining the failure to rescue sepsis sniffer
by Harrison, Andrew Marc, Ph.D.  College of Medicine - Mayo Clinic. 2015: 121 pages; 3702545.
187.
Attributes effecting software testing estimation; is organizational trust an issue?
by Hammoud, Wissam, D.M.IST.  University of Phoenix. 2013: 172 pages; 3583478.
190.
Determinants of effective information transfer in international regulatory standards adoption
by Popescu, Denisa, Ph.D.  The George Washington University. 2010: 233 pages; 3390249.
192.
An effective methodology for processing and analyzing large, complex spacecraft data streams
by Teymourlouei, Haydar, D.Sc.  Bowie State University. 2013: 109 pages; 3558443.
193.
Supporting source code comprehension during software evolution and maintenance
by Alhindawi, Nouh, Ph.D.  Kent State University. 2013: 226 pages; 3618939.
194.
A Qualitative Study of Social Barriers to Digitizing Medical Records
by Belcher, Kenneth L., II, Ph.D.  Northcentral University. 2012: 137 pages; 3532617.
195.
The impact of data breaches on market value of firms in the E-Commerce marketplace
by Washington, Kevin D., D.B.A.  Capella University. 2016: 84 pages; 10102712.
196.
Data governance: The missing approach to improving data quality
by Barker, James M., DM/IST  University of Phoenix. 2016: 293 pages; 10248424.
197.
Designing Privacy Notices: Supporting User Understanding and Control
by Kelley, Patrick Gage, Ph.D.  Carnegie Mellon University. 2013: 177 pages; 3573455.
198.
Constructing a Community Response Grid (CRG): The Dublin, Ohio Case Study
by Freund, John F., III, Ph.D.  Nova Southeastern University. 2012: 127 pages; 3506032.
199.
Strategies to Minimize the Effects of Information Security Threats on Business Performance
by Okoye, Stella Ifeyinwa, D.B.A.  Walden University. 2017: 197 pages; 10606454.
200.
Discovering structure in music: Automatic approaches and perceptual evaluations
by Nieto, Oriol, Ph.D.  New York University. 2015: 266 pages; 3705329.
201.
Guidelines for Healthcare Providers When User Testing Computerized Provider Order Entry
by Whiteside, Martin P., M.S.  University of California, Davis. 2013: 143 pages; 1565738.
202.
A framework for the governance of information security
by Edwards, Charles K., Ph.D.  Nova Southeastern University. 2013: 228 pages; 3607548.
203.
206.
207.
Towards information polycentricity theory– Investigation of a hospital revenue cycle
by Singh, Rajendra, Ph.D.  Georgia State University. 2011: 212 pages; 3490067.
210.
Leadership Best Practices for Female Executives in the Information Technology Industry
by Jenkins, Danielle, Ed.D.  Pepperdine University. 2017: 256 pages; 10607817.
181 - 210 of 2408 displayed.
« First < Previous |   4    5    6    7    8    9    10    11    12    13    14   Next >
Copyright © 2018 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest