Theses/Dissertations from 2017
Effects of a Comprehensive Computer Security Policy on Human Computer Security Policy Compliance, Dennis C. Acuña
Information Security Awareness: Antecedents and User Satisfaction Perspective, Yazan Alshboul
Improving Opinion Mining by Classifying Facts and Opinions in Twitter - A Deep Learning Approach, Swayambhu P. Chatterjee
BGP Route Attestation: Design and Observation Using IPV6 Headers, Michael J. Ham
Enhancing Traceability in Clinical Research Data Through an Information Product Framework, Samuel Hume
Users' Continuance Participation in Online Health Communities: Short-term vs. Long-term, Yanyan Shang
Binary Analysis Framework, Josh Stroschein
Theses/Dissertations from 2016
An Integrated Framework for the Recovery of Evidence from Encrypted Hard Disk Drives, Christopher Copeland
An Analytics-based Framework for Engaging Prospective Students in Higher Education Marketing, Santhosh Kumar Lakkaraju
Leveraging Content, Context, and Social Attributes to Detect Malicious Short URLs in Online Social Network, Raj Kumar Nepali
Design and Development of Data Fusion-based Approach to Minimize the False Alarm Rate in ICU, Sarin Shrestha
Advanced Data Analytics for Systematic Review Creation and Update, Prem Timsina
A Socio-technical Process Model for Improving the Requirements Analysis Phase of Socio-technical System, Abdullah Hamdi Saleh Wahbeh
Theses/Dissertations from 2015
Accuracy of Self-Disclosed Cybersecurity Risks of Large US Banks, Troy G. Bakker
Analysis of Healthcare Workflows in Accordance with Access Control Policies, Sandeep Kumar Lakkaraju
Design of a Patient-Centered and Clincially Integrated Patient Decision Aid, Sergey Motorny
Theses/Dissertations from 2014
Understanding Antecedents of Agile Software Development Methodology Preferences, David Brian Bishop
Analysis of Twitter Messages for Sentiment, Eric D. Brown
Small Business Information Security in Rural America: A Case Study of Independent Insurance Agencies in South Central North Dakota, Donald A. Heier
Theses/Dissertations from 2013
Creating a Maturity Model for Business Intelligence in Healthcare, Patti Brooks
A Simulation-Based Decision Model for Computing Architectures in Healthcare Organizations, Charles S. Brust
The Influence of Community Commitment on Knowledge Management in Online Communities of Practice, James Gregory Greer
Crime Analytics: Mining Event Sequences in Criminal Careers, Carl A. Janzen
Understanding Knowledge Creation in the Context of Knowledge-Intensive Business Processes, Todd A. Little
E-Government Security in Municipal Government: A Case Study of Municipalities in Orange County, California, Timothy J. Perez
Identifying Optimal IT Portfolios to Promote Healthcare Quality, Kenneth Pinaire
Database Environmental Change Impact Prediction for Human-driven Tuning in Real-time (DECIPHER), Monish Sharma
Improving Business Intelligence Design Process Using a Multi-perspective Inter-disciplinary Communication Approach, Michael Albert Tomasura
Aligning IT Assets to Maximize Healthcare Organizational Performance, Paul Weist
Social Networking and E-Learning: Determining Time and Satisfaction Derived Through Dual Use, Kevin Williams
Theses/Dissertations from 2012
Information Security Policy Compliance: A User Acceptance Perspective, Ahmad Al-Omari
Talent Analytics: How Data Mining Can Improve Talent Assessment, Karen Vizecky
Evaluating the Impact of Electronic Health Records on Clinical Reasoning Performance Using Task-Technology Fit Theory, Matthew J. Wills
Theses/Dissertations from 2011
Using Academic Analytics to Predict Dropout Risk in E-Learning Courses, Rajeev Bukralia
Theses/Dissertations from 2010
Towards Improving Collaboration Success in Virtual Teams Through Collaboration Training, Dawn R. Dittman
A Holistic Information Technology Audit Framework for Small- and Medium-sized Financial Institutions, Petter Lovaas
An Innovative Approach to Information Technology Risk Assessment for Small and Medium Sized Financial Institutions, Ashley Leonora Podhradsky
Theses/Dissertations from 2009
A Hierarchical Approach for Useable and Consistent CAPEC-based Attack Patterns, Patrick H. Engebretson