Dissertations
Discovering Design Principles for Health Behavioral Change Support Systems: A Text Mining Approach, Mohammad Aref Abdel-Rahman
Enhancing Smart Home Security Through Risk-Based Access Control (RBAC): “Closing the Gap”, Ahmad Abusini
Effects of a Comprehensive Computer Security Policy on Human Computer Security Policy Compliance, Dennis C. Acuña
Information Security Policy Compliance: A User Acceptance Perspective, Ahmad Al-Omari
Is Information Systems Misuse Always Bad? A New Perspective on IS Misuse in Hospitals Under the Context of Disasters, Dheyaaldin Alsalman
Is Information Systems Misuse Always Bad? A New Perspective on IS Misuse in Hospitals Under the Context of Disasters, Dheyaaldin Alsalman
Information Security Awareness: Antecedents and User Satisfaction Perspective, Yazan Alshboul
Design Principles For App-Based Healthcare Interventions: A Mixed Method Approach, Loknath Sai Ambati
A Comprehensive Framework Empowering Organizations to Effectively Minimize the Risk of Big Data De-anonymization Attack, Olufemi A. Asabi
JRevealPEG: A Semi-Blind JPEG Steganalysis Tool Targeting Current Open-Source Embedding Programs, Charles A. Badami
IPCFA: A Methodology for Acquiring Forensically-Sound Digital Evidence in the Realm of IAAS Public Cloud Deployments, Hosam Badreldin
Accuracy of Self-Disclosed Cybersecurity Risks of Large US Banks, Troy G. Bakker
Analysis of Theoretical and Applied Machine Learning Models for Network Intrusion Detection, Jonah Baron
Defining A Cyber Operations Performance Framework Via Computational Modeling, Briant Becote
Detection Of VulnerabilitIies in 5G Femtocell Firmware Using Static Analysis Tools, Charles H. Begian
Understanding Provider Perspectives: Catalysts and Challenges of Intelligent Clinical Decision Support Systems, Andrew Behrens
Understanding Antecedents of Agile Software Development Methodology Preferences, David Brian Bishop
Ednem: A Malware Detection Framework Based on Static and Dynamic Analysis, Jumani Blango
The Effectiveness of Transfer Learning Systems on Medical Images, James Boit
Two Project on Information Systems Capabilities and Organizational Performance, Giridhar Reddy Bojja
Leaderboard Design Principles Influencing User Engagement in an Online Discussion, Brian S. Bovee
A Metric For Machine Learning Vulnerability to Adversarial Examples, Matt Bradley
Advanced Code-reuse Attacks: A Novel Framework for JOP, Bramwell J. Brizendine
Creating a Maturity Model for Business Intelligence in Healthcare, Patti Brooks
Analysis of Twitter Messages for Sentiment, Eric D. Brown
A Simulation-Based Decision Model for Computing Architectures in Healthcare Organizations, Charles S. Brust
Using Academic Analytics to Predict Dropout Risk in E-Learning Courses, Rajeev Bukralia
An Application of Machine Learning to Analysis of Packed Mac Malware, Kimo Bumanglag
Improving Adversarial Attacks Against MalConv, Justin Burr
Employee Acceptance of Employer Control Over Personal Devices, Kevin Callies
Mobile Identity, Credential, and Access Management Framework, Peggy Renee Carnley
Malware Pattern of Life Analysis, Mar Castro
A Performance-Explainability-Fairness Framework For Benchmarking ML Models, Shuvro Chakrobartty
Improving Opinion Mining by Classifying Facts and Opinions in Twitter - A Deep Learning Approach, Swayambhu P. Chatterjee
Network Traffic Analysis Framework For Cyber Threat Detection, Meshesha K. Cherie
A Consent Framework for the Internet of Things in the GDPR Era, Gerald Chikukwa
An Integrated Framework for the Recovery of Evidence from Encrypted Hard Disk Drives, Christopher Copeland
Design Principles Influencing Secondary School Counselors' Satisfaction of a Decision-Support System, Kodey S. Crandall
Towards Improving Collaboration Success in Virtual Teams Through Collaboration Training, Dawn R. Dittman
Knowledge Management in Higher Education: Effectiveness, Success factors, and Organisational Performance, Armel Djangone
Aligning Recovery Objectives With Organizational Capabilities, Jude C. Ejiobi
Hybrid Recommender for Online Petitions with Social Network and Psycholinguistic Features, Ahmed Elnoshokaty
A Hierarchical Approach for Useable and Consistent CAPEC-based Attack Patterns, Patrick H. Engebretson
Exploring High-Power Distance Among Other Variables in Information Security Policy Compliance, Erasmus Ekpo Etim
Native American Community Digital Divide: Student Insights, Chad R. Fenner
Traversing NAT: A Problem, Tyler Flaagan
Mirai Bot Scanner Summation Prototype, Charles V. Frank Jr.
Effectiveness of Transfer Learning with Light-weight Architecture for Covid-19 Imaging, Rajesh Godasu
Analyzing the Effectiveness of Legal Regulations and Social Consequences for Securing Data, Howard B. Goodman
Exploring the Interoperability for Information Exchange Between Acute and Post-Acute Care Settings, Madhu Gottumukkala
The Influence of Community Commitment on Knowledge Management in Online Communities of Practice, James Gregory Greer
A Study of Stem and Non-Stem College Students’ Smart TV Attitudes (The Trade-Off Between Functionality and Security/Privacy), Nadia Halabi
BGP Route Attestation: Design and Observation Using IPV6 Headers, Michael J. Ham
Small Business Information Security in Rural America: A Case Study of Independent Insurance Agencies in South Central North Dakota, Donald A. Heier
A Holistic Methodology for Profiling Ransomware Through Endpoint Detection, Stefani K. Hobratsch
Enhancing Traceability in Clinical Research Data Through an Information Product Framework, Samuel Hume
BAMBI: Bluetooth Access Management & Beacon Identification, Anthony Jairam
Crime Analytics: Mining Event Sequences in Criminal Careers, Carl A. Janzen
Efficacy of Incident Response Certification in the Workforce, Samuel Jarocki
Leveraging the Zigbee Pattern of Life to Identify Devices, Kurt Jarvis
The Role of Privacy Within the Realm of Healthcare Wearables' Acceptance and Use, Thomas Jernejcic
Forensic Iconography for Image Forgery Detection, Chad R. Johnson
Malgazer: An Automated Malware Classifier With Running Window Entropy and Machine Learning, Keith Jones
Identifying Critical Factors That Impact Learning Analytics Adoption by Higher Education Faculty, Michael Knupp
Fine-Grained Address Space Layout Randomization Through Non-Contiguous Per-Function Memory Segment Assignment, Andrew Kramer
A Model of Authentication for Augmented and Virtual Realities, Christopher Kreider
A Framework for Identifying Host-based Artifacts in Dark Web Investigations, Arica Kulm
Analysis of Healthcare Workflows in Accordance with Access Control Policies, Sandeep Kumar Lakkaraju
An Analytics-based Framework for Engaging Prospective Students in Higher Education Marketing, Santhosh Kumar Lakkaraju
ABCD: A Risk Management Framework for SCADA Systems, Thuy Lam
A Novel Approach To A Second Channel Authentication Method Utilizing Alphanumerical Data Transfer Through Audio Waves, Mark Lawrence
Endpoint Defense as Code (EDAC): Configurable Contextual Analysis of Process Behaviors From Kernel/User Event Tracing, Trevor M. Lewis
Understanding Knowledge Creation in the Context of Knowledge-Intensive Business Processes, Todd A. Little
A Capability-Centric Approach to Cyber Risk Assessment and Mitigation, Thomas H. Llansó
Token Based Authentication and Authorization with Zero-Knowledge Proofs for Enhancing Web API Security and Privacy, Michael Lodder
A Holistic Information Technology Audit Framework for Small- and Medium-sized Financial Institutions, Petter Lovaas
Analysis of System Performance Metrics Towards the Detection of Cryptojacking in IOT Devices, Richard Matthews
Privacy Assessment Breakthrough: A Design Science Approach to Creating a Unified Methodology, Lisa McKee
Matching Possible Mitigations to Cyber Threats: A Document-Driven Decision Support Systems Approach, Martha Wagner McNeil
A Self-Regulated Learning Approach to Educational Recommender Design, Alicia McNett
Digital Forensic Readiness: An Examination of Law Enforcement Agencies in the State of Maryland, James B. McNicholas III
Cybersecurity Education for Non-Technical Learners, Matthew McNulty
Privacy and Security Concerns Associated with MHealth Technologies: A Social Media Mining Perspective, Damion Mitchell
Towards an Efficient Multi-Cloud Observability Framework of Containerized Microservices in Kubernetes Platform, Haytham Mohamed
Design of a Patient-Centered and Clincially Integrated Patient Decision Aid, Sergey Motorny
IoT-HASS: A Framework For Protecting Smart Home Environment, Tarig Mudawi
Self-Efficacy in Information Security: A Mixed Methods Study of Deaf End-Users, Kyle Murbach
Automated Dynamic Policy Generation for Access Control in the Internet of Things, Kaushik Nagarajan Muthusamy Ragothaman
A Virtual Machine Introspection Based Multi-Service, Multi-Architecture, High-Interaction Honeypot for IOT Devices, Cory A. Nance
UAV Drone Security of Control for Increased Safety-of-flight, Daniel R. Nash
Social Media Text Mining Framework for Drug Abuse: An Opioid Crisis Case Analysis, Tareq Nasralah
Leveraging Content, Context, and Social Attributes to Detect Malicious Short URLs in Online Social Network, Raj Kumar Nepali
A Cross-Architecture Framework for Anti-Debugging Techniques, Austin Norby
Towards Identity Relationship Management For Internet of Things, Mohammad Muntasir Nur
Information Security Awareness Programs in Congolese Organizations: Cultural Influence and Effective Use., Arnold Nzailu