Follow

Dissertations

PDF

A Capability-Centric Approach to Cyber Risk Assessment and Mitigation, Thomas H. Llansó

PDF

Accuracy of Self-Disclosed Cybersecurity Risks of Large US Banks, Troy G. Bakker

PDF

A Consent Framework for the Internet of Things in the GDPR Era, Gerald Chikukwa

A Cross Industry Study: Differences in Information Security Policy Compliance Between the Banking Industry and Higher Education, Hwee-Joo Kam

PDF

A Dark Web Pharma Framework for A More Efficient Investigation of Dark Web COVID-19 Vaccine Products., Francisca Afua Opoku-Boateng

PDF

Advanced Code-reuse Attacks: A Novel Framework for JOP, Bramwell J. Brizendine

PDF

Advanced Data Analytics for Systematic Review Creation and Update, Prem Timsina

PDF

A False Sense of Security - Organizations Need a Paradigm Shift on Protecting Themselves against APTs, Srinivasulu R. Vuggumudi

PDF

A Framework for Identifying Host-based Artifacts in Dark Web Investigations, Arica Kulm

PDF

A Hierarchical Approach for Useable and Consistent CAPEC-based Attack Patterns, Patrick H. Engebretson

PDF

A Holistic Information Technology Audit Framework for Small- and Medium-sized Financial Institutions, Petter Lovaas

PDF

A Holistic Methodology for Profiling Ransomware Through Endpoint Detection, Stefani K. Hobratsch

PDF

Aligning Recovery Objectives With Organizational Capabilities, Jude C. Ejiobi

PDF

A Malware Analysis and Artifact Capture Tool, Dallas Wright

PDF

A Metric For Machine Learning Vulnerability to Adversarial Examples, Matt Bradley

PDF

Analysis of Healthcare Workflows in Accordance with Access Control Policies, Sandeep Kumar Lakkaraju

PDF

Analysis of System Performance Metrics Towards the Detection of Cryptojacking in IOT Devices, Richard Matthews

PDF

Analysis of Theoretical and Applied Machine Learning Models for Network Intrusion Detection, Jonah Baron

PDF

Analysis of Twitter Messages for Sentiment, Eric D. Brown

PDF

Analyzing the Effectiveness of Legal Regulations and Social Consequences for Securing Data, Howard B. Goodman

PDF

An Analytics-based Framework for Engaging Prospective Students in Higher Education Marketing, Santhosh Kumar Lakkaraju

PDF

An Application of Machine Learning to Analysis of Packed Mac Malware, Kimo Bumanglag

PDF

An Exploration of the Impact of Electronic Medical Record Capabilities Selection, Implementation Sequence, and Adoption Timing on Healthcare Outcomes, Yousra Harb

PDF

An Exploratory Analysis of the Impact of Internalization, Externalization, Socialization, and Exchange on Employee Learning, Adaptability, Job Satisfaction, and Intention to Stay, Zahid B. Zamir

PDF

An Innovative Approach to Information Technology Risk Assessment for Small and Medium Sized Financial Institutions, Ashley L. Podhradsky

PDF

An Integrated Framework for the Recovery of Evidence from Encrypted Hard Disk Drives, Christopher Copeland

A Simulation-Based Decision Model for Computing Architectures in Healthcare Organizations, Charles S. Brust

PDF

A Socio-technical Process Model for Improving the Requirements Analysis Phase of Socio-technical System, Abdullah Hamdi Saleh Wahbeh

PDF

A Virtual Machine Introspection Based Multi-Service, Multi-Architecture, High-Interaction Honeypot for IOT Devices, Cory A. Nance

PDF

BGP Route Attestation: Design and Observation Using IPV6 Headers, Michael J. Ham

PDF

Binary Analysis Framework, Josh Stroschein

PDF

Block the Root Takeover: Validating Devices Using Blockchain Protocol, Sharmila Paul

PDF

BYOD-Insure: A Security Assessment Model for Enterprise BYOD, Melva Ratchford

PDF

Creating a Maturity Model for Business Intelligence in Healthcare, Patti Brooks

PDF

Crime Analytics: Mining Event Sequences in Criminal Careers, Carl A. Janzen

PDF

Cybersecurity Education for Non-Technical Learners, Matthew McNulty

PDF

Database Environmental Change Impact Prediction for Human-driven Tuning in Real-time (DECIPHER), Monish Sharma

PDF

Design and Development of Data Fusion-based Approach to Minimize the False Alarm Rate in ICU, Sarin Shrestha

PDF

Design of a Patient-Centered and Clincially Integrated Patient Decision Aid, Sergey Motorny

PDF

Design Principles Influencing Secondary School Counselors' Satisfaction of a Decision-Support System, Kodey S. Crandall

PDF

Digital Forensic Readiness: An Examination of Law Enforcement Agencies in the State of Maryland, James B. McNicholas III

PDF

Discovering Design Principles for Health Behavioral Change Support Systems: A Text Mining Approach, Mohammad Aref Abdel-Rahman

PDF

Distributed Multi-component Approach and System for Enhanced Security of Public Infrastructure as a Service (IAAS) Cloud Computing Environments, Jason Nikolai

PDF

Effects of a Comprehensive Computer Security Policy on Human Computer Security Policy Compliance, Dennis C. Acuña

PDF

Efficacy of Incident Response Certification in the Workforce, Samuel Jarocki

PDF

Employee Acceptance of Employer Control Over Personal Devices, Kevin Callies

PDF

Enhancing Traceability in Clinical Research Data Through an Information Product Framework, Samuel Hume

PDF

Evaluating the Impact of Electronic Health Records on Clinical Reasoning Performance Using Task-Technology Fit Theory, Matthew J. Wills

PDF

Evaluating the Impacts of Detecting X.509 Covert Channels, Cody Welu

PDF

Exploring High-Power Distance Among Other Variables in Information Security Policy Compliance, Erasmus Ekpo Etim

PDF

Factors In uencing Curriculum Adoption in 2- and 4-year Undergraduate Cybersecurity Programs, Michael J. Pritchard

PDF

Faculty Perceptions of Open Educational Resources in Cyber Curriculum: A Pilot Study, Alan Stines

PDF

Flashlight in a Dark Room: A Grounded Theory Study on Information Security Management at Small Healthcare Provider Organizations, Gerald Auger

Hybrid Recommender For Online Petitions With Social Network And Psycholinguistic Features, Ahmed Elnoshokaty

PDF

Hybrid Recommender for Online Petitions with Social Network and Psycholinguistic Features, Ahmed Elnoshokaty

PDF

Identifying Optimal IT Portfolios to Promote Healthcare Quality, Kenneth Pinaire

PDF

Improving Adversarial Attacks Against MalConv, Justin Burr

PDF

Improving Business Intelligence Design Process Using a Multi-perspective Inter-disciplinary Communication Approach, Michael Albert Tomasura

PDF

Information Security Awareness: Antecedents and User Satisfaction Perspective, Yazan Alshboul

PDF

Information Security Policy Compliance: A User Acceptance Perspective, Ahmad Al-Omari

PDF

Interactions in Visualizations to Support Knowledge Activation, Kari Sandouka

PDF

IoT-HASS: A Framework For Protecting Smart Home Environment, Tarig Mudawi

Is Information Systems Misuse Always Bad? A New Perspective on IS Misuse in Hospitals Under the Context of Disasters, Dheyaaldin Alsalman

PDF

Is Information Systems Misuse Always Bad? A New Perspective on IS Misuse in Hospitals Under the Context of Disasters, Dheyaaldin Alsalman

PDF

JRevealPEG: A Semi-Blind JPEG Steganalysis Tool Targeting Current Open-Source Embedding Programs, Charles A. Badami

PDF

Leaderboard Design Principles Influencing User Engagement in an Online Discussion, Brian S. Bovee

PDF

Leveraging Content, Context, and Social Attributes to Detect Malicious Short URLs in Online Social Network, Raj Kumar Nepali

PDF

Malgazer: An Automated Malware Classifier With Running Window Entropy and Machine Learning, Keith Jones

PDF

Matching Possible Mitigations to Cyber Threats: A Document-Driven Decision Support Systems Approach, Martha Wagner McNeil

PDF

Mirai Bot Scanner Summation Prototype, Charles V. Frank Jr.

PDF

Mobile Identity, Credential, and Access Management Framework, Peggy Renee Camley

PDF

Multi-dimensional Security Integrity Analysis of Broad Market Internet-connected Cameras, Mark A. Stanislav

PDF

Network Traffic Analysis Framework For Cyber Threat Detection, Meshesha K. Cherie

PDF

Privacy and Security Concerns Associated with MHealth Technologies: A Social Media Mining Perspective, Damion Mitchell

PDF

Privacy Assessment Breakthrough: A Design Science Approach to Creating a Unified Methodology, Lisa McKee

PDF

Self-Efficacy in Information Security: A Mixed Methods Study of Deaf End-Users, Kyle Murbach

PDF

Small Business Information Security in Rural America: A Case Study of Independent Insurance Agencies in South Central North Dakota, Donald A. Heier

PDF

Social Media Text Mining Framework for Drug Abuse: An Opioid Crisis Case Analysis, Tareq Nasralah

PDF

Social Networking and E-Learning: Determining Time and Satisfaction Derived Through Dual Use, Kevin Williams

PDF

Structured Sensemaking of Videographic Information within Dataphoric Space, Michael J. Pritchard

PDF

The CybHER Program supported by CISSE Framework to Engage and Anchor Middle-school Girls in Cybersecurity, Pamela Rowland

PDF

The Effectiveness of Transfer Learning Systems on Medical Images, James Boit

PDF

The Impact of Unified Communications on Perceived Productivity Through Relationship Building in a Large Enterprise, Joy Fluker

PDF

The Influence of Community Commitment on Knowledge Management in Online Communities of Practice, James Gregory Greer

PDF

The Role of Privacy Within the Realm of Healthcare Wearables' Acceptance and Use, Thomas Jernejcic

PDF

The Study of Crowdsourcing in Knowledge Management: The Role of Employees' Innovative Behavior on Job Performance, Vetrivadivel Vel

PDF

Towards Identity Relationship Management For Internet of Things, Mohammad Muntasir Nur

PDF

Towards Improving Collaboration Success in Virtual Teams Through Collaboration Training, Dawn R. Dittman

PDF

Transfer-Learned Pruned Deep Convolutional Neural Networks for Efficient Plant Classification in Resource-Constrained Environments, Martinson Ofori

PDF

Traversing NAT: A Problem, Tyler Flaagan

PDF

Two Project on Information Systems Capabilities and Organizational Performance, Giridhar Reddy Bojja

PDF

Understanding Antecedents of Agile Software Development Methodology Preferences, David Brian Bishop

PDF

Understanding Knowledge Creation in the Context of Knowledge-Intensive Business Processes, Todd A. Little

PDF

Users' Continuance Participation in Online Health Communities: Short-term vs. Long-term, Yanyan Shang

PDF

Using Academic Analytics to Predict Dropout Risk in E-Learning Courses, Rajeev Bukralia

Theses

PDF

10g Grid Control for Enterprise Database Monitoring, Varghese Abraham

PDF

A Centralized Storage System for Catering Information, Matthew D. Johnson

PDF

Achievement Data for K-12 Schools, Lennie Symes

PDF

Active Directory and Ult Plus Resource Database, Eric Johnson

PDF

A Database of Databases (DBDB), Lawrence L. Colborne