Dissertations
A Capability-Centric Approach to Cyber Risk Assessment and Mitigation, Thomas H. Llansó
Accuracy of Self-Disclosed Cybersecurity Risks of Large US Banks, Troy G. Bakker
A Consent Framework for the Internet of Things in the GDPR Era, Gerald Chikukwa
A Dark Web Pharma Framework for A More Efficient Investigation of Dark Web COVID-19 Vaccine Products., Francisca Afua Opoku-Boateng
Advanced Code-reuse Attacks: A Novel Framework for JOP, Bramwell J. Brizendine
Advanced Data Analytics for Systematic Review Creation and Update, Prem Timsina
A False Sense of Security - Organizations Need a Paradigm Shift on Protecting Themselves against APTs, Srinivasulu R. Vuggumudi
A Framework for Identifying Host-based Artifacts in Dark Web Investigations, Arica Kulm
A Hierarchical Approach for Useable and Consistent CAPEC-based Attack Patterns, Patrick H. Engebretson
A Holistic Information Technology Audit Framework for Small- and Medium-sized Financial Institutions, Petter Lovaas
A Holistic Methodology for Profiling Ransomware Through Endpoint Detection, Stefani K. Hobratsch
Aligning Recovery Objectives With Organizational Capabilities, Jude C. Ejiobi
A Malware Analysis and Artifact Capture Tool, Dallas Wright
A Metric For Machine Learning Vulnerability to Adversarial Examples, Matt Bradley
Analysis of Healthcare Workflows in Accordance with Access Control Policies, Sandeep Kumar Lakkaraju
Analysis of System Performance Metrics Towards the Detection of Cryptojacking in IOT Devices, Richard Matthews
Analysis of Theoretical and Applied Machine Learning Models for Network Intrusion Detection, Jonah Baron
Analysis of Twitter Messages for Sentiment, Eric D. Brown
Analyzing the Effectiveness of Legal Regulations and Social Consequences for Securing Data, Howard B. Goodman
An Analytics-based Framework for Engaging Prospective Students in Higher Education Marketing, Santhosh Kumar Lakkaraju
An Application of Machine Learning to Analysis of Packed Mac Malware, Kimo Bumanglag
An Innovative Approach to Information Technology Risk Assessment for Small and Medium Sized Financial Institutions, Ashley L. Podhradsky
An Integrated Framework for the Recovery of Evidence from Encrypted Hard Disk Drives, Christopher Copeland
A Simulation-Based Decision Model for Computing Architectures in Healthcare Organizations, Charles S. Brust
A Socio-technical Process Model for Improving the Requirements Analysis Phase of Socio-technical System, Abdullah Hamdi Saleh Wahbeh
A Virtual Machine Introspection Based Multi-Service, Multi-Architecture, High-Interaction Honeypot for IOT Devices, Cory A. Nance
BGP Route Attestation: Design and Observation Using IPV6 Headers, Michael J. Ham
Binary Analysis Framework, Josh Stroschein
Block the Root Takeover: Validating Devices Using Blockchain Protocol, Sharmila Paul
BYOD-Insure: A Security Assessment Model for Enterprise BYOD, Melva Ratchford
Creating a Maturity Model for Business Intelligence in Healthcare, Patti Brooks
Crime Analytics: Mining Event Sequences in Criminal Careers, Carl A. Janzen
Cybersecurity Education for Non-Technical Learners, Matthew McNulty
Database Environmental Change Impact Prediction for Human-driven Tuning in Real-time (DECIPHER), Monish Sharma
Design and Development of Data Fusion-based Approach to Minimize the False Alarm Rate in ICU, Sarin Shrestha
Design of a Patient-Centered and Clincially Integrated Patient Decision Aid, Sergey Motorny
Design Principles Influencing Secondary School Counselors' Satisfaction of a Decision-Support System, Kodey S. Crandall
Digital Forensic Readiness: An Examination of Law Enforcement Agencies in the State of Maryland, James B. McNicholas III
Discovering Design Principles for Health Behavioral Change Support Systems: A Text Mining Approach, Mohammad Aref Abdel-Rahman
Effects of a Comprehensive Computer Security Policy on Human Computer Security Policy Compliance, Dennis C. Acuña
Efficacy of Incident Response Certification in the Workforce, Samuel Jarocki
Employee Acceptance of Employer Control Over Personal Devices, Kevin Callies
Enhancing Traceability in Clinical Research Data Through an Information Product Framework, Samuel Hume
Evaluating the Impact of Electronic Health Records on Clinical Reasoning Performance Using Task-Technology Fit Theory, Matthew J. Wills
Evaluating the Impacts of Detecting X.509 Covert Channels, Cody Welu
Exploring High-Power Distance Among Other Variables in Information Security Policy Compliance, Erasmus Ekpo Etim
Factors In uencing Curriculum Adoption in 2- and 4-year Undergraduate Cybersecurity Programs, Michael J. Pritchard
Faculty Perceptions of Open Educational Resources in Cyber Curriculum: A Pilot Study, Alan Stines
Hybrid Recommender For Online Petitions With Social Network And Psycholinguistic Features, Ahmed Elnoshokaty
Hybrid Recommender for Online Petitions with Social Network and Psycholinguistic Features, Ahmed Elnoshokaty
Identifying Optimal IT Portfolios to Promote Healthcare Quality, Kenneth Pinaire
Improving Adversarial Attacks Against MalConv, Justin Burr
Improving Business Intelligence Design Process Using a Multi-perspective Inter-disciplinary Communication Approach, Michael Albert Tomasura
Information Security Awareness: Antecedents and User Satisfaction Perspective, Yazan Alshboul
Information Security Policy Compliance: A User Acceptance Perspective, Ahmad Al-Omari
Interactions in Visualizations to Support Knowledge Activation, Kari Sandouka
IoT-HASS: A Framework For Protecting Smart Home Environment, Tarig Mudawi
Is Information Systems Misuse Always Bad? A New Perspective on IS Misuse in Hospitals Under the Context of Disasters, Dheyaaldin Alsalman
Is Information Systems Misuse Always Bad? A New Perspective on IS Misuse in Hospitals Under the Context of Disasters, Dheyaaldin Alsalman
JRevealPEG: A Semi-Blind JPEG Steganalysis Tool Targeting Current Open-Source Embedding Programs, Charles A. Badami
Leaderboard Design Principles Influencing User Engagement in an Online Discussion, Brian S. Bovee
Leveraging Content, Context, and Social Attributes to Detect Malicious Short URLs in Online Social Network, Raj Kumar Nepali
Malgazer: An Automated Malware Classifier With Running Window Entropy and Machine Learning, Keith Jones
Matching Possible Mitigations to Cyber Threats: A Document-Driven Decision Support Systems Approach, Martha Wagner McNeil
Mirai Bot Scanner Summation Prototype, Charles V. Frank Jr.
Mobile Identity, Credential, and Access Management Framework, Peggy Renee Camley
Multi-dimensional Security Integrity Analysis of Broad Market Internet-connected Cameras, Mark A. Stanislav
Network Traffic Analysis Framework For Cyber Threat Detection, Meshesha K. Cherie
Privacy and Security Concerns Associated with MHealth Technologies: A Social Media Mining Perspective, Damion Mitchell
Privacy Assessment Breakthrough: A Design Science Approach to Creating a Unified Methodology, Lisa McKee
Self-Efficacy in Information Security: A Mixed Methods Study of Deaf End-Users, Kyle Murbach
Small Business Information Security in Rural America: A Case Study of Independent Insurance Agencies in South Central North Dakota, Donald A. Heier
Social Media Text Mining Framework for Drug Abuse: An Opioid Crisis Case Analysis, Tareq Nasralah
Social Networking and E-Learning: Determining Time and Satisfaction Derived Through Dual Use, Kevin Williams
Structured Sensemaking of Videographic Information within Dataphoric Space, Michael J. Pritchard
The CybHER Program supported by CISSE Framework to Engage and Anchor Middle-school Girls in Cybersecurity, Pamela Rowland
The Effectiveness of Transfer Learning Systems on Medical Images, James Boit
The Influence of Community Commitment on Knowledge Management in Online Communities of Practice, James Gregory Greer
The Role of Privacy Within the Realm of Healthcare Wearables' Acceptance and Use, Thomas Jernejcic
The Study of Crowdsourcing in Knowledge Management: The Role of Employees' Innovative Behavior on Job Performance, Vetrivadivel Vel
Towards Identity Relationship Management For Internet of Things, Mohammad Muntasir Nur
Towards Improving Collaboration Success in Virtual Teams Through Collaboration Training, Dawn R. Dittman
Transfer-Learned Pruned Deep Convolutional Neural Networks for Efficient Plant Classification in Resource-Constrained Environments, Martinson Ofori
Traversing NAT: A Problem, Tyler Flaagan
Two Project on Information Systems Capabilities and Organizational Performance, Giridhar Reddy Bojja
Understanding Antecedents of Agile Software Development Methodology Preferences, David Brian Bishop
Understanding Knowledge Creation in the Context of Knowledge-Intensive Business Processes, Todd A. Little
Users' Continuance Participation in Online Health Communities: Short-term vs. Long-term, Yanyan Shang
Using Academic Analytics to Predict Dropout Risk in E-Learning Courses, Rajeev Bukralia
Theses
10g Grid Control for Enterprise Database Monitoring, Varghese Abraham
A Centralized Storage System for Catering Information, Matthew D. Johnson
Achievement Data for K-12 Schools, Lennie Symes
Active Directory and Ult Plus Resource Database, Eric Johnson
A Database of Databases (DBDB), Lawrence L. Colborne