Arama Sonu&ccedil;lar&#305; - Daralt&#305;lm&#305;&#351;: Information technology. - Northcentral University. School of Business and Technology Management. degree granting institution. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Information$002btechnology.$002509Information$002btechnology.$0026qf$003dAUTHOR$002509Yazar$002509Northcentral$002bUniversity.$002bSchool$002bof$002bBusiness$002band$002bTechnology$002bManagement.$002bdegree$002bgranting$002binstitution.$002509Northcentral$002bUniversity.$002bSchool$002bof$002bBusiness$002band$002bTechnology$002bManagement.$002bdegree$002bgranting$002binstitution.$0026ps$003d300? 2024-06-05T06:28:08Z Business User's Perspective and Experience with Proposed Resolutions to Security and Privacy Issues in Cloud Data Storage ent://SD_ILS/0/SD_ILS:700450 2024-06-05T06:28:08Z 2024-06-05T06:28:08Z by&#160;Adams, Deborah, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:13808785">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:13808785</a><br/>Format:&#160;Kitap<br/> Employees' Intentional Violation of Information Security Policies in Organizations: The Leader- Member Exchange (LMX) Perspective ent://SD_ILS/0/SD_ILS:682126 2024-06-05T06:28:08Z 2024-06-05T06:28:08Z by&#160;Ezeilo, Greg Ugochukwu, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10824298">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10824298</a><br/>Format:&#160;Kitap<br/> The Perceived Impact of Social Media on Employee Performance and Effectiveness ent://SD_ILS/0/SD_ILS:682233 2024-06-05T06:28:08Z 2024-06-05T06:28:08Z by&#160;Hall, Jamaz R., author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10824786">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10824786</a><br/>Format:&#160;Kitap<br/> Study of Productivity Rates for Geographically Distributed Agile Teams ent://SD_ILS/0/SD_ILS:682548 2024-06-05T06:28:08Z 2024-06-05T06:28:08Z by&#160;Martin, Kimberly Ann, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10826315">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10826315</a><br/>Format:&#160;Kitap<br/> Motivational Factors in Potential Employees to Accept Restrictive BYOD ISSP in the Workplace ent://SD_ILS/0/SD_ILS:682702 2024-06-05T06:28:08Z 2024-06-05T06:28:08Z by&#160;Jensen, Bryan, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10827128">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10827128</a><br/>Format:&#160;Kitap<br/> Perceptions of Healthcare Personnel about the Impact of Cyber-Threats and Intrusions on Patients' Private Health Information ent://SD_ILS/0/SD_ILS:682814 2024-06-05T06:28:08Z 2024-06-05T06:28:08Z by&#160;Akiri, Blessing Emmanuel, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10828054">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10828054</a><br/>Format:&#160;Kitap<br/> Gender Related Barriers and Experiences of Women Who Have Succeeded in Information Technology Leadership Positions ent://SD_ILS/0/SD_ILS:682824 2024-06-05T06:28:08Z 2024-06-05T06:28:08Z by&#160;Sample, Stephanie L., author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10828145">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10828145</a><br/>Format:&#160;Kitap<br/> A Qualitative Case Study in Professional Information Assurance Workforce Practices Demonstrated Through the Department of Defense ent://SD_ILS/0/SD_ILS:681747 2024-06-05T06:28:08Z 2024-06-05T06:28:08Z by&#160;Hodge, Timothy D., author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10822162">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10822162</a><br/>Format:&#160;Kitap<br/> Analysis of User Response to Complexity in Password Composition Policies in U.S. Healthcare Organizations ent://SD_ILS/0/SD_ILS:694731 2024-06-05T06:28:08Z 2024-06-05T06:28:08Z by&#160;Murphy, David S., author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10828375">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10828375</a><br/>Format:&#160;Kitap<br/>