Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for publisher:("Utica College"). Showing records 1 – 30 of 35 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters

1. Kinchla, Brendan. Forensic recovery of evidence from deleted VMware vSphere Hypervisor virtual machines.

Degree: 2015, Utica College

  The purpose of this research was to analyze the potential for recovering evidence from deleted VMware vSphere Hypervisor (ESXi) virtual machines (VMs). There exists… (more)

Subjects/Keywords: Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kinchla, B. (2015). Forensic recovery of evidence from deleted VMware vSphere Hypervisor virtual machines. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=1587159

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kinchla, Brendan. “Forensic recovery of evidence from deleted VMware vSphere Hypervisor virtual machines.” 2015. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=1587159.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kinchla, Brendan. “Forensic recovery of evidence from deleted VMware vSphere Hypervisor virtual machines.” 2015. Web. 18 Jun 2019.

Vancouver:

Kinchla B. Forensic recovery of evidence from deleted VMware vSphere Hypervisor virtual machines. [Internet] [Thesis]. Utica College; 2015. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1587159.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kinchla B. Forensic recovery of evidence from deleted VMware vSphere Hypervisor virtual machines. [Thesis]. Utica College; 2015. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1587159

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

2. Labossiere, Dennis L. A matrix for small business owners to better protect their network.

Degree: 2016, Utica College

  Small business owners are targets for cyber-attacks just as much as large corporations. A big difference being small business owners don’t have the finances… (more)

Subjects/Keywords: Computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Labossiere, D. L. (2016). A matrix for small business owners to better protect their network. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=1605731

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Labossiere, Dennis L. “A matrix for small business owners to better protect their network.” 2016. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=1605731.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Labossiere, Dennis L. “A matrix for small business owners to better protect their network.” 2016. Web. 18 Jun 2019.

Vancouver:

Labossiere DL. A matrix for small business owners to better protect their network. [Internet] [Thesis]. Utica College; 2016. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1605731.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Labossiere DL. A matrix for small business owners to better protect their network. [Thesis]. Utica College; 2016. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1605731

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

3. Kabir, Shahnaz. Reform strategies for management of vascular patients to reduce readmission and healthcare costs.

Degree: 2017, Utica College

  The capstone project reports the risk factors causing unplanned hospital readmission of vascular patients as well as the effects on healthcare cost. The methods… (more)

Subjects/Keywords: Health sciences; Public health; Health care management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kabir, S. (2017). Reform strategies for management of vascular patients to reduce readmission and healthcare costs. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=10250824

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kabir, Shahnaz. “Reform strategies for management of vascular patients to reduce readmission and healthcare costs.” 2017. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=10250824.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kabir, Shahnaz. “Reform strategies for management of vascular patients to reduce readmission and healthcare costs.” 2017. Web. 18 Jun 2019.

Vancouver:

Kabir S. Reform strategies for management of vascular patients to reduce readmission and healthcare costs. [Internet] [Thesis]. Utica College; 2017. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10250824.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kabir S. Reform strategies for management of vascular patients to reduce readmission and healthcare costs. [Thesis]. Utica College; 2017. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10250824

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

4. Deep, Danielle. Role of the Internet in the Sexual Exploitation of Children.

Degree: 2016, Utica College

  The availability of the Internet has become increasingly easier to adolescents due to technological advancements. Children are not only susceptible to predators in parks,… (more)

Subjects/Keywords: Sociology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Deep, D. (2016). Role of the Internet in the Sexual Exploitation of Children. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=10153533

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Deep, Danielle. “Role of the Internet in the Sexual Exploitation of Children.” 2016. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=10153533.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Deep, Danielle. “Role of the Internet in the Sexual Exploitation of Children.” 2016. Web. 18 Jun 2019.

Vancouver:

Deep D. Role of the Internet in the Sexual Exploitation of Children. [Internet] [Thesis]. Utica College; 2016. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10153533.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Deep D. Role of the Internet in the Sexual Exploitation of Children. [Thesis]. Utica College; 2016. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10153533

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

5. Pamer, Karen. A global study of hawala targeting regulations.

Degree: 2016, Utica College

  This research focused on hawala regulations in multiple jurisdictions, strategies of international bodies to mitigate illicit transfers, and implementation of a standardized approach to… (more)

Subjects/Keywords: Economics; Finance; Banking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pamer, K. (2016). A global study of hawala targeting regulations. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=10153553

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pamer, Karen. “A global study of hawala targeting regulations.” 2016. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=10153553.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pamer, Karen. “A global study of hawala targeting regulations.” 2016. Web. 18 Jun 2019.

Vancouver:

Pamer K. A global study of hawala targeting regulations. [Internet] [Thesis]. Utica College; 2016. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10153553.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pamer K. A global study of hawala targeting regulations. [Thesis]. Utica College; 2016. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10153553

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

6. Harris, Ashley. Cyber ethics| Assessment on government and the private industry.

Degree: 2016, Utica College

  The need for cyber ethics continues to grow at a staggering pace within the federal government and the private industry’s code of conduct. However,… (more)

Subjects/Keywords: Ethics; Information technology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Harris, A. (2016). Cyber ethics| Assessment on government and the private industry. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=10154340

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Harris, Ashley. “Cyber ethics| Assessment on government and the private industry.” 2016. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=10154340.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Harris, Ashley. “Cyber ethics| Assessment on government and the private industry.” 2016. Web. 18 Jun 2019.

Vancouver:

Harris A. Cyber ethics| Assessment on government and the private industry. [Internet] [Thesis]. Utica College; 2016. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10154340.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Harris A. Cyber ethics| Assessment on government and the private industry. [Thesis]. Utica College; 2016. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10154340

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

7. Register, Michael G. Justifying the means| Electronic domestic surveillance programs before and following the September 11, 2001 terrorist attack on the United States.

Degree: 2016, Utica College

  Throughout the years, the United States government and local law enforcement has used electronic domestic surveillance for criminal justice purposes. Shortly after World War… (more)

Subjects/Keywords: Information technology; Political science; Criminology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Register, M. G. (2016). Justifying the means| Electronic domestic surveillance programs before and following the September 11, 2001 terrorist attack on the United States. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=10155656

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Register, Michael G. “Justifying the means| Electronic domestic surveillance programs before and following the September 11, 2001 terrorist attack on the United States.” 2016. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=10155656.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Register, Michael G. “Justifying the means| Electronic domestic surveillance programs before and following the September 11, 2001 terrorist attack on the United States.” 2016. Web. 18 Jun 2019.

Vancouver:

Register MG. Justifying the means| Electronic domestic surveillance programs before and following the September 11, 2001 terrorist attack on the United States. [Internet] [Thesis]. Utica College; 2016. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10155656.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Register MG. Justifying the means| Electronic domestic surveillance programs before and following the September 11, 2001 terrorist attack on the United States. [Thesis]. Utica College; 2016. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10155656

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

8. Tambasco, Michael J. Global scale identity management.

Degree: 2015, Utica College

  Global scale identity management attempts to be the system of identifying and authenticating entities such as people, hardware devices, distributed sensors and actuators, and… (more)

Subjects/Keywords: Information technology; Computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tambasco, M. J. (2015). Global scale identity management. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=1600350

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tambasco, Michael J. “Global scale identity management.” 2015. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=1600350.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tambasco, Michael J. “Global scale identity management.” 2015. Web. 18 Jun 2019.

Vancouver:

Tambasco MJ. Global scale identity management. [Internet] [Thesis]. Utica College; 2015. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1600350.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tambasco MJ. Global scale identity management. [Thesis]. Utica College; 2015. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1600350

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

9. Gobran, Ashraf. Cyber terrorrism threats.

Degree: 2015, Utica College

  The purpose of this study is to explore the potential threats that are posed uniquely by cyber terrorism. While traditional terrorism has affected governmental… (more)

Subjects/Keywords: Information technology; Computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gobran, A. (2015). Cyber terrorrism threats. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=1588500

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gobran, Ashraf. “Cyber terrorrism threats.” 2015. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=1588500.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gobran, Ashraf. “Cyber terrorrism threats.” 2015. Web. 18 Jun 2019.

Vancouver:

Gobran A. Cyber terrorrism threats. [Internet] [Thesis]. Utica College; 2015. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1588500.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gobran A. Cyber terrorrism threats. [Thesis]. Utica College; 2015. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1588500

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

10. Zambotti, Michael J. An Analysis of Data Security Standards at Hedge Funds.

Degree: 2017, Utica College

  The purpose of this research project was to analyze the current state of data security practices in the financial services industry, particularly hedge funds.… (more)

Subjects/Keywords: Finance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zambotti, M. J. (2017). An Analysis of Data Security Standards at Hedge Funds. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=10283770

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zambotti, Michael J. “An Analysis of Data Security Standards at Hedge Funds.” 2017. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=10283770.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zambotti, Michael J. “An Analysis of Data Security Standards at Hedge Funds.” 2017. Web. 18 Jun 2019.

Vancouver:

Zambotti MJ. An Analysis of Data Security Standards at Hedge Funds. [Internet] [Thesis]. Utica College; 2017. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10283770.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zambotti MJ. An Analysis of Data Security Standards at Hedge Funds. [Thesis]. Utica College; 2017. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10283770

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

11. Susral, Bradley. The Efficacy of North Korean Sanctions and Remediation Strategies.

Degree: 2017, Utica College

  The United Nations and United States’ economic sanctions on North Korea are significant because they have deep geopolitical implications. North Korea has grown its… (more)

Subjects/Keywords: International relations; Political science; Banking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Susral, B. (2017). The Efficacy of North Korean Sanctions and Remediation Strategies. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=10623292

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Susral, Bradley. “The Efficacy of North Korean Sanctions and Remediation Strategies.” 2017. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=10623292.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Susral, Bradley. “The Efficacy of North Korean Sanctions and Remediation Strategies.” 2017. Web. 18 Jun 2019.

Vancouver:

Susral B. The Efficacy of North Korean Sanctions and Remediation Strategies. [Internet] [Thesis]. Utica College; 2017. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10623292.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Susral B. The Efficacy of North Korean Sanctions and Remediation Strategies. [Thesis]. Utica College; 2017. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10623292

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

12. Fulton, John William. Solid State Disk forensics| Is there a path forward?.

Degree: 2014, Utica College

  Solid State Disks (SSDs) are reaching the point of being a practical replacement for traditional spinning media hard disk drives. With no moving parts… (more)

Subjects/Keywords: Engineering, General; Sociology, Criminology and Penology; Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fulton, J. W. (2014). Solid State Disk forensics| Is there a path forward?. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=1555597

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fulton, John William. “Solid State Disk forensics| Is there a path forward?.” 2014. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=1555597.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fulton, John William. “Solid State Disk forensics| Is there a path forward?.” 2014. Web. 18 Jun 2019.

Vancouver:

Fulton JW. Solid State Disk forensics| Is there a path forward?. [Internet] [Thesis]. Utica College; 2014. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1555597.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fulton JW. Solid State Disk forensics| Is there a path forward?. [Thesis]. Utica College; 2014. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1555597

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

13. Shwani, Hazim G. Critical infrastructure protection.

Degree: 2014, Utica College

  This research study focused on identifying the protection of critical infrastructures and enhancing cybersecurity. The most recent cyber practice that is in place to… (more)

Subjects/Keywords: Sociology, Criminology and Penology; Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shwani, H. G. (2014). Critical infrastructure protection. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=1555605

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Shwani, Hazim G. “Critical infrastructure protection.” 2014. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=1555605.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Shwani, Hazim G. “Critical infrastructure protection.” 2014. Web. 18 Jun 2019.

Vancouver:

Shwani HG. Critical infrastructure protection. [Internet] [Thesis]. Utica College; 2014. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1555605.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Shwani HG. Critical infrastructure protection. [Thesis]. Utica College; 2014. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1555605

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

14. Boawn, Daniel L. Cyber counterintelligence, defending the United States' information technology and communications critical infrastructure from Chinese threats.

Degree: 2014, Utica College

  Cyber counterintelligence (CCI) could be the United States' best defense against Chinese cyber aggression of Critical Infrastructure and Key Resources (CIKR). The need to… (more)

Subjects/Keywords: Information Technology; Multimedia Communications; Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Boawn, D. L. (2014). Cyber counterintelligence, defending the United States' information technology and communications critical infrastructure from Chinese threats. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=1555786

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Boawn, Daniel L. “Cyber counterintelligence, defending the United States' information technology and communications critical infrastructure from Chinese threats.” 2014. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=1555786.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Boawn, Daniel L. “Cyber counterintelligence, defending the United States' information technology and communications critical infrastructure from Chinese threats.” 2014. Web. 18 Jun 2019.

Vancouver:

Boawn DL. Cyber counterintelligence, defending the United States' information technology and communications critical infrastructure from Chinese threats. [Internet] [Thesis]. Utica College; 2014. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1555786.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Boawn DL. Cyber counterintelligence, defending the United States' information technology and communications critical infrastructure from Chinese threats. [Thesis]. Utica College; 2014. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1555786

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

15. Piersma, Hida Jessie. The role of a nurse leader| Process improvement in patient safety culture.

Degree: 2015, Utica College

  Within the health care system, patient safety outcomes have been criticized for many years. Medical malpractice, common errors, and nosocomial infections (i.e., hospital-acquired infections)… (more)

Subjects/Keywords: Higher education administration; Nursing; Health care management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Piersma, H. J. (2015). The role of a nurse leader| Process improvement in patient safety culture. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=1603160

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Piersma, Hida Jessie. “The role of a nurse leader| Process improvement in patient safety culture.” 2015. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=1603160.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Piersma, Hida Jessie. “The role of a nurse leader| Process improvement in patient safety culture.” 2015. Web. 18 Jun 2019.

Vancouver:

Piersma HJ. The role of a nurse leader| Process improvement in patient safety culture. [Internet] [Thesis]. Utica College; 2015. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1603160.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Piersma HJ. The role of a nurse leader| Process improvement in patient safety culture. [Thesis]. Utica College; 2015. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1603160

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

16. Pamplin, Berkley A. Virtual currencies and the implications for U.S. anti-money laundering regulations.

Degree: 2014, Utica College

  There is a general understanding in the financial and regulatory environment that virtual currencies pose a challenge for monitoring and combating money laundering. However,… (more)

Subjects/Keywords: Sociology, Criminology and Penology; Business Administration, Banking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pamplin, B. A. (2014). Virtual currencies and the implications for U.S. anti-money laundering regulations. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=1564625

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pamplin, Berkley A. “Virtual currencies and the implications for U.S. anti-money laundering regulations.” 2014. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=1564625.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pamplin, Berkley A. “Virtual currencies and the implications for U.S. anti-money laundering regulations.” 2014. Web. 18 Jun 2019.

Vancouver:

Pamplin BA. Virtual currencies and the implications for U.S. anti-money laundering regulations. [Internet] [Thesis]. Utica College; 2014. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1564625.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pamplin BA. Virtual currencies and the implications for U.S. anti-money laundering regulations. [Thesis]. Utica College; 2014. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1564625

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

17. Plantin, Jason M. Complicity in the wire transfer process a cause for increased money laundering.

Degree: 2014, Utica College

  There are conservative estimates that the amount of money laundered each year is anywhere between 2 and 5 percent of the annual gross domestic… (more)

Subjects/Keywords: Economics, General; Economics, Finance; Sociology, Criminology and Penology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Plantin, J. M. (2014). Complicity in the wire transfer process a cause for increased money laundering. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=1564626

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Plantin, Jason M. “Complicity in the wire transfer process a cause for increased money laundering.” 2014. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=1564626.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Plantin, Jason M. “Complicity in the wire transfer process a cause for increased money laundering.” 2014. Web. 18 Jun 2019.

Vancouver:

Plantin JM. Complicity in the wire transfer process a cause for increased money laundering. [Internet] [Thesis]. Utica College; 2014. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1564626.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Plantin JM. Complicity in the wire transfer process a cause for increased money laundering. [Thesis]. Utica College; 2014. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1564626

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

18. Schluderberg, Larry E. Addressing the cybersecurity Malicious Insider threat.

Degree: 2015, Utica College

  Malicious Insider threats consist of employees, contractors, or business partners who either have current authorized access, or have had authorized access to an organization's… (more)

Subjects/Keywords: Business Administration, Management; Sociology, Criminology and Penology; Information Science; Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Schluderberg, L. E. (2015). Addressing the cybersecurity Malicious Insider threat. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=1571095

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Schluderberg, Larry E. “Addressing the cybersecurity Malicious Insider threat.” 2015. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=1571095.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Schluderberg, Larry E. “Addressing the cybersecurity Malicious Insider threat.” 2015. Web. 18 Jun 2019.

Vancouver:

Schluderberg LE. Addressing the cybersecurity Malicious Insider threat. [Internet] [Thesis]. Utica College; 2015. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1571095.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Schluderberg LE. Addressing the cybersecurity Malicious Insider threat. [Thesis]. Utica College; 2015. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1571095

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

19. Corbin, George. The Google Chrome operating system forensic artifacts.

Degree: 2015, Utica College

  The increased popularity of Google Chromebooks due to their ease of use, security features and low price have contributed to explosive growth in terms… (more)

Subjects/Keywords: Information Technology; Sociology, Criminology and Penology; Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Corbin, G. (2015). The Google Chrome operating system forensic artifacts. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=1571599

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Corbin, George. “The Google Chrome operating system forensic artifacts.” 2015. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=1571599.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Corbin, George. “The Google Chrome operating system forensic artifacts.” 2015. Web. 18 Jun 2019.

Vancouver:

Corbin G. The Google Chrome operating system forensic artifacts. [Internet] [Thesis]. Utica College; 2015. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1571599.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Corbin G. The Google Chrome operating system forensic artifacts. [Thesis]. Utica College; 2015. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1571599

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

20. Mshvidobadze, Khatuna. Cyber bear| Russian cyber threat to its neighbors and America.

Degree: 2015, Utica College

  This paper examines how contemporary Russia's political, economic and social characteristics have promoted multiple cyber threats to neighboring countries and to the U.S. The… (more)

Subjects/Keywords: Political Science, International Relations; Political Science, General; Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mshvidobadze, K. (2015). Cyber bear| Russian cyber threat to its neighbors and America. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=1571750

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mshvidobadze, Khatuna. “Cyber bear| Russian cyber threat to its neighbors and America.” 2015. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=1571750.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mshvidobadze, Khatuna. “Cyber bear| Russian cyber threat to its neighbors and America.” 2015. Web. 18 Jun 2019.

Vancouver:

Mshvidobadze K. Cyber bear| Russian cyber threat to its neighbors and America. [Internet] [Thesis]. Utica College; 2015. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1571750.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mshvidobadze K. Cyber bear| Russian cyber threat to its neighbors and America. [Thesis]. Utica College; 2015. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1571750

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

21. Toussaint, Gregory W. Executive security awareness primer.

Degree: 2015, Utica College

  The purpose of this paper was to create a primer for a security awareness program to educate senior level executives on the key aspects… (more)

Subjects/Keywords: Information Technology; Information Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Toussaint, G. W. (2015). Executive security awareness primer. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=1586318

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Toussaint, Gregory W. “Executive security awareness primer.” 2015. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=1586318.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Toussaint, Gregory W. “Executive security awareness primer.” 2015. Web. 18 Jun 2019.

Vancouver:

Toussaint GW. Executive security awareness primer. [Internet] [Thesis]. Utica College; 2015. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1586318.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Toussaint GW. Executive security awareness primer. [Thesis]. Utica College; 2015. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1586318

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

22. Ayers, Amy L. Windows hibernation and memory forensics.

Degree: 2015, Utica College

  ABSTRACT The purpose of this capstone project was to research the hibernation file, its role in memory forensics and to explore current technology, techniques… (more)

Subjects/Keywords: Information Technology; Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ayers, A. L. (2015). Windows hibernation and memory forensics. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=1586690

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ayers, Amy L. “Windows hibernation and memory forensics.” 2015. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=1586690.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ayers, Amy L. “Windows hibernation and memory forensics.” 2015. Web. 18 Jun 2019.

Vancouver:

Ayers AL. Windows hibernation and memory forensics. [Internet] [Thesis]. Utica College; 2015. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1586690.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ayers AL. Windows hibernation and memory forensics. [Thesis]. Utica College; 2015. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1586690

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

23. Denison, Stephen. The accessibility of insider threats on a corporate network.

Degree: 2015, Utica College

  Corporations try to defend themselves against outsider threats, but insider threats can be just as devastating. Insiders have an understanding of their organization’s critical… (more)

Subjects/Keywords: Computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Denison, S. (2015). The accessibility of insider threats on a corporate network. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=1604807

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Denison, Stephen. “The accessibility of insider threats on a corporate network.” 2015. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=1604807.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Denison, Stephen. “The accessibility of insider threats on a corporate network.” 2015. Web. 18 Jun 2019.

Vancouver:

Denison S. The accessibility of insider threats on a corporate network. [Internet] [Thesis]. Utica College; 2015. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1604807.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Denison S. The accessibility of insider threats on a corporate network. [Thesis]. Utica College; 2015. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=1604807

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

24. Ash, Sarah L. Cybersecurity of wireless implantable medical devices.

Degree: 2016, Utica College

  Wireless implantable medical devices are used to improve and prolong the lives of persons with critical medical conditions. The World Society of Arrhythmias reported… (more)

Subjects/Keywords: Medicine; Computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ash, S. L. (2016). Cybersecurity of wireless implantable medical devices. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=10109631

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ash, Sarah L. “Cybersecurity of wireless implantable medical devices.” 2016. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=10109631.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ash, Sarah L. “Cybersecurity of wireless implantable medical devices.” 2016. Web. 18 Jun 2019.

Vancouver:

Ash SL. Cybersecurity of wireless implantable medical devices. [Internet] [Thesis]. Utica College; 2016. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10109631.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ash SL. Cybersecurity of wireless implantable medical devices. [Thesis]. Utica College; 2016. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10109631

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

25. Hermann, Rory Michael, Jr. Cyber War in a Small War Environment.

Degree: 2017, Utica College

  This paper discusses applying cyber warfare techniques to small war environments. Small wars do not carry the prestige of larger, more traditional campaigns; additionally,… (more)

Subjects/Keywords: Information technology; Military studies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hermann, Rory Michael, J. (2017). Cyber War in a Small War Environment. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=10271200

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hermann, Rory Michael, Jr. “Cyber War in a Small War Environment.” 2017. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=10271200.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hermann, Rory Michael, Jr. “Cyber War in a Small War Environment.” 2017. Web. 18 Jun 2019.

Vancouver:

Hermann, Rory Michael J. Cyber War in a Small War Environment. [Internet] [Thesis]. Utica College; 2017. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10271200.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hermann, Rory Michael J. Cyber War in a Small War Environment. [Thesis]. Utica College; 2017. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10271200

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

26. Lazarus, Seth A. Cyber Mobs| A Model for Improving Protections for Internet Users.

Degree: 2017, Utica College

  Cyber mobs have grown to have a significant impact on individuals in real space and cyber space. Law enforcement and legislators have been confronted… (more)

Subjects/Keywords: Law; Information technology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lazarus, S. A. (2017). Cyber Mobs| A Model for Improving Protections for Internet Users. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=10271260

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lazarus, Seth A. “Cyber Mobs| A Model for Improving Protections for Internet Users.” 2017. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=10271260.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lazarus, Seth A. “Cyber Mobs| A Model for Improving Protections for Internet Users.” 2017. Web. 18 Jun 2019.

Vancouver:

Lazarus SA. Cyber Mobs| A Model for Improving Protections for Internet Users. [Internet] [Thesis]. Utica College; 2017. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10271260.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lazarus SA. Cyber Mobs| A Model for Improving Protections for Internet Users. [Thesis]. Utica College; 2017. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10271260

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

27. Baumgold, Jessica. Exploring the Experiences of Adults Participating in Community Circus Classes| The Synergistic Relationship Between Circus and Occupational Therapy.

Degree: 2017, Utica College

  This participant-observer, phenomenological qualitative study explored the adult experience of a community circus class through an occupational therapy lens. Following 4 months of weekly… (more)

Subjects/Keywords: Occupational therapy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Baumgold, J. (2017). Exploring the Experiences of Adults Participating in Community Circus Classes| The Synergistic Relationship Between Circus and Occupational Therapy. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=10277149

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Baumgold, Jessica. “Exploring the Experiences of Adults Participating in Community Circus Classes| The Synergistic Relationship Between Circus and Occupational Therapy.” 2017. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=10277149.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Baumgold, Jessica. “Exploring the Experiences of Adults Participating in Community Circus Classes| The Synergistic Relationship Between Circus and Occupational Therapy.” 2017. Web. 18 Jun 2019.

Vancouver:

Baumgold J. Exploring the Experiences of Adults Participating in Community Circus Classes| The Synergistic Relationship Between Circus and Occupational Therapy. [Internet] [Thesis]. Utica College; 2017. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10277149.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Baumgold J. Exploring the Experiences of Adults Participating in Community Circus Classes| The Synergistic Relationship Between Circus and Occupational Therapy. [Thesis]. Utica College; 2017. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10277149

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

28. Fawcett, Jay Palmer. Bitcoin regulations and investigations| A proposal for U.S. policies.

Degree: 2017, Utica College

  Bitcoins were conceptualized in 2008, which revolutionized the digital transfers of value within payment systems (Nakamoto, 2008). The advent of digital currencies revealed problems… (more)

Subjects/Keywords: Law; Economics; Public policy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fawcett, J. P. (2017). Bitcoin regulations and investigations| A proposal for U.S. policies. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=10244196

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Fawcett, Jay Palmer. “Bitcoin regulations and investigations| A proposal for U.S. policies.” 2017. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=10244196.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Fawcett, Jay Palmer. “Bitcoin regulations and investigations| A proposal for U.S. policies.” 2017. Web. 18 Jun 2019.

Vancouver:

Fawcett JP. Bitcoin regulations and investigations| A proposal for U.S. policies. [Internet] [Thesis]. Utica College; 2017. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10244196.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Fawcett JP. Bitcoin regulations and investigations| A proposal for U.S. policies. [Thesis]. Utica College; 2017. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10244196

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

29. Garner, Michael Wilson, Jr. Nation State Threat Actions Against Critical Energy Infrastructures.

Degree: 2017, Utica College

  The purpose of this capstone project was to examine vulnerabilities of the Energy Industry that could be exploited by Nation State Threat Actors and… (more)

Subjects/Keywords: Computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Garner, Michael Wilson, J. (2017). Nation State Threat Actions Against Critical Energy Infrastructures. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=10686214

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Garner, Michael Wilson, Jr. “Nation State Threat Actions Against Critical Energy Infrastructures.” 2017. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=10686214.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Garner, Michael Wilson, Jr. “Nation State Threat Actions Against Critical Energy Infrastructures.” 2017. Web. 18 Jun 2019.

Vancouver:

Garner, Michael Wilson J. Nation State Threat Actions Against Critical Energy Infrastructures. [Internet] [Thesis]. Utica College; 2017. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10686214.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Garner, Michael Wilson J. Nation State Threat Actions Against Critical Energy Infrastructures. [Thesis]. Utica College; 2017. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10686214

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

30. Rivera, Richard. Absence of Tactical Level Cyber Capabilities for the US Army Special Operation Warfighters.

Degree: 2018, Utica College

  The purpose of this study is to analyze existing United States Army Special Operations Forces (ARSOF) cyber capabilities, identify gaps, and explore the possible… (more)

Subjects/Keywords: Military studies; Computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rivera, R. (2018). Absence of Tactical Level Cyber Capabilities for the US Army Special Operation Warfighters. (Thesis). Utica College. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=10980859

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Rivera, Richard. “Absence of Tactical Level Cyber Capabilities for the US Army Special Operation Warfighters.” 2018. Thesis, Utica College. Accessed June 18, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=10980859.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Rivera, Richard. “Absence of Tactical Level Cyber Capabilities for the US Army Special Operation Warfighters.” 2018. Web. 18 Jun 2019.

Vancouver:

Rivera R. Absence of Tactical Level Cyber Capabilities for the US Army Special Operation Warfighters. [Internet] [Thesis]. Utica College; 2018. [cited 2019 Jun 18]. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10980859.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Rivera R. Absence of Tactical Level Cyber Capabilities for the US Army Special Operation Warfighters. [Thesis]. Utica College; 2018. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10980859

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2]

.