Dissertations / Theses on the topic 'Cyber cash'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Cyber cash.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Gazula, Mohan B. (Mohan Buvana). "Cyber warfare conflict analysis and case studies." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/112518.
Full textFalangi, Francesca. "La Cyber Security e il caso dell'azienda Beta." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018.
Find full textRizzon, Luca. "Cyber-Physical Systems: two case studies in design methodologies." Doctoral thesis, Università degli studi di Trento, 2016. https://hdl.handle.net/11572/368113.
Full textRizzon, Luca. "Cyber-Physical Systems: two case studies in design methodologies." Doctoral thesis, University of Trento, 2016. http://eprints-phd.biblio.unitn.it/1786/1/thesis.pdf.
Full textHolm, Linnéa. "Cyber attacks & coercion in the digital era. : A qualitative case analysis of the North Korean cyber attack on Sony Pictures." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-323583.
Full textBeyer, Dawn Marie. "Constructing a Cyber Preparedness Framework (CPF): The Lockheed Martin Case Study." NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/90.
Full textBose, Sayak. "Cyber-physical modeling, analysis, and optimization - a shipboard smartgrid reconfiguration case study." Diss., Kansas State University, 2012. http://hdl.handle.net/2097/15104.
Full textLeal, de Melo Daltia Marcio. "Gerando acompanhamento rítmico automático para violão : estudo de caso do Cyber-João." Universidade Federal de Pernambuco, 2004. https://repositorio.ufpe.br/handle/123456789/2535.
Full textTodeschini, Davide <1990>. "HOW THE IOT CHANGES COMPANIES’ BUSINESS MODEL: THE PIRELLI CYBER FLEET CASE." Master's Degree Thesis, Università Ca' Foscari Venezia, 2016. http://hdl.handle.net/10579/9170.
Full textChuang, Cheng-Cheng. "A case study of web-based learning project - \"cyber museum of Chinese Art\" /." The Ohio State University, 2001. http://rave.ohiolink.edu/etdc/view?acc_num=osu1486400446372986.
Full textZhang, Qingpeng. "Analyzing Cyber-Enabled Social Movement Organizations: A Case Study with Crowd-Powered Search." Diss., The University of Arizona, 2012. http://hdl.handle.net/10150/265358.
Full textEnocson, Julia, and Linnéa Söderholm. "Prevention of Cyber Security Incidents within the Public Sector : A qualitative case study of two public organizations and their way towards a sustainable cyber climate." Thesis, Linköpings universitet, Informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-149300.
Full textSwart, Ignatius Petrus. "Pro-active visualization of cyber security on a National Level : a South African case study." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017940.
Full textChoudhari, Ashish. "Adaptive Scheduling in a Distributed Cyber-Physical System: A case study on Future Power Grids." OpenSIUC, 2015. https://opensiuc.lib.siu.edu/dissertations/1118.
Full textShoemake, James J. "Former Students' and Their Learning Coaches' Perceptions of Their Cyber-Charter School Experiences| A Case Study." Thesis, Indiana University of Pennsylvania, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10787137.
Full textSaldaña, Paola Renata. "The Scales and Shapes of Queer Women's Geographies: Mapping Private, Public and Cyber Spaces in Portland, OR." PDXScholar, 2015. https://pdxscholar.library.pdx.edu/open_access_etds/2213.
Full textBoger, Christina. "The Wrong Amazon Is Burning : A qualitative case study of a protest movement against the Cyber Valley in Tübingen." Thesis, Malmö universitet, Malmö högskola, Institutionen för globala politiska studier (GPS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-18566.
Full textChindipha, Stones Dalitso. "Gaining cyber security insight through an analysis of open source intelligence data: an East African case study." Thesis, Rhodes University, 2018. http://hdl.handle.net/10962/60618.
Full textRabbani, Talvia. "Empirical Testing of the CySeMoL Tool for Cyber Security Assessment – Case Study of Linux Server and MySQL." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-187664.
Full textMacEwan, Neil Finlay. "Responsibilisation, rules and rule-following concerning cyber security : findings from small business case studies in the UK." Thesis, University of Southampton, 2017. https://eprints.soton.ac.uk/417156/.
Full textRyttare, Emma. "Change Management: A Key in Achieving Successful Cyber Security : A Multiple Case Study of Organizations in Sweden." Thesis, Luleå tekniska universitet, Institutionen för ekonomi, teknik och samhälle, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74788.
Full textGripenstedt, Daniel, and Joakim Öberg. "A security analysis in a life science environment : a case study." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-299357.
Full textAdelola, Tiwalade. "Developing a framework for e-commerce privacy and data protection in developing nations : a case study of Nigeria." Thesis, Loughborough University, 2017. https://dspace.lboro.ac.uk/2134/27440.
Full textDenoix, Sebastian. "Psychodynamique du joueur vidéo excessif, étude de la relation à l'objet cyber-narcissique." Thesis, Strasbourg, 2016. http://www.theses.fr/2016STRAG001/document.
Full textSouza, Cristiane Naiara Araújo de. "Processo de elaboração da notícia no Ciberjornalismo: estudo de caso do portal d24am." Universidade Federal do Amazonas, 2013. http://tede.ufam.edu.br/handle/tede/2762.
Full textScherr, Daniel Leslie. "Cybersecurity Policy Development at the State Level: A Case Study of Middle Tennessee." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7426.
Full textCabanes, Quentin. "New hardware platform-based deep learning co-design methodology for CPS prototyping : Objects recognition in autonomous vehicle case-study." Electronic Thesis or Diss., université Paris-Saclay, 2021. http://www.theses.fr/2021UPASG042.
Full textInnocenti, Federica. "Analisi e riprogettazione del processo di ict risk management: un caso applicativo in Telecom Italia." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6708/.
Full textToledo, Penélope Thaís da Cunha. "Contra-hegemonia e mídias sociais: um estudo de caso da campanha “Primavera Carioca”." Niterói, 2017. https://app.uff.br/riuff/handle/1/3831.
Full textPersson, Björn. "Contextualizing Industry 4.0 in the Pulp and Paper industry : A case study at Stora Enso." Thesis, Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-68523.
Full textVitale, Francesco. "Run-time Anomaly Detection with Process Mining: Methodology and Railway System Compliance Case-Study." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-105324.
Full textNovaes, Bruna Alves. "A umbanda e seu novo espaço: o terreiro virtual – um estudo de caso." Universidade Federal de Juiz de Fora (UFJF), 2017. https://repositorio.ufjf.br/jspui/handle/ufjf/5704.
Full textAndrade, Melissa Maria de Freitas. "Negritude em rede: discursos de identidade, conhecimento e militância - um estudo de caso da comunidade Negros do Orkut (2004-2011)." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/48/48134/tde-04102012-135144/.
Full textBoem, Francesca. "Distributed Methods for Estimation and Fault Diagnosis: the case of Large-scale Networked Systems." Doctoral thesis, Università degli studi di Trieste, 2013. http://hdl.handle.net/10077/8534.
Full textCárdenas, Torres Miriam del Carmen. "Prácticas cibertransnacionales de ciudadanía a través de Internet. El caso de San Martin de Bolaños, Jalisco, México." Doctoral thesis, Universitat Oberta de Catalunya, 2016. http://hdl.handle.net/10803/360335.
Full textReyhan, Dilnur. "Le rôle des technologies d'information et de communication (TIC) dans la contruction des nouvelles diasporas : le cas de la diaspora Ouïghoure." Thesis, Strasbourg, 2017. http://www.theses.fr/2017STRAG003.
Full textBLOMKVIST, YLVA, and LOENBOM LEO ULLEMAR. "Improving supply chain visibility within logistics by implementing a Digital Twin : A case study at Scania Logistics." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279054.
Full textNessle, Åsbrink Marcus. "A case study of how Industry 4.0 will impact on a manual assembly process in an existing production system : Interpretation, enablers and benefits." Thesis, KTH, Industriell produktion, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-288514.
Full textKemmer, Tara A. "Hacking for peace: the case for cyber coercion." Thesis, 2021. https://hdl.handle.net/2144/43020.
Full textChang, Joseph, and 張毓智. "On Line Behavior Of Using Cyber Coffee : A Case Study For The User Of Cyber Coffee in Kaohsiung." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/82829729373339369386.
Full textWu, Jhao-Cyuan, and 吳櫂銓. "Social Surveillance in Cyber Communities: the Case of Taiwan Facebook." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/8g6gh6.
Full textWang, Chung-Hua, and 王俊華. "A Case Study of Business Strategies for Cyber Café''s future." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/5v4cbz.
Full textChen, Chien-Hung, and 陳建宏. "The Research of Applying Case-Base Reasoning to Cyber Crime Investigation." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/95671511270277464380.
Full textChi, Hung-Wei, and 祁宏偉. "The Research of Applying Case-Base Reasoning to Cyber Crime Investigation." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/26677884641728976648.
Full textYao, Yung-Chang, and 姚永錩. "An Exploration of Critical Success Factors of the implementation of Cyber University – A Case Study from "National Sun Yat-Sen Cyber University"." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/09326336428913859828.
Full textJEN, WANG SHU, and 王淑真. "A Case Study of KINGNET Female Leader in Taiwan Cyber Community Industry." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/b429s9.
Full textCHOU, YI-CHEN, and 周依蓁. "Textual Analysis on Facebook: Cyber-Bullying on the Entertainer Selina's Divorce Case." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/rp2gx3.
Full textTseng, Wei-wei, and 曾瑋瑋. "The Research on Event marketing – Chunghwa Telecom HiNet Cyber Game As A Case." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/5q86as.
Full textJian, Miao-Ju, and 簡妙如. "Cyber-bullying – A Case Study of Junior High School Students in Kaohsiung, Taiwan." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/23753747688683768069.
Full textYang, Hui-Mei, and 楊蕙鎂. "A Study of Acceptance for Information City Policy─Case Study of Taipei Cyber City." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/43563295631283923602.
Full text