Dissertations Completed in 2023 at Capitol Technology University

Dissertations Completed in 2023 at Capitol Technology University

Below is a partial list of 80 completed dissertations from graduates of Capitol Technology University's doctoral programs. As you can see in the titles, it is an impressive list from our exceptional full-time industry employed graduates who have spent several years researching and providing applicable information to the needs of industry today. Capitol Tech encourages all our doctoral graduates to submit their dissertation to https://www.proquest.com/ for publication. While this is not a requirement, it does become a document searchable and downloadable from anywhere in the world. Either due to a student's choice not to submit for publication or due to the sensitive nature of dissertation, these will not be accessible. In general, most dissertations become viewable on ProQuest. Most university libraries have access for a current student to use ProQuest for free, otherwise there will be a charge to the viewer to see and download a dissertation. In the event you do not have access to ProQuest, run a Google Scholar search https://scholar.google.com? using these parameters: "capitol technology university" dissertations and there will be a more limited amount of titles you can access for free.

  • Case Studies for Examining the Critical Need for Detailed Analysis towards Improving Supply Chain
  • Where to Play: An Edge in Recruiting NCAA D1 Football Student Athletes
  • Dehydration and its correlation to workplace injuries
  • A Quantitative Analysis of Network Steganographic Countermeasure Performance to Inform Cybersecurity Leadership Decision-Making
  • Precision Placement in Latent Space through Manipulation of Feature Space
  • Human-AI: Using Threat Intelligence to Expose Deepfakes and the Exploitation of Psychology
  • A Study in Safety Factors: Prioritizing the Top 10 Environmental Health and Safety Criteria. Deliberate Focus Utilizing Qualitative Survey Feedback Regarding the Relationship of Factor Differentials During Routine Work Versus Safety Critical Situations
  • Cybersecurity leadership: Gathering resources for the 2nd generation of practitioners
  • Cyber Strategies for Industrial Control Systems within the Energy Sector
  • Determining Predictor Variables for a Model to Estimate the Cost to Acquire Air Force Aircraft
  • RFID Impact: Mobile Medical Equipment Inventory
  • Comparative Toxicity: QSTR and Interspecies-QSTR Modelling For Predicting Physicochemical Properties
  • Detecting Security Anomalies Using Machine Learning for Smart Homes
  • Defining Key Barriers to Accelerating the Adoption of Enterprise Artificial Intelligence (AI) for Joint Forces Headquarters Department of Defense Information Network (JFHQ-DODIN)
  • Cybersecurity Risk Effects of Starlink on Rural Populations in the United States
  • Evaluating Associated Finite Bias within the Cybersecurity Producer Base Using Game Classification
  • Relationships between the safety climate, cultural dimension, individual risk perception
  • The Whole Community Approach to Emergency Management
  • Technology Effects on Culture: How Mobile Technology Effected the African American Community
  • Strategies to Protect Oil and Gas Industry Critical Networks against Asynchronous Threats
  • Exploring Social Cognitive Career Theory’s Application to Technologists Mid-Career Transition to Cybersecurity
  • Organizational Effects on BDA Adoption Outcomes in U.S. Public Sector Organizations
  • The Need for the United States to Establish Space Cybersecurity for Critical Infrastructure
  • Cybersecurity Risk Assessment and Best Practices for Small Satellites (SMALLSATS)
  • Overcoming the Barriers to Homeland Security Information Sharing: A Multi-disciplinary Assessment of Local Public Safety Agencies
  • Increasing General Aviation Pilots' Cybersecurity Awareness
  • Comparative Study of the Current Challenges and Changing Technology for Utilities
  • Cyber Threat Intelligence Driven Phishing Awareness Programs: A Qualitative Exploratory Study
  • National Cybersecurity Policy and Strategy of Nigeria: A Case Study
  • Success Factors in Phishing Campaigns in the Healthcare Industry: For Penetration Testers
  • Evaluation of Generative Adversarial Network Attacks on DeepSpeech
  • The Influence of Culture in Cyber Competition
  • Manufacture and Study of Internal Hubless Ramjet Compressor Assembly
  • A 10 Year Time Span Analysis of Android Vulnerabilities
  • Privacy Risks Are Related To the Use of Artificial Intelligence (AI) Wearable Devices and the Internet of Things (IOT) Technologies
  • Southeast Asia Cyber Development Challenges in the FinTech Industry
  • Study Reveals Supply Chain Warning Absent During COVID-19
  • Systems and methods of building efficient large language models
  • Quantitative Exploratory Investigation into the Barriers of Adopting DevSecOps Methodology into Security Operations Centers
  • Risk Management Framework Implementation Challenges: An Exploratory Qualitative Inquiry of the Department Of Navy
  • The Evolving Role of Artificial Intelligence (AI) in Finance
  • AI Trust Framework & Maturity Model: Improving Transparency, Trust and Resilience in Autonomous Human Machine Teams & Systems
  • Banking Operational Risk Assessments: An Exploratory Study of Risk Assessment Quantification Approaches
  • Optimal Instantaneous Autonomous Remote Authentication of 5G IOT Modeled Using Popularity Power Index for Coalition Formation and Measurement of Node Degree
  • Airline Cost Efficiency
  • Digital Sovereignty: The Need for an Artificial Intelligence Strategy for Africa
  • Eye-tracking Indicators of Insider Threats for Cybersecurity: Risky-Choice Decision-Making, Deception, and Scanpaths of the Insider
  • Unified Theory of Prime Numbers
  • COVID-19 Pandemic and Occupational Stress in Remote Workers in the United States
  • Relationship of Violations of the Washington Industrial Safety and Health Act and an Employer's Workers' Compensation Experience Modification Factor
  • Approach to Medicare Provider Fraud Detection and Prevention
  • Navigating the Risks and Maximizing the Rewards of Knowledge Management Systems Best Practices and Strategies
  • An Industrial Hygiene Comparison of Mask Type and Effects Relating to the Pandemic and Worker Safety
  • Promoting Sustainability and Equity in the Black Community to Fight Discrimination and Inequality
  • A Federalist Approach: Exploring the Department of Homeland Security’s Role to Securing Critical Infrastructure and Key Resources
  • Designing a Positive Workplace Safety Culture: Do Factors of Gender
  • Cyberpsychology, Behavior, and Social Networking
  • Cyber Exercises for Critical Infrastructure: Identifying Barriers to Effective Security and Defense
  • Jumping into the Breach: A Study on the Evolution and Dynamics of the Cyber Workforce within the American National Security Community
  • Comparison of Lighting Manipulations for Measuring Distance Required to Identify a Closed Runway
  • Defining AI Ethical Oversight Transferring Responsibility and Accountability from Humans to Machines
  • Dynamic InfoGraphics: A Concept for Presentation and Transparency of System Behaviors for Situation Awareness
  • Sustainability Leadership and Strategy from the Lens of Corporate Social Responsibility (CSR) and Environmental and Social Impact
  • A Correlational Quantitative Study Using AutoML (Automated Machine Learning) to Inform Credit Decisions
  • The Role of Leadership Theories in Emergency Response Plans
  • AI Enabled Computing: Managing Risks to Promote Equitable Outcomes
  • Barriers to Adoption of Advanced Cybersecurity Tools in Organizations
  • Understanding Influence Factors in Cyber Resiliency Adoption
  • Pilot Fatigue in the Aviation Sector and its Effects on Human Factors: Uncovering the Link Between Departure Time Within a Duty Day and Accident Rate
  • Deep Reinforcement Learning (DRL) Model to Detect Bit-and-Piece DDoS Attacks Against Low Powered (6LowPAN) Wirelessly Connected Devices on the Internet of Things (IoT) Network Systems
  • Harnessing the Speed and Accuracy of Machine Learning to Advance Cybersecurity
  • Exploring Natural Language Query Augmentation for Clip Model Applications
  • Risk & Resilience 4.0: Prevention through Design (PtD) JSA Methodology Research
  • Time Usage of Educational IT Software Services in Undergraduate Students and Instructors
  • Cybersecurity Leadership: A Healthcare Critical Infrastructure and Wearables Examination
  • Increasing Opportunities in Cybersecurity: Utilizing Artificial Intelligence and Deep Machine Learning to Reduce Geopolitical Tensions and Cyber War
  • Efficacy of Training and Education in Improving Firefighters’ Respiratory Protection Compliance
  • The Personalization Enhanced Experience Framework: Towards Identifying Efficient Metrics for Measuring Digital Marketing Personalization in the Luxury Hotel Industry
  • Cybersecurity Science: A Complex System
  • Standardization of Immediate Response for Law Enforcement in Active Shooter Situations
  • Establishing Cybersecurity Dominance by Introducing Women to the Fight

Questions about the Online Doctoral Programs at Capitol Technology University can be directed to Dr. Ian R. McAndrew PhD FRAeS , Dean of Doctoral Programs via [email protected] and website for the Doctoral Programs is located at https://www.captechu.edu/degrees-and-programs/doctoral-degrees

There is an option to complete your research via a multiple Peer-Reviewed, Refereed, Scholarly Publications route instead of a completed dissertation and transfer credit (up to 42 credits) is accepted towards completion of your doctoral degree. Contact Dr. McAndrew for details.

#PhD #OnlineDoctorates #Doctorate #Technology #OnlineDoctoralDegrees



John King

President, Solairus Aviation

5 个月

I would love to get a copy of “Increasing General Aviation Pilots' Cybersecurity Awareness”.

回复

Well done to all our cohorts! Impressive list and proud to be part of this.

Dr. DeAnjelo Bradley CFO MIFireE

PUBLIC SAFETY LEADER | EMERGENCY MANAGEMENT | PROJECT MANAGEMENT | ENVIRONMENTAL, SAFETY & HEALTH | OPERATIONS

11 个月

This is impressive

Ian R. McAndrew PhD FRAeS

Researcher and Professor

11 个月

This year we anticipate more; a university committed to support research.

要查看或添加评论,请登录

社区洞察

其他会员也浏览了