Content: Global student dissertations and literature reviews.
Purpose: Use for foundational research, to locate test instruments and data, and more.
Special Features: Search by advisor (chair), degree, degree level, or department. Includes a read-aloud feature
The ProQuest Dissertations & Theses database (PQDT) is the world's most comprehensive collection of dissertations and theses. It is the database of record for graduate research, with over 2.3 million dissertations and theses included from around the world.
This study looks closely at the potential impact of age and experience on the perceived ease of use of San Bernardino County’s (SBCOA) CIMS implementation. Author: Kent Steven Cawley, Northcentral University.
This phenomenological study examines the lived experience of catalogers and metadata specialists implementing Resource Description and Access (RDA) to create bibliographic records that are interoperable within and outside of library catalogs. Author: Kristine M. Woods, Emporia State University.
As part of this thesis, we have built a novel framework to automatically track details about how a consumer’s private data is stored, used and shared by a Cloud provider. Author: Agniva Banerjee, University of Maryland, Baltimore County.
This systematic study addressed the impact of data quality on small and midsize businesses within the United States of America, for there is limited adherence to the data management concept of data quality within many companies. Author: Seeronie Rosanna Etwaroo, Northcentral University.
The purpose of this qualitative, case study is to examine the impacts of interoperability initiatives involving the U.S. government and to provide an understanding of the information governance and security risk as standards that are vendor-neutral and trustworthy. Author: Maurice A. Thomas, Northcentral University.
The purpose is to develop a procedure for collating, processing and analyzing/evaluating quantitative and qualitative socio-economic data for a Stability COP. Author: Earnest R. Lloyd, The University of Texas at Arlington.
Grounded in general systems theory and routine activity approach, the focus of this qualitative multiple case study was to explore strategies used by owners of small businesses to protect confidential company data from cyber attacks. Author: Martins Donbruce Idahosa, Walden University.