Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
certificates in corrections leadership and management, crime analysis, homeland security, and law enforcement administration. The SCCJ offers in-person graduate courses (for the Master of Science in criminology
-
to attract a pool of qualified people who are available to assist in online courses in our Master of Science degree program in Crime Analysis. Academic Associate positions are fixed-term appointments
-
for research funding Knowledge of survey research methods, including questionnaire construction and sampling design principles Working knowledge of factor analytic methods, survival analysis, structural equation
-
certificates in corrections leadership and management, crime analysis, homeland security, and law enforcement administration. The SCCJ offers in-person graduate courses (for the Master of Science in criminology
-
or 'break' certain elements of the site's functionality. For more general information on cookies see the Wikipedia article on HTTP Cookies. For more information on ASU Privacy Statement .
-
or 'break' certain elements of the site's functionality. For more general information on cookies see the Wikipedia article on HTTP Cookies. For more information on ASU Privacy Statement .
-
a position combining project management, machine-learning model development, data management/analysis, and manuscript writing for publication. Preference will be given to applicants with (1
-
certificates in corrections leadership and management, crime analysis, homeland security, and law enforcement administration. The SCCJ offers in-person graduate courses (for the Master of Science in criminology
-
certificates in corrections leadership and management, crime analysis, homeland security, and law enforcement administration. The SCCJ offers in-person graduate courses (for the Master of Science in criminology
-
of interest include, but are not limited to, security analysis of AI/ML systems; security analysis of expert systems; security analysis of composite systems; cybersecurity; adversarial examples; LLM security