Dissertationen zum Thema „Breaches“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Breaches" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Talavera, Cano Andrés. „Regulating the Intolerance of Contractual Breaches“. IUS ET VERITAS, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/123754.
Der volle Inhalt der QuellePenalizar los incumplimientos permite una asignación eficiente de los riesgos en un contrato, asegurando y conservando el equilibrio contractual que las partes tuvieron en mente y plasmaron en su regulación contractual. El uso inteligente de las penalidades permitirá salvaguardar y mantener el equilibrio económico de los contratos, manteniendo así la rentabilidad de las operaciones comerciales perseguidas a través de ellos.
Smith, Tanshanika Turner. „Examining Data Privacy Breaches in Healthcare“. ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2623.
Der volle Inhalt der QuelleHo, Jean Qing Ying. „State responsibility for breaches of investment contracts“. Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708722.
Der volle Inhalt der QuelleBiggs, Carl T. „Implications of transaction costs for acquisition program cost breaches“. Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34629.
Der volle Inhalt der QuelleIt is generally accepted that cost growth in federal major defense acquisition programs (MDAPs) is partially attributable to inaccurate cost estimates. Cost analysts exhaustively analyze manpower and resources to provide accurate estimates, however the influence of transaction costs is often ignored in traditional cost estimates. This thesis investigates the association between cost growth and transaction costs, the real cost of business negotiations and program management. We collect MDAP cost threshold breach data and cross reference it with a proxy for MDAP transaction costs (Systems Engineering/Program Management Costs) to determine whether a correlation exists. We use multiple logistic regression models to analyze the binary outcome of breach or no breach. The results show that for MDAPs with cost-plus contracts there is a statistically significant relation between the likelihood of a cost threshold breach occurring and the relative magnitude of the MDAPs transaction costs; no such relation exists for fixed price contracts. Although these results show an association between cost threshold breaches and transaction costs, there is no evidence of causality between these two variables and our exploration of causality is a topic for future research.
Vorogushyn, Sergiy. „Analysis of flood hazard under consideration of dike breaches“. Phd thesis, Aachen Shaker, 2008. http://d-nb.info/994678622/04.
Der volle Inhalt der QuelleGriffin, Tony. „Strategies to Prevent Security Breaches Caused by Mobile Devices“. ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4628.
Der volle Inhalt der QuelleSaber, Jennifer. „Determining Small Business Cybersecurity Strategies to Prevent Data Breaches“. ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.
Der volle Inhalt der QuelleOfori-Duodu, Michael Samuel. „Exploring Data Security Management Strategies for Preventing Data Breaches“. ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.
Der volle Inhalt der QuelleZuzak, Catherine Ann. „Liability for breaches of aviation security obligatons : a Canadian perspective“. Thesis, McGill University, 1990. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=59859.
Der volle Inhalt der QuelleThis thesis explores the private law liability issues that may arise from branches of the duty to secure airports and aircraft. The focus is on providing a global view of the principles governing suits against the two most likely defendants--the air carrier and the government--and on the policy options which could underpin civil liability. The perspective is Canadian in that it presumes that either a Canadian airport or Canadian airline has been involved in the terrorist attack.
Kershaw, Debra S. „BOUNDARIES AND BREACHES: COMPLEXITIES AND STRATEGIES DOWN ON THE FARM“. UKnowledge, 2011. http://uknowledge.uky.edu/gradschool_diss/202.
Der volle Inhalt der QuelleRobson, Jennifer van Krieken. „Understanding practitioners' responses to inequality and breaches of human rights“. Thesis, Canterbury Christ Church University, 2012. http://create.canterbury.ac.uk/12166/.
Der volle Inhalt der QuelleVaruhas, Jason Nicholas Euripide. „Damages for breaches of human rights : a tort-based approach“. Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609692.
Der volle Inhalt der QuellePolanco, Pinerez G. C. „Phase change within flows from breaches of liquefied gas pipelines“. Thesis, Coventry University, 2008. http://curve.coventry.ac.uk/open/items/b374a447-1db1-b578-7424-a5e485b28f4f/1.
Der volle Inhalt der QuelleKongnso, Fedinand Jaiventume. „Best Practices to Minimize Data Security Breaches for Increased Business Performance“. ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1825.
Der volle Inhalt der QuelleVorogushyn, Sergiy [Verfasser]. „Analysis of flood hazard under consideration of dike breaches / Sergiy Vorogushyn“. Aachen : Shaker, 2009. http://d-nb.info/1156517923/34.
Der volle Inhalt der QuelleFahy, Patrick. „State obligations to prevent breaches of Article 3 by non-state actors“. Thesis, Queen's University Belfast, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.673848.
Der volle Inhalt der QuelleOsei-Amanfi, Michael. „A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches“. Thesis, Grand Canyon University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13423232.
Der volle Inhalt der QuelleThe purpose of this qualitative single case study was to explore the available strategies IT leaders at ABC, a Managed IT Services company in the SME sector in Columbus, Ohio, may use to avoid data breaches in the cloud environment. The security framework established by the Cloud Security Alliance (CSA) provided the conceptual framework for this study. A purposeful sampling strategy was used to select 10 IT leaders to participate in the study. Data were gathered through open-ended, semi-structured individual face-to-face interviews, asynchronous discussions through e-mails, and reviews of company-provided documents. An inductive thematic analysis was used to analyze all the data collected in the study. The following six major themes emerged from the data relating to descriptions of the data security threats and vulnerabilities facing IT leaders in the cloud, and the strategies they may use to avoid a breach of their data: (1) managing the human factor, (2) managing the network environment, (3) types of data security threats, (4) people pose the most significant risk, (5) elements of an effective strategy, and (6) addressing password issues. The results indicated that IT leaders face multifaceted data security threats in the cloud and these could be addressed through a combination of strategies including user education, securing the network, limiting user access to IT resources, and addressing password issues.
Laoh, Arnold. „The availability of international judicial review of government breaches of human rights“. Thesis, Laoh, Arnold (2006) The availability of international judicial review of government breaches of human rights. PhD thesis, Murdoch University, 2006. https://researchrepository.murdoch.edu.au/id/eprint/144/.
Der volle Inhalt der QuelleLaoh, Arnold. „The availability of international judicial review of government breaches of human rights“. Laoh, Arnold (2006) The availability of international judicial review of government breaches of human rights. PhD thesis, Murdoch University, 2006. http://researchrepository.murdoch.edu.au/144/.
Der volle Inhalt der QuelleZhou, Lei. „The value of security audits, asymmetric information and market impact of security breaches“. College Park, Md. : University of Maryland, 2004. http://hdl.handle.net/1903/1736.
Der volle Inhalt der QuelleThesis research directed by: Business and Management. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Ayereby, Manouan Pierre-Marius. „Overcoming Data Breaches and Human Factors in Minimizing Threats to Cyber-Security Ecosystems“. ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6163.
Der volle Inhalt der Quelleau, adt@murdoch edu, und Arnold Laoh. „The availability of international judicial review of government act for breaches of human rights“. Murdoch University, 2002. http://wwwlib.murdoch.edu.au/adt/browse/view/adt-MU20061122.131327.
Der volle Inhalt der QuelleBellefeuille, Cynthia Lynn. „Quantifying and managing the risk of information security breaches participants in a supply chain“. Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33313.
Der volle Inhalt der QuelleIncludes bibliographical references (leaf 70).
Technical integration between companies can result in an increased risk of information security breaches. This thesis proposes a methodology for quantifying information security risk to a supply chain participant. Given a system responsible for supply chain interaction and the vulnerabilities attributed to the system, the variables that determine the probability and severity of security incidents were used to create a model to quantify the risk within three hypothetical information systems. The probability of an incident occurring was determined by rating the availability and ease of performing an exploit, the attractiveness of the target and an estimate of the frequency of the attack occurring Internet wide. In assigning a monetary value to the incident, the outcome from an attack was considered in terms of the direct impact on the business process and the potential impact on partnerships. A method for determining mitigation strategies was then proposed based on a given set of monetary constraints and the realization of corporate security policy.
by Cynthia Lynn Bellefeuille.
M.Eng.in Logistics
Almajed, Yasser M. „A framework for an adaptive early warning and response system for insider privacy breaches“. Thesis, De Montfort University, 2015. http://hdl.handle.net/2086/11129.
Der volle Inhalt der QuelleGarringer, James. „The Role of Protocol Analysis in Cybersecurity| Closing the Gap on Undetected Data Breaches“. Thesis, Utica College, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10974156.
Der volle Inhalt der QuelleOrganizations of all sizes are targets for a cyberattack. Undetected data breaches result in the catastrophic loss of personally identifiable information (PII) causing considerable financial and reputation harm to organizations, while also imposing a risk of identity fraud to consumers. The purpose of this study was to consider the impact that undetected data breaches have on organizations with an additional focus on shortening the gap between the time of data breach and the time of detection through manual protocol analysis and intrusion detection system (IDS) solutions. This research reviewed the available literature detailing the effects of undetected data breaches on organizations as well as the advanced exploitation of protocols and anomaly detection through manual protocol analysis and IDS.
Manual protocol analysis provides situational anomaly detection when compared to baseline network traffic, but implies privacy concerns and does not allow timely detection of most cyberattacks. Automated IDS stream-based flows allow quicker detection of cyberattacks. Network flow-based IDS misses hidden attacks due to lack of a data payload requiring manual analysis instead, while host-based IDS adversely affects the performance of the host computer, but successfully identifies anomalies based on known signatures. This study recommended a complementary defense-in-depth solution which employs manual protocol analysis and both host-based and network-based IDS solutions as a viable strategy for reducing the time between data breach and time of detection. This study additionally recommended that security operation center personnel and IT departments should receive protocol analysis training to support manual detection against a known network traffic baseline.
Sleep, Lyndal. „Pulling down their breaches : An analysis of Centrelink breach and appeal numbers from 1996 to 2001 using a case study of a single Centrelink office“. Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1322.
Der volle Inhalt der QuelleDeZulueta, Monica. „A novel neural network based system for assessing risks associated with information technology security breaches“. FIU Digital Commons, 2004. http://digitalcommons.fiu.edu/etd/2791.
Der volle Inhalt der QuelleWashington, Kevin D. „The impact of data breaches on market value of firms in the E-Commerce marketplace“. Thesis, Capella University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10102712.
Der volle Inhalt der QuelleUsing a sample of information and security data breaches the present research examines the public announcement impact between Brick and Mortar firms and E-Commerce firms. The dissertation initially analyzes the effects of publicly announced information and security breaches on abnormal stock returns, abnormal trading volume, and firm risk. The dissertation then analyzes differential impact between Brick and Mortar firms and E-Commerce firm’s market value following a data breach. Using a sample size of 38 information security breaches, E-Commerce firms resulted in more negative abnormal stock returns than Brick and Mortar firms. While data breach announcements did not significantly impact retail firms as a whole, they did have a significant impact when broken into the subsets. E-Commerce firms that announced an information security breach experienced abnormal trading volume.
Gadirova, Nurlana. „The Impacts of Cyberattacks on Private Firms' Cash Holdings“. Thesis, Université d'Ottawa / University of Ottawa, 2021. http://hdl.handle.net/10393/41924.
Der volle Inhalt der QuelleBetz, Linda. „An Analysis of the Relationship between Security Information Technology Enhancements and Computer Security Breaches and Incidents“. NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/960.
Der volle Inhalt der QuellePaddeu, Federica Isabella. „General defences to breaches of international law : justification and excuse in the law of state responsibility“. Thesis, University of Cambridge, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.648758.
Der volle Inhalt der QuelleCameron, Calla. „Grave Breaches: American Military Intervention in the Late Twentieth- Century and the Consequences for International Law“. Scholarship @ Claremont, 2017. http://scholarship.claremont.edu/cmc_theses/1677.
Der volle Inhalt der QuellePelletier, Justin M. „Effects of Data Breaches on Sector-Wide Systematic Risk in Financial, Technology, Healthcare and Services Sectors“. Thesis, Capella University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10615009.
Der volle Inhalt der QuelleThis research informs an ongoing debate regarding a firm’s incentives to invest in information security. Previous research reported that data breaches have had a decreasing impact on a company’s stock price over time, leading researchers to conclude that market-based incentives are decreasingly effective. Some information security economists also suggested that further regulation is necessary because they found that capital market participants poorly accounted for the spillover effects of a breach—the effects of a breach that are external to the breached company. However, some studies indicate that sector-wide systematic risk could measure spillover effects and that the effects of a data breach on systematic risk may have changed over time. The purpose of this study was to quantitatively describe the relationship between the data breach of a firm and changes to the systematic risk of that firm’s sector. This dissertation used event studies of sector-wide systematic risk within American stock markets to measure the external effects of breaches that occurred in companies within the financial, technology, healthcare and services sectors. The use of a repeated measures analysis of variance between those event studies allowed examination of longitudinal changes to sector-wide systematic risk between 2006 through 2016. This analysis found that the breach of an individual company had a significant impact on the systematic risk for that company’s entire sector (1.08% in 2016) and that these impacts have increased over time (p = 0.015). The results were consistent across all measured sectors, without any significant correlation attributable to the scope of the breach. Together, these findings suggest that market forces are increasingly incentivizing sector-wide investment in information security. Further research should consider the potential for government enforced meta-regulation of sector defined information security standards.
Asiri, Mohammed. „Three Essays in Investment Efficiency, Accounting Reporting Complexity, and Cybersecurity Breaches: Evidence from Corporate Tax Avoidance“. Thesis, Curtin University, 2021. http://hdl.handle.net/20.500.11937/83671.
Der volle Inhalt der QuelleLee, Foong Mee, und n/a. „Remedies and sanctions against corporate officers for breaches of duties under part 3.2 of the corporations law“. University of Canberra. Law, 1994. http://erl.canberra.edu.au./public/adt-AUC20050523.102418.
Der volle Inhalt der QuelleHicks, Andrew David. „Conceptualising the constructive trust : a new approach and its specific application to acquisitive breaches of fiduciary obligation“. Thesis, University of Hull, 2007. http://hydra.hull.ac.uk/resources/hull:6437.
Der volle Inhalt der QuelleWaddell, Stanie Adolphus. „A Study of the Effect of Information Security Policies on Information Security Breaches in Higher Education Institutions“. NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/331.
Der volle Inhalt der QuelleZachis, Savio de Melo. „Analysis of breaches and co-breaks in financial series: a non-parametric approach data using high frequency“. Universidade Federal do CearÃ, 2009. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=3730.
Der volle Inhalt der QuelleThis research use a non-parametric test developed by Lee & MYKLAND (2007) to extract jumps in IBOVESPA series and study its dynamics. Among the qualities of this test there are the ability to identify the exact time of occurrence of break / co-break, the sign and size of it. The jumps in the series of Dow Jones, Exchange rate, C-Bond spread and SELIC rate were also estimated and the relation with IBOVESPAÂs jump were verified. The results were analyzed by descriptive statistics, analysis of frequencies and Logit regression models. As a main result there was the predominance of co-breaks involving IBOVESPA with exchange rate and with the spread of C-Bond.
Este trabalho faz uso do teste nÃo-paramÃtrico desenvolvido por LEE & MYKLAND (2007) para extrair a quebra da sÃrie do IBOVESPA e estudar sua dinÃmica. Dentre as qualidades deste teste estÃo à capacidade de identificar o momento exato da ocorrÃncia da quebra/co-quebra, o sinal e o tamanho da mesma. Foram estimadas tambÃm as quebras nas sÃries do Dow Jones, da taxa de CÃmbio, spread do C-Bond e taxa da SELIC; e verificou-se a relaÃÃo destas com as quebras do IBOVESPA. Os resultados foram analisados via estatÃsticas descritivas/freqÃÃncias e por modelos Logit. Como resultado principal tem-se a predominÃncia das co-quebras associando o IBOVESPA ao CÃmbio e ao spread do C-Bond.
Mendoza, Choque Luis Enrique. „Main Labor Breaches of the Peruvian State in the Framework of the Free Trade Agreement with the United States“. Derecho & Sociedad, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/118733.
Der volle Inhalt der QuelleEl siguiente artículo parte de antigua y cercana vinculación entre Derecho del Trabajo y el comercio internacional, relación que en los últimos años ha recobrado importancia debido a la aparición de nuevos instrumentos, mecanismos y sanciones. El contenido laboral del TLC con los Estados Unidos y su aplicación se pueden analizar desde distintos ángulos, en el siguiente trabajo nos limitaremos a estudiarlo a la luz de tres elementos: el Principio de Progresividad de los derechos sociales, la naturaleza jurídica del TLC y dos de los regímenes laborales promocionales vigentes en la legislación peruana. Los incumplimientos a los que haremos referencia son los referidos a las dos quejas presentadas por organizaciones sindicales peruanas en el marco de los mecanismos de cumplimiento del TLC. Finalmente, se presentan algunas conclusiones que pretenden contribuir al debate sobre la materia.
Xanthaki, Helen. „Secondary establishment of European Union public limited companies in France, Greece and Italy : breaches of European Community law and redress“. Thesis, Durham University, 2000. http://etheses.dur.ac.uk/1202/.
Der volle Inhalt der QuelleNsibande, Senzosenkosi. „The impact of data breaches of varying severity on the customer loyalty of high net worth individuals in retail banking“. Diss., University of Pretoria, 2020. http://hdl.handle.net/2263/79631.
Der volle Inhalt der QuelleMini Dissertation (MBA)--University of Pretoria, 2020.
pt2021
Gordon Institute of Business Science (GIBS)
MBA
Unrestricted
Sedaghat, Soroush, University of Western Sydney und School of Computing and Information Technology. „Web authenticity“. THESIS_XXX_CIT_Sedaghat_S.xml, 2002. http://handle.uws.edu.au:8081/1959.7/431.
Der volle Inhalt der QuelleMaster of Science (Honours) Computing
Ahmadian, Reza. „Modelling hydrodynamic and bacterial processes through linked river, floodplain and coastal systems : with particular application to marine turbines, barrages and embankment breaches“. Thesis, Cardiff University, 2010. http://orca.cf.ac.uk/54931/.
Der volle Inhalt der QuelleAnagnostaras, Georgios. „To sue or not to sue? : the present and future of liability actions for breaches of European Community law committed by the domestic authorities“. Thesis, University of Bristol, 2001. http://hdl.handle.net/1983/c2f5f65b-28be-4db8-9d7d-0e84d4694a28.
Der volle Inhalt der QuelleZottoli, Michael A. „Understanding the process through which breaches of the psychological contract influence feelings of psychological contract violation: an analysis incorporating causal, responsibility and blame attributions“. The Ohio State University, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=osu1054515958.
Der volle Inhalt der QuelleAhmad, Altaf. „The Effect of Perceived Privacy Breaches on Continued Technology Use and Individual Psychology: The Construct, Instrument Development, and an Application Using Internet Search Engines“. OpenSIUC, 2010. https://opensiuc.lib.siu.edu/dissertations/162.
Der volle Inhalt der QuellePikó, Rita. „Swiss Legal Status on the Protection of Whistleblowers: Taking into account the EU Directive on the protection of persons who report breaches of Union law“. Universität Leipzig, 2020. https://ul.qucosa.de/id/qucosa%3A70825.
Der volle Inhalt der QuelleKinna, Rémy Paul. „Entering murky legal waters transboundary impacts of acid mine drainage within the Limpopo river as potential breaches of South Africa's duty not to cause significant harm“. Master's thesis, University of Cape Town, 2013. http://hdl.handle.net/11427/4479.
Der volle Inhalt der QuelleMatiatos, Christoforos. „Essai sur la pratique hellénique du droit constitutionnel intermédiaire“. Thesis, Paris 1, 2015. http://www.theses.fr/2015PA010284/document.
Der volle Inhalt der QuelleThis work studies, in its legal aspects, the process of breaches of constitutional continuity and the way out of them, in the course of the history of the modern Greek State. Process by which a regime in power disappears and another appears. Process in which legitimation precedes legalization. Process that reserves a varied fate to the former constitutional order and ends with the establishment of a new order. This process extends over a period that could be called "intermediate". Its duration varies, and it happens to be of a certain length. This was sometimes the case in Greece. But this period has its "law" that has a place in the general Constitutional Law in spite of its peculiarities that make it particular
Palmcrantz, Conrad. „When we see something that is well beyond our understanding : The duty of States to investigate war crimes and how it applies to autonomous weapons systems“. Thesis, Försvarshögskolan, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-8306.
Der volle Inhalt der Quelle