Dissertations / Theses on the topic 'Breaches'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Breaches.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Talavera, Cano Andrés. "Regulating the Intolerance of Contractual Breaches." IUS ET VERITAS, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/123754.
Full textPenalizar los incumplimientos permite una asignación eficiente de los riesgos en un contrato, asegurando y conservando el equilibrio contractual que las partes tuvieron en mente y plasmaron en su regulación contractual. El uso inteligente de las penalidades permitirá salvaguardar y mantener el equilibrio económico de los contratos, manteniendo así la rentabilidad de las operaciones comerciales perseguidas a través de ellos.
Smith, Tanshanika Turner. "Examining Data Privacy Breaches in Healthcare." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2623.
Full textHo, Jean Qing Ying. "State responsibility for breaches of investment contracts." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708722.
Full textBiggs, Carl T. "Implications of transaction costs for acquisition program cost breaches." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34629.
Full textIt is generally accepted that cost growth in federal major defense acquisition programs (MDAPs) is partially attributable to inaccurate cost estimates. Cost analysts exhaustively analyze manpower and resources to provide accurate estimates, however the influence of transaction costs is often ignored in traditional cost estimates. This thesis investigates the association between cost growth and transaction costs, the real cost of business negotiations and program management. We collect MDAP cost threshold breach data and cross reference it with a proxy for MDAP transaction costs (Systems Engineering/Program Management Costs) to determine whether a correlation exists. We use multiple logistic regression models to analyze the binary outcome of breach or no breach. The results show that for MDAPs with cost-plus contracts there is a statistically significant relation between the likelihood of a cost threshold breach occurring and the relative magnitude of the MDAPs transaction costs; no such relation exists for fixed price contracts. Although these results show an association between cost threshold breaches and transaction costs, there is no evidence of causality between these two variables and our exploration of causality is a topic for future research.
Vorogushyn, Sergiy. "Analysis of flood hazard under consideration of dike breaches." Phd thesis, Aachen Shaker, 2008. http://d-nb.info/994678622/04.
Full textGriffin, Tony. "Strategies to Prevent Security Breaches Caused by Mobile Devices." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4628.
Full textSaber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.
Full textOfori-Duodu, Michael Samuel. "Exploring Data Security Management Strategies for Preventing Data Breaches." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.
Full textZuzak, Catherine Ann. "Liability for breaches of aviation security obligatons : a Canadian perspective." Thesis, McGill University, 1990. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=59859.
Full textThis thesis explores the private law liability issues that may arise from branches of the duty to secure airports and aircraft. The focus is on providing a global view of the principles governing suits against the two most likely defendants--the air carrier and the government--and on the policy options which could underpin civil liability. The perspective is Canadian in that it presumes that either a Canadian airport or Canadian airline has been involved in the terrorist attack.
Kershaw, Debra S. "BOUNDARIES AND BREACHES: COMPLEXITIES AND STRATEGIES DOWN ON THE FARM." UKnowledge, 2011. http://uknowledge.uky.edu/gradschool_diss/202.
Full textRobson, Jennifer van Krieken. "Understanding practitioners' responses to inequality and breaches of human rights." Thesis, Canterbury Christ Church University, 2012. http://create.canterbury.ac.uk/12166/.
Full textVaruhas, Jason Nicholas Euripide. "Damages for breaches of human rights : a tort-based approach." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609692.
Full textPolanco, Pinerez G. C. "Phase change within flows from breaches of liquefied gas pipelines." Thesis, Coventry University, 2008. http://curve.coventry.ac.uk/open/items/b374a447-1db1-b578-7424-a5e485b28f4f/1.
Full textKongnso, Fedinand Jaiventume. "Best Practices to Minimize Data Security Breaches for Increased Business Performance." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1825.
Full textVorogushyn, Sergiy [Verfasser]. "Analysis of flood hazard under consideration of dike breaches / Sergiy Vorogushyn." Aachen : Shaker, 2009. http://d-nb.info/1156517923/34.
Full textFahy, Patrick. "State obligations to prevent breaches of Article 3 by non-state actors." Thesis, Queen's University Belfast, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.673848.
Full textOsei-Amanfi, Michael. "A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches." Thesis, Grand Canyon University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13423232.
Full textThe purpose of this qualitative single case study was to explore the available strategies IT leaders at ABC, a Managed IT Services company in the SME sector in Columbus, Ohio, may use to avoid data breaches in the cloud environment. The security framework established by the Cloud Security Alliance (CSA) provided the conceptual framework for this study. A purposeful sampling strategy was used to select 10 IT leaders to participate in the study. Data were gathered through open-ended, semi-structured individual face-to-face interviews, asynchronous discussions through e-mails, and reviews of company-provided documents. An inductive thematic analysis was used to analyze all the data collected in the study. The following six major themes emerged from the data relating to descriptions of the data security threats and vulnerabilities facing IT leaders in the cloud, and the strategies they may use to avoid a breach of their data: (1) managing the human factor, (2) managing the network environment, (3) types of data security threats, (4) people pose the most significant risk, (5) elements of an effective strategy, and (6) addressing password issues. The results indicated that IT leaders face multifaceted data security threats in the cloud and these could be addressed through a combination of strategies including user education, securing the network, limiting user access to IT resources, and addressing password issues.
Laoh, Arnold. "The availability of international judicial review of government breaches of human rights." Thesis, Laoh, Arnold (2006) The availability of international judicial review of government breaches of human rights. PhD thesis, Murdoch University, 2006. https://researchrepository.murdoch.edu.au/id/eprint/144/.
Full textLaoh, Arnold. "The availability of international judicial review of government breaches of human rights." Laoh, Arnold (2006) The availability of international judicial review of government breaches of human rights. PhD thesis, Murdoch University, 2006. http://researchrepository.murdoch.edu.au/144/.
Full textZhou, Lei. "The value of security audits, asymmetric information and market impact of security breaches." College Park, Md. : University of Maryland, 2004. http://hdl.handle.net/1903/1736.
Full textThesis research directed by: Business and Management. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Ayereby, Manouan Pierre-Marius. "Overcoming Data Breaches and Human Factors in Minimizing Threats to Cyber-Security Ecosystems." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6163.
Full textau, adt@murdoch edu, and Arnold Laoh. "The availability of international judicial review of government act for breaches of human rights." Murdoch University, 2002. http://wwwlib.murdoch.edu.au/adt/browse/view/adt-MU20061122.131327.
Full textBellefeuille, Cynthia Lynn. "Quantifying and managing the risk of information security breaches participants in a supply chain." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33313.
Full textIncludes bibliographical references (leaf 70).
Technical integration between companies can result in an increased risk of information security breaches. This thesis proposes a methodology for quantifying information security risk to a supply chain participant. Given a system responsible for supply chain interaction and the vulnerabilities attributed to the system, the variables that determine the probability and severity of security incidents were used to create a model to quantify the risk within three hypothetical information systems. The probability of an incident occurring was determined by rating the availability and ease of performing an exploit, the attractiveness of the target and an estimate of the frequency of the attack occurring Internet wide. In assigning a monetary value to the incident, the outcome from an attack was considered in terms of the direct impact on the business process and the potential impact on partnerships. A method for determining mitigation strategies was then proposed based on a given set of monetary constraints and the realization of corporate security policy.
by Cynthia Lynn Bellefeuille.
M.Eng.in Logistics
Almajed, Yasser M. "A framework for an adaptive early warning and response system for insider privacy breaches." Thesis, De Montfort University, 2015. http://hdl.handle.net/2086/11129.
Full textGarringer, James. "The Role of Protocol Analysis in Cybersecurity| Closing the Gap on Undetected Data Breaches." Thesis, Utica College, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10974156.
Full textOrganizations of all sizes are targets for a cyberattack. Undetected data breaches result in the catastrophic loss of personally identifiable information (PII) causing considerable financial and reputation harm to organizations, while also imposing a risk of identity fraud to consumers. The purpose of this study was to consider the impact that undetected data breaches have on organizations with an additional focus on shortening the gap between the time of data breach and the time of detection through manual protocol analysis and intrusion detection system (IDS) solutions. This research reviewed the available literature detailing the effects of undetected data breaches on organizations as well as the advanced exploitation of protocols and anomaly detection through manual protocol analysis and IDS.
Manual protocol analysis provides situational anomaly detection when compared to baseline network traffic, but implies privacy concerns and does not allow timely detection of most cyberattacks. Automated IDS stream-based flows allow quicker detection of cyberattacks. Network flow-based IDS misses hidden attacks due to lack of a data payload requiring manual analysis instead, while host-based IDS adversely affects the performance of the host computer, but successfully identifies anomalies based on known signatures. This study recommended a complementary defense-in-depth solution which employs manual protocol analysis and both host-based and network-based IDS solutions as a viable strategy for reducing the time between data breach and time of detection. This study additionally recommended that security operation center personnel and IT departments should receive protocol analysis training to support manual detection against a known network traffic baseline.
Sleep, Lyndal. "Pulling down their breaches : An analysis of Centrelink breach and appeal numbers from 1996 to 2001 using a case study of a single Centrelink office." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1322.
Full textDeZulueta, Monica. "A novel neural network based system for assessing risks associated with information technology security breaches." FIU Digital Commons, 2004. http://digitalcommons.fiu.edu/etd/2791.
Full textWashington, Kevin D. "The impact of data breaches on market value of firms in the E-Commerce marketplace." Thesis, Capella University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10102712.
Full textUsing a sample of information and security data breaches the present research examines the public announcement impact between Brick and Mortar firms and E-Commerce firms. The dissertation initially analyzes the effects of publicly announced information and security breaches on abnormal stock returns, abnormal trading volume, and firm risk. The dissertation then analyzes differential impact between Brick and Mortar firms and E-Commerce firm’s market value following a data breach. Using a sample size of 38 information security breaches, E-Commerce firms resulted in more negative abnormal stock returns than Brick and Mortar firms. While data breach announcements did not significantly impact retail firms as a whole, they did have a significant impact when broken into the subsets. E-Commerce firms that announced an information security breach experienced abnormal trading volume.
Gadirova, Nurlana. "The Impacts of Cyberattacks on Private Firms' Cash Holdings." Thesis, Université d'Ottawa / University of Ottawa, 2021. http://hdl.handle.net/10393/41924.
Full textBetz, Linda. "An Analysis of the Relationship between Security Information Technology Enhancements and Computer Security Breaches and Incidents." NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/960.
Full textPaddeu, Federica Isabella. "General defences to breaches of international law : justification and excuse in the law of state responsibility." Thesis, University of Cambridge, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.648758.
Full textCameron, Calla. "Grave Breaches: American Military Intervention in the Late Twentieth- Century and the Consequences for International Law." Scholarship @ Claremont, 2017. http://scholarship.claremont.edu/cmc_theses/1677.
Full textPelletier, Justin M. "Effects of Data Breaches on Sector-Wide Systematic Risk in Financial, Technology, Healthcare and Services Sectors." Thesis, Capella University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10615009.
Full textThis research informs an ongoing debate regarding a firm’s incentives to invest in information security. Previous research reported that data breaches have had a decreasing impact on a company’s stock price over time, leading researchers to conclude that market-based incentives are decreasingly effective. Some information security economists also suggested that further regulation is necessary because they found that capital market participants poorly accounted for the spillover effects of a breach—the effects of a breach that are external to the breached company. However, some studies indicate that sector-wide systematic risk could measure spillover effects and that the effects of a data breach on systematic risk may have changed over time. The purpose of this study was to quantitatively describe the relationship between the data breach of a firm and changes to the systematic risk of that firm’s sector. This dissertation used event studies of sector-wide systematic risk within American stock markets to measure the external effects of breaches that occurred in companies within the financial, technology, healthcare and services sectors. The use of a repeated measures analysis of variance between those event studies allowed examination of longitudinal changes to sector-wide systematic risk between 2006 through 2016. This analysis found that the breach of an individual company had a significant impact on the systematic risk for that company’s entire sector (1.08% in 2016) and that these impacts have increased over time (p = 0.015). The results were consistent across all measured sectors, without any significant correlation attributable to the scope of the breach. Together, these findings suggest that market forces are increasingly incentivizing sector-wide investment in information security. Further research should consider the potential for government enforced meta-regulation of sector defined information security standards.
Asiri, Mohammed. "Three Essays in Investment Efficiency, Accounting Reporting Complexity, and Cybersecurity Breaches: Evidence from Corporate Tax Avoidance." Thesis, Curtin University, 2021. http://hdl.handle.net/20.500.11937/83671.
Full textLee, Foong Mee, and n/a. "Remedies and sanctions against corporate officers for breaches of duties under part 3.2 of the corporations law." University of Canberra. Law, 1994. http://erl.canberra.edu.au./public/adt-AUC20050523.102418.
Full textHicks, Andrew David. "Conceptualising the constructive trust : a new approach and its specific application to acquisitive breaches of fiduciary obligation." Thesis, University of Hull, 2007. http://hydra.hull.ac.uk/resources/hull:6437.
Full textWaddell, Stanie Adolphus. "A Study of the Effect of Information Security Policies on Information Security Breaches in Higher Education Institutions." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/331.
Full textZachis, Savio de Melo. "Analysis of breaches and co-breaks in financial series: a non-parametric approach data using high frequency." Universidade Federal do CearÃ, 2009. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=3730.
Full textThis research use a non-parametric test developed by Lee & MYKLAND (2007) to extract jumps in IBOVESPA series and study its dynamics. Among the qualities of this test there are the ability to identify the exact time of occurrence of break / co-break, the sign and size of it. The jumps in the series of Dow Jones, Exchange rate, C-Bond spread and SELIC rate were also estimated and the relation with IBOVESPAÂs jump were verified. The results were analyzed by descriptive statistics, analysis of frequencies and Logit regression models. As a main result there was the predominance of co-breaks involving IBOVESPA with exchange rate and with the spread of C-Bond.
Este trabalho faz uso do teste nÃo-paramÃtrico desenvolvido por LEE & MYKLAND (2007) para extrair a quebra da sÃrie do IBOVESPA e estudar sua dinÃmica. Dentre as qualidades deste teste estÃo à capacidade de identificar o momento exato da ocorrÃncia da quebra/co-quebra, o sinal e o tamanho da mesma. Foram estimadas tambÃm as quebras nas sÃries do Dow Jones, da taxa de CÃmbio, spread do C-Bond e taxa da SELIC; e verificou-se a relaÃÃo destas com as quebras do IBOVESPA. Os resultados foram analisados via estatÃsticas descritivas/freqÃÃncias e por modelos Logit. Como resultado principal tem-se a predominÃncia das co-quebras associando o IBOVESPA ao CÃmbio e ao spread do C-Bond.
Mendoza, Choque Luis Enrique. "Main Labor Breaches of the Peruvian State in the Framework of the Free Trade Agreement with the United States." Derecho & Sociedad, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/118733.
Full textEl siguiente artículo parte de antigua y cercana vinculación entre Derecho del Trabajo y el comercio internacional, relación que en los últimos años ha recobrado importancia debido a la aparición de nuevos instrumentos, mecanismos y sanciones. El contenido laboral del TLC con los Estados Unidos y su aplicación se pueden analizar desde distintos ángulos, en el siguiente trabajo nos limitaremos a estudiarlo a la luz de tres elementos: el Principio de Progresividad de los derechos sociales, la naturaleza jurídica del TLC y dos de los regímenes laborales promocionales vigentes en la legislación peruana. Los incumplimientos a los que haremos referencia son los referidos a las dos quejas presentadas por organizaciones sindicales peruanas en el marco de los mecanismos de cumplimiento del TLC. Finalmente, se presentan algunas conclusiones que pretenden contribuir al debate sobre la materia.
Xanthaki, Helen. "Secondary establishment of European Union public limited companies in France, Greece and Italy : breaches of European Community law and redress." Thesis, Durham University, 2000. http://etheses.dur.ac.uk/1202/.
Full textNsibande, Senzosenkosi. "The impact of data breaches of varying severity on the customer loyalty of high net worth individuals in retail banking." Diss., University of Pretoria, 2020. http://hdl.handle.net/2263/79631.
Full textMini Dissertation (MBA)--University of Pretoria, 2020.
pt2021
Gordon Institute of Business Science (GIBS)
MBA
Unrestricted
Sedaghat, Soroush, University of Western Sydney, and School of Computing and Information Technology. "Web authenticity." THESIS_XXX_CIT_Sedaghat_S.xml, 2002. http://handle.uws.edu.au:8081/1959.7/431.
Full textMaster of Science (Honours) Computing
Ahmadian, Reza. "Modelling hydrodynamic and bacterial processes through linked river, floodplain and coastal systems : with particular application to marine turbines, barrages and embankment breaches." Thesis, Cardiff University, 2010. http://orca.cf.ac.uk/54931/.
Full textAnagnostaras, Georgios. "To sue or not to sue? : the present and future of liability actions for breaches of European Community law committed by the domestic authorities." Thesis, University of Bristol, 2001. http://hdl.handle.net/1983/c2f5f65b-28be-4db8-9d7d-0e84d4694a28.
Full textZottoli, Michael A. "Understanding the process through which breaches of the psychological contract influence feelings of psychological contract violation: an analysis incorporating causal, responsibility and blame attributions." The Ohio State University, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=osu1054515958.
Full textAhmad, Altaf. "The Effect of Perceived Privacy Breaches on Continued Technology Use and Individual Psychology: The Construct, Instrument Development, and an Application Using Internet Search Engines." OpenSIUC, 2010. https://opensiuc.lib.siu.edu/dissertations/162.
Full textPikó, Rita. "Swiss Legal Status on the Protection of Whistleblowers: Taking into account the EU Directive on the protection of persons who report breaches of Union law." Universität Leipzig, 2020. https://ul.qucosa.de/id/qucosa%3A70825.
Full textKinna, Rémy Paul. "Entering murky legal waters transboundary impacts of acid mine drainage within the Limpopo river as potential breaches of South Africa's duty not to cause significant harm." Master's thesis, University of Cape Town, 2013. http://hdl.handle.net/11427/4479.
Full textMatiatos, Christoforos. "Essai sur la pratique hellénique du droit constitutionnel intermédiaire." Thesis, Paris 1, 2015. http://www.theses.fr/2015PA010284/document.
Full textThis work studies, in its legal aspects, the process of breaches of constitutional continuity and the way out of them, in the course of the history of the modern Greek State. Process by which a regime in power disappears and another appears. Process in which legitimation precedes legalization. Process that reserves a varied fate to the former constitutional order and ends with the establishment of a new order. This process extends over a period that could be called "intermediate". Its duration varies, and it happens to be of a certain length. This was sometimes the case in Greece. But this period has its "law" that has a place in the general Constitutional Law in spite of its peculiarities that make it particular
Palmcrantz, Conrad. "When we see something that is well beyond our understanding : The duty of States to investigate war crimes and how it applies to autonomous weapons systems." Thesis, Försvarshögskolan, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-8306.
Full text