Literatura académica sobre el tema "Breaches"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Breaches".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Breaches"
Richardson, Vernon J., Rodney E. Smith, and Marcia Weidenmier Watson. "Much Ado about Nothing: The (Lack of) Economic Impact of Data Privacy Breaches." Journal of Information Systems 33, no. 3 (February 1, 2019): 227–65. http://dx.doi.org/10.2308/isys-52379.
Texto completoZafar, Humayun, Myung Ko, and Kweku-Muata Osei-Bryson. "Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors." Information Resources Management Journal 25, no. 1 (January 2012): 21–37. http://dx.doi.org/10.4018/irmj.2012010102.
Texto completoSmith, Thomas J. (Tom), Julia L. Higgs, and Robert E. Pinsker. "Do Auditors Price Breach Risk in Their Audit Fees?" Journal of Information Systems 33, no. 2 (August 1, 2018): 177–204. http://dx.doi.org/10.2308/isys-52241.
Texto completoDu, Shuili, Kholekile L. Gwebu, Jing Wang, and Kun Yu. "Differential Market Reaction to Data Security Breaches: A Screening Perspective." Communications of the Association for Information Systems 54 (2024): 376–401. http://dx.doi.org/10.17705/1cais.05414.
Texto completoJuma'h, Ahmad H., and Yazan Alnsour. "The effect of data breaches on company performance." International Journal of Accounting & Information Management 28, no. 2 (March 20, 2020): 275–301. http://dx.doi.org/10.1108/ijaim-01-2019-0006.
Texto completoSaleem, Hamza, and Muhammad Naveed. "SoK: Anatomy of Data Breaches." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (October 1, 2020): 153–74. http://dx.doi.org/10.2478/popets-2020-0067.
Texto completoJohnson, Mark, Min Jung Kang, and Tolani Lawson. "Stock Price Reaction to Data Breaches." Journal of Finance Issues 16, no. 2 (December 31, 2017): 1–13. http://dx.doi.org/10.58886/jfi.v16i2.2263.
Texto completoMulyadi, Rahmad, Witantra Dhamar Hutami, Kevin Dilian Suganda, and Dhiya Farah Khalisha. "Risk of neurologic deficit in medially breached pedicle screws assessed by computed tomography: a systematic review." Asian Spine Journal 18, no. 6 (December 31, 2024): 903–12. https://doi.org/10.31616/asj.2024.0325.
Texto completoWang, Tawei, Yen-Yao Wang, and Ju-Chun Yen. "It's Not My Fault." Journal of Database Management 30, no. 3 (July 2019): 18–37. http://dx.doi.org/10.4018/jdm.2019070102.
Texto completoKude, Thomas, Hartmut Hoehle, and Tracy Ann Sykes. "Big data breaches and customer compensation strategies." International Journal of Operations & Production Management 37, no. 1 (January 3, 2017): 56–74. http://dx.doi.org/10.1108/ijopm-03-2015-0156.
Texto completoTesis sobre el tema "Breaches"
Talavera, Cano Andrés. "Regulating the Intolerance of Contractual Breaches." IUS ET VERITAS, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/123754.
Texto completoSmith, Tanshanika Turner. "Examining Data Privacy Breaches in Healthcare." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2623.
Texto completoHo, Jean Qing Ying. "State responsibility for breaches of investment contracts." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708722.
Texto completoBiggs, Carl T. "Implications of transaction costs for acquisition program cost breaches." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34629.
Texto completoVorogushyn, Sergiy. "Analysis of flood hazard under consideration of dike breaches." Phd thesis, Aachen Shaker, 2008. http://d-nb.info/994678622/04.
Texto completoGriffin, Tony. "Strategies to Prevent Security Breaches Caused by Mobile Devices." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4628.
Texto completoSaber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.
Texto completoOfori-Duodu, Michael Samuel. "Exploring Data Security Management Strategies for Preventing Data Breaches." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.
Texto completoZuzak, Catherine Ann. "Liability for breaches of aviation security obligatons : a Canadian perspective." Thesis, McGill University, 1990. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=59859.
Texto completoKershaw, Debra S. "BOUNDARIES AND BREACHES: COMPLEXITIES AND STRATEGIES DOWN ON THE FARM." UKnowledge, 2011. http://uknowledge.uky.edu/gradschool_diss/202.
Texto completoLibros sobre el tema "Breaches"
Daswani, Neil, and Moudy Elbayadi. Big Breaches. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7.
Texto completoS, Logweller Cary, ed. Identity theft breaches. Hauppauge, NY: Nova Science Publishers, 2009.
Buscar texto completoY, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.
Buscar texto completoY, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. [Boston, MA]: MCLE, 2009.
Buscar texto completoCentre, National Computing, ed. The Information Security Breaches Survey 1996. [Oxford?]: National Computing Centre, 1996.
Buscar texto completoFoster, Peter C., Sara E. Cable, Kathleen M. Porter, and Walter C. Boyd. Fundamentals of data security law & breaches. Boston, MA: MCLE New England, 2014.
Buscar texto completoArena, Mark V. Management perspectives pertaining to root cause analyses of Nunn-McCurdy breaches: Contractor motivations and anticipating breaches. Santa Monica, CA: Rand Corporation, 2014.
Buscar texto completoVan Roosebeke, Bert. State Liability for Breaches of European Law. Wiesbaden: DUV, 2007. http://dx.doi.org/10.1007/978-3-8350-9494-9.
Texto completoWong, Rebecca. Data Security Breaches and Privacy in Europe. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7.
Texto completoRita, Tehan, ed. Data security breaches: Context and incident summaries. New York: Nova Science Publishers, 2008.
Buscar texto completoCapítulos de libros sobre el tema "Breaches"
Anesko, Michael. "Breaches." In Henry James and Queer Filiation, 103–5. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94538-5_13.
Texto completoDaswani, Neil, and Moudy Elbayadi. "The Root Causes of Data Breaches." In Big Breaches, 3–33. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_1.
Texto completoDaswani, Neil, and Moudy Elbayadi. "The Equifax Breach." In Big Breaches, 75–95. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_4.
Texto completoDaswani, Neil, and Moudy Elbayadi. "The Seven Habits of Highly Effective Security." In Big Breaches, 195–232. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_9.
Texto completoDaswani, Neil, and Moudy Elbayadi. "Facebook Security Issues and the 2016 US Presidential Election." In Big Breaches, 97–130. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_5.
Texto completoDaswani, Neil, and Moudy Elbayadi. "Advice to Cybersecurity Investors." In Big Breaches, 331–59. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_14.
Texto completoDaswani, Neil, and Moudy Elbayadi. "The Capital One Breach." In Big Breaches, 35–53. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_2.
Texto completoDaswani, Neil, and Moudy Elbayadi. "Technology Defenses to Fight the Root Causes of Breach: Part One." In Big Breaches, 269–302. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_12.
Texto completoDaswani, Neil, and Moudy Elbayadi. "The Yahoo Breaches of 2013 and 2014." In Big Breaches, 155–69. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_7.
Texto completoDaswani, Neil, and Moudy Elbayadi. "Applying Your Skills to Cybersecurity." In Big Breaches, 385–407. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_16.
Texto completoActas de conferencias sobre el tema "Breaches"
K, Santha Sheela, Mrithula M, Varshni Priya A, and Selvalakshmi C.B. "Cyber Hacking Breaches Prediction and Detection Using Machine Learning." In 2024 IEEE 2nd International Conference on Innovations in High Speed Communication and Signal Processing (IHCSP), 1–7. IEEE, 2024. https://doi.org/10.1109/ihcsp63227.2024.10960232.
Texto completoSandeep, V., Jyotirmaya Sahoo, and Pawan Bhambu. "Defending Machine Learning in Agriculture Against Data Breaches and Misuse." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT), 1–6. IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10726152.
Texto completoJulie, Gabriel, Bas Dit Nugues Manon, Flouzat-Lachaniette Charles Henri, Rosi Giuseppe, Wagnac Eric, Haiat Guillaume, and Petit Yvan. "Preventing cortical breaches with impact analysis during spinal instrumentation surgery." In 2024 46th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 1–4. IEEE, 2024. https://doi.org/10.1109/embc53108.2024.10781753.
Texto completoAngelis, John N., and Rajendran S. Murthy. "Blame Shifting, Shopping Intensity, and Revisit Likelihood in Data Breaches." In 2024 Portland International Conference on Management of Engineering and Technology (PICMET), 1–9. IEEE, 2024. http://dx.doi.org/10.23919/picmet64035.2024.10653185.
Texto completoXiang, Hui, Yifan Wu, Xuebin Wang, Jinqiao Shi, Can Zhao, and Jiapeng Zhao. "Identifying Data Breaches in Dark Web through Prompt Active Learning." In 2024 IEEE 9th International Conference on Data Science in Cyberspace (DSC), 61–68. IEEE, 2024. https://doi.org/10.1109/dsc63484.2024.00016.
Texto completoTomasov, Adrian, Petr Dejdar, Petr Munster, and Tomas Horvath. "Utilizing a State of Polarization Change Detector and Machine Learning for Enhanced Security in Fiber-Optic Networks." In CLEO: Applications and Technology, JTu2A.217. Washington, D.C.: Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_at.2024.jtu2a.217.
Texto completoSrinivasan, S. "Privacy Protection and Data Breaches." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2261.
Texto completoSingh, Ram Govind, and Naveenkumar D. "Are we undermining data breaches? Protecting education sector from data breaches." In 2023 International Conference on Computer, Electronics & Electrical Engineering & their Applications (IC2E3). IEEE, 2023. http://dx.doi.org/10.1109/ic2e357697.2023.10262570.
Texto completoFleury-Charles, Aaron, Md Minhaz Chowdhury, and Nafiz Rifat. "Data Breaches: Vulnerable Privacy." In 2022 IEEE International Conference on Electro Information Technology (eIT). IEEE, 2022. http://dx.doi.org/10.1109/eit53891.2022.9814044.
Texto completoAlaminov, Hristo. "DATA BREACHES AND DIGITALISATION." In PROTECTION OF THE PERSONAL DATA AND THE DIGITALIZATION 2021. University publishing house "Science and Economics", University of Economics - Varna, 2021. http://dx.doi.org/10.36997/ppdd2021.29.
Texto completoInformes sobre el tema "Breaches"
Woodhams, Josephine. Breaches in Research Integrity. UK Research Integrity Office, July 2023. http://dx.doi.org/10.37672/ukrio.2023.07.breachesinresearchintegrity.
Texto completoSainsbury, Nicola. Whistleblowing and Breaches of Good Research Practice. UK Research Integrity Office, October 2024. http://dx.doi.org/10.37672/ukrio.2024.04.whistleblowingandbreaches.
Texto completoHurtle, Jackie C. Decrease the Number of Glovebox Glove Breaches and Failures. Office of Scientific and Technical Information (OSTI), December 2013. http://dx.doi.org/10.2172/1113782.
Texto completoTaylor, R. B., and D. Frobel. Barrier breaches and washover features, Martinique Beach, Nova Scotia. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1999. http://dx.doi.org/10.4095/211075.
Texto completoFisher, Bill. Data Confidentiality: Identifying and Protecting Assets Against Data Breaches. Gaithersburg, MD: National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1800-28.
Texto completoBiggs, Carl T., Diana I. Angelis, Laura Armey, and Raymond Franck. Transaction Costs and Cost Breaches in Major Defense Acquisition Programs. Fort Belvoir, VA: Defense Technical Information Center, February 2014. http://dx.doi.org/10.21236/ada612617.
Texto completoPOND, DANIEL J., F. KAY HOUGHTON, and WALTER E. GILMORE. CONTRIBUTORS TO HUMAN ERRORS AND BREACHES IN NATIONAL SECURITY APPLICATIONS. Office of Scientific and Technical Information (OSTI), August 2002. http://dx.doi.org/10.2172/801246.
Texto completoFisher, Bill. Data Confidentiality: Detect, Respond to, and Recover from Data Breaches. Gaithersburg, MD: National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1800-29.
Texto completoBratton, Robert Lawrence. Quick Look Report for Chemical Reactivity Modeling of Various Multi-Canister Overpack Breaches. Office of Scientific and Technical Information (OSTI), April 2002. http://dx.doi.org/10.2172/911538.
Texto completoAngelis, Diana I., Laura Armey, and Carl T. Biggs. A Model for Understanding the Relationship Between Transaction Costs and Acquisition Cost Breaches. Fort Belvoir, VA: Defense Technical Information Center, April 2014. http://dx.doi.org/10.21236/ada612854.
Texto completo