Artículos de revistas sobre el tema "Breaches"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Breaches".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Richardson, Vernon J., Rodney E. Smith y Marcia Weidenmier Watson. "Much Ado about Nothing: The (Lack of) Economic Impact of Data Privacy Breaches". Journal of Information Systems 33, n.º 3 (1 de febrero de 2019): 227–65. http://dx.doi.org/10.2308/isys-52379.
Texto completoZafar, Humayun, Myung Ko y Kweku-Muata Osei-Bryson. "Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors". Information Resources Management Journal 25, n.º 1 (enero de 2012): 21–37. http://dx.doi.org/10.4018/irmj.2012010102.
Texto completoSmith, Thomas J. (Tom), Julia L. Higgs y Robert E. Pinsker. "Do Auditors Price Breach Risk in Their Audit Fees?" Journal of Information Systems 33, n.º 2 (1 de agosto de 2018): 177–204. http://dx.doi.org/10.2308/isys-52241.
Texto completoJuma'h, Ahmad H. y Yazan Alnsour. "The effect of data breaches on company performance". International Journal of Accounting & Information Management 28, n.º 2 (20 de marzo de 2020): 275–301. http://dx.doi.org/10.1108/ijaim-01-2019-0006.
Texto completoSaleem, Hamza y Muhammad Naveed. "SoK: Anatomy of Data Breaches". Proceedings on Privacy Enhancing Technologies 2020, n.º 4 (1 de octubre de 2020): 153–74. http://dx.doi.org/10.2478/popets-2020-0067.
Texto completoJohnson, Mark, Min Jung Kang y Tolani Lawson. "Stock Price Reaction to Data Breaches". Journal of Finance Issues 16, n.º 2 (31 de diciembre de 2017): 1–13. http://dx.doi.org/10.58886/jfi.v16i2.2263.
Texto completoWang, Tawei, Yen-Yao Wang y Ju-Chun Yen. "It's Not My Fault". Journal of Database Management 30, n.º 3 (julio de 2019): 18–37. http://dx.doi.org/10.4018/jdm.2019070102.
Texto completoKude, Thomas, Hartmut Hoehle y Tracy Ann Sykes. "Big data breaches and customer compensation strategies". International Journal of Operations & Production Management 37, n.º 1 (3 de enero de 2017): 56–74. http://dx.doi.org/10.1108/ijopm-03-2015-0156.
Texto completoCheng, Xu (Joyce) y Stephanie Walton. "Do Nonprofessional Investors Care About How and When Data Breaches are Disclosed?" Journal of Information Systems 33, n.º 3 (1 de marzo de 2019): 163–82. http://dx.doi.org/10.2308/isys-52410.
Texto completoSebastian, Glorin. "Cyber Kill Chain Analysis of Five Major US Data Breaches". International Journal of Cyber Warfare and Terrorism 12, n.º 1 (1 de enero de 2022): 1–15. http://dx.doi.org/10.4018/ijcwt.315651.
Texto completoMahlaola, Tintswalo B. y Barbara Van Dyk. "Reasons for Picture Archiving and Communication System (PACS) data security breaches: Intentional versus non-intentional breaches". Health SA Gesondheid 21 (11 de octubre de 2016): 271–79. http://dx.doi.org/10.4102/hsag.v21i0.966.
Texto completoRaasck, Kyle, Jason Khoury, Ahmed Aoude, Benjamin Beland, Alexander Munteanu, Michael H. Weber y Jeff Golan. "The Effect of Thoracolumbar Pedicle Isthmus on Pedicle Screw Accuracy". Global Spine Journal 10, n.º 4 (20 de mayo de 2019): 393–98. http://dx.doi.org/10.1177/2192568219850143.
Texto completoHiggs, Julia L., Robert E. Pinsker, Thomas J. Smith y George R. Young. "The Relationship between Board-Level Technology Committees and Reported Security Breaches". Journal of Information Systems 30, n.º 3 (1 de enero de 2016): 79–98. http://dx.doi.org/10.2308/isys-51402.
Texto completoGrandi, Laurie D. y Joanna R. Adler. "A Study into Breaches of Youth Justice Orders and the Young People Who Breach Them". Youth Justice 16, n.º 3 (31 de julio de 2016): 205–25. http://dx.doi.org/10.1177/1473225415618463.
Texto completoLee, Jinhyung y Sung J. Choi. "Hospital Productivity After Data Breaches: Difference-in-Differences Analysis". Journal of Medical Internet Research 23, n.º 7 (6 de julio de 2021): e26157. http://dx.doi.org/10.2196/26157.
Texto completoWang, Michael Y., Guillermo Pineiro y Praveen V. Mummaneni. "Stimulus-evoked electromyography testing of percutaneous pedicle screws for the detection of pedicle breaches: a clinical study of 409 screws in 93 patients". Journal of Neurosurgery: Spine 13, n.º 5 (noviembre de 2010): 600–605. http://dx.doi.org/10.3171/2010.5.spine09536.
Texto completoGwebu, Kholekile y Clayton W. Barrows. "Data breaches in hospitality: is the industry different?" Journal of Hospitality and Tourism Technology 11, n.º 3 (24 de agosto de 2020): 511–27. http://dx.doi.org/10.1108/jhtt-11-2019-0138.
Texto completoD'Arcy, John y Asli Basoglu. "The Influences of Public and Institutional Pressure on Firms’ Cybersecurity Disclosures". Journal of the Association for Information Systems 23, n.º 3 (2022): 779–805. http://dx.doi.org/10.17705/1jais.00740.
Texto completoHile, Jack. "Dude, Where’s My Data? The Effectiveness of Laws Governing Data Breaches in Australia". Journal of Telecommunications and the Digital Economy 9, n.º 2 (29 de junio de 2021): 47–68. http://dx.doi.org/10.18080/jtde.v9n2.381.
Texto completoCross, Cassandra, Megan Parker y Daniel Sansom. "Media discourses surrounding ‘non-ideal’ victims: The case of the Ashley Madison data breach". International Review of Victimology 25, n.º 1 (20 de febrero de 2018): 53–69. http://dx.doi.org/10.1177/0269758017752410.
Texto completoWhigham, Kerry. "States of conception: Renegotiating the mnemonic order amid crisis". Memory Studies 14, n.º 6 (diciembre de 2021): 1333–46. http://dx.doi.org/10.1177/17506980211054339.
Texto completoNeto, Nelson Novaes, Stuart Madnick, Anchises Moraes G. De Paula y Natasha Malara Borges. "Developing a Global Data Breach Database and the Challenges Encountered". Journal of Data and Information Quality 13, n.º 1 (28 de enero de 2021): 1–33. http://dx.doi.org/10.1145/3439873.
Texto completoAli, Syed Emad Azhar, Fong-Woon Lai, Ameenullah Aman, Muhammad Furquan Saleem y Salaheldin Hamad. "Do Information Security Breach and Its Factors Have a Long-Run Competitive Effect on Breached Firms’ Equity Risk?" Journal of Competitiveness 14, n.º 1 (31 de marzo de 2022): 23–42. http://dx.doi.org/10.7441/joc.2022.01.02.
Texto completoLi, You Tang, Zhi Yuan Rui y Chang Feng Yan. "Uniform Model and Fracture Criteria of Annularly Breached Bars under Bending". Key Engineering Materials 321-323 (octubre de 2006): 751–54. http://dx.doi.org/10.4028/www.scientific.net/kem.321-323.751.
Texto completoHoltfreter, Robert E. y Adrian Harrington. "Data breach trends in the United States". Journal of Financial Crime 22, n.º 2 (5 de mayo de 2015): 242–60. http://dx.doi.org/10.1108/jfc-09-2013-0055.
Texto completoKo, Dongwoo, Joongu Kang, Sungjoong Kim y Yonguk Ryu. "Experimental study on the performance analysis of river levee using new substance for improving earth surface resistance". E3S Web of Conferences 40 (2018): 03022. http://dx.doi.org/10.1051/e3sconf/20184003022.
Texto completoSeh, Adil Hussain, Mohammad Zarour, Mamdouh Alenezi, Amal Krishna Sarkar, Alka Agrawal, Rajeev Kumar y Raees Ahmad Khan. "Healthcare Data Breaches: Insights and Implications". Healthcare 8, n.º 2 (13 de mayo de 2020): 133. http://dx.doi.org/10.3390/healthcare8020133.
Texto completoAvery, Atiya. "After the disclosure: measuring the short-term and long-term impacts of data breach disclosures on the financial performance of organizations". Information & Computer Security 29, n.º 3 (8 de abril de 2021): 500–525. http://dx.doi.org/10.1108/ics-10-2020-0161.
Texto completoAivazpour, Zahra, Rohit Valecha y Rajarshi Chakraborty. "Data Breaches". ACM SIGMIS Database: the DATABASE for Advances in Information Systems 53, n.º 4 (15 de noviembre de 2022): 65–82. http://dx.doi.org/10.1145/3571823.3571829.
Texto completoKamoun, Faouzi y Mathew Nicho. "Human and Organizational Factors of Healthcare Data Breaches". International Journal of Healthcare Information Systems and Informatics 9, n.º 1 (enero de 2014): 42–60. http://dx.doi.org/10.4018/ijhisi.2014010103.
Texto completoBisogni, Fabio y Hadi Asghari. "More Than a Suspect: An Investigation into the Connection Between Data Breaches, Identity Theft, and Data Breach Notification Laws". Journal of Information Policy 10, n.º 1 (1 de mayo de 2020): 45–82. http://dx.doi.org/10.5325/jinfopoli.10.1.0045.
Texto completoHao, Jianqiang y Hongying Dai. "Social media content and sentiment analysis on consumer security breaches". Journal of Financial Crime 23, n.º 4 (3 de octubre de 2016): 855–69. http://dx.doi.org/10.1108/jfc-01-2016-0001.
Texto completoSpasenko, К. "SIGNIFICANT INVESTIGATIONS OF SITUATION AND VERSIONS IN INVESTIGATION VIOLATION OF SAFETY RULES DURING WORKS WITH HIGH-RISK". Theory and Practice of Forensic Science and Criminalistics 20, n.º 2 (4 de diciembre de 2019): 62–71. http://dx.doi.org/10.32353/khrife.2.2019.04.
Texto completoBurke, Ivan D. y Renier P. van Heerden. "The World is Polluted With Leaked Cyber Data". International Journal of Cyber Warfare and Terrorism 7, n.º 4 (octubre de 2017): 35–51. http://dx.doi.org/10.4018/ijcwt.2017100104.
Texto completoAlgarni, Abdullah M., Vijey Thayananthan y Yashwant K. Malaiya. "Quantitative Assessment of Cybersecurity Risks for Mitigating Data Breaches in Business Systems". Applied Sciences 11, n.º 8 (19 de abril de 2021): 3678. http://dx.doi.org/10.3390/app11083678.
Texto completo&NA;. "Privacy breaches". Nursing 34, n.º 9 (septiembre de 2004): 35. http://dx.doi.org/10.1097/00152193-200409000-00035.
Texto completoPham, Martin H., Joshua Bakhsheshian, Patrick C. Reid, Ian A. Buchanan, Vance L. Fredrickson y John C. Liu. "Evaluation of C2 pedicle screw placement via the freehand technique by neurosurgical trainees". Journal of Neurosurgery: Spine 29, n.º 3 (septiembre de 2018): 235–40. http://dx.doi.org/10.3171/2018.1.spine17875.
Texto completoMohammed, Zareef. "Data breach recovery areas: an exploration of organization's recovery strategies for surviving data breaches". Organizational Cybersecurity Journal: Practice, Process and People 2, n.º 1 (9 de noviembre de 2021): 41–59. http://dx.doi.org/10.1108/ocj-05-2021-0014.
Texto completoDiers-Lawson, Audra y Amelia Symons. "Mind the gap: Understanding stakeholder reactions to different types of data security". Proceedings of the International Crisis and Risk Communication Conference 3 (11 de marzo de 2020): 25–28. http://dx.doi.org/10.30658/icrcc.2020.6.
Texto completoPetrie, Nicholas. "Reforming the Remedy: Getting the Right Remedial Structure to Protect Personal Privacy". Deakin Law Review 17, n.º 1 (1 de octubre de 2012): 121. http://dx.doi.org/10.21153/dlr2012vol17no1art71.
Texto completoGaikwad, Ujjwala Nitin, Oshrika Bose, Abhishek Padhi, Atul Jindal, Keshao Nagpure, Anudita Bhargava y Padma Das. "A retrospective observational insight into COVID-19 exposures resulting from personal protective equipment (PPE) breaches". PLOS ONE 17, n.º 5 (17 de mayo de 2022): e0268582. http://dx.doi.org/10.1371/journal.pone.0268582.
Texto completoCha, Sandra E., Sung Soo Kim, Patricia Faison Hewlin y D. Scott DeRue. "Turning a Blind or Critical Eye to Leader Value Breaches: The Role of Value Congruence in Employee Perceptions of Leader Integrity". Journal of Leadership & Organizational Studies 27, n.º 3 (26 de febrero de 2020): 286–306. http://dx.doi.org/10.1177/1548051820906981.
Texto completoCanan, Mustafa, Omer Ilker Poyraz y Anthony Akil. "A Monte-Carlo Analysis of Monetary Impact of Mega Data Breaches". International Journal of Cyber Warfare and Terrorism 11, n.º 3 (julio de 2021): 58–81. http://dx.doi.org/10.4018/ijcwt.2021070105.
Texto completoSciubba, Daniel M., Joseph C. Noggle, Ananth K. Vellimana, Hassan Alosh, Matthew J. McGirt, Ziya L. Gokaslan y Jean-Paul Wolinsky. "Radiographic and clinical evaluation of free-hand placement of C-2 pedicle screws". Journal of Neurosurgery: Spine 11, n.º 1 (julio de 2009): 15–22. http://dx.doi.org/10.3171/2009.3.spine08166.
Texto completoMuir Wood, Robert y William Bateman. "Uncertainties and constraints on breaching and their implications for flood loss estimation". Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 363, n.º 1831 (15 de junio de 2005): 1423–30. http://dx.doi.org/10.1098/rsta.2005.1576.
Texto completoRisher, Paul y Stanford Gibson. "Applying Mechanistic Dam Breach Models to Historic Levee Breaches". E3S Web of Conferences 7 (2016): 03002. http://dx.doi.org/10.1051/e3sconf/20160703002.
Texto completoDonohue, Miriam L., Ross R. Moquin, Amit Singla y Blair Calancie. "Is in vivo manual palpation for thoracic pedicle screw instrumentation reliable?" Journal of Neurosurgery: Spine 20, n.º 5 (mayo de 2014): 492–96. http://dx.doi.org/10.3171/2014.1.spine13197.
Texto completoTopa, Gabriela, Mercedes Aranda-Carmena y Berta De-Maria. "Psychological Contract Breach and Outcomes: A Systematic Review of Reviews". International Journal of Environmental Research and Public Health 19, n.º 23 (23 de noviembre de 2022): 15527. http://dx.doi.org/10.3390/ijerph192315527.
Texto completoMožina, Damjan. "Raskid ugovora: Skica i Zakon o obligacionim odnosima". Anali Pravnog fakulteta u Beogradu 70, n.º 5 (29 de diciembre de 2022): 517–42. http://dx.doi.org/10.51204/anali_pfbu_22mk17a.
Texto completoSchatz, Daniel y Rabih Bashroush. "The impact of repeated data breach events on organisations’ market value". Information & Computer Security 24, n.º 1 (14 de marzo de 2016): 73–92. http://dx.doi.org/10.1108/ics-03-2014-0020.
Texto completo