Articoli di riviste sul tema "Breaches"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Breaches".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Richardson, Vernon J., Rodney E. Smith e Marcia Weidenmier Watson. "Much Ado about Nothing: The (Lack of) Economic Impact of Data Privacy Breaches". Journal of Information Systems 33, n. 3 (1 febbraio 2019): 227–65. http://dx.doi.org/10.2308/isys-52379.
Testo completoZafar, Humayun, Myung Ko e Kweku-Muata Osei-Bryson. "Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors". Information Resources Management Journal 25, n. 1 (gennaio 2012): 21–37. http://dx.doi.org/10.4018/irmj.2012010102.
Testo completoSmith, Thomas J. (Tom), Julia L. Higgs e Robert E. Pinsker. "Do Auditors Price Breach Risk in Their Audit Fees?" Journal of Information Systems 33, n. 2 (1 agosto 2018): 177–204. http://dx.doi.org/10.2308/isys-52241.
Testo completoJuma'h, Ahmad H., e Yazan Alnsour. "The effect of data breaches on company performance". International Journal of Accounting & Information Management 28, n. 2 (20 marzo 2020): 275–301. http://dx.doi.org/10.1108/ijaim-01-2019-0006.
Testo completoSaleem, Hamza, e Muhammad Naveed. "SoK: Anatomy of Data Breaches". Proceedings on Privacy Enhancing Technologies 2020, n. 4 (1 ottobre 2020): 153–74. http://dx.doi.org/10.2478/popets-2020-0067.
Testo completoJohnson, Mark, Min Jung Kang e Tolani Lawson. "Stock Price Reaction to Data Breaches". Journal of Finance Issues 16, n. 2 (31 dicembre 2017): 1–13. http://dx.doi.org/10.58886/jfi.v16i2.2263.
Testo completoWang, Tawei, Yen-Yao Wang e Ju-Chun Yen. "It's Not My Fault". Journal of Database Management 30, n. 3 (luglio 2019): 18–37. http://dx.doi.org/10.4018/jdm.2019070102.
Testo completoKude, Thomas, Hartmut Hoehle e Tracy Ann Sykes. "Big data breaches and customer compensation strategies". International Journal of Operations & Production Management 37, n. 1 (3 gennaio 2017): 56–74. http://dx.doi.org/10.1108/ijopm-03-2015-0156.
Testo completoCheng, Xu (Joyce), e Stephanie Walton. "Do Nonprofessional Investors Care About How and When Data Breaches are Disclosed?" Journal of Information Systems 33, n. 3 (1 marzo 2019): 163–82. http://dx.doi.org/10.2308/isys-52410.
Testo completoSebastian, Glorin. "Cyber Kill Chain Analysis of Five Major US Data Breaches". International Journal of Cyber Warfare and Terrorism 12, n. 1 (1 gennaio 2022): 1–15. http://dx.doi.org/10.4018/ijcwt.315651.
Testo completoMahlaola, Tintswalo B., e Barbara Van Dyk. "Reasons for Picture Archiving and Communication System (PACS) data security breaches: Intentional versus non-intentional breaches". Health SA Gesondheid 21 (11 ottobre 2016): 271–79. http://dx.doi.org/10.4102/hsag.v21i0.966.
Testo completoRaasck, Kyle, Jason Khoury, Ahmed Aoude, Benjamin Beland, Alexander Munteanu, Michael H. Weber e Jeff Golan. "The Effect of Thoracolumbar Pedicle Isthmus on Pedicle Screw Accuracy". Global Spine Journal 10, n. 4 (20 maggio 2019): 393–98. http://dx.doi.org/10.1177/2192568219850143.
Testo completoHiggs, Julia L., Robert E. Pinsker, Thomas J. Smith e George R. Young. "The Relationship between Board-Level Technology Committees and Reported Security Breaches". Journal of Information Systems 30, n. 3 (1 gennaio 2016): 79–98. http://dx.doi.org/10.2308/isys-51402.
Testo completoGrandi, Laurie D., e Joanna R. Adler. "A Study into Breaches of Youth Justice Orders and the Young People Who Breach Them". Youth Justice 16, n. 3 (31 luglio 2016): 205–25. http://dx.doi.org/10.1177/1473225415618463.
Testo completoLee, Jinhyung, e Sung J. Choi. "Hospital Productivity After Data Breaches: Difference-in-Differences Analysis". Journal of Medical Internet Research 23, n. 7 (6 luglio 2021): e26157. http://dx.doi.org/10.2196/26157.
Testo completoWang, Michael Y., Guillermo Pineiro e Praveen V. Mummaneni. "Stimulus-evoked electromyography testing of percutaneous pedicle screws for the detection of pedicle breaches: a clinical study of 409 screws in 93 patients". Journal of Neurosurgery: Spine 13, n. 5 (novembre 2010): 600–605. http://dx.doi.org/10.3171/2010.5.spine09536.
Testo completoGwebu, Kholekile, e Clayton W. Barrows. "Data breaches in hospitality: is the industry different?" Journal of Hospitality and Tourism Technology 11, n. 3 (24 agosto 2020): 511–27. http://dx.doi.org/10.1108/jhtt-11-2019-0138.
Testo completoD'Arcy, John, e Asli Basoglu. "The Influences of Public and Institutional Pressure on Firms’ Cybersecurity Disclosures". Journal of the Association for Information Systems 23, n. 3 (2022): 779–805. http://dx.doi.org/10.17705/1jais.00740.
Testo completoHile, Jack. "Dude, Where’s My Data? The Effectiveness of Laws Governing Data Breaches in Australia". Journal of Telecommunications and the Digital Economy 9, n. 2 (29 giugno 2021): 47–68. http://dx.doi.org/10.18080/jtde.v9n2.381.
Testo completoCross, Cassandra, Megan Parker e Daniel Sansom. "Media discourses surrounding ‘non-ideal’ victims: The case of the Ashley Madison data breach". International Review of Victimology 25, n. 1 (20 febbraio 2018): 53–69. http://dx.doi.org/10.1177/0269758017752410.
Testo completoWhigham, Kerry. "States of conception: Renegotiating the mnemonic order amid crisis". Memory Studies 14, n. 6 (dicembre 2021): 1333–46. http://dx.doi.org/10.1177/17506980211054339.
Testo completoNeto, Nelson Novaes, Stuart Madnick, Anchises Moraes G. De Paula e Natasha Malara Borges. "Developing a Global Data Breach Database and the Challenges Encountered". Journal of Data and Information Quality 13, n. 1 (28 gennaio 2021): 1–33. http://dx.doi.org/10.1145/3439873.
Testo completoAli, Syed Emad Azhar, Fong-Woon Lai, Ameenullah Aman, Muhammad Furquan Saleem e Salaheldin Hamad. "Do Information Security Breach and Its Factors Have a Long-Run Competitive Effect on Breached Firms’ Equity Risk?" Journal of Competitiveness 14, n. 1 (31 marzo 2022): 23–42. http://dx.doi.org/10.7441/joc.2022.01.02.
Testo completoLi, You Tang, Zhi Yuan Rui e Chang Feng Yan. "Uniform Model and Fracture Criteria of Annularly Breached Bars under Bending". Key Engineering Materials 321-323 (ottobre 2006): 751–54. http://dx.doi.org/10.4028/www.scientific.net/kem.321-323.751.
Testo completoHoltfreter, Robert E., e Adrian Harrington. "Data breach trends in the United States". Journal of Financial Crime 22, n. 2 (5 maggio 2015): 242–60. http://dx.doi.org/10.1108/jfc-09-2013-0055.
Testo completoKo, Dongwoo, Joongu Kang, Sungjoong Kim e Yonguk Ryu. "Experimental study on the performance analysis of river levee using new substance for improving earth surface resistance". E3S Web of Conferences 40 (2018): 03022. http://dx.doi.org/10.1051/e3sconf/20184003022.
Testo completoSeh, Adil Hussain, Mohammad Zarour, Mamdouh Alenezi, Amal Krishna Sarkar, Alka Agrawal, Rajeev Kumar e Raees Ahmad Khan. "Healthcare Data Breaches: Insights and Implications". Healthcare 8, n. 2 (13 maggio 2020): 133. http://dx.doi.org/10.3390/healthcare8020133.
Testo completoAvery, Atiya. "After the disclosure: measuring the short-term and long-term impacts of data breach disclosures on the financial performance of organizations". Information & Computer Security 29, n. 3 (8 aprile 2021): 500–525. http://dx.doi.org/10.1108/ics-10-2020-0161.
Testo completoAivazpour, Zahra, Rohit Valecha e Rajarshi Chakraborty. "Data Breaches". ACM SIGMIS Database: the DATABASE for Advances in Information Systems 53, n. 4 (15 novembre 2022): 65–82. http://dx.doi.org/10.1145/3571823.3571829.
Testo completoKamoun, Faouzi, e Mathew Nicho. "Human and Organizational Factors of Healthcare Data Breaches". International Journal of Healthcare Information Systems and Informatics 9, n. 1 (gennaio 2014): 42–60. http://dx.doi.org/10.4018/ijhisi.2014010103.
Testo completoBisogni, Fabio, e Hadi Asghari. "More Than a Suspect: An Investigation into the Connection Between Data Breaches, Identity Theft, and Data Breach Notification Laws". Journal of Information Policy 10, n. 1 (1 maggio 2020): 45–82. http://dx.doi.org/10.5325/jinfopoli.10.1.0045.
Testo completoHao, Jianqiang, e Hongying Dai. "Social media content and sentiment analysis on consumer security breaches". Journal of Financial Crime 23, n. 4 (3 ottobre 2016): 855–69. http://dx.doi.org/10.1108/jfc-01-2016-0001.
Testo completoSpasenko, К. "SIGNIFICANT INVESTIGATIONS OF SITUATION AND VERSIONS IN INVESTIGATION VIOLATION OF SAFETY RULES DURING WORKS WITH HIGH-RISK". Theory and Practice of Forensic Science and Criminalistics 20, n. 2 (4 dicembre 2019): 62–71. http://dx.doi.org/10.32353/khrife.2.2019.04.
Testo completoBurke, Ivan D., e Renier P. van Heerden. "The World is Polluted With Leaked Cyber Data". International Journal of Cyber Warfare and Terrorism 7, n. 4 (ottobre 2017): 35–51. http://dx.doi.org/10.4018/ijcwt.2017100104.
Testo completoAlgarni, Abdullah M., Vijey Thayananthan e Yashwant K. Malaiya. "Quantitative Assessment of Cybersecurity Risks for Mitigating Data Breaches in Business Systems". Applied Sciences 11, n. 8 (19 aprile 2021): 3678. http://dx.doi.org/10.3390/app11083678.
Testo completo&NA;. "Privacy breaches". Nursing 34, n. 9 (settembre 2004): 35. http://dx.doi.org/10.1097/00152193-200409000-00035.
Testo completoPham, Martin H., Joshua Bakhsheshian, Patrick C. Reid, Ian A. Buchanan, Vance L. Fredrickson e John C. Liu. "Evaluation of C2 pedicle screw placement via the freehand technique by neurosurgical trainees". Journal of Neurosurgery: Spine 29, n. 3 (settembre 2018): 235–40. http://dx.doi.org/10.3171/2018.1.spine17875.
Testo completoMohammed, Zareef. "Data breach recovery areas: an exploration of organization's recovery strategies for surviving data breaches". Organizational Cybersecurity Journal: Practice, Process and People 2, n. 1 (9 novembre 2021): 41–59. http://dx.doi.org/10.1108/ocj-05-2021-0014.
Testo completoDiers-Lawson, Audra, e Amelia Symons. "Mind the gap: Understanding stakeholder reactions to different types of data security". Proceedings of the International Crisis and Risk Communication Conference 3 (11 marzo 2020): 25–28. http://dx.doi.org/10.30658/icrcc.2020.6.
Testo completoPetrie, Nicholas. "Reforming the Remedy: Getting the Right Remedial Structure to Protect Personal Privacy". Deakin Law Review 17, n. 1 (1 ottobre 2012): 121. http://dx.doi.org/10.21153/dlr2012vol17no1art71.
Testo completoGaikwad, Ujjwala Nitin, Oshrika Bose, Abhishek Padhi, Atul Jindal, Keshao Nagpure, Anudita Bhargava e Padma Das. "A retrospective observational insight into COVID-19 exposures resulting from personal protective equipment (PPE) breaches". PLOS ONE 17, n. 5 (17 maggio 2022): e0268582. http://dx.doi.org/10.1371/journal.pone.0268582.
Testo completoCha, Sandra E., Sung Soo Kim, Patricia Faison Hewlin e D. Scott DeRue. "Turning a Blind or Critical Eye to Leader Value Breaches: The Role of Value Congruence in Employee Perceptions of Leader Integrity". Journal of Leadership & Organizational Studies 27, n. 3 (26 febbraio 2020): 286–306. http://dx.doi.org/10.1177/1548051820906981.
Testo completoCanan, Mustafa, Omer Ilker Poyraz e Anthony Akil. "A Monte-Carlo Analysis of Monetary Impact of Mega Data Breaches". International Journal of Cyber Warfare and Terrorism 11, n. 3 (luglio 2021): 58–81. http://dx.doi.org/10.4018/ijcwt.2021070105.
Testo completoSciubba, Daniel M., Joseph C. Noggle, Ananth K. Vellimana, Hassan Alosh, Matthew J. McGirt, Ziya L. Gokaslan e Jean-Paul Wolinsky. "Radiographic and clinical evaluation of free-hand placement of C-2 pedicle screws". Journal of Neurosurgery: Spine 11, n. 1 (luglio 2009): 15–22. http://dx.doi.org/10.3171/2009.3.spine08166.
Testo completoMuir Wood, Robert, e William Bateman. "Uncertainties and constraints on breaching and their implications for flood loss estimation". Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 363, n. 1831 (15 giugno 2005): 1423–30. http://dx.doi.org/10.1098/rsta.2005.1576.
Testo completoRisher, Paul, e Stanford Gibson. "Applying Mechanistic Dam Breach Models to Historic Levee Breaches". E3S Web of Conferences 7 (2016): 03002. http://dx.doi.org/10.1051/e3sconf/20160703002.
Testo completoDonohue, Miriam L., Ross R. Moquin, Amit Singla e Blair Calancie. "Is in vivo manual palpation for thoracic pedicle screw instrumentation reliable?" Journal of Neurosurgery: Spine 20, n. 5 (maggio 2014): 492–96. http://dx.doi.org/10.3171/2014.1.spine13197.
Testo completoTopa, Gabriela, Mercedes Aranda-Carmena e Berta De-Maria. "Psychological Contract Breach and Outcomes: A Systematic Review of Reviews". International Journal of Environmental Research and Public Health 19, n. 23 (23 novembre 2022): 15527. http://dx.doi.org/10.3390/ijerph192315527.
Testo completoMožina, Damjan. "Raskid ugovora: Skica i Zakon o obligacionim odnosima". Anali Pravnog fakulteta u Beogradu 70, n. 5 (29 dicembre 2022): 517–42. http://dx.doi.org/10.51204/anali_pfbu_22mk17a.
Testo completoSchatz, Daniel, e Rabih Bashroush. "The impact of repeated data breach events on organisations’ market value". Information & Computer Security 24, n. 1 (14 marzo 2016): 73–92. http://dx.doi.org/10.1108/ics-03-2014-0020.
Testo completo