Artykuły w czasopismach na temat „Breaches”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Breaches”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Richardson, Vernon J., Rodney E. Smith i Marcia Weidenmier Watson. "Much Ado about Nothing: The (Lack of) Economic Impact of Data Privacy Breaches". Journal of Information Systems 33, nr 3 (1.02.2019): 227–65. http://dx.doi.org/10.2308/isys-52379.
Pełny tekst źródłaZafar, Humayun, Myung Ko i Kweku-Muata Osei-Bryson. "Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors". Information Resources Management Journal 25, nr 1 (styczeń 2012): 21–37. http://dx.doi.org/10.4018/irmj.2012010102.
Pełny tekst źródłaSmith, Thomas J. (Tom), Julia L. Higgs i Robert E. Pinsker. "Do Auditors Price Breach Risk in Their Audit Fees?" Journal of Information Systems 33, nr 2 (1.08.2018): 177–204. http://dx.doi.org/10.2308/isys-52241.
Pełny tekst źródłaJuma'h, Ahmad H., i Yazan Alnsour. "The effect of data breaches on company performance". International Journal of Accounting & Information Management 28, nr 2 (20.03.2020): 275–301. http://dx.doi.org/10.1108/ijaim-01-2019-0006.
Pełny tekst źródłaSaleem, Hamza, i Muhammad Naveed. "SoK: Anatomy of Data Breaches". Proceedings on Privacy Enhancing Technologies 2020, nr 4 (1.10.2020): 153–74. http://dx.doi.org/10.2478/popets-2020-0067.
Pełny tekst źródłaJohnson, Mark, Min Jung Kang i Tolani Lawson. "Stock Price Reaction to Data Breaches". Journal of Finance Issues 16, nr 2 (31.12.2017): 1–13. http://dx.doi.org/10.58886/jfi.v16i2.2263.
Pełny tekst źródłaWang, Tawei, Yen-Yao Wang i Ju-Chun Yen. "It's Not My Fault". Journal of Database Management 30, nr 3 (lipiec 2019): 18–37. http://dx.doi.org/10.4018/jdm.2019070102.
Pełny tekst źródłaKude, Thomas, Hartmut Hoehle i Tracy Ann Sykes. "Big data breaches and customer compensation strategies". International Journal of Operations & Production Management 37, nr 1 (3.01.2017): 56–74. http://dx.doi.org/10.1108/ijopm-03-2015-0156.
Pełny tekst źródłaCheng, Xu (Joyce), i Stephanie Walton. "Do Nonprofessional Investors Care About How and When Data Breaches are Disclosed?" Journal of Information Systems 33, nr 3 (1.03.2019): 163–82. http://dx.doi.org/10.2308/isys-52410.
Pełny tekst źródłaSebastian, Glorin. "Cyber Kill Chain Analysis of Five Major US Data Breaches". International Journal of Cyber Warfare and Terrorism 12, nr 1 (1.01.2022): 1–15. http://dx.doi.org/10.4018/ijcwt.315651.
Pełny tekst źródłaMahlaola, Tintswalo B., i Barbara Van Dyk. "Reasons for Picture Archiving and Communication System (PACS) data security breaches: Intentional versus non-intentional breaches". Health SA Gesondheid 21 (11.10.2016): 271–79. http://dx.doi.org/10.4102/hsag.v21i0.966.
Pełny tekst źródłaRaasck, Kyle, Jason Khoury, Ahmed Aoude, Benjamin Beland, Alexander Munteanu, Michael H. Weber i Jeff Golan. "The Effect of Thoracolumbar Pedicle Isthmus on Pedicle Screw Accuracy". Global Spine Journal 10, nr 4 (20.05.2019): 393–98. http://dx.doi.org/10.1177/2192568219850143.
Pełny tekst źródłaHiggs, Julia L., Robert E. Pinsker, Thomas J. Smith i George R. Young. "The Relationship between Board-Level Technology Committees and Reported Security Breaches". Journal of Information Systems 30, nr 3 (1.01.2016): 79–98. http://dx.doi.org/10.2308/isys-51402.
Pełny tekst źródłaGrandi, Laurie D., i Joanna R. Adler. "A Study into Breaches of Youth Justice Orders and the Young People Who Breach Them". Youth Justice 16, nr 3 (31.07.2016): 205–25. http://dx.doi.org/10.1177/1473225415618463.
Pełny tekst źródłaLee, Jinhyung, i Sung J. Choi. "Hospital Productivity After Data Breaches: Difference-in-Differences Analysis". Journal of Medical Internet Research 23, nr 7 (6.07.2021): e26157. http://dx.doi.org/10.2196/26157.
Pełny tekst źródłaWang, Michael Y., Guillermo Pineiro i Praveen V. Mummaneni. "Stimulus-evoked electromyography testing of percutaneous pedicle screws for the detection of pedicle breaches: a clinical study of 409 screws in 93 patients". Journal of Neurosurgery: Spine 13, nr 5 (listopad 2010): 600–605. http://dx.doi.org/10.3171/2010.5.spine09536.
Pełny tekst źródłaGwebu, Kholekile, i Clayton W. Barrows. "Data breaches in hospitality: is the industry different?" Journal of Hospitality and Tourism Technology 11, nr 3 (24.08.2020): 511–27. http://dx.doi.org/10.1108/jhtt-11-2019-0138.
Pełny tekst źródłaD'Arcy, John, i Asli Basoglu. "The Influences of Public and Institutional Pressure on Firms’ Cybersecurity Disclosures". Journal of the Association for Information Systems 23, nr 3 (2022): 779–805. http://dx.doi.org/10.17705/1jais.00740.
Pełny tekst źródłaHile, Jack. "Dude, Where’s My Data? The Effectiveness of Laws Governing Data Breaches in Australia". Journal of Telecommunications and the Digital Economy 9, nr 2 (29.06.2021): 47–68. http://dx.doi.org/10.18080/jtde.v9n2.381.
Pełny tekst źródłaCross, Cassandra, Megan Parker i Daniel Sansom. "Media discourses surrounding ‘non-ideal’ victims: The case of the Ashley Madison data breach". International Review of Victimology 25, nr 1 (20.02.2018): 53–69. http://dx.doi.org/10.1177/0269758017752410.
Pełny tekst źródłaWhigham, Kerry. "States of conception: Renegotiating the mnemonic order amid crisis". Memory Studies 14, nr 6 (grudzień 2021): 1333–46. http://dx.doi.org/10.1177/17506980211054339.
Pełny tekst źródłaNeto, Nelson Novaes, Stuart Madnick, Anchises Moraes G. De Paula i Natasha Malara Borges. "Developing a Global Data Breach Database and the Challenges Encountered". Journal of Data and Information Quality 13, nr 1 (28.01.2021): 1–33. http://dx.doi.org/10.1145/3439873.
Pełny tekst źródłaAli, Syed Emad Azhar, Fong-Woon Lai, Ameenullah Aman, Muhammad Furquan Saleem i Salaheldin Hamad. "Do Information Security Breach and Its Factors Have a Long-Run Competitive Effect on Breached Firms’ Equity Risk?" Journal of Competitiveness 14, nr 1 (31.03.2022): 23–42. http://dx.doi.org/10.7441/joc.2022.01.02.
Pełny tekst źródłaLi, You Tang, Zhi Yuan Rui i Chang Feng Yan. "Uniform Model and Fracture Criteria of Annularly Breached Bars under Bending". Key Engineering Materials 321-323 (październik 2006): 751–54. http://dx.doi.org/10.4028/www.scientific.net/kem.321-323.751.
Pełny tekst źródłaHoltfreter, Robert E., i Adrian Harrington. "Data breach trends in the United States". Journal of Financial Crime 22, nr 2 (5.05.2015): 242–60. http://dx.doi.org/10.1108/jfc-09-2013-0055.
Pełny tekst źródłaKo, Dongwoo, Joongu Kang, Sungjoong Kim i Yonguk Ryu. "Experimental study on the performance analysis of river levee using new substance for improving earth surface resistance". E3S Web of Conferences 40 (2018): 03022. http://dx.doi.org/10.1051/e3sconf/20184003022.
Pełny tekst źródłaSeh, Adil Hussain, Mohammad Zarour, Mamdouh Alenezi, Amal Krishna Sarkar, Alka Agrawal, Rajeev Kumar i Raees Ahmad Khan. "Healthcare Data Breaches: Insights and Implications". Healthcare 8, nr 2 (13.05.2020): 133. http://dx.doi.org/10.3390/healthcare8020133.
Pełny tekst źródłaAvery, Atiya. "After the disclosure: measuring the short-term and long-term impacts of data breach disclosures on the financial performance of organizations". Information & Computer Security 29, nr 3 (8.04.2021): 500–525. http://dx.doi.org/10.1108/ics-10-2020-0161.
Pełny tekst źródłaAivazpour, Zahra, Rohit Valecha i Rajarshi Chakraborty. "Data Breaches". ACM SIGMIS Database: the DATABASE for Advances in Information Systems 53, nr 4 (15.11.2022): 65–82. http://dx.doi.org/10.1145/3571823.3571829.
Pełny tekst źródłaKamoun, Faouzi, i Mathew Nicho. "Human and Organizational Factors of Healthcare Data Breaches". International Journal of Healthcare Information Systems and Informatics 9, nr 1 (styczeń 2014): 42–60. http://dx.doi.org/10.4018/ijhisi.2014010103.
Pełny tekst źródłaBisogni, Fabio, i Hadi Asghari. "More Than a Suspect: An Investigation into the Connection Between Data Breaches, Identity Theft, and Data Breach Notification Laws". Journal of Information Policy 10, nr 1 (1.05.2020): 45–82. http://dx.doi.org/10.5325/jinfopoli.10.1.0045.
Pełny tekst źródłaHao, Jianqiang, i Hongying Dai. "Social media content and sentiment analysis on consumer security breaches". Journal of Financial Crime 23, nr 4 (3.10.2016): 855–69. http://dx.doi.org/10.1108/jfc-01-2016-0001.
Pełny tekst źródłaSpasenko, К. "SIGNIFICANT INVESTIGATIONS OF SITUATION AND VERSIONS IN INVESTIGATION VIOLATION OF SAFETY RULES DURING WORKS WITH HIGH-RISK". Theory and Practice of Forensic Science and Criminalistics 20, nr 2 (4.12.2019): 62–71. http://dx.doi.org/10.32353/khrife.2.2019.04.
Pełny tekst źródłaBurke, Ivan D., i Renier P. van Heerden. "The World is Polluted With Leaked Cyber Data". International Journal of Cyber Warfare and Terrorism 7, nr 4 (październik 2017): 35–51. http://dx.doi.org/10.4018/ijcwt.2017100104.
Pełny tekst źródłaAlgarni, Abdullah M., Vijey Thayananthan i Yashwant K. Malaiya. "Quantitative Assessment of Cybersecurity Risks for Mitigating Data Breaches in Business Systems". Applied Sciences 11, nr 8 (19.04.2021): 3678. http://dx.doi.org/10.3390/app11083678.
Pełny tekst źródła&NA;. "Privacy breaches". Nursing 34, nr 9 (wrzesień 2004): 35. http://dx.doi.org/10.1097/00152193-200409000-00035.
Pełny tekst źródłaPham, Martin H., Joshua Bakhsheshian, Patrick C. Reid, Ian A. Buchanan, Vance L. Fredrickson i John C. Liu. "Evaluation of C2 pedicle screw placement via the freehand technique by neurosurgical trainees". Journal of Neurosurgery: Spine 29, nr 3 (wrzesień 2018): 235–40. http://dx.doi.org/10.3171/2018.1.spine17875.
Pełny tekst źródłaMohammed, Zareef. "Data breach recovery areas: an exploration of organization's recovery strategies for surviving data breaches". Organizational Cybersecurity Journal: Practice, Process and People 2, nr 1 (9.11.2021): 41–59. http://dx.doi.org/10.1108/ocj-05-2021-0014.
Pełny tekst źródłaDiers-Lawson, Audra, i Amelia Symons. "Mind the gap: Understanding stakeholder reactions to different types of data security". Proceedings of the International Crisis and Risk Communication Conference 3 (11.03.2020): 25–28. http://dx.doi.org/10.30658/icrcc.2020.6.
Pełny tekst źródłaPetrie, Nicholas. "Reforming the Remedy: Getting the Right Remedial Structure to Protect Personal Privacy". Deakin Law Review 17, nr 1 (1.10.2012): 121. http://dx.doi.org/10.21153/dlr2012vol17no1art71.
Pełny tekst źródłaGaikwad, Ujjwala Nitin, Oshrika Bose, Abhishek Padhi, Atul Jindal, Keshao Nagpure, Anudita Bhargava i Padma Das. "A retrospective observational insight into COVID-19 exposures resulting from personal protective equipment (PPE) breaches". PLOS ONE 17, nr 5 (17.05.2022): e0268582. http://dx.doi.org/10.1371/journal.pone.0268582.
Pełny tekst źródłaCha, Sandra E., Sung Soo Kim, Patricia Faison Hewlin i D. Scott DeRue. "Turning a Blind or Critical Eye to Leader Value Breaches: The Role of Value Congruence in Employee Perceptions of Leader Integrity". Journal of Leadership & Organizational Studies 27, nr 3 (26.02.2020): 286–306. http://dx.doi.org/10.1177/1548051820906981.
Pełny tekst źródłaCanan, Mustafa, Omer Ilker Poyraz i Anthony Akil. "A Monte-Carlo Analysis of Monetary Impact of Mega Data Breaches". International Journal of Cyber Warfare and Terrorism 11, nr 3 (lipiec 2021): 58–81. http://dx.doi.org/10.4018/ijcwt.2021070105.
Pełny tekst źródłaSciubba, Daniel M., Joseph C. Noggle, Ananth K. Vellimana, Hassan Alosh, Matthew J. McGirt, Ziya L. Gokaslan i Jean-Paul Wolinsky. "Radiographic and clinical evaluation of free-hand placement of C-2 pedicle screws". Journal of Neurosurgery: Spine 11, nr 1 (lipiec 2009): 15–22. http://dx.doi.org/10.3171/2009.3.spine08166.
Pełny tekst źródłaMuir Wood, Robert, i William Bateman. "Uncertainties and constraints on breaching and their implications for flood loss estimation". Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 363, nr 1831 (15.06.2005): 1423–30. http://dx.doi.org/10.1098/rsta.2005.1576.
Pełny tekst źródłaRisher, Paul, i Stanford Gibson. "Applying Mechanistic Dam Breach Models to Historic Levee Breaches". E3S Web of Conferences 7 (2016): 03002. http://dx.doi.org/10.1051/e3sconf/20160703002.
Pełny tekst źródłaDonohue, Miriam L., Ross R. Moquin, Amit Singla i Blair Calancie. "Is in vivo manual palpation for thoracic pedicle screw instrumentation reliable?" Journal of Neurosurgery: Spine 20, nr 5 (maj 2014): 492–96. http://dx.doi.org/10.3171/2014.1.spine13197.
Pełny tekst źródłaTopa, Gabriela, Mercedes Aranda-Carmena i Berta De-Maria. "Psychological Contract Breach and Outcomes: A Systematic Review of Reviews". International Journal of Environmental Research and Public Health 19, nr 23 (23.11.2022): 15527. http://dx.doi.org/10.3390/ijerph192315527.
Pełny tekst źródłaMožina, Damjan. "Raskid ugovora: Skica i Zakon o obligacionim odnosima". Anali Pravnog fakulteta u Beogradu 70, nr 5 (29.12.2022): 517–42. http://dx.doi.org/10.51204/anali_pfbu_22mk17a.
Pełny tekst źródłaSchatz, Daniel, i Rabih Bashroush. "The impact of repeated data breach events on organisations’ market value". Information & Computer Security 24, nr 1 (14.03.2016): 73–92. http://dx.doi.org/10.1108/ics-03-2014-0020.
Pełny tekst źródła