Artigos de revistas sobre o tema "Breaches"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Breaches".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Richardson, Vernon J., Rodney E. Smith e Marcia Weidenmier Watson. "Much Ado about Nothing: The (Lack of) Economic Impact of Data Privacy Breaches". Journal of Information Systems 33, n.º 3 (1 de fevereiro de 2019): 227–65. http://dx.doi.org/10.2308/isys-52379.
Texto completo da fonteZafar, Humayun, Myung Ko e Kweku-Muata Osei-Bryson. "Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors". Information Resources Management Journal 25, n.º 1 (janeiro de 2012): 21–37. http://dx.doi.org/10.4018/irmj.2012010102.
Texto completo da fonteSmith, Thomas J. (Tom), Julia L. Higgs e Robert E. Pinsker. "Do Auditors Price Breach Risk in Their Audit Fees?" Journal of Information Systems 33, n.º 2 (1 de agosto de 2018): 177–204. http://dx.doi.org/10.2308/isys-52241.
Texto completo da fonteJuma'h, Ahmad H., e Yazan Alnsour. "The effect of data breaches on company performance". International Journal of Accounting & Information Management 28, n.º 2 (20 de março de 2020): 275–301. http://dx.doi.org/10.1108/ijaim-01-2019-0006.
Texto completo da fonteSaleem, Hamza, e Muhammad Naveed. "SoK: Anatomy of Data Breaches". Proceedings on Privacy Enhancing Technologies 2020, n.º 4 (1 de outubro de 2020): 153–74. http://dx.doi.org/10.2478/popets-2020-0067.
Texto completo da fonteJohnson, Mark, Min Jung Kang e Tolani Lawson. "Stock Price Reaction to Data Breaches". Journal of Finance Issues 16, n.º 2 (31 de dezembro de 2017): 1–13. http://dx.doi.org/10.58886/jfi.v16i2.2263.
Texto completo da fonteWang, Tawei, Yen-Yao Wang e Ju-Chun Yen. "It's Not My Fault". Journal of Database Management 30, n.º 3 (julho de 2019): 18–37. http://dx.doi.org/10.4018/jdm.2019070102.
Texto completo da fonteKude, Thomas, Hartmut Hoehle e Tracy Ann Sykes. "Big data breaches and customer compensation strategies". International Journal of Operations & Production Management 37, n.º 1 (3 de janeiro de 2017): 56–74. http://dx.doi.org/10.1108/ijopm-03-2015-0156.
Texto completo da fonteCheng, Xu (Joyce), e Stephanie Walton. "Do Nonprofessional Investors Care About How and When Data Breaches are Disclosed?" Journal of Information Systems 33, n.º 3 (1 de março de 2019): 163–82. http://dx.doi.org/10.2308/isys-52410.
Texto completo da fonteSebastian, Glorin. "Cyber Kill Chain Analysis of Five Major US Data Breaches". International Journal of Cyber Warfare and Terrorism 12, n.º 1 (1 de janeiro de 2022): 1–15. http://dx.doi.org/10.4018/ijcwt.315651.
Texto completo da fonteMahlaola, Tintswalo B., e Barbara Van Dyk. "Reasons for Picture Archiving and Communication System (PACS) data security breaches: Intentional versus non-intentional breaches". Health SA Gesondheid 21 (11 de outubro de 2016): 271–79. http://dx.doi.org/10.4102/hsag.v21i0.966.
Texto completo da fonteRaasck, Kyle, Jason Khoury, Ahmed Aoude, Benjamin Beland, Alexander Munteanu, Michael H. Weber e Jeff Golan. "The Effect of Thoracolumbar Pedicle Isthmus on Pedicle Screw Accuracy". Global Spine Journal 10, n.º 4 (20 de maio de 2019): 393–98. http://dx.doi.org/10.1177/2192568219850143.
Texto completo da fonteHiggs, Julia L., Robert E. Pinsker, Thomas J. Smith e George R. Young. "The Relationship between Board-Level Technology Committees and Reported Security Breaches". Journal of Information Systems 30, n.º 3 (1 de janeiro de 2016): 79–98. http://dx.doi.org/10.2308/isys-51402.
Texto completo da fonteGrandi, Laurie D., e Joanna R. Adler. "A Study into Breaches of Youth Justice Orders and the Young People Who Breach Them". Youth Justice 16, n.º 3 (31 de julho de 2016): 205–25. http://dx.doi.org/10.1177/1473225415618463.
Texto completo da fonteLee, Jinhyung, e Sung J. Choi. "Hospital Productivity After Data Breaches: Difference-in-Differences Analysis". Journal of Medical Internet Research 23, n.º 7 (6 de julho de 2021): e26157. http://dx.doi.org/10.2196/26157.
Texto completo da fonteWang, Michael Y., Guillermo Pineiro e Praveen V. Mummaneni. "Stimulus-evoked electromyography testing of percutaneous pedicle screws for the detection of pedicle breaches: a clinical study of 409 screws in 93 patients". Journal of Neurosurgery: Spine 13, n.º 5 (novembro de 2010): 600–605. http://dx.doi.org/10.3171/2010.5.spine09536.
Texto completo da fonteGwebu, Kholekile, e Clayton W. Barrows. "Data breaches in hospitality: is the industry different?" Journal of Hospitality and Tourism Technology 11, n.º 3 (24 de agosto de 2020): 511–27. http://dx.doi.org/10.1108/jhtt-11-2019-0138.
Texto completo da fonteD'Arcy, John, e Asli Basoglu. "The Influences of Public and Institutional Pressure on Firms’ Cybersecurity Disclosures". Journal of the Association for Information Systems 23, n.º 3 (2022): 779–805. http://dx.doi.org/10.17705/1jais.00740.
Texto completo da fonteHile, Jack. "Dude, Where’s My Data? The Effectiveness of Laws Governing Data Breaches in Australia". Journal of Telecommunications and the Digital Economy 9, n.º 2 (29 de junho de 2021): 47–68. http://dx.doi.org/10.18080/jtde.v9n2.381.
Texto completo da fonteCross, Cassandra, Megan Parker e Daniel Sansom. "Media discourses surrounding ‘non-ideal’ victims: The case of the Ashley Madison data breach". International Review of Victimology 25, n.º 1 (20 de fevereiro de 2018): 53–69. http://dx.doi.org/10.1177/0269758017752410.
Texto completo da fonteWhigham, Kerry. "States of conception: Renegotiating the mnemonic order amid crisis". Memory Studies 14, n.º 6 (dezembro de 2021): 1333–46. http://dx.doi.org/10.1177/17506980211054339.
Texto completo da fonteNeto, Nelson Novaes, Stuart Madnick, Anchises Moraes G. De Paula e Natasha Malara Borges. "Developing a Global Data Breach Database and the Challenges Encountered". Journal of Data and Information Quality 13, n.º 1 (28 de janeiro de 2021): 1–33. http://dx.doi.org/10.1145/3439873.
Texto completo da fonteAli, Syed Emad Azhar, Fong-Woon Lai, Ameenullah Aman, Muhammad Furquan Saleem e Salaheldin Hamad. "Do Information Security Breach and Its Factors Have a Long-Run Competitive Effect on Breached Firms’ Equity Risk?" Journal of Competitiveness 14, n.º 1 (31 de março de 2022): 23–42. http://dx.doi.org/10.7441/joc.2022.01.02.
Texto completo da fonteLi, You Tang, Zhi Yuan Rui e Chang Feng Yan. "Uniform Model and Fracture Criteria of Annularly Breached Bars under Bending". Key Engineering Materials 321-323 (outubro de 2006): 751–54. http://dx.doi.org/10.4028/www.scientific.net/kem.321-323.751.
Texto completo da fonteHoltfreter, Robert E., e Adrian Harrington. "Data breach trends in the United States". Journal of Financial Crime 22, n.º 2 (5 de maio de 2015): 242–60. http://dx.doi.org/10.1108/jfc-09-2013-0055.
Texto completo da fonteKo, Dongwoo, Joongu Kang, Sungjoong Kim e Yonguk Ryu. "Experimental study on the performance analysis of river levee using new substance for improving earth surface resistance". E3S Web of Conferences 40 (2018): 03022. http://dx.doi.org/10.1051/e3sconf/20184003022.
Texto completo da fonteSeh, Adil Hussain, Mohammad Zarour, Mamdouh Alenezi, Amal Krishna Sarkar, Alka Agrawal, Rajeev Kumar e Raees Ahmad Khan. "Healthcare Data Breaches: Insights and Implications". Healthcare 8, n.º 2 (13 de maio de 2020): 133. http://dx.doi.org/10.3390/healthcare8020133.
Texto completo da fonteAvery, Atiya. "After the disclosure: measuring the short-term and long-term impacts of data breach disclosures on the financial performance of organizations". Information & Computer Security 29, n.º 3 (8 de abril de 2021): 500–525. http://dx.doi.org/10.1108/ics-10-2020-0161.
Texto completo da fonteAivazpour, Zahra, Rohit Valecha e Rajarshi Chakraborty. "Data Breaches". ACM SIGMIS Database: the DATABASE for Advances in Information Systems 53, n.º 4 (15 de novembro de 2022): 65–82. http://dx.doi.org/10.1145/3571823.3571829.
Texto completo da fonteKamoun, Faouzi, e Mathew Nicho. "Human and Organizational Factors of Healthcare Data Breaches". International Journal of Healthcare Information Systems and Informatics 9, n.º 1 (janeiro de 2014): 42–60. http://dx.doi.org/10.4018/ijhisi.2014010103.
Texto completo da fonteBisogni, Fabio, e Hadi Asghari. "More Than a Suspect: An Investigation into the Connection Between Data Breaches, Identity Theft, and Data Breach Notification Laws". Journal of Information Policy 10, n.º 1 (1 de maio de 2020): 45–82. http://dx.doi.org/10.5325/jinfopoli.10.1.0045.
Texto completo da fonteHao, Jianqiang, e Hongying Dai. "Social media content and sentiment analysis on consumer security breaches". Journal of Financial Crime 23, n.º 4 (3 de outubro de 2016): 855–69. http://dx.doi.org/10.1108/jfc-01-2016-0001.
Texto completo da fonteSpasenko, К. "SIGNIFICANT INVESTIGATIONS OF SITUATION AND VERSIONS IN INVESTIGATION VIOLATION OF SAFETY RULES DURING WORKS WITH HIGH-RISK". Theory and Practice of Forensic Science and Criminalistics 20, n.º 2 (4 de dezembro de 2019): 62–71. http://dx.doi.org/10.32353/khrife.2.2019.04.
Texto completo da fonteBurke, Ivan D., e Renier P. van Heerden. "The World is Polluted With Leaked Cyber Data". International Journal of Cyber Warfare and Terrorism 7, n.º 4 (outubro de 2017): 35–51. http://dx.doi.org/10.4018/ijcwt.2017100104.
Texto completo da fonteAlgarni, Abdullah M., Vijey Thayananthan e Yashwant K. Malaiya. "Quantitative Assessment of Cybersecurity Risks for Mitigating Data Breaches in Business Systems". Applied Sciences 11, n.º 8 (19 de abril de 2021): 3678. http://dx.doi.org/10.3390/app11083678.
Texto completo da fonte&NA;. "Privacy breaches". Nursing 34, n.º 9 (setembro de 2004): 35. http://dx.doi.org/10.1097/00152193-200409000-00035.
Texto completo da fontePham, Martin H., Joshua Bakhsheshian, Patrick C. Reid, Ian A. Buchanan, Vance L. Fredrickson e John C. Liu. "Evaluation of C2 pedicle screw placement via the freehand technique by neurosurgical trainees". Journal of Neurosurgery: Spine 29, n.º 3 (setembro de 2018): 235–40. http://dx.doi.org/10.3171/2018.1.spine17875.
Texto completo da fonteMohammed, Zareef. "Data breach recovery areas: an exploration of organization's recovery strategies for surviving data breaches". Organizational Cybersecurity Journal: Practice, Process and People 2, n.º 1 (9 de novembro de 2021): 41–59. http://dx.doi.org/10.1108/ocj-05-2021-0014.
Texto completo da fonteDiers-Lawson, Audra, e Amelia Symons. "Mind the gap: Understanding stakeholder reactions to different types of data security". Proceedings of the International Crisis and Risk Communication Conference 3 (11 de março de 2020): 25–28. http://dx.doi.org/10.30658/icrcc.2020.6.
Texto completo da fontePetrie, Nicholas. "Reforming the Remedy: Getting the Right Remedial Structure to Protect Personal Privacy". Deakin Law Review 17, n.º 1 (1 de outubro de 2012): 121. http://dx.doi.org/10.21153/dlr2012vol17no1art71.
Texto completo da fonteGaikwad, Ujjwala Nitin, Oshrika Bose, Abhishek Padhi, Atul Jindal, Keshao Nagpure, Anudita Bhargava e Padma Das. "A retrospective observational insight into COVID-19 exposures resulting from personal protective equipment (PPE) breaches". PLOS ONE 17, n.º 5 (17 de maio de 2022): e0268582. http://dx.doi.org/10.1371/journal.pone.0268582.
Texto completo da fonteCha, Sandra E., Sung Soo Kim, Patricia Faison Hewlin e D. Scott DeRue. "Turning a Blind or Critical Eye to Leader Value Breaches: The Role of Value Congruence in Employee Perceptions of Leader Integrity". Journal of Leadership & Organizational Studies 27, n.º 3 (26 de fevereiro de 2020): 286–306. http://dx.doi.org/10.1177/1548051820906981.
Texto completo da fonteCanan, Mustafa, Omer Ilker Poyraz e Anthony Akil. "A Monte-Carlo Analysis of Monetary Impact of Mega Data Breaches". International Journal of Cyber Warfare and Terrorism 11, n.º 3 (julho de 2021): 58–81. http://dx.doi.org/10.4018/ijcwt.2021070105.
Texto completo da fonteSciubba, Daniel M., Joseph C. Noggle, Ananth K. Vellimana, Hassan Alosh, Matthew J. McGirt, Ziya L. Gokaslan e Jean-Paul Wolinsky. "Radiographic and clinical evaluation of free-hand placement of C-2 pedicle screws". Journal of Neurosurgery: Spine 11, n.º 1 (julho de 2009): 15–22. http://dx.doi.org/10.3171/2009.3.spine08166.
Texto completo da fonteMuir Wood, Robert, e William Bateman. "Uncertainties and constraints on breaching and their implications for flood loss estimation". Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 363, n.º 1831 (15 de junho de 2005): 1423–30. http://dx.doi.org/10.1098/rsta.2005.1576.
Texto completo da fonteRisher, Paul, e Stanford Gibson. "Applying Mechanistic Dam Breach Models to Historic Levee Breaches". E3S Web of Conferences 7 (2016): 03002. http://dx.doi.org/10.1051/e3sconf/20160703002.
Texto completo da fonteDonohue, Miriam L., Ross R. Moquin, Amit Singla e Blair Calancie. "Is in vivo manual palpation for thoracic pedicle screw instrumentation reliable?" Journal of Neurosurgery: Spine 20, n.º 5 (maio de 2014): 492–96. http://dx.doi.org/10.3171/2014.1.spine13197.
Texto completo da fonteTopa, Gabriela, Mercedes Aranda-Carmena e Berta De-Maria. "Psychological Contract Breach and Outcomes: A Systematic Review of Reviews". International Journal of Environmental Research and Public Health 19, n.º 23 (23 de novembro de 2022): 15527. http://dx.doi.org/10.3390/ijerph192315527.
Texto completo da fonteMožina, Damjan. "Raskid ugovora: Skica i Zakon o obligacionim odnosima". Anali Pravnog fakulteta u Beogradu 70, n.º 5 (29 de dezembro de 2022): 517–42. http://dx.doi.org/10.51204/anali_pfbu_22mk17a.
Texto completo da fonteSchatz, Daniel, e Rabih Bashroush. "The impact of repeated data breach events on organisations’ market value". Information & Computer Security 24, n.º 1 (14 de março de 2016): 73–92. http://dx.doi.org/10.1108/ics-03-2014-0020.
Texto completo da fonte