Добірка наукової літератури з теми "Breaches"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Breaches".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Breaches"
Richardson, Vernon J., Rodney E. Smith, and Marcia Weidenmier Watson. "Much Ado about Nothing: The (Lack of) Economic Impact of Data Privacy Breaches." Journal of Information Systems 33, no. 3 (February 1, 2019): 227–65. http://dx.doi.org/10.2308/isys-52379.
Повний текст джерелаZafar, Humayun, Myung Ko, and Kweku-Muata Osei-Bryson. "Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors." Information Resources Management Journal 25, no. 1 (January 2012): 21–37. http://dx.doi.org/10.4018/irmj.2012010102.
Повний текст джерелаSmith, Thomas J. (Tom), Julia L. Higgs, and Robert E. Pinsker. "Do Auditors Price Breach Risk in Their Audit Fees?" Journal of Information Systems 33, no. 2 (August 1, 2018): 177–204. http://dx.doi.org/10.2308/isys-52241.
Повний текст джерелаJuma'h, Ahmad H., and Yazan Alnsour. "The effect of data breaches on company performance." International Journal of Accounting & Information Management 28, no. 2 (March 20, 2020): 275–301. http://dx.doi.org/10.1108/ijaim-01-2019-0006.
Повний текст джерелаSaleem, Hamza, and Muhammad Naveed. "SoK: Anatomy of Data Breaches." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (October 1, 2020): 153–74. http://dx.doi.org/10.2478/popets-2020-0067.
Повний текст джерелаJohnson, Mark, Min Jung Kang, and Tolani Lawson. "Stock Price Reaction to Data Breaches." Journal of Finance Issues 16, no. 2 (December 31, 2017): 1–13. http://dx.doi.org/10.58886/jfi.v16i2.2263.
Повний текст джерелаWang, Tawei, Yen-Yao Wang, and Ju-Chun Yen. "It's Not My Fault." Journal of Database Management 30, no. 3 (July 2019): 18–37. http://dx.doi.org/10.4018/jdm.2019070102.
Повний текст джерелаKude, Thomas, Hartmut Hoehle, and Tracy Ann Sykes. "Big data breaches and customer compensation strategies." International Journal of Operations & Production Management 37, no. 1 (January 3, 2017): 56–74. http://dx.doi.org/10.1108/ijopm-03-2015-0156.
Повний текст джерелаCheng, Xu (Joyce), and Stephanie Walton. "Do Nonprofessional Investors Care About How and When Data Breaches are Disclosed?" Journal of Information Systems 33, no. 3 (March 1, 2019): 163–82. http://dx.doi.org/10.2308/isys-52410.
Повний текст джерелаSebastian, Glorin. "Cyber Kill Chain Analysis of Five Major US Data Breaches." International Journal of Cyber Warfare and Terrorism 12, no. 1 (January 1, 2022): 1–15. http://dx.doi.org/10.4018/ijcwt.315651.
Повний текст джерелаДисертації з теми "Breaches"
Talavera, Cano Andrés. "Regulating the Intolerance of Contractual Breaches." IUS ET VERITAS, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/123754.
Повний текст джерелаPenalizar los incumplimientos permite una asignación eficiente de los riesgos en un contrato, asegurando y conservando el equilibrio contractual que las partes tuvieron en mente y plasmaron en su regulación contractual. El uso inteligente de las penalidades permitirá salvaguardar y mantener el equilibrio económico de los contratos, manteniendo así la rentabilidad de las operaciones comerciales perseguidas a través de ellos.
Smith, Tanshanika Turner. "Examining Data Privacy Breaches in Healthcare." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2623.
Повний текст джерелаHo, Jean Qing Ying. "State responsibility for breaches of investment contracts." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708722.
Повний текст джерелаBiggs, Carl T. "Implications of transaction costs for acquisition program cost breaches." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34629.
Повний текст джерелаIt is generally accepted that cost growth in federal major defense acquisition programs (MDAPs) is partially attributable to inaccurate cost estimates. Cost analysts exhaustively analyze manpower and resources to provide accurate estimates, however the influence of transaction costs is often ignored in traditional cost estimates. This thesis investigates the association between cost growth and transaction costs, the real cost of business negotiations and program management. We collect MDAP cost threshold breach data and cross reference it with a proxy for MDAP transaction costs (Systems Engineering/Program Management Costs) to determine whether a correlation exists. We use multiple logistic regression models to analyze the binary outcome of breach or no breach. The results show that for MDAPs with cost-plus contracts there is a statistically significant relation between the likelihood of a cost threshold breach occurring and the relative magnitude of the MDAPs transaction costs; no such relation exists for fixed price contracts. Although these results show an association between cost threshold breaches and transaction costs, there is no evidence of causality between these two variables and our exploration of causality is a topic for future research.
Vorogushyn, Sergiy. "Analysis of flood hazard under consideration of dike breaches." Phd thesis, Aachen Shaker, 2008. http://d-nb.info/994678622/04.
Повний текст джерелаGriffin, Tony. "Strategies to Prevent Security Breaches Caused by Mobile Devices." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4628.
Повний текст джерелаSaber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.
Повний текст джерелаOfori-Duodu, Michael Samuel. "Exploring Data Security Management Strategies for Preventing Data Breaches." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.
Повний текст джерелаZuzak, Catherine Ann. "Liability for breaches of aviation security obligatons : a Canadian perspective." Thesis, McGill University, 1990. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=59859.
Повний текст джерелаThis thesis explores the private law liability issues that may arise from branches of the duty to secure airports and aircraft. The focus is on providing a global view of the principles governing suits against the two most likely defendants--the air carrier and the government--and on the policy options which could underpin civil liability. The perspective is Canadian in that it presumes that either a Canadian airport or Canadian airline has been involved in the terrorist attack.
Kershaw, Debra S. "BOUNDARIES AND BREACHES: COMPLEXITIES AND STRATEGIES DOWN ON THE FARM." UKnowledge, 2011. http://uknowledge.uky.edu/gradschool_diss/202.
Повний текст джерелаКниги з теми "Breaches"
Daswani, Neil, and Moudy Elbayadi. Big Breaches. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7.
Повний текст джерелаS, Logweller Cary, ed. Identity theft breaches. Hauppauge, NY: Nova Science Publishers, 2009.
Знайти повний текст джерелаFoster, Peter C., Sara E. Cable, Kathleen M. Porter, and Walter C. Boyd. Fundamentals of data security law & breaches. Boston, MA: MCLE New England, 2014.
Знайти повний текст джерелаPersonal identifiable information and data breaches. Hauppauge, NY: Nova Science Publishers, 2009.
Знайти повний текст джерелаArena, Mark V. Management perspectives pertaining to root cause analyses of Nunn-McCurdy breaches: Contractor motivations and anticipating breaches. Santa Monica, CA: Rand Corporation, 2014.
Знайти повний текст джерелаVan Roosebeke, Bert. State Liability for Breaches of European Law. Wiesbaden: DUV, 2007. http://dx.doi.org/10.1007/978-3-8350-9494-9.
Повний текст джерелаWong, Rebecca. Data Security Breaches and Privacy in Europe. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7.
Повний текст джерелаRita, Tehan, ed. Data security breaches: Context and incident summaries. New York: Nova Science Publishers, 2008.
Знайти повний текст джерелаKrausz, Michael. Managing Information Security Breaches: Studies from Real Life. Ely: IT Governance Pub., 2010.
Знайти повний текст джерелаGreat Britain. Parliament. House of Commons. European Scrutiny Committee. Scrutiny reserve breaches: Third report of session 2002-2003. London: Stationery Office, 2002.
Знайти повний текст джерелаЧастини книг з теми "Breaches"
Anesko, Michael. "Breaches." In Henry James and Queer Filiation, 103–5. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94538-5_13.
Повний текст джерелаDaswani, Neil, and Moudy Elbayadi. "The Root Causes of Data Breaches." In Big Breaches, 3–33. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_1.
Повний текст джерелаDaswani, Neil, and Moudy Elbayadi. "The Equifax Breach." In Big Breaches, 75–95. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_4.
Повний текст джерелаDaswani, Neil, and Moudy Elbayadi. "The Seven Habits of Highly Effective Security." In Big Breaches, 195–232. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_9.
Повний текст джерелаDaswani, Neil, and Moudy Elbayadi. "Facebook Security Issues and the 2016 US Presidential Election." In Big Breaches, 97–130. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_5.
Повний текст джерелаDaswani, Neil, and Moudy Elbayadi. "Advice to Cybersecurity Investors." In Big Breaches, 331–59. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_14.
Повний текст джерелаDaswani, Neil, and Moudy Elbayadi. "The Capital One Breach." In Big Breaches, 35–53. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_2.
Повний текст джерелаDaswani, Neil, and Moudy Elbayadi. "Technology Defenses to Fight the Root Causes of Breach: Part One." In Big Breaches, 269–302. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_12.
Повний текст джерелаDaswani, Neil, and Moudy Elbayadi. "The Yahoo Breaches of 2013 and 2014." In Big Breaches, 155–69. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_7.
Повний текст джерелаDaswani, Neil, and Moudy Elbayadi. "Applying Your Skills to Cybersecurity." In Big Breaches, 385–407. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_16.
Повний текст джерелаТези доповідей конференцій з теми "Breaches"
Srinivasan, S. "Privacy Protection and Data Breaches." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2261.
Повний текст джерелаFleury-Charles, Aaron, Md Minhaz Chowdhury, and Nafiz Rifat. "Data Breaches: Vulnerable Privacy." In 2022 IEEE International Conference on Electro Information Technology (eIT). IEEE, 2022. http://dx.doi.org/10.1109/eit53891.2022.9814044.
Повний текст джерелаAlaminov, Hristo. "DATA BREACHES AND DIGITALISATION." In PROTECTION OF THE PERSONAL DATA AND THE DIGITALIZATION 2021. University publishing house "Science and Economics", University of Economics - Varna, 2021. http://dx.doi.org/10.36997/ppdd2021.29.
Повний текст джерелаYuan, Liwei, Weichao Xing, Haibo Chen, and Binyu Zang. "Security breaches as PMU deviation." In the Second Asia-Pacific Workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2103799.2103807.
Повний текст джерелаThomas, Kurt, Frank Li, Ali Zand, Jacob Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, et al. "Data Breaches, Phishing, or Malware?" In CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3133956.3134067.
Повний текст джерелаKayes, A. S. M., Mohammad Hammoudeh, Shahriar Badsha, Paul A. Watters, Alex Ng, Fatma Mohammed, and Mofakharul Islam. "Responsibility Attribution Against Data Breaches." In 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020. http://dx.doi.org/10.1109/iciot48696.2020.9089466.
Повний текст джерелаChen, Danny, Md Minhaz Chowdhury, and Shadman Latif. "Data Breaches in Corporate Setting." In 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME). IEEE, 2021. http://dx.doi.org/10.1109/iceccme52200.2021.9590974.
Повний текст джерелаPark, Y. H., and Michael Cournoyer. "Root Cause Analysis of Glovebox Glove Failure." In ASME 2007 Pressure Vessels and Piping Conference. ASMEDC, 2007. http://dx.doi.org/10.1115/pvp2007-26121.
Повний текст джерелаSubramanian, R. Raja, Rithvik Avula, Paramkusam Sree Surya, and Bellamkonda Pranay. "Modeling and Predicting Cyber Hacking Breaches." In 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2021. http://dx.doi.org/10.1109/iciccs51141.2021.9432175.
Повний текст джерелаJia, Ouyang, Yin Jian, and Liu Shaopeng. "Limiting Privacy Breaches in Differential Privacy." In 3rd International Conference on Computer Science and Service System. Paris, France: Atlantis Press, 2014. http://dx.doi.org/10.2991/csss-14.2014.153.
Повний текст джерелаЗвіти організацій з теми "Breaches"
Hurtle, Jackie C. Decrease the Number of Glovebox Glove Breaches and Failures. Office of Scientific and Technical Information (OSTI), December 2013. http://dx.doi.org/10.2172/1113782.
Повний текст джерелаTaylor, R. B., and D. Frobel. Barrier breaches and washover features, Martinique Beach, Nova Scotia. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1999. http://dx.doi.org/10.4095/211075.
Повний текст джерелаBiggs, Carl T., Diana I. Angelis, Laura Armey, and Raymond Franck. Transaction Costs and Cost Breaches in Major Defense Acquisition Programs. Fort Belvoir, VA: Defense Technical Information Center, February 2014. http://dx.doi.org/10.21236/ada612617.
Повний текст джерелаPOND, DANIEL J., F. KAY HOUGHTON, and WALTER E. GILMORE. CONTRIBUTORS TO HUMAN ERRORS AND BREACHES IN NATIONAL SECURITY APPLICATIONS. Office of Scientific and Technical Information (OSTI), August 2002. http://dx.doi.org/10.2172/801246.
Повний текст джерелаBratton, Robert Lawrence. Quick Look Report for Chemical Reactivity Modeling of Various Multi-Canister Overpack Breaches. Office of Scientific and Technical Information (OSTI), April 2002. http://dx.doi.org/10.2172/911538.
Повний текст джерелаAngelis, Diana I., Laura Armey, and Carl T. Biggs. A Model for Understanding the Relationship Between Transaction Costs and Acquisition Cost Breaches. Fort Belvoir, VA: Defense Technical Information Center, April 2014. http://dx.doi.org/10.21236/ada612854.
Повний текст джерелаDiehl, Richard P., Brandon R. Gould, and Tzee-Nan K. Lo. Root Causes of Nunn-McCurdy Breaches - A Survey of PARCA Root Causes Analyses, 2010-2011. Fort Belvoir, VA: Defense Technical Information Center, August 2012. http://dx.doi.org/10.21236/ada590811.
Повний текст джерелаZ. P. Walton. Atlas Breached Waste Package and Drip Shield Experiments: Breached Drip Shield Tests. Office of Scientific and Technical Information (OSTI), May 2003. http://dx.doi.org/10.2172/836518.
Повний текст джерелаLam, Poh-Sang, and Robert Sindelar. Crack Stability in Breached Fuel. Office of Scientific and Technical Information (OSTI), February 2021. http://dx.doi.org/10.2172/1764826.
Повний текст джерелаLAM, POH-SANG, and ROBERT SINDELAR. CRACK STABILITY IN BREACHED FUEL. Office of Scientific and Technical Information (OSTI), April 2021. http://dx.doi.org/10.2172/1782428.
Повний текст джерела