Статті в журналах з теми "Breaches"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Breaches".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Richardson, Vernon J., Rodney E. Smith, and Marcia Weidenmier Watson. "Much Ado about Nothing: The (Lack of) Economic Impact of Data Privacy Breaches." Journal of Information Systems 33, no. 3 (February 1, 2019): 227–65. http://dx.doi.org/10.2308/isys-52379.
Повний текст джерелаZafar, Humayun, Myung Ko, and Kweku-Muata Osei-Bryson. "Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors." Information Resources Management Journal 25, no. 1 (January 2012): 21–37. http://dx.doi.org/10.4018/irmj.2012010102.
Повний текст джерелаSmith, Thomas J. (Tom), Julia L. Higgs, and Robert E. Pinsker. "Do Auditors Price Breach Risk in Their Audit Fees?" Journal of Information Systems 33, no. 2 (August 1, 2018): 177–204. http://dx.doi.org/10.2308/isys-52241.
Повний текст джерелаJuma'h, Ahmad H., and Yazan Alnsour. "The effect of data breaches on company performance." International Journal of Accounting & Information Management 28, no. 2 (March 20, 2020): 275–301. http://dx.doi.org/10.1108/ijaim-01-2019-0006.
Повний текст джерелаSaleem, Hamza, and Muhammad Naveed. "SoK: Anatomy of Data Breaches." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (October 1, 2020): 153–74. http://dx.doi.org/10.2478/popets-2020-0067.
Повний текст джерелаJohnson, Mark, Min Jung Kang, and Tolani Lawson. "Stock Price Reaction to Data Breaches." Journal of Finance Issues 16, no. 2 (December 31, 2017): 1–13. http://dx.doi.org/10.58886/jfi.v16i2.2263.
Повний текст джерелаWang, Tawei, Yen-Yao Wang, and Ju-Chun Yen. "It's Not My Fault." Journal of Database Management 30, no. 3 (July 2019): 18–37. http://dx.doi.org/10.4018/jdm.2019070102.
Повний текст джерелаKude, Thomas, Hartmut Hoehle, and Tracy Ann Sykes. "Big data breaches and customer compensation strategies." International Journal of Operations & Production Management 37, no. 1 (January 3, 2017): 56–74. http://dx.doi.org/10.1108/ijopm-03-2015-0156.
Повний текст джерелаCheng, Xu (Joyce), and Stephanie Walton. "Do Nonprofessional Investors Care About How and When Data Breaches are Disclosed?" Journal of Information Systems 33, no. 3 (March 1, 2019): 163–82. http://dx.doi.org/10.2308/isys-52410.
Повний текст джерелаSebastian, Glorin. "Cyber Kill Chain Analysis of Five Major US Data Breaches." International Journal of Cyber Warfare and Terrorism 12, no. 1 (January 1, 2022): 1–15. http://dx.doi.org/10.4018/ijcwt.315651.
Повний текст джерелаMahlaola, Tintswalo B., and Barbara Van Dyk. "Reasons for Picture Archiving and Communication System (PACS) data security breaches: Intentional versus non-intentional breaches." Health SA Gesondheid 21 (October 11, 2016): 271–79. http://dx.doi.org/10.4102/hsag.v21i0.966.
Повний текст джерелаRaasck, Kyle, Jason Khoury, Ahmed Aoude, Benjamin Beland, Alexander Munteanu, Michael H. Weber, and Jeff Golan. "The Effect of Thoracolumbar Pedicle Isthmus on Pedicle Screw Accuracy." Global Spine Journal 10, no. 4 (May 20, 2019): 393–98. http://dx.doi.org/10.1177/2192568219850143.
Повний текст джерелаHiggs, Julia L., Robert E. Pinsker, Thomas J. Smith, and George R. Young. "The Relationship between Board-Level Technology Committees and Reported Security Breaches." Journal of Information Systems 30, no. 3 (January 1, 2016): 79–98. http://dx.doi.org/10.2308/isys-51402.
Повний текст джерелаGrandi, Laurie D., and Joanna R. Adler. "A Study into Breaches of Youth Justice Orders and the Young People Who Breach Them." Youth Justice 16, no. 3 (July 31, 2016): 205–25. http://dx.doi.org/10.1177/1473225415618463.
Повний текст джерелаLee, Jinhyung, and Sung J. Choi. "Hospital Productivity After Data Breaches: Difference-in-Differences Analysis." Journal of Medical Internet Research 23, no. 7 (July 6, 2021): e26157. http://dx.doi.org/10.2196/26157.
Повний текст джерелаWang, Michael Y., Guillermo Pineiro, and Praveen V. Mummaneni. "Stimulus-evoked electromyography testing of percutaneous pedicle screws for the detection of pedicle breaches: a clinical study of 409 screws in 93 patients." Journal of Neurosurgery: Spine 13, no. 5 (November 2010): 600–605. http://dx.doi.org/10.3171/2010.5.spine09536.
Повний текст джерелаGwebu, Kholekile, and Clayton W. Barrows. "Data breaches in hospitality: is the industry different?" Journal of Hospitality and Tourism Technology 11, no. 3 (August 24, 2020): 511–27. http://dx.doi.org/10.1108/jhtt-11-2019-0138.
Повний текст джерелаD'Arcy, John, and Asli Basoglu. "The Influences of Public and Institutional Pressure on Firms’ Cybersecurity Disclosures." Journal of the Association for Information Systems 23, no. 3 (2022): 779–805. http://dx.doi.org/10.17705/1jais.00740.
Повний текст джерелаHile, Jack. "Dude, Where’s My Data? The Effectiveness of Laws Governing Data Breaches in Australia." Journal of Telecommunications and the Digital Economy 9, no. 2 (June 29, 2021): 47–68. http://dx.doi.org/10.18080/jtde.v9n2.381.
Повний текст джерелаCross, Cassandra, Megan Parker, and Daniel Sansom. "Media discourses surrounding ‘non-ideal’ victims: The case of the Ashley Madison data breach." International Review of Victimology 25, no. 1 (February 20, 2018): 53–69. http://dx.doi.org/10.1177/0269758017752410.
Повний текст джерелаWhigham, Kerry. "States of conception: Renegotiating the mnemonic order amid crisis." Memory Studies 14, no. 6 (December 2021): 1333–46. http://dx.doi.org/10.1177/17506980211054339.
Повний текст джерелаNeto, Nelson Novaes, Stuart Madnick, Anchises Moraes G. De Paula, and Natasha Malara Borges. "Developing a Global Data Breach Database and the Challenges Encountered." Journal of Data and Information Quality 13, no. 1 (January 28, 2021): 1–33. http://dx.doi.org/10.1145/3439873.
Повний текст джерелаAli, Syed Emad Azhar, Fong-Woon Lai, Ameenullah Aman, Muhammad Furquan Saleem, and Salaheldin Hamad. "Do Information Security Breach and Its Factors Have a Long-Run Competitive Effect on Breached Firms’ Equity Risk?" Journal of Competitiveness 14, no. 1 (March 31, 2022): 23–42. http://dx.doi.org/10.7441/joc.2022.01.02.
Повний текст джерелаLi, You Tang, Zhi Yuan Rui, and Chang Feng Yan. "Uniform Model and Fracture Criteria of Annularly Breached Bars under Bending." Key Engineering Materials 321-323 (October 2006): 751–54. http://dx.doi.org/10.4028/www.scientific.net/kem.321-323.751.
Повний текст джерелаHoltfreter, Robert E., and Adrian Harrington. "Data breach trends in the United States." Journal of Financial Crime 22, no. 2 (May 5, 2015): 242–60. http://dx.doi.org/10.1108/jfc-09-2013-0055.
Повний текст джерелаKo, Dongwoo, Joongu Kang, Sungjoong Kim, and Yonguk Ryu. "Experimental study on the performance analysis of river levee using new substance for improving earth surface resistance." E3S Web of Conferences 40 (2018): 03022. http://dx.doi.org/10.1051/e3sconf/20184003022.
Повний текст джерелаSeh, Adil Hussain, Mohammad Zarour, Mamdouh Alenezi, Amal Krishna Sarkar, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan. "Healthcare Data Breaches: Insights and Implications." Healthcare 8, no. 2 (May 13, 2020): 133. http://dx.doi.org/10.3390/healthcare8020133.
Повний текст джерелаAvery, Atiya. "After the disclosure: measuring the short-term and long-term impacts of data breach disclosures on the financial performance of organizations." Information & Computer Security 29, no. 3 (April 8, 2021): 500–525. http://dx.doi.org/10.1108/ics-10-2020-0161.
Повний текст джерелаAivazpour, Zahra, Rohit Valecha, and Rajarshi Chakraborty. "Data Breaches." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 53, no. 4 (November 15, 2022): 65–82. http://dx.doi.org/10.1145/3571823.3571829.
Повний текст джерелаKamoun, Faouzi, and Mathew Nicho. "Human and Organizational Factors of Healthcare Data Breaches." International Journal of Healthcare Information Systems and Informatics 9, no. 1 (January 2014): 42–60. http://dx.doi.org/10.4018/ijhisi.2014010103.
Повний текст джерелаBisogni, Fabio, and Hadi Asghari. "More Than a Suspect: An Investigation into the Connection Between Data Breaches, Identity Theft, and Data Breach Notification Laws." Journal of Information Policy 10, no. 1 (May 1, 2020): 45–82. http://dx.doi.org/10.5325/jinfopoli.10.1.0045.
Повний текст джерелаHao, Jianqiang, and Hongying Dai. "Social media content and sentiment analysis on consumer security breaches." Journal of Financial Crime 23, no. 4 (October 3, 2016): 855–69. http://dx.doi.org/10.1108/jfc-01-2016-0001.
Повний текст джерелаSpasenko, К. "SIGNIFICANT INVESTIGATIONS OF SITUATION AND VERSIONS IN INVESTIGATION VIOLATION OF SAFETY RULES DURING WORKS WITH HIGH-RISK." Theory and Practice of Forensic Science and Criminalistics 20, no. 2 (December 4, 2019): 62–71. http://dx.doi.org/10.32353/khrife.2.2019.04.
Повний текст джерелаBurke, Ivan D., and Renier P. van Heerden. "The World is Polluted With Leaked Cyber Data." International Journal of Cyber Warfare and Terrorism 7, no. 4 (October 2017): 35–51. http://dx.doi.org/10.4018/ijcwt.2017100104.
Повний текст джерелаAlgarni, Abdullah M., Vijey Thayananthan, and Yashwant K. Malaiya. "Quantitative Assessment of Cybersecurity Risks for Mitigating Data Breaches in Business Systems." Applied Sciences 11, no. 8 (April 19, 2021): 3678. http://dx.doi.org/10.3390/app11083678.
Повний текст джерела&NA;. "Privacy breaches." Nursing 34, no. 9 (September 2004): 35. http://dx.doi.org/10.1097/00152193-200409000-00035.
Повний текст джерелаPham, Martin H., Joshua Bakhsheshian, Patrick C. Reid, Ian A. Buchanan, Vance L. Fredrickson, and John C. Liu. "Evaluation of C2 pedicle screw placement via the freehand technique by neurosurgical trainees." Journal of Neurosurgery: Spine 29, no. 3 (September 2018): 235–40. http://dx.doi.org/10.3171/2018.1.spine17875.
Повний текст джерелаMohammed, Zareef. "Data breach recovery areas: an exploration of organization's recovery strategies for surviving data breaches." Organizational Cybersecurity Journal: Practice, Process and People 2, no. 1 (November 9, 2021): 41–59. http://dx.doi.org/10.1108/ocj-05-2021-0014.
Повний текст джерелаDiers-Lawson, Audra, and Amelia Symons. "Mind the gap: Understanding stakeholder reactions to different types of data security." Proceedings of the International Crisis and Risk Communication Conference 3 (March 11, 2020): 25–28. http://dx.doi.org/10.30658/icrcc.2020.6.
Повний текст джерелаPetrie, Nicholas. "Reforming the Remedy: Getting the Right Remedial Structure to Protect Personal Privacy." Deakin Law Review 17, no. 1 (October 1, 2012): 121. http://dx.doi.org/10.21153/dlr2012vol17no1art71.
Повний текст джерелаGaikwad, Ujjwala Nitin, Oshrika Bose, Abhishek Padhi, Atul Jindal, Keshao Nagpure, Anudita Bhargava, and Padma Das. "A retrospective observational insight into COVID-19 exposures resulting from personal protective equipment (PPE) breaches." PLOS ONE 17, no. 5 (May 17, 2022): e0268582. http://dx.doi.org/10.1371/journal.pone.0268582.
Повний текст джерелаCha, Sandra E., Sung Soo Kim, Patricia Faison Hewlin, and D. Scott DeRue. "Turning a Blind or Critical Eye to Leader Value Breaches: The Role of Value Congruence in Employee Perceptions of Leader Integrity." Journal of Leadership & Organizational Studies 27, no. 3 (February 26, 2020): 286–306. http://dx.doi.org/10.1177/1548051820906981.
Повний текст джерелаCanan, Mustafa, Omer Ilker Poyraz, and Anthony Akil. "A Monte-Carlo Analysis of Monetary Impact of Mega Data Breaches." International Journal of Cyber Warfare and Terrorism 11, no. 3 (July 2021): 58–81. http://dx.doi.org/10.4018/ijcwt.2021070105.
Повний текст джерелаSciubba, Daniel M., Joseph C. Noggle, Ananth K. Vellimana, Hassan Alosh, Matthew J. McGirt, Ziya L. Gokaslan, and Jean-Paul Wolinsky. "Radiographic and clinical evaluation of free-hand placement of C-2 pedicle screws." Journal of Neurosurgery: Spine 11, no. 1 (July 2009): 15–22. http://dx.doi.org/10.3171/2009.3.spine08166.
Повний текст джерелаMuir Wood, Robert, and William Bateman. "Uncertainties and constraints on breaching and their implications for flood loss estimation." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 363, no. 1831 (June 15, 2005): 1423–30. http://dx.doi.org/10.1098/rsta.2005.1576.
Повний текст джерелаRisher, Paul, and Stanford Gibson. "Applying Mechanistic Dam Breach Models to Historic Levee Breaches." E3S Web of Conferences 7 (2016): 03002. http://dx.doi.org/10.1051/e3sconf/20160703002.
Повний текст джерелаDonohue, Miriam L., Ross R. Moquin, Amit Singla, and Blair Calancie. "Is in vivo manual palpation for thoracic pedicle screw instrumentation reliable?" Journal of Neurosurgery: Spine 20, no. 5 (May 2014): 492–96. http://dx.doi.org/10.3171/2014.1.spine13197.
Повний текст джерелаTopa, Gabriela, Mercedes Aranda-Carmena, and Berta De-Maria. "Psychological Contract Breach and Outcomes: A Systematic Review of Reviews." International Journal of Environmental Research and Public Health 19, no. 23 (November 23, 2022): 15527. http://dx.doi.org/10.3390/ijerph192315527.
Повний текст джерелаMožina, Damjan. "Raskid ugovora: Skica i Zakon o obligacionim odnosima." Anali Pravnog fakulteta u Beogradu 70, no. 5 (December 29, 2022): 517–42. http://dx.doi.org/10.51204/anali_pfbu_22mk17a.
Повний текст джерелаSchatz, Daniel, and Rabih Bashroush. "The impact of repeated data breach events on organisations’ market value." Information & Computer Security 24, no. 1 (March 14, 2016): 73–92. http://dx.doi.org/10.1108/ics-03-2014-0020.
Повний текст джерела