نتایج جستجو برای: breach flow

تعداد نتایج: 486434  

Journal: :Journal of AHIMA 2009
Chris Dimick

The laptop was missing. Previously stationed in the EEG department of NorthShore University HealthSystem, the laptop had been connected to equipment used by staff to treat patients. Just who took the laptop from the Evanston, IL-based facility—an employee, patient, or visitor—was not known. What was known was that 250 patients had personal information stored on the machine, including their name...

Journal: :The Journal of applied psychology 2009
Samantha D Montes David Zweig

Promises are positioned centrally in the study of psychological contract breach and are argued to distinguish psychological contracts from related constructs, such as employee expectations. However, because the effects of promises and delivered inducements are confounded in most research, the role of promises in perceptions of, and reactions to, breach remains unclear. If promises are not an im...

2009

As a severe threat in anonymized data publication, proximity breach is gaining increasing attention. Such breach occurs when an attacker learns with high confidence that the sensitive value of a targeted victim belongs to a set of semantically proximate values, even though not sure about the exact value. Focusing on tackling proximity breach under specific data models (e.g., categorical or nume...

2013
Wendy Ellens Piotr Zuraniewski Anna Sperotto Harm Schotanus Michel Mandjes Erik Meeuwissen

DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security breach can be misused for activities like free web browsing, but also for command & control traffic or cyber espionage, thus motivating the search for effective automated DNS tunnel detection techniques. In this paper we develop such a technique, based on the monitoring and analysis of network f...

2000
Hanoch Dagan

This article focuses on cases of restitution within contract, investigating the normative desirability of enabling a promisee to pursue the profits derived by the promisor through a breach of contract as an alternative pecuniary remedy of wide applicability. Situated at the frontier of both contractual and restitutionary liability, the question of whether restitutionary damages for breach of co...

2014
Chang-Hyun Lee Seung-Jae Hyun Yongjung J Kim Ki-Jeong Kim Tae-Ahn Jahng Hyun-Jib Kim

STUDY DESIGN A retrospective cross-sectional study. PURPOSE The purpose of this study is to evaluate the accuracy and safety of free-hand pedicle screw insertion performed by a young surgeon. OVERVIEW OF LITERATURE Few articles exist regarding the safety of the free-hand technique without inspection by an experienced spine surgeon. METHODS The index surgeon has performed spinal surgery fo...

ژورنال: مدیریت شهری 2017
Aliakbari Sefiddarbon, Aboozar , Soltan Ahmadi, Jalal , Taqizadeh, Ibrahim ,

The conclusion of any contract aims at implementation of the obligations arising from it. Morality dictates that people adhere to what they assumed regarding others. The law also supported the moral judgment and in case of breach of obligations to oblige, compensation as a sanction is imposed on obligor. In view of the economic analysis, he also committed to respect his contract and the Contrac...

2014
Sang-Uk Kim Byoung-il Roh Seong-Joon Kim Sang-Don Kim

OBJECTIVE To identify the accuracy and efficiency of the computed tomographic (CT)-based navigation system on upper cervical instrumentation, particularly C1 lateral mass and C2 pedicle screw fixation compared to previous reports. METHODS Between May 2005 and March 2014, 25 patients underwent upper cervical instrumentation via a CT-based navigation system. Seven patients were excluded, while ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید