نتایج جستجو برای: breach flow
تعداد نتایج: 486434 فیلتر نتایج به سال:
The laptop was missing. Previously stationed in the EEG department of NorthShore University HealthSystem, the laptop had been connected to equipment used by staff to treat patients. Just who took the laptop from the Evanston, IL-based facility—an employee, patient, or visitor—was not known. What was known was that 250 patients had personal information stored on the machine, including their name...
Promises are positioned centrally in the study of psychological contract breach and are argued to distinguish psychological contracts from related constructs, such as employee expectations. However, because the effects of promises and delivered inducements are confounded in most research, the role of promises in perceptions of, and reactions to, breach remains unclear. If promises are not an im...
As a severe threat in anonymized data publication, proximity breach is gaining increasing attention. Such breach occurs when an attacker learns with high confidence that the sensitive value of a targeted victim belongs to a set of semantically proximate values, even though not sure about the exact value. Focusing on tackling proximity breach under specific data models (e.g., categorical or nume...
DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security breach can be misused for activities like free web browsing, but also for command & control traffic or cyber espionage, thus motivating the search for effective automated DNS tunnel detection techniques. In this paper we develop such a technique, based on the monitoring and analysis of network f...
This article focuses on cases of restitution within contract, investigating the normative desirability of enabling a promisee to pursue the profits derived by the promisor through a breach of contract as an alternative pecuniary remedy of wide applicability. Situated at the frontier of both contractual and restitutionary liability, the question of whether restitutionary damages for breach of co...
STUDY DESIGN A retrospective cross-sectional study. PURPOSE The purpose of this study is to evaluate the accuracy and safety of free-hand pedicle screw insertion performed by a young surgeon. OVERVIEW OF LITERATURE Few articles exist regarding the safety of the free-hand technique without inspection by an experienced spine surgeon. METHODS The index surgeon has performed spinal surgery fo...
The conclusion of any contract aims at implementation of the obligations arising from it. Morality dictates that people adhere to what they assumed regarding others. The law also supported the moral judgment and in case of breach of obligations to oblige, compensation as a sanction is imposed on obligor. In view of the economic analysis, he also committed to respect his contract and the Contrac...
OBJECTIVE To identify the accuracy and efficiency of the computed tomographic (CT)-based navigation system on upper cervical instrumentation, particularly C1 lateral mass and C2 pedicle screw fixation compared to previous reports. METHODS Between May 2005 and March 2014, 25 patients underwent upper cervical instrumentation via a CT-based navigation system. Seven patients were excluded, while ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید