نتایج جستجو برای: breach flow

تعداد نتایج: 486434  

Journal: :Journal of Computer Security 2003
Katherine Campbell Lawrence A. Gordon Martin P. Loeb Lei Zhou

This study examines the economic effect of information security breaches reported in newspapers on publicly traded US corporations. We find limited evidence of an overall negative stock market reaction to public announcements of information security breaches. However, further investigation reveals that the nature of the breach affects this result. We find a highly significant negative market re...

2013
Himanshu Prasad G Jagadesh

INTRODUCTION Desmoid tumor of bone is a rare benign tumor. It is reported commonly in mandibular and meta-diaphyseal region of long bones. We report involvement of unusual site in ilio-acetabular region with breach in articular cartilage. CASE REPORT A 40 year old female presented with pain in the left hip. Radiologically, a lytic lesion at ilio-acetabular region was seen. Intra-operatively b...

2017
Gordon B. Schmidt

The current study examines the relationship between adult attachment style and both perceived psychological contract breach and affective organizational commitment in a sample of college students with employment experience. Attachment style is argued to be an individual difference factor that affects how an individual perceives organizational events based on theory and existing empirical resear...

Journal: :J. Cybersecurity 2016
Sasha Romanosky

This paper examines a sample of over 12,000 cyber events that include data breaches, security incidents, privacy violations, and phishing crimes. First, we analyze the characteristics of these breaches (such as causes, and types of information compromised). We then examine the breach and litigation rate, by industry, and we identify the industries that incur the greatest costs from cyber events...

2009
William Roberds Stacey L. Schreft

This paper presents a monetary-theoretic model to study the implications of networks’ collection of personal identifying data and data security on each other’s incidence and costs of identity theft. To facilitate trade, agents join clubs (networks) that compile and secure data. Too much data collection and too little security arise in equilibrium with noncooperative networks compared with the e...

2005
Brian J. d'Auriol Afolami Akinsanmi

This paper describes an approach for intrusion detection that is based on conceptual representations. The Conceptual Space model is adapted to represent information about potential intrusive activity. In order to more easily provide for decisions regarding assessment of intrusive behavior, we incorporate superellipsoids into our adapted conceptual space model. Brief comments regarding conceptua...

2008
Vadim N. Smelyanskiy Dmitry G. Luchinsky Vyatcheslav V. Osipov Dogan A. Timucin Serdar Uckun

We develop a case breach model for the on-board fault diagnostics and prognostics system for subscale solid-rocket boosters (SRBs). The model development was motivated by recent ground firing tests, in which a deviation of measured time-traces from the predicted time-series was observed. A modified model takes into account the nozzle ablation, including the effect of roughness of the nozzle sur...

2015
Jasmina Kevric Victor Aguirre Kate Martin Dinesh Varma Mark Fitzgerald Charles Pilgrim

Introduction. Management of haemodynamically stable patients with penetrating abdominal injuries varies from nonoperative to operative management. The aim was to investigate whether peritoneal breach when used as an indication for exploratory laparotomy appropriately identified patients with intra-abdominal visceral injury. Methods. We conducted retrospective cohort study of all patients presen...

2018
Samantha K. Jones Yannick Griep

Employees often draw meaning from personal experiences and contributions in their work, particularly when engaging in organizational activities that align with their personal identity or values. However, recent empirical findings have demonstrated how meaningful work can also have a negative effect on employee's well-being as employees feel so invested in their work, they push themselves beyond...

Journal: :مطالعات حقوق خصوصی 0
محمد نکوئی دکتری حقوق خصوصی دانشگاه شهید بهشتی

in various legal systems, with adoption of the validity of exclusion clause as a rule, in the exceptional instances for the reason of social importance of the matter and contrary to the public policy, exclusion clause is void. thus, in the case of death; bodily injuries; deliberated breach of contract or legal duty ;gross negligence and deception imputed to party relying to exclusion clause, it...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید