نتایج جستجو برای: مدل breach
تعداد نتایج: 124667 فیلتر نتایج به سال:
The extent to which religion and spirituality are integrated into routine psychiatric practice has been a source of increasing controversy over recent years. While taking a patient's spiritual needs into account when planning their care may be less contentious, disclosure to the patient by the psychiatrist of their own religious beliefs or consulting clergy in the context of treatment are seen ...
Few interpersonal relationships endure without one party violating the other's expectations. Thus, the ability to build trust and to restore cooperation after a breach can be critical for the preservation of positive relationships. Using an iterated prisoner's dilemma, this article presents two experiments that investigated the effects of the timing of a trust breach-at the start of an interact...
Antitrust scholars have argued that exclusive contracts have anticompetitive, or at best neutral effects, if no efficiencies are generated. In contrast, this paper shows that exclusive contracts can have procompetitive effects, provided buyers are imperfect downstream competitors and contract breach is feasible. In that case an efficient entrant is not necessarily foreclosed through exclusive c...
با توجه به رشد بالای جمعیت در جهان و نیاز اطمینان از امنیت غذایی، افزایش تولید واحد سطح محصولات زراعی بهمنزلة راهبردی اساسی حل مسئلة تأمین غذا بهشمار میرود. سوی دیگر، وجود محدودیت زیرکشت پایینبودن میانگین عملکرد برخی کشاورزی مانند گندم کشور، محصول میتواند راهکاری عملی پاسخ کشور محسوب شود. یکی مهمترین بیماریهای فوزاریوم است که، نقش پیشبینی این بیماری جلوگیری کاهش بهرهوری محصول، مدلهایی...
Abstract By examining managers’ decisions about disclosing updated assessments of firms’ risks, we present evidence that the risk factor disclosures are informative. We use setting cybersecurity after a data breach because breaches, especially severe serve as natural experiment where an exogenous shock to assessment their firm’s risks occurs. analyze topic from perspective two different theoret...
This paper deals with the sub-task of PAN 2017 Author Identification, which is to detect style breaches for unknown number of authors within a single document in English. The presented model is an unsupervised approach that will detect style breaches and mark text boundaries on the basis of different stylistic features. This model will use some classical stylistic features like POS analysis and...
If your facility experienced a security incident—a breach, a leak, a stolen laptop or PDA—would you be prepared to handle the situation? Tom Martin, chief information officer at the University of Washington Academic Medical Center, was forced to confront the above scenario after a hacker accessed a database of patients’ medical information. His experience can help others in the healthcare indus...
Improving employees’ understanding of digital forensic technical terms and concepts within an organisation is likely to increase the potential of successful collaboration during a cyber security incident (e.g. data breach) investigation within that organisation. In this paper, we seek to determine whether multimedia presentations, in this case videos, are an effective tool in improving a learne...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید