نتایج جستجو برای: مدل breach

تعداد نتایج: 124667  

Journal: :Cyberpsychology, Behavior, and Social Networking 2021

Journal: :The British journal of psychiatry : the journal of mental science 2011
Rob Poole Christopher C H Cook

The extent to which religion and spirituality are integrated into routine psychiatric practice has been a source of increasing controversy over recent years. While taking a patient's spiritual needs into account when planning their care may be less contentious, disclosure to the patient by the psychiatrist of their own religious beliefs or consulting clergy in the context of treatment are seen ...

Journal: :Personality & social psychology bulletin 2008
Robert B Lount Chen-Bo Zhong Niro Sivanathan J Keith Murnighan

Few interpersonal relationships endure without one party violating the other's expectations. Thus, the ability to build trust and to restore cooperation after a breach can be critical for the preservation of positive relationships. Using an iterated prisoner's dilemma, this article presents two experiments that investigated the effects of the timing of a trust breach-at the start of an interact...

2016
Linda Gratz Markus Reisinger

Antitrust scholars have argued that exclusive contracts have anticompetitive, or at best neutral effects, if no efficiencies are generated. In contrast, this paper shows that exclusive contracts can have procompetitive effects, provided buyers are imperfect downstream competitors and contract breach is feasible. In that case an efficient entrant is not necessarily foreclosed through exclusive c...

Journal: : 2022

با توجه به رشد بالای جمعیت در جهان و نیاز اطمینان از امنیت غذایی، افزایش تولید واحد سطح محصولات زراعی به‌منزلة راهبردی اساسی حل مسئلة تأمین غذا به‌شمار می‌رود. سوی دیگر، وجود محدودیت زیرکشت پایین‌بودن میانگین عملکرد برخی کشاورزی مانند گندم کشور، محصول می‌تواند راهکاری عملی پاسخ کشور محسوب شود. یکی مهم‌ترین بیماری‌های فوزاریوم است که، نقش پیش‌بینی این بیماری جلوگیری کاهش بهره‌وری محصول، مدل‌هایی...

Journal: :Journal of Business Ethics 2022

Abstract By examining managers’ decisions about disclosing updated assessments of firms’ risks, we present evidence that the risk factor disclosures are informative. We use setting cybersecurity after a data breach because breaches, especially severe serve as natural experiment where an exogenous shock to assessment their firm’s risks occurs. analyze topic from perspective two different theoret...

2017
Jamal Ahmad Khan

This paper deals with the sub-task of PAN 2017 Author Identification, which is to detect style breaches for unknown number of authors within a single document in English. The presented model is an unsupervised approach that will detect style breaches and mark text boundaries on the basis of different stylistic features. This model will use some classical stylistic features like POS analysis and...

Journal: :Journal of AHIMA 2002
Michelle Dougherty

If your facility experienced a security incident—a breach, a leak, a stolen laptop or PDA—would you be prepared to handle the situation? Tom Martin, chief information officer at the University of Washington Academic Medical Center, was forced to confront the above scenario after a hacker accessed a database of patients’ medical information. His experience can help others in the healthcare indus...

Journal: :CoRR 2016
Niken Dwi Wahyu Cahyani Ben Martini Kim-Kwang Raymond Choo

Improving employees’ understanding of digital forensic technical terms and concepts within an organisation is likely to increase the potential of successful collaboration during a cyber security incident (e.g. data breach) investigation within that organisation. In this paper, we seek to determine whether multimedia presentations, in this case videos, are an effective tool in improving a learne...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید