نتایج جستجو برای: in partial breach

تعداد نتایج: 17011741  

Journal: :J. Cybersecurity 2016
Armin Sarabi Parinaz Naghizadeh Ardabili Yang Liu Mingyan Liu

This article aims to understand if, and to what extent, business details about an organization can help to assess a company’s risk in experiencing data breach incidents, as well its distribution of risk over multiple incident types, in order to provide guidelines to effectively protect, detect, and recover from different forms of security incidents. Existing work on prediction of data breach ma...

Journal: :Journal of the History of International Law 2018

Introduction: Wearable electronic devices, which are based on Internet of Things (IoT) and big data computing, are able to continuously collect and process the physiological and environmental data and exchange them with other tools, users, and internet networks. Therefore, despite their potential benefits in health monitoring, they can pose serious risks, especially in breach of privacy. Hence...

2000
SANDRA L. ROBINSON ELIZABETH WOLFE MORRISON

This study examines factors a€ecting employees' perceptions that their psychological contract has been breached by their organization, and factors a€ecting whether this perception will cause employees to experience feelings of contract violation. Data were obtained from 147 managers just prior to their beginning of new job (time 1) and 18 months later (time 2). It was found that perceived contr...

Journal: :Games and Economic Behavior 2001
Tuomas Sandholm Victor R. Lesser

Ž . In automated negotiation systems for self-interested agents, contracts have traditionally been binding. They do not accommodate future events. Contingency contracts address this, but are often impractical. As an alternative, we propose le eled commitment contracts. The level of commitment is set by breach penalties. To be freed from the contract, an agent simply pays the penalty to the othe...

Journal: :J. Cybersecurity 2016
Sasha Romanosky

This paper examines a sample of over 12,000 cyber events that include data breaches, security incidents, privacy violations, and phishing crimes. First, we analyze the characteristics of these breaches (such as causes, and types of information compromised). We then examine the breach and litigation rate, by industry, and we identify the industries that incur the greatest costs from cyber events...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید