نتایج جستجو برای: breach flow
تعداد نتایج: 486434 فیلتر نتایج به سال:
Present criteria for acceptable grass covered levee overtopping are based on average overtopping values but do not include the effect of overtopping duration. This paper applies experimental steady state results for acceptable overtopping to the case of intermittent wave overtopping. Laboratory results consisting of velocities and durations for acceptable land side levee erosion due to steady f...
the present paper deals with criminal issues. for example, legal injunction on the necessity of returning a deposit has a legal nature and legal injunction on the punishment of those who breach the trust has a criminal nature. existing social issues are the basis of classification of some instances into the issue, some of which are based on variation and others on quality. therefore, the motiva...
MODIFIED) A progress in development of the physics model based diagnostic and prognostic system for solid rocket motors (SRMs) of the new generation of the crew exploration vehicles is reported. The performance model (PM) of the internal ballistics of large segmented SRMs in the regime of steady burning in the presence of the case breach fault is presented. This model takes into account propell...
Previous research showed that perceptions of psychological contract (PC) breach have undesirable individual and organizational consequences. Surprisingly, the PC literature has paid little to no attention to the relationship between PC breach perceptions and stress. A better understanding of how PC breach may elicit stress seems crucial, given that stress plays a key role in employees' physical...
Legislators in many countries enact security breach notification regulation to address a lack of information security. The laws designate authorities to collect breach reports and advise firms. We devise a principal–agent model to analyze the economic effect of mandatory security breach reporting to authorities. The model assumes that firms (agents) have few incentives to unilaterally report br...
s in this article, the evaluation of damages in international disputes with special reference to the oil and gas cases has been studied. it should be noticed as a fact that the breach of contracts or the breach of some sorts of obligations does not necessarily amount to payment of damages. in many cases, the evaluation of damages depends on the methods of evaluation uses. therefore, the most im...
While the discussion about a federal law on data breach notification is ongoing and a rash of large, costly data breaches has galvanized public interest in the issue, this paper investigates on the phenomenon of data breach notification letters. In case of any data breach a company faces a number of dilemmas on how to inform the customers. The choices that a company makes on the missive content...
The existing literature has been silent on individuals’ decision making and reactions in response to data breaches. In 2015, the Office of Personnel Management (OPM) discovered that data of several million Federal employee was stolen in cyber-attacks. Within the context of the OPM breaches, we propose a conceptual model that helps reveal the core decision making process of incident victims in r...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید