نتایج جستجو برای: مدل breach

تعداد نتایج: 124667  

The main goal of this research has been investigating the impact of human resource management practices on the employee turnover intentions by considering psychological contract breach in the gas company of Rasht. So, it's considered an applied research, in terms of its goals, a descriptive survey, in terms of information gathering and correlational in terms of the interrelation between the res...

Journal: : 2022

برای دستیابی به مزیت رقابتی در شرایط عدم‌­اطمینان که آن تغییر ضروری است، یکی از چالش‌های بزرگ سازمان‌ها کاهش ریسک طریق ایجاد زنجیره‌های تأمین تاب‌آور است. تاب‌آوری زنجیره ‌تأمین توانایی مقابله با اختلال اشاره دارد یک رویداد غیرقابل‌پیش‌بینی بوده و دارای منابع داخلی خارجی مختلفی ازجمله بلایای طبیعی ریسک‌های عملیاتی پژوهش حاضر شبیه‌سازی توسط نرم‌افزار ارنا زنجیره‌ سنگ ساختمانی «کارخانه سنگبری آسم...

Journal: :Developmental cell 2017
Kaleb M Naegeli Eric Hastie Aastha Garde Zheng Wang Daniel P Keeley Kacy L Gordon Ariel M Pani Laura C Kelley Meghan A Morrissey Qiuyi Chi Bob Goldstein David R Sherwood

Invasive cells use small invadopodia to breach basement membrane (BM), a dense matrix that encases tissues. Following the breach, a large protrusion forms to clear a path for tissue entry by poorly understood mechanisms. Using RNAi screening for defects in Caenorhabditis elegans anchor cell (AC) invasion, we found that UNC-6(netrin)/UNC-40(DCC) signaling at the BM breach site directs exocytosis...

Journal: :MIS Quarterly 2017
Sigi Goode Hartmut Hoehle Viswanath Venkatesh Susan A. Brown

To gather articles, we searched three literature databases of Scopus, ABI/Inform, and Google Scholar. We looked for all articles that contained various keywords, such as “data breach,” “security breach,” “privacy breach,” and “information breach.” We then narrowed our focus to include scholarly articles, excluding articles in the popular and practitioner media. Most of the articles identified i...

2004
Ertan Onur Cem Ersoy Hakan Deliç Lale Akarun

Considering wireless sensor networks for border surveillance, one of the major concerns is sensing coverage. Breach probability can be used as a measure to analyze the tradeoffs and to determine the required number of sensors to be deployed to obtain a certain security level. In this paper, the sensing coverage of surveillance wireless sensor networks is studied by utilizing a well-known image ...

2007
Shantanu Pai Susan Gasson

Trust development is a critical aspect of computersupported cooperative work (CSCW). Trust is especially important in distributed work environments because of the limited amount of social presence afforded by computer-based communication media. Although several studies have studied trust development in computer-mediated environments, very few have researched the reparation of trust, following a...

2004
Ertan Onur Cem Ersoy Hakan Deliç

In this paper, the sensing coverage area of surveillance wireless sensor networks is considered. The sensing coverage is determined by applying the Neyman-Pearson detection model and defining the breach probability on a gridmodeled field. Using a graph model for the perimeter, Dijkstra’s shortest path algorithm is used to find the weakest breach path. The breach probability is linked to paramet...

2017
Daniel Keeley David R. Sherwood

Metastasis is initiated in epithelial-derived tumors when cells at the tumor front breach the epithelial basement membrane (BM). Invasion through BMs is thought to be one of the most rate-limiting steps in cancer progression and thus is a therapeutically attractive target for halting tumor spread. Despite intense interest, it has been challenging to experimentally determine how invasive cells b...

Journal: :Law and Contemporary Problems 1989

Journal: :Proceedings on Privacy Enhancing Technologies 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید