نتایج جستجو برای: breach flow

تعداد نتایج: 486434  

2017
Veronica Marotta Sasha Romanosky

Information security controls can help reduce the probability of a breach, but cannot guarantee that one will not occur. In order to reduce the costs of data breaches, firms are faced with competing alternatives. Investments in ex ante security measures can help prevent a breach, but this is costly and may be inefficient; ex post mitigation efforts can help reduce losses following a breach, but...

Journal: :Computers & Security 2009
Divakaran Liginlal Inkook Sim Lara Khansa

Privacy breaches and their regulatory implications have attracted corporate attention in recent times. An often overlooked cause of privacy breaches is human error. In this study, we first apply a model based on the widely accepted GEMS error typology to analyze publicly reported privacy breach incidents within the U.S. Then, based on an examination of the causes of the reported privacy breach ...

2013
Hasan G. Elmazoghi

Dam breach width significantly influences peak breach outflow, inundation levels, and flood arrival time, but uncertainties inherent in the prediction of its value for embankment dams make its accurate estimation a challenging task in dam risk assessments. The key focus of this paper is to provide a fuzzy logic (FL) model for estimating the average breach width of embankment dams as an alternat...

Journal: :Water 2021

Levee breaches are some of the most common hazards in world and cause loss lives, livelihoods, property destruction. During 2010 flood Pakistan, devastating breach occurred at Tori on right bank Indus River, downstream Guddu Barrage, which caused residual floods northern Sindh adjoining regions Balochistan province. In this study, 2D unsteady flow modeling performed for computed inundation by c...

2007
Anirvan DuttaGupta Arijit Bishnu Indranil Sengupta

Coverage is a measure of the quality of surveillance offered by a given network of sensors over the field it protects. Geometric characterization of, and optimization problems pertaining to, a specific measure of coverage maximal breach form the subject matter of this paper. We prove lower bound results for maximal breach through its geometric characterization. We define a new measure called av...

The main goal of this research has been investigating the impact of human resource management practices on the employee turnover intentions by considering psychological contract breach in the gas company of Rasht. So, it's considered an applied research, in terms of its goals, a descriptive survey, in terms of information gathering and correlational in terms of the interrelation between the res...

Journal: :Developmental cell 2017
Kaleb M Naegeli Eric Hastie Aastha Garde Zheng Wang Daniel P Keeley Kacy L Gordon Ariel M Pani Laura C Kelley Meghan A Morrissey Qiuyi Chi Bob Goldstein David R Sherwood

Invasive cells use small invadopodia to breach basement membrane (BM), a dense matrix that encases tissues. Following the breach, a large protrusion forms to clear a path for tissue entry by poorly understood mechanisms. Using RNAi screening for defects in Caenorhabditis elegans anchor cell (AC) invasion, we found that UNC-6(netrin)/UNC-40(DCC) signaling at the BM breach site directs exocytosis...

Journal: :MIS Quarterly 2017
Sigi Goode Hartmut Hoehle Viswanath Venkatesh Susan A. Brown

To gather articles, we searched three literature databases of Scopus, ABI/Inform, and Google Scholar. We looked for all articles that contained various keywords, such as “data breach,” “security breach,” “privacy breach,” and “information breach.” We then narrowed our focus to include scholarly articles, excluding articles in the popular and practitioner media. Most of the articles identified i...

2004
Ertan Onur Cem Ersoy Hakan Deliç Lale Akarun

Considering wireless sensor networks for border surveillance, one of the major concerns is sensing coverage. Breach probability can be used as a measure to analyze the tradeoffs and to determine the required number of sensors to be deployed to obtain a certain security level. In this paper, the sensing coverage of surveillance wireless sensor networks is studied by utilizing a well-known image ...

2007
Shantanu Pai Susan Gasson

Trust development is a critical aspect of computersupported cooperative work (CSCW). Trust is especially important in distributed work environments because of the limited amount of social presence afforded by computer-based communication media. Although several studies have studied trust development in computer-mediated environments, very few have researched the reparation of trust, following a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید