نتایج جستجو برای: in partial breach

تعداد نتایج: 17011741  

Journal: :Computers & Security 2009
Divakaran Liginlal Inkook Sim Lara Khansa

Privacy breaches and their regulatory implications have attracted corporate attention in recent times. An often overlooked cause of privacy breaches is human error. In this study, we first apply a model based on the widely accepted GEMS error typology to analyze publicly reported privacy breach incidents within the U.S. Then, based on an examination of the causes of the reported privacy breach ...

2017
A. L. Nichols J. H. Viers

River Res Applic. 2017;1–13. Abstract The transport of water and sediment from rivers to adjacent floodplains helps generate complex floodplain, wetland, and riparian ecosystems. However, riverside levees restrict lateral connectivity of water and sediment during flood pulses, making the re‐introduction of floodplain hydrogeomorphic processes through intentional levee breaching and removal an e...

2013
Hasan G. Elmazoghi

Dam breach width significantly influences peak breach outflow, inundation levels, and flood arrival time, but uncertainties inherent in the prediction of its value for embankment dams make its accurate estimation a challenging task in dam risk assessments. The key focus of this paper is to provide a fuzzy logic (FL) model for estimating the average breach width of embankment dams as an alternat...

Journal: :MIS Quarterly 2017
Sigi Goode Hartmut Hoehle Viswanath Venkatesh Susan A. Brown

To gather articles, we searched three literature databases of Scopus, ABI/Inform, and Google Scholar. We looked for all articles that contained various keywords, such as “data breach,” “security breach,” “privacy breach,” and “information breach.” We then narrowed our focus to include scholarly articles, excluding articles in the popular and practitioner media. Most of the articles identified i...

Journal: :Developmental cell 2017
Kaleb M Naegeli Eric Hastie Aastha Garde Zheng Wang Daniel P Keeley Kacy L Gordon Ariel M Pani Laura C Kelley Meghan A Morrissey Qiuyi Chi Bob Goldstein David R Sherwood

Invasive cells use small invadopodia to breach basement membrane (BM), a dense matrix that encases tissues. Following the breach, a large protrusion forms to clear a path for tissue entry by poorly understood mechanisms. Using RNAi screening for defects in Caenorhabditis elegans anchor cell (AC) invasion, we found that UNC-6(netrin)/UNC-40(DCC) signaling at the BM breach site directs exocytosis...

2007
Shantanu Pai Susan Gasson

Trust development is a critical aspect of computersupported cooperative work (CSCW). Trust is especially important in distributed work environments because of the limited amount of social presence afforded by computer-based communication media. Although several studies have studied trust development in computer-mediated environments, very few have researched the reparation of trust, following a...

Journal: :Communications for Statistical Applications and Methods 2020

Journal: :Acta Obstetricia et Gynecologica Scandinavica 2002

2017
Daniel Keeley David R. Sherwood

Metastasis is initiated in epithelial-derived tumors when cells at the tumor front breach the epithelial basement membrane (BM). Invasion through BMs is thought to be one of the most rate-limiting steps in cancer progression and thus is a therapeutically attractive target for halting tumor spread. Despite intense interest, it has been challenging to experimentally determine how invasive cells b...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید