نتایج جستجو برای: in partial breach

تعداد نتایج: 17011741  

2004
Ertan Onur Cem Ersoy Hakan Deliç Lale Akarun

Considering wireless sensor networks for border surveillance, one of the major concerns is sensing coverage. Breach probability can be used as a measure to analyze the tradeoffs and to determine the required number of sensors to be deployed to obtain a certain security level. In this paper, the sensing coverage of surveillance wireless sensor networks is studied by utilizing a well-known image ...

2004
Ertan Onur Cem Ersoy Hakan Deliç

In this paper, the sensing coverage area of surveillance wireless sensor networks is considered. The sensing coverage is determined by applying the Neyman-Pearson detection model and defining the breach probability on a gridmodeled field. Using a graph model for the perimeter, Dijkstra’s shortest path algorithm is used to find the weakest breach path. The breach probability is linked to paramet...

2007
Anirvan DuttaGupta Arijit Bishnu Indranil Sengupta

Coverage is a measure of the quality of surveillance offered by a given network of sensors over the field it protects. Geometric characterization of, and optimization problems pertaining to, a specific measure of coverage maximal breach form the subject matter of this paper. We prove lower bound results for maximal breach through its geometric characterization. We define a new measure called av...

Journal: :Infection Control & Hospital Epidemiology 1996

Journal: :Harvard Law Review 1921

2017
Fabio Bisogni Hadi Asghari Michel J.G. Van Eeten

Introduction A decade has passed since the enactment of data breach notification laws (DBNLs) in numerous U.S. states. These laws mandate companies that have suffered a data breach to inform the customers whose data might have been exposed. The intent of DBNLs can perhaps be best summed up in the phrase: “sunlight is the best disinfectant”. Whether the goal of incentivizing better security prac...

2012
Gou-Fong Liaw

This study explored the relationship between psychological contract breach and ethical decisionmaking intention. Previous studies analyzed the relation mainly from the Western cultural perspective, thus leaving the Eastern context. In this regard, the present study examined the cross-level moderating effect of ethical climate on variables at the individual level. Forty state-owned and private c...

2006
Kregg Aytes Steve Byers Mukunthan Santhanakrishnan

IT managers often struggle to justify investments in information security. In addition to standard quantitative analyses such as Return on Security Investment (ROSI), executive management may also want to know what the effect of potential security breaches would be on the market value of a publicly-traded firm. This study attempts to shed light on the issue by examining the impact of informatio...

Journal: :IJISP 2011
Benjamin Ngugi Jafar Mana Lydia Segal

As the nation confronts a growing tide of security breaches, the importance of having quality data breach information systems becomes paramount. Yet too little attention is paid to evaluating these systems. This article draws on data quality scholarship to develop a yardstick that assesses the quality of data breach notification systems in the U.S. at both the state and national levels from the...

2005

Worldwide 83% of large dams are embankment structures (ICOLD, 1984), and the proportion is even greater for small dams. Embankment overtopping and breach is an important issue, and the Discusser congratulates the Author for his worthwhile contribution which complements the comprehensive study of Coleman et al. (2002). This discussion is focused on the breach development stage. It is shown that ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید