نتایج جستجو برای: breach flow

تعداد نتایج: 486434  

Journal: :Western Journal of Medicine 2000

Journal: :The Yale Law Journal 1991

Journal: :IJISP 2011
Benjamin Ngugi Jafar Mana Lydia Segal

As the nation confronts a growing tide of security breaches, the importance of having quality data breach information systems becomes paramount. Yet too little attention is paid to evaluating these systems. This article draws on data quality scholarship to develop a yardstick that assesses the quality of data breach notification systems in the U.S. at both the state and national levels from the...

2017
Fabio Bisogni Hadi Asghari Michel J.G. Van Eeten

Introduction A decade has passed since the enactment of data breach notification laws (DBNLs) in numerous U.S. states. These laws mandate companies that have suffered a data breach to inform the customers whose data might have been exposed. The intent of DBNLs can perhaps be best summed up in the phrase: “sunlight is the best disinfectant”. Whether the goal of incentivizing better security prac...

2012
Gou-Fong Liaw

This study explored the relationship between psychological contract breach and ethical decisionmaking intention. Previous studies analyzed the relation mainly from the Western cultural perspective, thus leaving the Eastern context. In this regard, the present study examined the cross-level moderating effect of ethical climate on variables at the individual level. Forty state-owned and private c...

2006
Kregg Aytes Steve Byers Mukunthan Santhanakrishnan

IT managers often struggle to justify investments in information security. In addition to standard quantitative analyses such as Return on Security Investment (ROSI), executive management may also want to know what the effect of potential security breaches would be on the market value of a publicly-traded firm. This study attempts to shed light on the issue by examining the impact of informatio...

Journal: :SSRN Electronic Journal 2004

Journal: :Computer Communications 2006
Ertan Onur Cem Ersoy Hakan Deliç

Determining the required number of sensors to be deployed is a critical decision for surveillance wireless sensor networks. In this paper, we discuss the trade-off between the number of sensors and the breach detection probability considering the effects of sensor parameters. We present the weakest breach path problem formulation and provide a solution by utilizing the Dijkstra’s shortest path ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید