Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Breaches“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Breaches" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Breaches"
Richardson, Vernon J., Rodney E. Smith, and Marcia Weidenmier Watson. "Much Ado about Nothing: The (Lack of) Economic Impact of Data Privacy Breaches." Journal of Information Systems 33, no. 3 (2019): 227–65. http://dx.doi.org/10.2308/isys-52379.
Der volle Inhalt der QuelleZafar, Humayun, Myung Ko, and Kweku-Muata Osei-Bryson. "Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors." Information Resources Management Journal 25, no. 1 (2012): 21–37. http://dx.doi.org/10.4018/irmj.2012010102.
Der volle Inhalt der QuelleSmith, Thomas J. (Tom), Julia L. Higgs, and Robert E. Pinsker. "Do Auditors Price Breach Risk in Their Audit Fees?" Journal of Information Systems 33, no. 2 (2018): 177–204. http://dx.doi.org/10.2308/isys-52241.
Der volle Inhalt der QuelleDu, Shuili, Kholekile L. Gwebu, Jing Wang, and Kun Yu. "Differential Market Reaction to Data Security Breaches: A Screening Perspective." Communications of the Association for Information Systems 54 (2024): 376–401. http://dx.doi.org/10.17705/1cais.05414.
Der volle Inhalt der QuelleJuma'h, Ahmad H., and Yazan Alnsour. "The effect of data breaches on company performance." International Journal of Accounting & Information Management 28, no. 2 (2020): 275–301. http://dx.doi.org/10.1108/ijaim-01-2019-0006.
Der volle Inhalt der QuelleSaleem, Hamza, and Muhammad Naveed. "SoK: Anatomy of Data Breaches." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (2020): 153–74. http://dx.doi.org/10.2478/popets-2020-0067.
Der volle Inhalt der QuelleJohnson, Mark, Min Jung Kang, and Tolani Lawson. "Stock Price Reaction to Data Breaches." Journal of Finance Issues 16, no. 2 (2017): 1–13. http://dx.doi.org/10.58886/jfi.v16i2.2263.
Der volle Inhalt der QuelleMulyadi, Rahmad, Witantra Dhamar Hutami, Kevin Dilian Suganda, and Dhiya Farah Khalisha. "Risk of neurologic deficit in medially breached pedicle screws assessed by computed tomography: a systematic review." Asian Spine Journal 18, no. 6 (2024): 903–12. https://doi.org/10.31616/asj.2024.0325.
Der volle Inhalt der QuelleWang, Tawei, Yen-Yao Wang, and Ju-Chun Yen. "It's Not My Fault." Journal of Database Management 30, no. 3 (2019): 18–37. http://dx.doi.org/10.4018/jdm.2019070102.
Der volle Inhalt der QuelleKude, Thomas, Hartmut Hoehle, and Tracy Ann Sykes. "Big data breaches and customer compensation strategies." International Journal of Operations & Production Management 37, no. 1 (2017): 56–74. http://dx.doi.org/10.1108/ijopm-03-2015-0156.
Der volle Inhalt der QuelleDissertationen zum Thema "Breaches"
Talavera, Cano Andrés. "Regulating the Intolerance of Contractual Breaches." IUS ET VERITAS, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/123754.
Der volle Inhalt der QuelleSmith, Tanshanika Turner. "Examining Data Privacy Breaches in Healthcare." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2623.
Der volle Inhalt der QuelleHo, Jean Qing Ying. "State responsibility for breaches of investment contracts." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708722.
Der volle Inhalt der QuelleBiggs, Carl T. "Implications of transaction costs for acquisition program cost breaches." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34629.
Der volle Inhalt der QuelleVorogushyn, Sergiy. "Analysis of flood hazard under consideration of dike breaches." Phd thesis, Aachen Shaker, 2008. http://d-nb.info/994678622/04.
Der volle Inhalt der QuelleGriffin, Tony. "Strategies to Prevent Security Breaches Caused by Mobile Devices." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4628.
Der volle Inhalt der QuelleSaber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.
Der volle Inhalt der QuelleOfori-Duodu, Michael Samuel. "Exploring Data Security Management Strategies for Preventing Data Breaches." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.
Der volle Inhalt der QuelleZuzak, Catherine Ann. "Liability for breaches of aviation security obligatons : a Canadian perspective." Thesis, McGill University, 1990. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=59859.
Der volle Inhalt der QuelleKershaw, Debra S. "BOUNDARIES AND BREACHES: COMPLEXITIES AND STRATEGIES DOWN ON THE FARM." UKnowledge, 2011. http://uknowledge.uky.edu/gradschool_diss/202.
Der volle Inhalt der QuelleBücher zum Thema "Breaches"
Daswani, Neil, and Moudy Elbayadi. Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7.
Der volle Inhalt der QuelleS, Logweller Cary, ed. Identity theft breaches. Nova Science Publishers, 2009.
Den vollen Inhalt der Quelle findenY, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. MCLE, 2009.
Den vollen Inhalt der Quelle findenY, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. MCLE, 2009.
Den vollen Inhalt der Quelle findenCentre, National Computing, ed. The Information Security Breaches Survey 1996. National Computing Centre, 1996.
Den vollen Inhalt der Quelle findenFoster, Peter C., Sara E. Cable, Kathleen M. Porter, and Walter C. Boyd. Fundamentals of data security law & breaches. MCLE New England, 2014.
Den vollen Inhalt der Quelle findenArena, Mark V. Management perspectives pertaining to root cause analyses of Nunn-McCurdy breaches: Contractor motivations and anticipating breaches. Rand Corporation, 2014.
Den vollen Inhalt der Quelle findenVan Roosebeke, Bert. State Liability for Breaches of European Law. DUV, 2007. http://dx.doi.org/10.1007/978-3-8350-9494-9.
Der volle Inhalt der QuelleWong, Rebecca. Data Security Breaches and Privacy in Europe. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7.
Der volle Inhalt der QuelleRita, Tehan, ed. Data security breaches: Context and incident summaries. Nova Science Publishers, 2008.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Breaches"
Anesko, Michael. "Breaches." In Henry James and Queer Filiation. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94538-5_13.
Der volle Inhalt der QuelleDaswani, Neil, and Moudy Elbayadi. "The Root Causes of Data Breaches." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_1.
Der volle Inhalt der QuelleDaswani, Neil, and Moudy Elbayadi. "The Equifax Breach." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_4.
Der volle Inhalt der QuelleDaswani, Neil, and Moudy Elbayadi. "The Seven Habits of Highly Effective Security." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_9.
Der volle Inhalt der QuelleDaswani, Neil, and Moudy Elbayadi. "Facebook Security Issues and the 2016 US Presidential Election." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_5.
Der volle Inhalt der QuelleDaswani, Neil, and Moudy Elbayadi. "Advice to Cybersecurity Investors." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_14.
Der volle Inhalt der QuelleDaswani, Neil, and Moudy Elbayadi. "The Capital One Breach." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_2.
Der volle Inhalt der QuelleDaswani, Neil, and Moudy Elbayadi. "Technology Defenses to Fight the Root Causes of Breach: Part One." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_12.
Der volle Inhalt der QuelleDaswani, Neil, and Moudy Elbayadi. "The Yahoo Breaches of 2013 and 2014." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_7.
Der volle Inhalt der QuelleDaswani, Neil, and Moudy Elbayadi. "Applying Your Skills to Cybersecurity." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_16.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Breaches"
K, Santha Sheela, Mrithula M, Varshni Priya A, and Selvalakshmi C.B. "Cyber Hacking Breaches Prediction and Detection Using Machine Learning." In 2024 IEEE 2nd International Conference on Innovations in High Speed Communication and Signal Processing (IHCSP). IEEE, 2024. https://doi.org/10.1109/ihcsp63227.2024.10960232.
Der volle Inhalt der QuelleSandeep, V., Jyotirmaya Sahoo, and Pawan Bhambu. "Defending Machine Learning in Agriculture Against Data Breaches and Misuse." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10726152.
Der volle Inhalt der QuelleJulie, Gabriel, Bas Dit Nugues Manon, Flouzat-Lachaniette Charles Henri, et al. "Preventing cortical breaches with impact analysis during spinal instrumentation surgery." In 2024 46th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). IEEE, 2024. https://doi.org/10.1109/embc53108.2024.10781753.
Der volle Inhalt der QuelleAngelis, John N., and Rajendran S. Murthy. "Blame Shifting, Shopping Intensity, and Revisit Likelihood in Data Breaches." In 2024 Portland International Conference on Management of Engineering and Technology (PICMET). IEEE, 2024. http://dx.doi.org/10.23919/picmet64035.2024.10653185.
Der volle Inhalt der QuelleXiang, Hui, Yifan Wu, Xuebin Wang, Jinqiao Shi, Can Zhao, and Jiapeng Zhao. "Identifying Data Breaches in Dark Web through Prompt Active Learning." In 2024 IEEE 9th International Conference on Data Science in Cyberspace (DSC). IEEE, 2024. https://doi.org/10.1109/dsc63484.2024.00016.
Der volle Inhalt der QuelleTomasov, Adrian, Petr Dejdar, Petr Munster, and Tomas Horvath. "Utilizing a State of Polarization Change Detector and Machine Learning for Enhanced Security in Fiber-Optic Networks." In CLEO: Applications and Technology. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_at.2024.jtu2a.217.
Der volle Inhalt der QuelleSrinivasan, S. "Privacy Protection and Data Breaches." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2261.
Der volle Inhalt der QuelleSingh, Ram Govind, and Naveenkumar D. "Are we undermining data breaches? Protecting education sector from data breaches." In 2023 International Conference on Computer, Electronics & Electrical Engineering & their Applications (IC2E3). IEEE, 2023. http://dx.doi.org/10.1109/ic2e357697.2023.10262570.
Der volle Inhalt der QuelleFleury-Charles, Aaron, Md Minhaz Chowdhury, and Nafiz Rifat. "Data Breaches: Vulnerable Privacy." In 2022 IEEE International Conference on Electro Information Technology (eIT). IEEE, 2022. http://dx.doi.org/10.1109/eit53891.2022.9814044.
Der volle Inhalt der QuelleAlaminov, Hristo. "DATA BREACHES AND DIGITALISATION." In PROTECTION OF THE PERSONAL DATA AND THE DIGITALIZATION 2021. University publishing house "Science and Economics", University of Economics - Varna, 2021. http://dx.doi.org/10.36997/ppdd2021.29.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Breaches"
Woodhams, Josephine. Breaches in Research Integrity. UK Research Integrity Office, 2023. http://dx.doi.org/10.37672/ukrio.2023.07.breachesinresearchintegrity.
Der volle Inhalt der QuelleSainsbury, Nicola. Whistleblowing and Breaches of Good Research Practice. UK Research Integrity Office, 2024. http://dx.doi.org/10.37672/ukrio.2024.04.whistleblowingandbreaches.
Der volle Inhalt der QuelleHurtle, Jackie C. Decrease the Number of Glovebox Glove Breaches and Failures. Office of Scientific and Technical Information (OSTI), 2013. http://dx.doi.org/10.2172/1113782.
Der volle Inhalt der QuelleTaylor, R. B., and D. Frobel. Barrier breaches and washover features, Martinique Beach, Nova Scotia. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1999. http://dx.doi.org/10.4095/211075.
Der volle Inhalt der QuelleFisher, Bill. Data Confidentiality: Identifying and Protecting Assets Against Data Breaches. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1800-28.
Der volle Inhalt der QuelleBiggs, Carl T., Diana I. Angelis, Laura Armey, and Raymond Franck. Transaction Costs and Cost Breaches in Major Defense Acquisition Programs. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada612617.
Der volle Inhalt der QuellePOND, DANIEL J., F. KAY HOUGHTON, and WALTER E. GILMORE. CONTRIBUTORS TO HUMAN ERRORS AND BREACHES IN NATIONAL SECURITY APPLICATIONS. Office of Scientific and Technical Information (OSTI), 2002. http://dx.doi.org/10.2172/801246.
Der volle Inhalt der QuelleFisher, Bill. Data Confidentiality: Detect, Respond to, and Recover from Data Breaches. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1800-29.
Der volle Inhalt der QuelleBratton, Robert Lawrence. Quick Look Report for Chemical Reactivity Modeling of Various Multi-Canister Overpack Breaches. Office of Scientific and Technical Information (OSTI), 2002. http://dx.doi.org/10.2172/911538.
Der volle Inhalt der QuelleAngelis, Diana I., Laura Armey, and Carl T. Biggs. A Model for Understanding the Relationship Between Transaction Costs and Acquisition Cost Breaches. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada612854.
Der volle Inhalt der Quelle