Dissertationen zum Thema „Breaches“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Breaches" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Talavera, Cano Andrés. "Regulating the Intolerance of Contractual Breaches." IUS ET VERITAS, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/123754.
Der volle Inhalt der QuelleSmith, Tanshanika Turner. "Examining Data Privacy Breaches in Healthcare." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2623.
Der volle Inhalt der QuelleHo, Jean Qing Ying. "State responsibility for breaches of investment contracts." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708722.
Der volle Inhalt der QuelleBiggs, Carl T. "Implications of transaction costs for acquisition program cost breaches." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34629.
Der volle Inhalt der QuelleVorogushyn, Sergiy. "Analysis of flood hazard under consideration of dike breaches." Phd thesis, Aachen Shaker, 2008. http://d-nb.info/994678622/04.
Der volle Inhalt der QuelleGriffin, Tony. "Strategies to Prevent Security Breaches Caused by Mobile Devices." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4628.
Der volle Inhalt der QuelleSaber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.
Der volle Inhalt der QuelleOfori-Duodu, Michael Samuel. "Exploring Data Security Management Strategies for Preventing Data Breaches." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.
Der volle Inhalt der QuelleZuzak, Catherine Ann. "Liability for breaches of aviation security obligatons : a Canadian perspective." Thesis, McGill University, 1990. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=59859.
Der volle Inhalt der QuelleKershaw, Debra S. "BOUNDARIES AND BREACHES: COMPLEXITIES AND STRATEGIES DOWN ON THE FARM." UKnowledge, 2011. http://uknowledge.uky.edu/gradschool_diss/202.
Der volle Inhalt der QuelleRobson, Jennifer van Krieken. "Understanding practitioners' responses to inequality and breaches of human rights." Thesis, Canterbury Christ Church University, 2012. http://create.canterbury.ac.uk/12166/.
Der volle Inhalt der QuelleVaruhas, Jason Nicholas Euripide. "Damages for breaches of human rights : a tort-based approach." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609692.
Der volle Inhalt der QuellePolanco, Pinerez G. C. "Phase change within flows from breaches of liquefied gas pipelines." Thesis, Coventry University, 2008. http://curve.coventry.ac.uk/open/items/b374a447-1db1-b578-7424-a5e485b28f4f/1.
Der volle Inhalt der QuelleKongnso, Fedinand Jaiventume. "Best Practices to Minimize Data Security Breaches for Increased Business Performance." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1825.
Der volle Inhalt der QuelleVorogushyn, Sergiy [Verfasser]. "Analysis of flood hazard under consideration of dike breaches / Sergiy Vorogushyn." Aachen : Shaker, 2009. http://d-nb.info/1156517923/34.
Der volle Inhalt der QuelleFahy, Patrick. "State obligations to prevent breaches of Article 3 by non-state actors." Thesis, Queen's University Belfast, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.673848.
Der volle Inhalt der QuelleLaoh, Arnold. "The availability of international judicial review of government breaches of human rights." Thesis, Laoh, Arnold (2006) The availability of international judicial review of government breaches of human rights. PhD thesis, Murdoch University, 2006. https://researchrepository.murdoch.edu.au/id/eprint/144/.
Der volle Inhalt der QuelleLaoh, Arnold. "The availability of international judicial review of government breaches of human rights." Laoh, Arnold (2006) The availability of international judicial review of government breaches of human rights. PhD thesis, Murdoch University, 2006. http://researchrepository.murdoch.edu.au/144/.
Der volle Inhalt der QuelleOsei-Amanfi, Michael. "A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches." Thesis, Grand Canyon University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13423232.
Der volle Inhalt der QuelleZhou, Lei. "The value of security audits, asymmetric information and market impact of security breaches." College Park, Md. : University of Maryland, 2004. http://hdl.handle.net/1903/1736.
Der volle Inhalt der QuelleAyereby, Manouan Pierre-Marius. "Overcoming Data Breaches and Human Factors in Minimizing Threats to Cyber-Security Ecosystems." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6163.
Der volle Inhalt der Quelleau, adt@murdoch edu, and Arnold Laoh. "The availability of international judicial review of government act for breaches of human rights." Murdoch University, 2002. http://wwwlib.murdoch.edu.au/adt/browse/view/adt-MU20061122.131327.
Der volle Inhalt der QuelleBellefeuille, Cynthia Lynn. "Quantifying and managing the risk of information security breaches participants in a supply chain." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33313.
Der volle Inhalt der QuelleAlmajed, Yasser M. "A framework for an adaptive early warning and response system for insider privacy breaches." Thesis, De Montfort University, 2015. http://hdl.handle.net/2086/11129.
Der volle Inhalt der QuelleGarringer, James. "The Role of Protocol Analysis in Cybersecurity| Closing the Gap on Undetected Data Breaches." Thesis, Utica College, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10974156.
Der volle Inhalt der QuelleSleep, Lyndal. "Pulling down their breaches : An analysis of Centrelink breach and appeal numbers from 1996 to 2001 using a case study of a single Centrelink office." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1322.
Der volle Inhalt der QuelleDeZulueta, Monica. "A novel neural network based system for assessing risks associated with information technology security breaches." FIU Digital Commons, 2004. http://digitalcommons.fiu.edu/etd/2791.
Der volle Inhalt der QuelleWashington, Kevin D. "The impact of data breaches on market value of firms in the E-Commerce marketplace." Thesis, Capella University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10102712.
Der volle Inhalt der QuelleEnríquez, Luis. "Personal data breaches : towards a deep integration between information security risks and GDPR compliance risks." Electronic Thesis or Diss., Université de Lille (2022-....), 2024. http://www.theses.fr/2024ULILD016.
Der volle Inhalt der QuelleGadirova, Nurlana. "The Impacts of Cyberattacks on Private Firms' Cash Holdings." Thesis, Université d'Ottawa / University of Ottawa, 2021. http://hdl.handle.net/10393/41924.
Der volle Inhalt der QuelleBetz, Linda. "An Analysis of the Relationship between Security Information Technology Enhancements and Computer Security Breaches and Incidents." NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/960.
Der volle Inhalt der QuellePaddeu, Federica Isabella. "General defences to breaches of international law : justification and excuse in the law of state responsibility." Thesis, University of Cambridge, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.648758.
Der volle Inhalt der QuelleCameron, Calla. "Grave Breaches: American Military Intervention in the Late Twentieth- Century and the Consequences for International Law." Scholarship @ Claremont, 2017. http://scholarship.claremont.edu/cmc_theses/1677.
Der volle Inhalt der QuellePelletier, Justin M. "Effects of Data Breaches on Sector-Wide Systematic Risk in Financial, Technology, Healthcare and Services Sectors." Thesis, Capella University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10615009.
Der volle Inhalt der QuelleAsiri, Mohammed. "Three Essays in Investment Efficiency, Accounting Reporting Complexity, and Cybersecurity Breaches: Evidence from Corporate Tax Avoidance." Thesis, Curtin University, 2021. http://hdl.handle.net/20.500.11937/83671.
Der volle Inhalt der QuelleLee, Foong Mee, and n/a. "Remedies and sanctions against corporate officers for breaches of duties under part 3.2 of the corporations law." University of Canberra. Law, 1994. http://erl.canberra.edu.au./public/adt-AUC20050523.102418.
Der volle Inhalt der QuelleHicks, Andrew David. "Conceptualising the constructive trust : a new approach and its specific application to acquisitive breaches of fiduciary obligation." Thesis, University of Hull, 2007. http://hydra.hull.ac.uk/resources/hull:6437.
Der volle Inhalt der QuelleWaddell, Stanie Adolphus. "A Study of the Effect of Information Security Policies on Information Security Breaches in Higher Education Institutions." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/331.
Der volle Inhalt der QuelleZachis, Savio de Melo. "Analysis of breaches and co-breaks in financial series: a non-parametric approach data using high frequency." Universidade Federal do CearÃ, 2009. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=3730.
Der volle Inhalt der QuelleMoruzzi, Davide <1997>. "Cyber data intelligence tool: from raw data breaches to structured storing, performant searching and user-friendly visualisation." Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19916.
Der volle Inhalt der QuelleMendoza, Choque Luis Enrique. "Main Labor Breaches of the Peruvian State in the Framework of the Free Trade Agreement with the United States." Derecho & Sociedad, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/118733.
Der volle Inhalt der QuelleXanthaki, Helen. "Secondary establishment of European Union public limited companies in France, Greece and Italy : breaches of European Community law and redress." Thesis, Durham University, 2000. http://etheses.dur.ac.uk/1202/.
Der volle Inhalt der QuelleNsibande, Senzosenkosi. "The impact of data breaches of varying severity on the customer loyalty of high net worth individuals in retail banking." Diss., University of Pretoria, 2020. http://hdl.handle.net/2263/79631.
Der volle Inhalt der QuelleSedaghat, Soroush, University of Western Sydney, and School of Computing and Information Technology. "Web authenticity." THESIS_XXX_CIT_Sedaghat_S.xml, 2002. http://handle.uws.edu.au:8081/1959.7/431.
Der volle Inhalt der QuelleAhmadian, Reza. "Modelling hydrodynamic and bacterial processes through linked river, floodplain and coastal systems : with particular application to marine turbines, barrages and embankment breaches." Thesis, Cardiff University, 2010. http://orca.cf.ac.uk/54931/.
Der volle Inhalt der QuelleAnagnostaras, Georgios. "To sue or not to sue? : the present and future of liability actions for breaches of European Community law committed by the domestic authorities." Thesis, University of Bristol, 2001. http://hdl.handle.net/1983/c2f5f65b-28be-4db8-9d7d-0e84d4694a28.
Der volle Inhalt der QuelleZottoli, Michael A. "Understanding the process through which breaches of the psychological contract influence feelings of psychological contract violation: an analysis incorporating causal, responsibility and blame attributions." The Ohio State University, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=osu1054515958.
Der volle Inhalt der QuelleAhmad, Altaf. "The Effect of Perceived Privacy Breaches on Continued Technology Use and Individual Psychology: The Construct, Instrument Development, and an Application Using Internet Search Engines." OpenSIUC, 2010. https://opensiuc.lib.siu.edu/dissertations/162.
Der volle Inhalt der QuellePikó, Rita. "Swiss Legal Status on the Protection of Whistleblowers: Taking into account the EU Directive on the protection of persons who report breaches of Union law." Universität Leipzig, 2020. https://ul.qucosa.de/id/qucosa%3A70825.
Der volle Inhalt der QuelleKinna, Rémy Paul. "Entering murky legal waters transboundary impacts of acid mine drainage within the Limpopo river as potential breaches of South Africa's duty not to cause significant harm." Master's thesis, University of Cape Town, 2013. http://hdl.handle.net/11427/4479.
Der volle Inhalt der Quelle