Zeitschriftenartikel zum Thema „Breaches“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Breaches" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Richardson, Vernon J., Rodney E. Smith, and Marcia Weidenmier Watson. "Much Ado about Nothing: The (Lack of) Economic Impact of Data Privacy Breaches." Journal of Information Systems 33, no. 3 (2019): 227–65. http://dx.doi.org/10.2308/isys-52379.
Der volle Inhalt der QuelleZafar, Humayun, Myung Ko, and Kweku-Muata Osei-Bryson. "Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors." Information Resources Management Journal 25, no. 1 (2012): 21–37. http://dx.doi.org/10.4018/irmj.2012010102.
Der volle Inhalt der QuelleSmith, Thomas J. (Tom), Julia L. Higgs, and Robert E. Pinsker. "Do Auditors Price Breach Risk in Their Audit Fees?" Journal of Information Systems 33, no. 2 (2018): 177–204. http://dx.doi.org/10.2308/isys-52241.
Der volle Inhalt der QuelleDu, Shuili, Kholekile L. Gwebu, Jing Wang, and Kun Yu. "Differential Market Reaction to Data Security Breaches: A Screening Perspective." Communications of the Association for Information Systems 54 (2024): 376–401. http://dx.doi.org/10.17705/1cais.05414.
Der volle Inhalt der QuelleJuma'h, Ahmad H., and Yazan Alnsour. "The effect of data breaches on company performance." International Journal of Accounting & Information Management 28, no. 2 (2020): 275–301. http://dx.doi.org/10.1108/ijaim-01-2019-0006.
Der volle Inhalt der QuelleSaleem, Hamza, and Muhammad Naveed. "SoK: Anatomy of Data Breaches." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (2020): 153–74. http://dx.doi.org/10.2478/popets-2020-0067.
Der volle Inhalt der QuelleJohnson, Mark, Min Jung Kang, and Tolani Lawson. "Stock Price Reaction to Data Breaches." Journal of Finance Issues 16, no. 2 (2017): 1–13. http://dx.doi.org/10.58886/jfi.v16i2.2263.
Der volle Inhalt der QuelleMulyadi, Rahmad, Witantra Dhamar Hutami, Kevin Dilian Suganda, and Dhiya Farah Khalisha. "Risk of neurologic deficit in medially breached pedicle screws assessed by computed tomography: a systematic review." Asian Spine Journal 18, no. 6 (2024): 903–12. https://doi.org/10.31616/asj.2024.0325.
Der volle Inhalt der QuelleWang, Tawei, Yen-Yao Wang, and Ju-Chun Yen. "It's Not My Fault." Journal of Database Management 30, no. 3 (2019): 18–37. http://dx.doi.org/10.4018/jdm.2019070102.
Der volle Inhalt der QuelleKude, Thomas, Hartmut Hoehle, and Tracy Ann Sykes. "Big data breaches and customer compensation strategies." International Journal of Operations & Production Management 37, no. 1 (2017): 56–74. http://dx.doi.org/10.1108/ijopm-03-2015-0156.
Der volle Inhalt der QuelleCheng, Xu (Joyce), and Stephanie Walton. "Do Nonprofessional Investors Care About How and When Data Breaches are Disclosed?" Journal of Information Systems 33, no. 3 (2019): 163–82. http://dx.doi.org/10.2308/isys-52410.
Der volle Inhalt der QuelleSebastian, Glorin. "Cyber Kill Chain Analysis of Five Major US Data Breaches." International Journal of Cyber Warfare and Terrorism 12, no. 1 (2022): 1–15. http://dx.doi.org/10.4018/ijcwt.315651.
Der volle Inhalt der QuelleNikkhah, Hamid, and Varun Grover. "An Empirical Investigation of Company Response to Data Breaches." MIS Quarterly 46, no. 4 (2022): 2163–96. http://dx.doi.org/10.25300/misq/2022/16609.
Der volle Inhalt der QuelleMahlaola, Tintswalo B., and Barbara Van Dyk. "Reasons for Picture Archiving and Communication System (PACS) data security breaches: Intentional versus non-intentional breaches." Health SA Gesondheid 21 (October 11, 2016): 271–79. http://dx.doi.org/10.4102/hsag.v21i0.966.
Der volle Inhalt der QuelleRaasck, Kyle, Jason Khoury, Ahmed Aoude, et al. "The Effect of Thoracolumbar Pedicle Isthmus on Pedicle Screw Accuracy." Global Spine Journal 10, no. 4 (2019): 393–98. http://dx.doi.org/10.1177/2192568219850143.
Der volle Inhalt der QuelleRaghupathi, Wullianallur, Viju Raghupathi, and Aditya Saharia. "Analyzing Health Data Breaches: A Visual Analytics Approach." AppliedMath 3, no. 1 (2023): 175–99. http://dx.doi.org/10.3390/appliedmath3010011.
Der volle Inhalt der QuelleAnsar, Kainat, Mansoor Ahmed, Markus Helfert, and Jungsuk Kim. "Blockchain-Based Data Breach Detection: Approaches, Challenges, and Future Directions." Mathematics 12, no. 1 (2023): 107. http://dx.doi.org/10.3390/math12010107.
Der volle Inhalt der QuelleBoraste, Toshnil H. "Breach Analysis of Earthen Dam." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30477.
Der volle Inhalt der QuelleHiggs, Julia L., Robert E. Pinsker, Thomas J. Smith, and George R. Young. "The Relationship between Board-Level Technology Committees and Reported Security Breaches." Journal of Information Systems 30, no. 3 (2016): 79–98. http://dx.doi.org/10.2308/isys-51402.
Der volle Inhalt der QuelleGrandi, Laurie D., and Joanna R. Adler. "A Study into Breaches of Youth Justice Orders and the Young People Who Breach Them." Youth Justice 16, no. 3 (2016): 205–25. http://dx.doi.org/10.1177/1473225415618463.
Der volle Inhalt der QuelleLee, Jinhyung, and Sung J. Choi. "Hospital Productivity After Data Breaches: Difference-in-Differences Analysis." Journal of Medical Internet Research 23, no. 7 (2021): e26157. http://dx.doi.org/10.2196/26157.
Der volle Inhalt der QuelleWang, Michael Y., Guillermo Pineiro, and Praveen V. Mummaneni. "Stimulus-evoked electromyography testing of percutaneous pedicle screws for the detection of pedicle breaches: a clinical study of 409 screws in 93 patients." Journal of Neurosurgery: Spine 13, no. 5 (2010): 600–605. http://dx.doi.org/10.3171/2010.5.spine09536.
Der volle Inhalt der QuelleCross, Cassandra, Megan Parker, and Daniel Sansom. "Media discourses surrounding ‘non-ideal’ victims: The case of the Ashley Madison data breach." International Review of Victimology 25, no. 1 (2018): 53–69. http://dx.doi.org/10.1177/0269758017752410.
Der volle Inhalt der QuelleGwebu, Kholekile, and Clayton W. Barrows. "Data breaches in hospitality: is the industry different?" Journal of Hospitality and Tourism Technology 11, no. 3 (2020): 511–27. http://dx.doi.org/10.1108/jhtt-11-2019-0138.
Der volle Inhalt der QuelleKim, Yunsieg P. "Redefining “No Evidence of a Breach” in Election Security." SMU Law Review Forum 76, no. 1 (2023): 131. http://dx.doi.org/10.25172/slrf.76.1.6.
Der volle Inhalt der QuelleNeto, Nelson Novaes, Stuart Madnick, Anchises Moraes G. De Paula, and Natasha Malara Borges. "Developing a Global Data Breach Database and the Challenges Encountered." Journal of Data and Information Quality 13, no. 1 (2021): 1–33. http://dx.doi.org/10.1145/3439873.
Der volle Inhalt der QuelleD'Arcy, John, and Asli Basoglu. "The Influences of Public and Institutional Pressure on Firms’ Cybersecurity Disclosures." Journal of the Association for Information Systems 23, no. 3 (2022): 779–805. http://dx.doi.org/10.17705/1jais.00740.
Der volle Inhalt der QuelleHile, Jack. "Dude, Where’s My Data? The Effectiveness of Laws Governing Data Breaches in Australia." Journal of Telecommunications and the Digital Economy 9, no. 2 (2021): 47–68. http://dx.doi.org/10.18080/jtde.v9n2.381.
Der volle Inhalt der QuelleWhigham, Kerry. "States of conception: Renegotiating the mnemonic order amid crisis." Memory Studies 14, no. 6 (2021): 1333–46. http://dx.doi.org/10.1177/17506980211054339.
Der volle Inhalt der QuelleLi, You Tang, Zhi Yuan Rui, and Chang Feng Yan. "Uniform Model and Fracture Criteria of Annularly Breached Bars under Bending." Key Engineering Materials 321-323 (October 2006): 751–54. http://dx.doi.org/10.4028/www.scientific.net/kem.321-323.751.
Der volle Inhalt der QuelleAli, Syed Emad Azhar, Fong-Woon Lai, Ameenullah Aman, Muhammad Furquan Saleem, and Salaheldin Hamad. "Do Information Security Breach and Its Factors Have a Long-Run Competitive Effect on Breached Firms’ Equity Risk?" Journal of Competitiveness 14, no. 1 (2022): 23–42. http://dx.doi.org/10.7441/joc.2022.01.02.
Der volle Inhalt der QuelleHoltfreter, Robert E., and Adrian Harrington. "Data breach trends in the United States." Journal of Financial Crime 22, no. 2 (2015): 242–60. http://dx.doi.org/10.1108/jfc-09-2013-0055.
Der volle Inhalt der QuelleYakkaluri Narendra and Shaik Haseena. "MODELING ORGANIZATIONAL VULNERABILITY TO DATA BREACHES USING MODERN CRIME THEORY." International Journal of Engineering Research and Science & Technology 21, no. 2 (2025): 942–51. https://doi.org/10.62643/ijerst.2025.v21.i2.pp942-951.
Der volle Inhalt der QuelleKo, Dongwoo, Joongu Kang, Sungjoong Kim, and Yonguk Ryu. "Experimental study on the performance analysis of river levee using new substance for improving earth surface resistance." E3S Web of Conferences 40 (2018): 03022. http://dx.doi.org/10.1051/e3sconf/20184003022.
Der volle Inhalt der QuelleSmrithi, Sukesh, Hephzibah Miriam D. Doreen, and Robin C. R. Rene. "An analysis of the increasing cases of data breaches in india." i-manager’s Journal on Software Engineering 17, no. 3 (2023): 38. http://dx.doi.org/10.26634/jse.17.3.19791.
Der volle Inhalt der QuelleAvery, Atiya. "After the disclosure: measuring the short-term and long-term impacts of data breach disclosures on the financial performance of organizations." Information & Computer Security 29, no. 3 (2021): 500–525. http://dx.doi.org/10.1108/ics-10-2020-0161.
Der volle Inhalt der QuelleSeh, Adil Hussain, Mohammad Zarour, Mamdouh Alenezi, et al. "Healthcare Data Breaches: Insights and Implications." Healthcare 8, no. 2 (2020): 133. http://dx.doi.org/10.3390/healthcare8020133.
Der volle Inhalt der QuellePimenta Rodrigues, Gabriel Arquelau, André Luiz Marques Serrano, Amanda Nunes Lopes Espiñeira Lemos, et al. "Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review." Data 9, no. 2 (2024): 27. http://dx.doi.org/10.3390/data9020027.
Der volle Inhalt der QuelleWarren, Alexandra O., Sharon A. Wilson, Alan Howard, Axel Noblet, and Edwin S. Kite. "Multiple Overspill Flood Channels from Young Craters Require Surface Melting and Hundreds of Meters of Midlatitude Ice Late in Mars’s History." Planetary Science Journal 5, no. 8 (2024): 174. http://dx.doi.org/10.3847/psj/ad5e6f.
Der volle Inhalt der QuelleDas, Pradip Kumar. "An Insight into Data Breaches: Challenges and Prevention." Middle East Research Journal of Humanities and Social Sciences 3, no. 01 (2022): 1–8. http://dx.doi.org/10.36348/merjhss.2023.v03i01.001.
Der volle Inhalt der QuelleB., Sravani, Bhumika G, Prashanth J, Pavan B, and Asha Haseena S. "A Structural Equation Modelling Approach to Understanding Data Breach Factors Through Modern Crime Theory." International Journal of Computational Learning & Intelligence 4, no. 2 (2025): 473–79. https://doi.org/10.5281/zenodo.15184367.
Der volle Inhalt der QuelleOghene, Augustine. "Data breach and privacy in the digital era." BOHR International Journal of Computer Science 2, no. 1 (2023): 95–111. http://dx.doi.org/10.54646/bijcs.2023.26.
Der volle Inhalt der QuelleErkan-Barlow, Asligul, Thanh Ngo, Rajni Goel, and Denise Streeter. "An in-depth analysis of the impact of cyberattacks on the profitability of commercial banks in the United States." Journal of Global Business Insights 8, no. 2 (2023): 120–35. http://dx.doi.org/10.5038/2640-6489.8.2.1246.
Der volle Inhalt der QuelleKamoun, Faouzi, and Mathew Nicho. "Human and Organizational Factors of Healthcare Data Breaches." International Journal of Healthcare Information Systems and Informatics 9, no. 1 (2014): 42–60. http://dx.doi.org/10.4018/ijhisi.2014010103.
Der volle Inhalt der QuelleBisogni, Fabio, and Hadi Asghari. "More Than a Suspect: An Investigation into the Connection Between Data Breaches, Identity Theft, and Data Breach Notification Laws." Journal of Information Policy 10, no. 1 (2020): 45–82. http://dx.doi.org/10.5325/jinfopoli.10.1.0045.
Der volle Inhalt der QuelleMolitor, Dominik, Wullianallur Raghupathi, Aditya Saharia, and Viju Raghupathi. "Exploring Key Issues in Cybersecurity Data Breaches: Analyzing Data Breach Litigation with ML-Based Text Analytics." Information 14, no. 11 (2023): 600. http://dx.doi.org/10.3390/info14110600.
Der volle Inhalt der QuelleOluka, Alexander. "Analysing the implications of cybersecurity breaches on firm leadership." Technology audit and production reserves 6, no. 4(74) (2023): 20–26. http://dx.doi.org/10.15587/2706-5448.2023.286985.
Der volle Inhalt der QuelleGunatileka, Shannel. "“Big Data Breaches”, sovereignty of states and the challenges in attribution." University of Colombo Review 5, no. 1 (2024): 104–29. http://dx.doi.org/10.4038/ucr.v5i1.99.
Der volle Inhalt der QuelleSpasenko, К. "SIGNIFICANT INVESTIGATIONS OF SITUATION AND VERSIONS IN INVESTIGATION VIOLATION OF SAFETY RULES DURING WORKS WITH HIGH-RISK." Theory and Practice of Forensic Science and Criminalistics 20, no. 2 (2019): 62–71. http://dx.doi.org/10.32353/khrife.2.2019.04.
Der volle Inhalt der QuelleBrown, Nolan James, Basel Musmar, Zach Pennington, et al. "284 CT-Based Assessment of Prone Versus Lateral Pedicle Screw Placement Accuracy: A Retrospective Single-surgeon Study." Neurosurgery 70, Supplement_1 (2024): 80–81. http://dx.doi.org/10.1227/neu.0000000000002809_284.
Der volle Inhalt der Quelle