Siga este enlace para ver otros tipos de publicaciones sobre el tema: Breaches.

Tesis sobre el tema "Breaches"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores tesis para su investigación sobre el tema "Breaches".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Talavera, Cano Andrés. "Regulating the Intolerance of Contractual Breaches." IUS ET VERITAS, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/123754.

Texto completo
Resumen
To penalize contractual breaches allows efficient allocation of risks in a contract, ensuring and maintaining the contractual equilibrium that the parties had in mind and shaped in its contractual regulation. The intelligent use of penalties will safeguard and maintain the economic balance of the contracts, thus maintaining the profitability of business operations pursued through them.<br>Penalizar los incumplimientos permite una asignación eficiente de los riesgos en un contrato, asegurando y conservando el equilibrio contractual que las partes tuvieron en mente y plasmaron en su regulación c
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Smith, Tanshanika Turner. "Examining Data Privacy Breaches in Healthcare." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2623.

Texto completo
Resumen
Healthcare data can contain sensitive, personal, and confidential information that should remain secure. Despite the efforts to protect patient data, security breaches occur and may result in fraud, identity theft, and other damages. Grounded in the theoretical backdrop of integrated system theory, the purpose of this study was to determine the association between data privacy breaches, data storage locations, business associates, covered entities, and number of individuals affected. Study data consisted of secondary breach information retrieved from the Department of Health and Human Services
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Ho, Jean Qing Ying. "State responsibility for breaches of investment contracts." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708722.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Biggs, Carl T. "Implications of transaction costs for acquisition program cost breaches." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34629.

Texto completo
Resumen
Approved for public release; distribution is unlimited<br>It is generally accepted that cost growth in federal major defense acquisition programs (MDAPs) is partially attributable to inaccurate cost estimates. Cost analysts exhaustively analyze manpower and resources to provide accurate estimates, however the influence of transaction costs is often ignored in traditional cost estimates. This thesis investigates the association between cost growth and transaction costs, the real cost of business negotiations and program management. We collect MDAP cost threshold breach data and cross reference
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Vorogushyn, Sergiy. "Analysis of flood hazard under consideration of dike breaches." Phd thesis, Aachen Shaker, 2008. http://d-nb.info/994678622/04.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Griffin, Tony. "Strategies to Prevent Security Breaches Caused by Mobile Devices." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4628.

Texto completo
Resumen
Data breaches happen almost every day in the United States and, according to research, the majority of these breaches occur due to a lack of security with organizations' mobile devices. Although most of the security policies related to mobile devices currently in place may meet the guidelines required by law, they often fail to prevent a data breach caused by a mobile device. The main purpose of this qualitative single case study was to explore the strategies used by security managers to prevent data breaches caused by mobile devices. The study population consisted of security managers working
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Saber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.

Texto completo
Resumen
Cybercrime is one of the quickest growing areas of criminality. Criminals abuse the speed, accessibility, and privacy of the Internet to commit diverse crimes involving data and identity theft that cause severe damage to victims worldwide. Many small businesses do not have the financial and technological means to protect their systems from cyberattack, making them vulnerable to data breaches. This exploratory multiple case study, grounded in systems thinking theory and routine activities theory, encompassed an investigation of cybersecurity strategies used by 5 small business leaders in Middle
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Ofori-Duodu, Michael Samuel. "Exploring Data Security Management Strategies for Preventing Data Breaches." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.

Texto completo
Resumen
Insider threat continues to pose a risk to organizations, and in some cases, the country at large. Data breach events continue to show the insider threat risk has not subsided. This qualitative case study sought to explore the data security management strategies used by database and system administrators to prevent data breaches by malicious insiders. The study population consisted of database administrators and system administrators from a government contracting agency in the northeastern region of the United States. The general systems theory, developed by Von Bertalanffy, was used as the co
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Zuzak, Catherine Ann. "Liability for breaches of aviation security obligatons : a Canadian perspective." Thesis, McGill University, 1990. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=59859.

Texto completo
Resumen
Unlawful interference with civil aviation is one of the most pressing and worrisome problems facing the international aviation community today. In the last few decades, violations of aviation security have included acts of sabotage, bombings and bomb threats and the unlawful seizure and total destruction of aircraft in flight. Great efforts have been taken at the national and international levels to increase and standardize security measures at airports throughout the world. The fact remains, however, that even the most stringent security requirements have not been able to guard against all po
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Kershaw, Debra S. "BOUNDARIES AND BREACHES: COMPLEXITIES AND STRATEGIES DOWN ON THE FARM." UKnowledge, 2011. http://uknowledge.uky.edu/gradschool_diss/202.

Texto completo
Resumen
Employing a wide range of theoretical and methodological tools, practitioners within an array of disciplines have attempted to gain new understanding about the structural changes in the agricultural system in the United States and around the world. From Agricultural Economists to Sociologists, quantitative and qualitative research has attempted to shed light on structural change in agriculture and its implications for the real lives of farmers, their families, and consumers of their goods. The current research adopts a comparative-historical approach to examining the particular affects of stru
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Robson, Jennifer van Krieken. "Understanding practitioners' responses to inequality and breaches of human rights." Thesis, Canterbury Christ Church University, 2012. http://create.canterbury.ac.uk/12166/.

Texto completo
Resumen
My thesis arose from a sense of frustration that the inequality and breaches of human rights experienced by children and young people were unaddressed within the education settings in which I work. Using Mills' (1959) notion of connecting the 'personal troubles of the milieu' and the 'public issues of the social structure’ I explore my own, and other’s practice, to achieve a range of alternative responses to inequality and breaches of human rights. Exploration of theoretical perspectives shows that different conceptual positions (e.g. equality of condition, Baker et al 2004; capability equalit
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Varuhas, Jason Nicholas Euripide. "Damages for breaches of human rights : a tort-based approach." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609692.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Polanco, Pinerez G. C. "Phase change within flows from breaches of liquefied gas pipelines." Thesis, Coventry University, 2008. http://curve.coventry.ac.uk/open/items/b374a447-1db1-b578-7424-a5e485b28f4f/1.

Texto completo
Resumen
This thesis presents a compendium of work on superheated liquid releases. Superheated liquid releases are often subject to flashing. Nucleation has been identified as an important process in the early stage of flashing. The presence of strong nucleation and therefore flashing depends on the output of the balance of the promoting forces and dissipation forces inside the fluid released. A one dimensional model to classify the type of jet to be formed after the release has been developed based on the balance of these forces. The analysis is based on the assumption that the nucleation process can
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Kongnso, Fedinand Jaiventume. "Best Practices to Minimize Data Security Breaches for Increased Business Performance." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1825.

Texto completo
Resumen
In the United States, businesses have reported over 2,800 data compromises of an estimated 543 million records, with security breaches costing firms approximately $7.2 million annually. Scholars and industry practitioners have indicated a significant impact of security breaches on consumers and organizations. However, there are limited data on the best practices for minimizing the impact of security breaches on organizational performance. The purpose of this qualitative multicase study was to explore best practices technology leaders use to minimize data security breaches for increased busines
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Vorogushyn, Sergiy [Verfasser]. "Analysis of flood hazard under consideration of dike breaches / Sergiy Vorogushyn." Aachen : Shaker, 2009. http://d-nb.info/1156517923/34.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Fahy, Patrick. "State obligations to prevent breaches of Article 3 by non-state actors." Thesis, Queen's University Belfast, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.673848.

Texto completo
Resumen
The thesis examines an area of human rights law where the author contends there is serious doctrinal imprecision and decisional inconsistency in the jurisprudence of the European Court of Human Rights; in the principles and practice applied in relation to the State's obligations under Article 3 of the European Convention on Human Rights to provide operational protection for At1icle 3 rights. The thesis relates this problem back to the failure of the European Court of Human Rights in the case of Osman v United Kingdom to sufficiently define the relationship between the notion of effectiveness a
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Laoh, Arnold. "The availability of international judicial review of government breaches of human rights." Thesis, Laoh, Arnold (2006) The availability of international judicial review of government breaches of human rights. PhD thesis, Murdoch University, 2006. https://researchrepository.murdoch.edu.au/id/eprint/144/.

Texto completo
Resumen
The main objective of this thesis is to provide description, analysis and criticism on the existing international instruments for the promotion of respect and protection of human rights, as well as a suggestion to the international community through the United Nations mechanism to adopt an additional legal instrument as a complementary procedure. This, in turn, should serve as an extra-pressure upon the State governments to bring their internal legal system in the same line as the international standards for the protection of human rights. It is being argued in this work that the current in
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Laoh, Arnold. "The availability of international judicial review of government breaches of human rights." Laoh, Arnold (2006) The availability of international judicial review of government breaches of human rights. PhD thesis, Murdoch University, 2006. http://researchrepository.murdoch.edu.au/144/.

Texto completo
Resumen
The main objective of this thesis is to provide description, analysis and criticism on the existing international instruments for the promotion of respect and protection of human rights, as well as a suggestion to the international community through the United Nations mechanism to adopt an additional legal instrument as a complementary procedure. This, in turn, should serve as an extra-pressure upon the State governments to bring their internal legal system in the same line as the international standards for the protection of human rights. It is being argued in this work that the current in
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Osei-Amanfi, Michael. "A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches." Thesis, Grand Canyon University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13423232.

Texto completo
Resumen
<p> The purpose of this qualitative single case study was to explore the available strategies IT leaders at ABC, a Managed IT Services company in the SME sector in Columbus, Ohio, may use to avoid data breaches in the cloud environment. The security framework established by the Cloud Security Alliance (CSA) provided the conceptual framework for this study. A purposeful sampling strategy was used to select 10 IT leaders to participate in the study. Data were gathered through open-ended, semi-structured individual face-to-face interviews, asynchronous discussions through e-mails, and reviews of
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Zhou, Lei. "The value of security audits, asymmetric information and market impact of security breaches." College Park, Md. : University of Maryland, 2004. http://hdl.handle.net/1903/1736.

Texto completo
Resumen
Thesis (Ph. D.) -- University of Maryland, College Park, 2004.<br>Thesis research directed by: Business and Management. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Ayereby, Manouan Pierre-Marius. "Overcoming Data Breaches and Human Factors in Minimizing Threats to Cyber-Security Ecosystems." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6163.

Texto completo
Resumen
This mixed-methods study focused on the internal human factors responsible for data breaches that could cause adverse impacts on organizations. Based on the Swiss cheese theory, the study was designed to examine preventative measures that managers could implement to minimize potential data breaches resulting from internal employees' behaviors. The purpose of this study was to provide insight to managers about developing strategies that could prevent data breaches from cyber-threats by focusing on the specific internal human factors responsible for data breaches, the root causes, and the preven
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

au, adt@murdoch edu, and Arnold Laoh. "The availability of international judicial review of government act for breaches of human rights." Murdoch University, 2002. http://wwwlib.murdoch.edu.au/adt/browse/view/adt-MU20061122.131327.

Texto completo
Resumen
The main objective of this thesis is to provide description, analysis and criticism on the existing international instruments for the promotion of respect and protection of human rights, as well as a suggestion to the international community through the United Nations mechanism to adopt an additional legal instrument as a complementary procedure. This, in turn, should serve as an extra-pressure upon the State governments to bring their internal legal system in the same line as the international standards for the protection of human rights. It is being argued in this work that the current inte
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Bellefeuille, Cynthia Lynn. "Quantifying and managing the risk of information security breaches participants in a supply chain." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33313.

Texto completo
Resumen
Thesis (M. Eng. in Logistics)--Massachusetts Institute of Technology, Engineering Systems Division, 2005.<br>Includes bibliographical references (leaf 70).<br>Technical integration between companies can result in an increased risk of information security breaches. This thesis proposes a methodology for quantifying information security risk to a supply chain participant. Given a system responsible for supply chain interaction and the vulnerabilities attributed to the system, the variables that determine the probability and severity of security incidents were used to create a model to quantify t
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Almajed, Yasser M. "A framework for an adaptive early warning and response system for insider privacy breaches." Thesis, De Montfort University, 2015. http://hdl.handle.net/2086/11129.

Texto completo
Resumen
Organisations such as governments and healthcare bodies are increasingly responsible for managing large amounts of personal information, and the increasing complexity of modern information systems is causing growing concerns about the protection of these assets from insider threats. Insider threats are very difficult to handle, because the insiders have direct access to information and are trusted by their organisations. The nature of insider privacy breaches varies with the organisation’s acceptable usage policy and the attributes of an insider. However, the level of risk that insiders pose d
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Garringer, James. "The Role of Protocol Analysis in Cybersecurity| Closing the Gap on Undetected Data Breaches." Thesis, Utica College, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10974156.

Texto completo
Resumen
<p> Organizations of all sizes are targets for a cyberattack. Undetected data breaches result in the catastrophic loss of personally identifiable information (PII) causing considerable financial and reputation harm to organizations, while also imposing a risk of identity fraud to consumers. The purpose of this study was to consider the impact that undetected data breaches have on organizations with an additional focus on shortening the gap between the time of data breach and the time of detection through manual protocol analysis and intrusion detection system (IDS) solutions. This research rev
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Sleep, Lyndal. "Pulling down their breaches : An analysis of Centrelink breach and appeal numbers from 1996 to 2001 using a case study of a single Centrelink office." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1322.

Texto completo
Resumen
This thesis is about current Centrelink breach and appeal figures. It is also about the current conservative neo-liberalising climate of Australian social policy reforms, with which they are inextricably connected. It shows that while Centrelink breach numbers have increased more than three fold since 1996, formal appeals against Centrelink decisions have not increased similarly. This thesis asks: what might this mean? It answers this question through a single case study of a Centrelink office. Data was collected using individual focused interviews, documents collected from the site, and direc
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

DeZulueta, Monica. "A novel neural network based system for assessing risks associated with information technology security breaches." FIU Digital Commons, 2004. http://digitalcommons.fiu.edu/etd/2791.

Texto completo
Resumen
Security remains a top priority for organizations as their information systems continue to be plagued by security breaches. This dissertation developed a unique approach to assess the security risks associated with information systems based on dynamic neural network architecture. The risks that are considered encompass the production computing environment and the client machine environment. The risks are established as metrics that define how susceptible each of the computing environments is to security breaches. The merit of the approach developed in this dissertation is based on the design a
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Washington, Kevin D. "The impact of data breaches on market value of firms in the E-Commerce marketplace." Thesis, Capella University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10102712.

Texto completo
Resumen
<p> Using a sample of information and security data breaches the present research examines the public announcement impact between Brick and Mortar firms and E-Commerce firms. The dissertation initially analyzes the effects of publicly announced information and security breaches on abnormal stock returns, abnormal trading volume, and firm risk. The dissertation then analyzes differential impact between Brick and Mortar firms and E-Commerce firm&rsquo;s market value following a data breach. Using a sample size of 38 information security breaches, E-Commerce firms resulted in more negative abnorm
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Enríquez, Luis. "Personal data breaches : towards a deep integration between information security risks and GDPR compliance risks." Electronic Thesis or Diss., Université de Lille (2022-....), 2024. http://www.theses.fr/2024ULILD016.

Texto completo
Resumen
La sécurité de l'information est étroitement liée au droit de protection des données, car une mise en œuvre inefficace de la sécurité peut entraîner des violations de données à caractère personnel. Le RGPD repose sur la gestion de risques pour la protection des droits et libertés des personnes concernées, ce qui signifie que la gestion de risques est le mécanisme de protection des droits fondamentaux. Cependant, l'état de l'art en matière de gestion des risques liés à la sécurité de l'information et de gestion des risques juridiques sont encore immatures. Malheureusement, l'état actuel de l'ar
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Gadirova, Nurlana. "The Impacts of Cyberattacks on Private Firms' Cash Holdings." Thesis, Université d'Ottawa / University of Ottawa, 2021. http://hdl.handle.net/10393/41924.

Texto completo
Resumen
This research investigates 202 data breach events occurring between 2015 and 2019 and the related financial effects on the USA's impacted private firms. From examining previous research, it is obvious that no known studies evaluate the financial impacts of cybercrimes on private firms. Prior studies mostly focus on public firms and stock market reactions even though there is the increasing number of cyberattacks on private firms too. This study seeks to fill the gap by providing the empirical evidence of the impacts on those firms' cash holding after experiencing a cybersecurity attack. Overal
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Betz, Linda. "An Analysis of the Relationship between Security Information Technology Enhancements and Computer Security Breaches and Incidents." NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/960.

Texto completo
Resumen
Financial services institutions maintain large amounts of data that include both intellectual property and personally identifiable information for employees and customers. Due to the potential damage to individuals, government regulators hold institutions accountable for ensuring that personal data are protected and require reporting of data security breaches. No company wants a data breach, but finding a security incident or breach early in the attack cycle may decrease the damage or data loss a company experiences. In multiple high profile data breaches reported in major news stories over th
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Paddeu, Federica Isabella. "General defences to breaches of international law : justification and excuse in the law of state responsibility." Thesis, University of Cambridge, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.648758.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Cameron, Calla. "Grave Breaches: American Military Intervention in the Late Twentieth- Century and the Consequences for International Law." Scholarship @ Claremont, 2017. http://scholarship.claremont.edu/cmc_theses/1677.

Texto completo
Resumen
The duality of the United States’ relationship with international criminal law and human rights atrocities is a fascinating theme that weaves through all of American history, but most distinctly demonstrates the contradictory nature of American foreign policy in the latter half of the 20th century. America is both protector of human rights and perpetrator of human rights atrocities, global police force and aggressor. The Cold War exacerbated the tensions caused by American military dominance. The international political and physical power of the American military allowed the United States to d
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Pelletier, Justin M. "Effects of Data Breaches on Sector-Wide Systematic Risk in Financial, Technology, Healthcare and Services Sectors." Thesis, Capella University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10615009.

Texto completo
Resumen
<p> This research informs an ongoing debate regarding a firm&rsquo;s incentives to invest in information security. Previous research reported that data breaches have had a decreasing impact on a company&rsquo;s stock price over time, leading researchers to conclude that market-based incentives are decreasingly effective. Some information security economists also suggested that further regulation is necessary because they found that capital market participants poorly accounted for the spillover effects of a breach&mdash;the effects of a breach that are external to the breached company. However,
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Asiri, Mohammed. "Three Essays in Investment Efficiency, Accounting Reporting Complexity, and Cybersecurity Breaches: Evidence from Corporate Tax Avoidance." Thesis, Curtin University, 2021. http://hdl.handle.net/20.500.11937/83671.

Texto completo
Resumen
This thesis comprises three essays that examine the association between corporate tax avoidance and investment efficiency, accounting reporting complexity (ARC) and cybersecurity breaches (CSBs). The results of this study indicate that there is a positive association between corporate tax avoidance and investment inefficiency. It is also found that the association is mediated by financial statement readability, financial statement comparability and product market competition. It is found that ARC is associated positively with firms’ reporting of UTBs. Additionally, the use of industry-speciali
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Lee, Foong Mee, and n/a. "Remedies and sanctions against corporate officers for breaches of duties under part 3.2 of the corporations law." University of Canberra. Law, 1994. http://erl.canberra.edu.au./public/adt-AUC20050523.102418.

Texto completo
Resumen
The subject of sanctions and remedies against corporate officers for breaches of the provisions in the Corporations Law is an area of the law which has been largely neglected by the legislature. Although there have been several legislative reforms on remedies since the Corporations Law came into force, those reforms were ad hoc in nature and no attempt has been made to carry out a comprehensive review to assess the effectiveness of the existing sanctions and remedies in context of the needs of contemporary society. In consequence, there is increasing concern that the remedies employed in Austr
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Hicks, Andrew David. "Conceptualising the constructive trust : a new approach and its specific application to acquisitive breaches of fiduciary obligation." Thesis, University of Hull, 2007. http://hydra.hull.ac.uk/resources/hull:6437.

Texto completo
Resumen
In this thesis I examine the conceptual nature of the constructive trust. In particular I provide a critique of those contemporary theories which view the conceptual choice as one of clear alternatives between the "institutional" and "remedial" constructive trust. Having rejected these unhelpful and somewhat confusing alternatives a new framework for analysis is proposed. The aim of the proposal is to facilitate the reaching of normatively desirable results within a framework that is coherent, rational and illuminating. The framework is applied (and its benefits illustrated) in the second half
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Waddell, Stanie Adolphus. "A Study of the Effect of Information Security Policies on Information Security Breaches in Higher Education Institutions." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/331.

Texto completo
Resumen
Many articles within the literature point to the information security policy as one of the most important elements of an effective information security program. Even though this belief is continually referred to in many information security scholarly articles, very few research studies have been performed to corroborate this sentiment. Doherty and Fulford undertook two studies in 2003 and in 2005 respectively that sought to catalogue the impact of the information security policy on breaches at businesses in the United Kingdom. The pair went on to call for additional studies in differing indust
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Zachis, Savio de Melo. "Analysis of breaches and co-breaks in financial series: a non-parametric approach data using high frequency." Universidade Federal do CearÃ, 2009. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=3730.

Texto completo
Resumen
nÃo hÃ<br>This research use a non-parametric test developed by Lee & MYKLAND (2007) to extract jumps in IBOVESPA series and study its dynamics. Among the qualities of this test there are the ability to identify the exact time of occurrence of break / co-break, the sign and size of it. The jumps in the series of Dow Jones, Exchange rate, C-Bond spread and SELIC rate were also estimated and the relation with IBOVESPAÂs jump were verified. The results were analyzed by descriptive statistics, analysis of frequencies and Logit regression models. As a main result there was the predominance of co-bre
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Moruzzi, Davide <1997&gt. "Cyber data intelligence tool: from raw data breaches to structured storing, performant searching and user-friendly visualisation." Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19916.

Texto completo
Resumen
The thesis aims to summarise and motivate the cyber intelligence project carried out during the internship period in a local company. The scenario in which the developed software runs will be presented. The technologies and criticalities found will be highlighted and the final product that can be used by the company for its own purposes will be shown. It is possible to find everything you need by surfing the web, also a lot of stolen credentials. Everyday people upload on the web data which came from a breach due to lack of security in the network infrastructures, malware attacks or human err
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Mendoza, Choque Luis Enrique. "Main Labor Breaches of the Peruvian State in the Framework of the Free Trade Agreement with the United States." Derecho & Sociedad, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/118733.

Texto completo
Resumen
The following article begins with the old and close relationship between labor rights and international trade, a relationship that has become more important given the creation of new instruments, mechanisms and sanctions. The labor chapter of the Peru-US Trade Promotion Agreement and its application can be analyzed from different perspectives. The following article sets its focus on three distinct facets: the principle of progressivity of social rights; the legal nature of free trade agreements; and two of the current promotional labor regimes in Peruvian legislation. The article references tw
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Xanthaki, Helen. "Secondary establishment of European Union public limited companies in France, Greece and Italy : breaches of European Community law and redress." Thesis, Durham University, 2000. http://etheses.dur.ac.uk/1202/.

Texto completo
Resumen
The thesis analyses the secondary establishment of foreign European Union public companies limited by shares in France, Greece and Italy. The conditions for the establishment of branches, agencies and subsidiaries in the three countries are presented. Their compliance with European Community law is evaluated. Although the formal conditions for the recognition and secondary establishment of foreign companies comply with European Community law, national legislative and administrative practices limit the activities allowed to foreign persons and violate their free establishment, as confirmed by t
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Nsibande, Senzosenkosi. "The impact of data breaches of varying severity on the customer loyalty of high net worth individuals in retail banking." Diss., University of Pretoria, 2020. http://hdl.handle.net/2263/79631.

Texto completo
Resumen
The aim of this study was to investigate the impact of data breaches of varying severity on customer loyalty. The study was motivated by the growth in the amount of data shared and stored by organisations to enhance service offerings (Big Data), and the increase in the frequency and scale of data breaches caused by this. Research shows that customer loyalty is critical to the long-term profitability of an organisation, making the understanding of data breaches on customer loyalty critical for any organisation’s prospects. Despite this significance, literature on how breach severity can influen
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Sedaghat, Soroush, University of Western Sydney, and School of Computing and Information Technology. "Web authenticity." THESIS_XXX_CIT_Sedaghat_S.xml, 2002. http://handle.uws.edu.au:8081/1959.7/431.

Texto completo
Resumen
Advancements in web technology such as the integration of operating platforms, the application of mobile applets and connectivity with databases into an encompassing web environment has promoted the development of complex web-based systems for enterprise computing. In this integration the inherent security flaws and associated problems of these technological advancements are also brought together under this web environment. These flaws, when exploited, could lead to system compromises of various kinds including stealing of security sensitive information, system take-over fabrication of fake el
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Ahmadian, Reza. "Modelling hydrodynamic and bacterial processes through linked river, floodplain and coastal systems : with particular application to marine turbines, barrages and embankment breaches." Thesis, Cardiff University, 2010. http://orca.cf.ac.uk/54931/.

Texto completo
Resumen
Hydro-environmental models have provided robust tools for efficient planning of water resources, flood risk and water quality, as well as increasingly being used for new challenges such as marine renewable energy, and have increasingly attracted growing interest. The new challenges ahead for use of hydro-environmental modelling tools has led to an increasing interest in considering the water system as a whole, and with a larger system framework, with this being achieved by expanding the modelling domain further than the area of the interest to capture the whole hydrodynamic and water quality a
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Anagnostaras, Georgios. "To sue or not to sue? : the present and future of liability actions for breaches of European Community law committed by the domestic authorities." Thesis, University of Bristol, 2001. http://hdl.handle.net/1983/c2f5f65b-28be-4db8-9d7d-0e84d4694a28.

Texto completo
Resumen
The introduction in the seminal case of Francovich of the principle of governmental liability for breaches committed by the domestic authorities added a further means of protection to the judicial arsenal of individuals claiming rights under the Treaty. At the same time, it gave rise to considerable academic comment around the legitimacy of the doctrine and the exact circumstances in which damages can be paid under it from the national treasury. The intention of this thesis is basically twofold. In the first place, it analyses the developments that have taken place in the field under considera
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Zottoli, Michael A. "Understanding the process through which breaches of the psychological contract influence feelings of psychological contract violation: an analysis incorporating causal, responsibility and blame attributions." The Ohio State University, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=osu1054515958.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Ahmad, Altaf. "The Effect of Perceived Privacy Breaches on Continued Technology Use and Individual Psychology: The Construct, Instrument Development, and an Application Using Internet Search Engines." OpenSIUC, 2010. https://opensiuc.lib.siu.edu/dissertations/162.

Texto completo
Resumen
This dissertation involved the development of a new construct, perceived privacy breach (PPB), to evaluate how a person perceives breaches of privacy in terms of whether they perceive any exchange of information was fair or not and how they believe it will impact people whose information has been shared. This instrument assists researchers to understand how a person perceives a possible breach of privacy. The PPB instrument was created after conducting a pilot study of approximately 200 undergraduate students and testing the data for possible dimensions in an Exploratory Factor Analysis (EFA).
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Pikó, Rita. "Swiss Legal Status on the Protection of Whistleblowers: Taking into account the EU Directive on the protection of persons who report breaches of Union law." Universität Leipzig, 2020. https://ul.qucosa.de/id/qucosa%3A70825.

Texto completo
Resumen
The EU Whistleblower Protection Directive came into force on 16 December 2019. Switzerland continues to struggle with this topic: the Swiss National Council (Nationalrat) dismissed a draft law on its introduction on 3 June 2019 and, after the Swiss Council of States (Ständerat) approved the draft law without changes on 16 December 2019, dismissed it again on 5 March 2020.
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Kinna, Rémy Paul. "Entering murky legal waters transboundary impacts of acid mine drainage within the Limpopo river as potential breaches of South Africa's duty not to cause significant harm." Master's thesis, University of Cape Town, 2013. http://hdl.handle.net/11427/4479.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!