Gotowa bibliografia na temat „Breaches”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Breaches”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Breaches"
Richardson, Vernon J., Rodney E. Smith, and Marcia Weidenmier Watson. "Much Ado about Nothing: The (Lack of) Economic Impact of Data Privacy Breaches." Journal of Information Systems 33, no. 3 (2019): 227–65. http://dx.doi.org/10.2308/isys-52379.
Pełny tekst źródłaZafar, Humayun, Myung Ko, and Kweku-Muata Osei-Bryson. "Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors." Information Resources Management Journal 25, no. 1 (2012): 21–37. http://dx.doi.org/10.4018/irmj.2012010102.
Pełny tekst źródłaSmith, Thomas J. (Tom), Julia L. Higgs, and Robert E. Pinsker. "Do Auditors Price Breach Risk in Their Audit Fees?" Journal of Information Systems 33, no. 2 (2018): 177–204. http://dx.doi.org/10.2308/isys-52241.
Pełny tekst źródłaDu, Shuili, Kholekile L. Gwebu, Jing Wang, and Kun Yu. "Differential Market Reaction to Data Security Breaches: A Screening Perspective." Communications of the Association for Information Systems 54 (2024): 376–401. http://dx.doi.org/10.17705/1cais.05414.
Pełny tekst źródłaJuma'h, Ahmad H., and Yazan Alnsour. "The effect of data breaches on company performance." International Journal of Accounting & Information Management 28, no. 2 (2020): 275–301. http://dx.doi.org/10.1108/ijaim-01-2019-0006.
Pełny tekst źródłaSaleem, Hamza, and Muhammad Naveed. "SoK: Anatomy of Data Breaches." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (2020): 153–74. http://dx.doi.org/10.2478/popets-2020-0067.
Pełny tekst źródłaJohnson, Mark, Min Jung Kang, and Tolani Lawson. "Stock Price Reaction to Data Breaches." Journal of Finance Issues 16, no. 2 (2017): 1–13. http://dx.doi.org/10.58886/jfi.v16i2.2263.
Pełny tekst źródłaMulyadi, Rahmad, Witantra Dhamar Hutami, Kevin Dilian Suganda, and Dhiya Farah Khalisha. "Risk of neurologic deficit in medially breached pedicle screws assessed by computed tomography: a systematic review." Asian Spine Journal 18, no. 6 (2024): 903–12. https://doi.org/10.31616/asj.2024.0325.
Pełny tekst źródłaWang, Tawei, Yen-Yao Wang, and Ju-Chun Yen. "It's Not My Fault." Journal of Database Management 30, no. 3 (2019): 18–37. http://dx.doi.org/10.4018/jdm.2019070102.
Pełny tekst źródłaKude, Thomas, Hartmut Hoehle, and Tracy Ann Sykes. "Big data breaches and customer compensation strategies." International Journal of Operations & Production Management 37, no. 1 (2017): 56–74. http://dx.doi.org/10.1108/ijopm-03-2015-0156.
Pełny tekst źródłaRozprawy doktorskie na temat "Breaches"
Talavera, Cano Andrés. "Regulating the Intolerance of Contractual Breaches." IUS ET VERITAS, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/123754.
Pełny tekst źródłaSmith, Tanshanika Turner. "Examining Data Privacy Breaches in Healthcare." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2623.
Pełny tekst źródłaHo, Jean Qing Ying. "State responsibility for breaches of investment contracts." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708722.
Pełny tekst źródłaBiggs, Carl T. "Implications of transaction costs for acquisition program cost breaches." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34629.
Pełny tekst źródłaVorogushyn, Sergiy. "Analysis of flood hazard under consideration of dike breaches." Phd thesis, Aachen Shaker, 2008. http://d-nb.info/994678622/04.
Pełny tekst źródłaGriffin, Tony. "Strategies to Prevent Security Breaches Caused by Mobile Devices." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4628.
Pełny tekst źródłaSaber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.
Pełny tekst źródłaOfori-Duodu, Michael Samuel. "Exploring Data Security Management Strategies for Preventing Data Breaches." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.
Pełny tekst źródłaZuzak, Catherine Ann. "Liability for breaches of aviation security obligatons : a Canadian perspective." Thesis, McGill University, 1990. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=59859.
Pełny tekst źródłaKershaw, Debra S. "BOUNDARIES AND BREACHES: COMPLEXITIES AND STRATEGIES DOWN ON THE FARM." UKnowledge, 2011. http://uknowledge.uky.edu/gradschool_diss/202.
Pełny tekst źródłaKsiążki na temat "Breaches"
Daswani, Neil, and Moudy Elbayadi. Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7.
Pełny tekst źródłaS, Logweller Cary, ed. Identity theft breaches. Nova Science Publishers, 2009.
Znajdź pełny tekst źródłaY, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. MCLE, 2009.
Znajdź pełny tekst źródłaY, Chow Stephen, Anthony Barbara B, and Massachusetts Continuing Legal Education, Inc. (1982- ), eds. Preventing & handling data security breaches. MCLE, 2009.
Znajdź pełny tekst źródłaCentre, National Computing, ed. The Information Security Breaches Survey 1996. National Computing Centre, 1996.
Znajdź pełny tekst źródłaFoster, Peter C., Sara E. Cable, Kathleen M. Porter, and Walter C. Boyd. Fundamentals of data security law & breaches. MCLE New England, 2014.
Znajdź pełny tekst źródłaArena, Mark V. Management perspectives pertaining to root cause analyses of Nunn-McCurdy breaches: Contractor motivations and anticipating breaches. Rand Corporation, 2014.
Znajdź pełny tekst źródłaVan Roosebeke, Bert. State Liability for Breaches of European Law. DUV, 2007. http://dx.doi.org/10.1007/978-3-8350-9494-9.
Pełny tekst źródłaWong, Rebecca. Data Security Breaches and Privacy in Europe. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5586-7.
Pełny tekst źródłaRita, Tehan, ed. Data security breaches: Context and incident summaries. Nova Science Publishers, 2008.
Znajdź pełny tekst źródłaCzęści książek na temat "Breaches"
Anesko, Michael. "Breaches." In Henry James and Queer Filiation. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94538-5_13.
Pełny tekst źródłaDaswani, Neil, and Moudy Elbayadi. "The Root Causes of Data Breaches." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_1.
Pełny tekst źródłaDaswani, Neil, and Moudy Elbayadi. "The Equifax Breach." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_4.
Pełny tekst źródłaDaswani, Neil, and Moudy Elbayadi. "The Seven Habits of Highly Effective Security." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_9.
Pełny tekst źródłaDaswani, Neil, and Moudy Elbayadi. "Facebook Security Issues and the 2016 US Presidential Election." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_5.
Pełny tekst źródłaDaswani, Neil, and Moudy Elbayadi. "Advice to Cybersecurity Investors." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_14.
Pełny tekst źródłaDaswani, Neil, and Moudy Elbayadi. "The Capital One Breach." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_2.
Pełny tekst źródłaDaswani, Neil, and Moudy Elbayadi. "Technology Defenses to Fight the Root Causes of Breach: Part One." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_12.
Pełny tekst źródłaDaswani, Neil, and Moudy Elbayadi. "The Yahoo Breaches of 2013 and 2014." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_7.
Pełny tekst źródłaDaswani, Neil, and Moudy Elbayadi. "Applying Your Skills to Cybersecurity." In Big Breaches. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6655-7_16.
Pełny tekst źródłaStreszczenia konferencji na temat "Breaches"
K, Santha Sheela, Mrithula M, Varshni Priya A, and Selvalakshmi C.B. "Cyber Hacking Breaches Prediction and Detection Using Machine Learning." In 2024 IEEE 2nd International Conference on Innovations in High Speed Communication and Signal Processing (IHCSP). IEEE, 2024. https://doi.org/10.1109/ihcsp63227.2024.10960232.
Pełny tekst źródłaSandeep, V., Jyotirmaya Sahoo, and Pawan Bhambu. "Defending Machine Learning in Agriculture Against Data Breaches and Misuse." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10726152.
Pełny tekst źródłaJulie, Gabriel, Bas Dit Nugues Manon, Flouzat-Lachaniette Charles Henri, et al. "Preventing cortical breaches with impact analysis during spinal instrumentation surgery." In 2024 46th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). IEEE, 2024. https://doi.org/10.1109/embc53108.2024.10781753.
Pełny tekst źródłaAngelis, John N., and Rajendran S. Murthy. "Blame Shifting, Shopping Intensity, and Revisit Likelihood in Data Breaches." In 2024 Portland International Conference on Management of Engineering and Technology (PICMET). IEEE, 2024. http://dx.doi.org/10.23919/picmet64035.2024.10653185.
Pełny tekst źródłaXiang, Hui, Yifan Wu, Xuebin Wang, Jinqiao Shi, Can Zhao, and Jiapeng Zhao. "Identifying Data Breaches in Dark Web through Prompt Active Learning." In 2024 IEEE 9th International Conference on Data Science in Cyberspace (DSC). IEEE, 2024. https://doi.org/10.1109/dsc63484.2024.00016.
Pełny tekst źródłaTomasov, Adrian, Petr Dejdar, Petr Munster, and Tomas Horvath. "Utilizing a State of Polarization Change Detector and Machine Learning for Enhanced Security in Fiber-Optic Networks." In CLEO: Applications and Technology. Optica Publishing Group, 2024. http://dx.doi.org/10.1364/cleo_at.2024.jtu2a.217.
Pełny tekst źródłaSrinivasan, S. "Privacy Protection and Data Breaches." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2261.
Pełny tekst źródłaSingh, Ram Govind, and Naveenkumar D. "Are we undermining data breaches? Protecting education sector from data breaches." In 2023 International Conference on Computer, Electronics & Electrical Engineering & their Applications (IC2E3). IEEE, 2023. http://dx.doi.org/10.1109/ic2e357697.2023.10262570.
Pełny tekst źródłaFleury-Charles, Aaron, Md Minhaz Chowdhury, and Nafiz Rifat. "Data Breaches: Vulnerable Privacy." In 2022 IEEE International Conference on Electro Information Technology (eIT). IEEE, 2022. http://dx.doi.org/10.1109/eit53891.2022.9814044.
Pełny tekst źródłaAlaminov, Hristo. "DATA BREACHES AND DIGITALISATION." In PROTECTION OF THE PERSONAL DATA AND THE DIGITALIZATION 2021. University publishing house "Science and Economics", University of Economics - Varna, 2021. http://dx.doi.org/10.36997/ppdd2021.29.
Pełny tekst źródłaRaporty organizacyjne na temat "Breaches"
Woodhams, Josephine. Breaches in Research Integrity. UK Research Integrity Office, 2023. http://dx.doi.org/10.37672/ukrio.2023.07.breachesinresearchintegrity.
Pełny tekst źródłaSainsbury, Nicola. Whistleblowing and Breaches of Good Research Practice. UK Research Integrity Office, 2024. http://dx.doi.org/10.37672/ukrio.2024.04.whistleblowingandbreaches.
Pełny tekst źródłaHurtle, Jackie C. Decrease the Number of Glovebox Glove Breaches and Failures. Office of Scientific and Technical Information (OSTI), 2013. http://dx.doi.org/10.2172/1113782.
Pełny tekst źródłaTaylor, R. B., and D. Frobel. Barrier breaches and washover features, Martinique Beach, Nova Scotia. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1999. http://dx.doi.org/10.4095/211075.
Pełny tekst źródłaFisher, Bill. Data Confidentiality: Identifying and Protecting Assets Against Data Breaches. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1800-28.
Pełny tekst źródłaBiggs, Carl T., Diana I. Angelis, Laura Armey, and Raymond Franck. Transaction Costs and Cost Breaches in Major Defense Acquisition Programs. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada612617.
Pełny tekst źródłaPOND, DANIEL J., F. KAY HOUGHTON, and WALTER E. GILMORE. CONTRIBUTORS TO HUMAN ERRORS AND BREACHES IN NATIONAL SECURITY APPLICATIONS. Office of Scientific and Technical Information (OSTI), 2002. http://dx.doi.org/10.2172/801246.
Pełny tekst źródłaFisher, Bill. Data Confidentiality: Detect, Respond to, and Recover from Data Breaches. National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.sp.1800-29.
Pełny tekst źródłaBratton, Robert Lawrence. Quick Look Report for Chemical Reactivity Modeling of Various Multi-Canister Overpack Breaches. Office of Scientific and Technical Information (OSTI), 2002. http://dx.doi.org/10.2172/911538.
Pełny tekst źródłaAngelis, Diana I., Laura Armey, and Carl T. Biggs. A Model for Understanding the Relationship Between Transaction Costs and Acquisition Cost Breaches. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada612854.
Pełny tekst źródła