Rozprawy doktorskie na temat „Breaches”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Breaches”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Talavera, Cano Andrés. "Regulating the Intolerance of Contractual Breaches." IUS ET VERITAS, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/123754.
Pełny tekst źródłaSmith, Tanshanika Turner. "Examining Data Privacy Breaches in Healthcare." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2623.
Pełny tekst źródłaHo, Jean Qing Ying. "State responsibility for breaches of investment contracts." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708722.
Pełny tekst źródłaBiggs, Carl T. "Implications of transaction costs for acquisition program cost breaches." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34629.
Pełny tekst źródłaVorogushyn, Sergiy. "Analysis of flood hazard under consideration of dike breaches." Phd thesis, Aachen Shaker, 2008. http://d-nb.info/994678622/04.
Pełny tekst źródłaGriffin, Tony. "Strategies to Prevent Security Breaches Caused by Mobile Devices." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4628.
Pełny tekst źródłaSaber, Jennifer. "Determining Small Business Cybersecurity Strategies to Prevent Data Breaches." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/4991.
Pełny tekst źródłaOfori-Duodu, Michael Samuel. "Exploring Data Security Management Strategies for Preventing Data Breaches." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.
Pełny tekst źródłaZuzak, Catherine Ann. "Liability for breaches of aviation security obligatons : a Canadian perspective." Thesis, McGill University, 1990. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=59859.
Pełny tekst źródłaKershaw, Debra S. "BOUNDARIES AND BREACHES: COMPLEXITIES AND STRATEGIES DOWN ON THE FARM." UKnowledge, 2011. http://uknowledge.uky.edu/gradschool_diss/202.
Pełny tekst źródłaRobson, Jennifer van Krieken. "Understanding practitioners' responses to inequality and breaches of human rights." Thesis, Canterbury Christ Church University, 2012. http://create.canterbury.ac.uk/12166/.
Pełny tekst źródłaVaruhas, Jason Nicholas Euripide. "Damages for breaches of human rights : a tort-based approach." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609692.
Pełny tekst źródłaPolanco, Pinerez G. C. "Phase change within flows from breaches of liquefied gas pipelines." Thesis, Coventry University, 2008. http://curve.coventry.ac.uk/open/items/b374a447-1db1-b578-7424-a5e485b28f4f/1.
Pełny tekst źródłaKongnso, Fedinand Jaiventume. "Best Practices to Minimize Data Security Breaches for Increased Business Performance." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1825.
Pełny tekst źródłaVorogushyn, Sergiy [Verfasser]. "Analysis of flood hazard under consideration of dike breaches / Sergiy Vorogushyn." Aachen : Shaker, 2009. http://d-nb.info/1156517923/34.
Pełny tekst źródłaFahy, Patrick. "State obligations to prevent breaches of Article 3 by non-state actors." Thesis, Queen's University Belfast, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.673848.
Pełny tekst źródłaLaoh, Arnold. "The availability of international judicial review of government breaches of human rights." Thesis, Laoh, Arnold (2006) The availability of international judicial review of government breaches of human rights. PhD thesis, Murdoch University, 2006. https://researchrepository.murdoch.edu.au/id/eprint/144/.
Pełny tekst źródłaLaoh, Arnold. "The availability of international judicial review of government breaches of human rights." Laoh, Arnold (2006) The availability of international judicial review of government breaches of human rights. PhD thesis, Murdoch University, 2006. http://researchrepository.murdoch.edu.au/144/.
Pełny tekst źródłaOsei-Amanfi, Michael. "A Case Study Exploration of Strategies to Avoid Cloud Computing Data Breaches." Thesis, Grand Canyon University, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=13423232.
Pełny tekst źródłaZhou, Lei. "The value of security audits, asymmetric information and market impact of security breaches." College Park, Md. : University of Maryland, 2004. http://hdl.handle.net/1903/1736.
Pełny tekst źródłaAyereby, Manouan Pierre-Marius. "Overcoming Data Breaches and Human Factors in Minimizing Threats to Cyber-Security Ecosystems." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/6163.
Pełny tekst źródłaau, adt@murdoch edu, and Arnold Laoh. "The availability of international judicial review of government act for breaches of human rights." Murdoch University, 2002. http://wwwlib.murdoch.edu.au/adt/browse/view/adt-MU20061122.131327.
Pełny tekst źródłaBellefeuille, Cynthia Lynn. "Quantifying and managing the risk of information security breaches participants in a supply chain." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33313.
Pełny tekst źródłaAlmajed, Yasser M. "A framework for an adaptive early warning and response system for insider privacy breaches." Thesis, De Montfort University, 2015. http://hdl.handle.net/2086/11129.
Pełny tekst źródłaGarringer, James. "The Role of Protocol Analysis in Cybersecurity| Closing the Gap on Undetected Data Breaches." Thesis, Utica College, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10974156.
Pełny tekst źródłaSleep, Lyndal. "Pulling down their breaches : An analysis of Centrelink breach and appeal numbers from 1996 to 2001 using a case study of a single Centrelink office." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2003. https://ro.ecu.edu.au/theses/1322.
Pełny tekst źródłaDeZulueta, Monica. "A novel neural network based system for assessing risks associated with information technology security breaches." FIU Digital Commons, 2004. http://digitalcommons.fiu.edu/etd/2791.
Pełny tekst źródłaWashington, Kevin D. "The impact of data breaches on market value of firms in the E-Commerce marketplace." Thesis, Capella University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10102712.
Pełny tekst źródłaEnríquez, Luis. "Personal data breaches : towards a deep integration between information security risks and GDPR compliance risks." Electronic Thesis or Diss., Université de Lille (2022-....), 2024. http://www.theses.fr/2024ULILD016.
Pełny tekst źródłaGadirova, Nurlana. "The Impacts of Cyberattacks on Private Firms' Cash Holdings." Thesis, Université d'Ottawa / University of Ottawa, 2021. http://hdl.handle.net/10393/41924.
Pełny tekst źródłaBetz, Linda. "An Analysis of the Relationship between Security Information Technology Enhancements and Computer Security Breaches and Incidents." NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/960.
Pełny tekst źródłaPaddeu, Federica Isabella. "General defences to breaches of international law : justification and excuse in the law of state responsibility." Thesis, University of Cambridge, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.648758.
Pełny tekst źródłaCameron, Calla. "Grave Breaches: American Military Intervention in the Late Twentieth- Century and the Consequences for International Law." Scholarship @ Claremont, 2017. http://scholarship.claremont.edu/cmc_theses/1677.
Pełny tekst źródłaPelletier, Justin M. "Effects of Data Breaches on Sector-Wide Systematic Risk in Financial, Technology, Healthcare and Services Sectors." Thesis, Capella University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10615009.
Pełny tekst źródłaAsiri, Mohammed. "Three Essays in Investment Efficiency, Accounting Reporting Complexity, and Cybersecurity Breaches: Evidence from Corporate Tax Avoidance." Thesis, Curtin University, 2021. http://hdl.handle.net/20.500.11937/83671.
Pełny tekst źródłaLee, Foong Mee, and n/a. "Remedies and sanctions against corporate officers for breaches of duties under part 3.2 of the corporations law." University of Canberra. Law, 1994. http://erl.canberra.edu.au./public/adt-AUC20050523.102418.
Pełny tekst źródłaHicks, Andrew David. "Conceptualising the constructive trust : a new approach and its specific application to acquisitive breaches of fiduciary obligation." Thesis, University of Hull, 2007. http://hydra.hull.ac.uk/resources/hull:6437.
Pełny tekst źródłaWaddell, Stanie Adolphus. "A Study of the Effect of Information Security Policies on Information Security Breaches in Higher Education Institutions." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/331.
Pełny tekst źródłaZachis, Savio de Melo. "Analysis of breaches and co-breaks in financial series: a non-parametric approach data using high frequency." Universidade Federal do CearÃ, 2009. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=3730.
Pełny tekst źródłaMoruzzi, Davide <1997>. "Cyber data intelligence tool: from raw data breaches to structured storing, performant searching and user-friendly visualisation." Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19916.
Pełny tekst źródłaMendoza, Choque Luis Enrique. "Main Labor Breaches of the Peruvian State in the Framework of the Free Trade Agreement with the United States." Derecho & Sociedad, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/118733.
Pełny tekst źródłaXanthaki, Helen. "Secondary establishment of European Union public limited companies in France, Greece and Italy : breaches of European Community law and redress." Thesis, Durham University, 2000. http://etheses.dur.ac.uk/1202/.
Pełny tekst źródłaNsibande, Senzosenkosi. "The impact of data breaches of varying severity on the customer loyalty of high net worth individuals in retail banking." Diss., University of Pretoria, 2020. http://hdl.handle.net/2263/79631.
Pełny tekst źródłaSedaghat, Soroush, University of Western Sydney, and School of Computing and Information Technology. "Web authenticity." THESIS_XXX_CIT_Sedaghat_S.xml, 2002. http://handle.uws.edu.au:8081/1959.7/431.
Pełny tekst źródłaAhmadian, Reza. "Modelling hydrodynamic and bacterial processes through linked river, floodplain and coastal systems : with particular application to marine turbines, barrages and embankment breaches." Thesis, Cardiff University, 2010. http://orca.cf.ac.uk/54931/.
Pełny tekst źródłaAnagnostaras, Georgios. "To sue or not to sue? : the present and future of liability actions for breaches of European Community law committed by the domestic authorities." Thesis, University of Bristol, 2001. http://hdl.handle.net/1983/c2f5f65b-28be-4db8-9d7d-0e84d4694a28.
Pełny tekst źródłaZottoli, Michael A. "Understanding the process through which breaches of the psychological contract influence feelings of psychological contract violation: an analysis incorporating causal, responsibility and blame attributions." The Ohio State University, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=osu1054515958.
Pełny tekst źródłaAhmad, Altaf. "The Effect of Perceived Privacy Breaches on Continued Technology Use and Individual Psychology: The Construct, Instrument Development, and an Application Using Internet Search Engines." OpenSIUC, 2010. https://opensiuc.lib.siu.edu/dissertations/162.
Pełny tekst źródłaPikó, Rita. "Swiss Legal Status on the Protection of Whistleblowers: Taking into account the EU Directive on the protection of persons who report breaches of Union law." Universität Leipzig, 2020. https://ul.qucosa.de/id/qucosa%3A70825.
Pełny tekst źródłaKinna, Rémy Paul. "Entering murky legal waters transboundary impacts of acid mine drainage within the Limpopo river as potential breaches of South Africa's duty not to cause significant harm." Master's thesis, University of Cape Town, 2013. http://hdl.handle.net/11427/4479.
Pełny tekst źródła