نتایج جستجو برای: مدل breach

تعداد نتایج: 124667  

Introduction: Women injured by their husband's breach of contract need help and therapy to overcome their emotional and emotional problems. This research was conducted with the aim of determining the effectiveness of emotion-oriented therapy based on attachment trauma and spirituality-oriented schema therapy on the anxiety and emotional capital of women affected by a spouse's breach of contract...

2013
Griselda Sinanaj Jan Muntermann

Corporate reputation represents a core asset of companies and research has shown that better reputation can have positive effects such as increased revenues and sales. On the other hand, companies may suffer reputational damage that can result from internal or external and potentially unforeseen events such as operational losses. In this paper, we present an empirical analysis of how unforeseen...

Journal: :Studies in health technology and informatics 2010
Geraldine Mackenzie Hugh Carter

This chapter gives an educational overview of: * An awareness of the legal issues involved in health informatics * The need for the privacy and security of the patient record * The legal consequences of a breach of the security of the patient record * The concept of privacy law and what precautions ought to be taken to minimize legal liability for a breach of privacy and/or confidentiality.

2017
Kamil Safin Rita Kuznetsova

The paper investigates method for the style breach detection task. We developed a method based on mapping sentences into high dimensional vector space. Each sentence vector depends on the previous and next sentence vectors. As main architecture for this mapping we use the pre-trained encoder-decoder model. Then we use these vectors for constructing an author style function and detecting outlier...

2015
Armin Sarabi Parinaz Naghizadeh Ardabili Yang Liu Mingyan Liu

This paper aims to understand if, and to what extent, business details about an organization can help provide guidelines for better resource allocation across different preventive measures, in order to effectively protect, detect, and recover from, different forms of security incidents. Existing work on analyzing the distribution of risk across different incident categories, most notably Verizo...

Journal: :Geomorphology 2022

The sudden breach of a landslide dam seriously threatens the safety people and property downstream. failure mechanism dams is significantly affected by grain size distribution material. In this study, series experiments are conducted to investigate effects composition on stability, process, parameters dams. results show that remain stable with seepage for coarse-dominated dam, fail overtopping ...

2017

User passwords were first introduced to allow time sharing on large mainframes. Mainframes at the time were large systems within a controlled environment. Passwords were stored in plain text file with no perceived need to secure user passwords. The first documented password breach occurred when a user wanted to gain additional time on a mainframe than the allotted four hours limit. The user sim...

2013
Katy Barnett

In her engaging and useful book, Accounting for Profit for Breach of Contract: Theory and Practice, Katy Barnett presents a theory of disgorgement damages for breach of contract. This is a welcome publication, as disgorgement damages continue to present both theoretical and practical puzzles for the law of contract, and Barnett makes a valuable contribution to this important topic. By way of ba...

Journal: :Information Systems Security 2007
Edward H. Freeman

Responsible developers work hard to produce secure, reliable, and efficient software packages. No company wants its integrity compromised by hackers, employees, or legitimate users. Negative publicity damages a firm’s reputation. Legal proceedings can cost an organization millions and destroy any chance of long-term success. Realistically, few products are released without security flaws. Progr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید