نتایج جستجو برای: مدل breach
تعداد نتایج: 124667 فیلتر نتایج به سال:
With the knowledge that team work is not always associated with high(er) performance, we draw from the Multi-Level Theory of Psychological Contracts, Person-Environment Fit Theory, and Optimal Distinctiveness Theory to study shared perceptions of psychological contract (PC) breach in relation to shared perceptions of complementary and supplementary fit to explain why some teams perform better t...
We argue that enforcement costs, ignored in the literature on ‘efficient breach’, are important for the choice of contract breach remedy. Empirically we find that specific performance is almost never claimed in Civil Law countries. It involves forcing a party in breach to perform actions while damages involves extracting only a monetary payment. The former is more difficult and more coercive. W...
In wireless sensor networks, sensors can be equipped with one or more sensing components. An atomic event can be detected using one sensing component.A composite event is the combination of several atomic events. Themonitored area is divided into grids. To achieve high reliability, the composite event must be k-watched in each grid. Otherwise, a detection breach occurs. In this paper, we study ...
A violation of trust can have quite different consequences, depending on the nature of the relationship in which the trust breach occurs. In this article, we identify a key relationship characteristic that affects trust recovery: the extent of relationship experience before the trust breach. Across two experiments, this investigation establishes the behavioral effect that greater relationship e...
Password-based authentications using smart cards are very necessary between login users and a remote server. Smart card security breach threatens the security of password-based authentication schemes with smart cards. A password-based authentication scheme with smart cards against smart card security breach was proposed by C.T. Li et al. recently. However, it is noted that Li et al.'s scheme ne...
Article history: Received 10 March 2010 Available online 16 September 2010 This study tested the mediating role of violation in the relationship between breach and both affective and continuance commitment and the extent to which this mediating role is moderated by exchange imbalance amongst a sample of 103 sales personnel. Results suggest that violation mediated the relationship between breach...
This paper is about the remedy of disgorgement for breach of contract. In it I argue for two conclusions. I first argue that, prima facie at least, disgorgement damages for breach of contract present something of a puzzle. But second, I argue that if we pay close attention to the notion of contractual performance, this puzzle can be resolved in a way that is consistent with principles of correc...
This study examines the economic effect of information security breaches reported in newspapers on publicly traded US corporations. We find limited evidence of an overall negative stock market reaction to public announcements of information security breaches. However, further investigation reveals that the nature of the breach affects this result. We find a highly significant negative market re...
INTRODUCTION Desmoid tumor of bone is a rare benign tumor. It is reported commonly in mandibular and meta-diaphyseal region of long bones. We report involvement of unusual site in ilio-acetabular region with breach in articular cartilage. CASE REPORT A 40 year old female presented with pain in the left hip. Radiologically, a lytic lesion at ilio-acetabular region was seen. Intra-operatively b...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید