نتایج جستجو برای: مدل breach

تعداد نتایج: 124667  

2017
Katherine Gibbard Yannick Griep Rein De Cooman Genevieve Hoffart Denis Onen Hamidreza Zareipour

With the knowledge that team work is not always associated with high(er) performance, we draw from the Multi-Level Theory of Psychological Contracts, Person-Environment Fit Theory, and Optimal Distinctiveness Theory to study shared perceptions of psychological contract (PC) breach in relation to shared perceptions of complementary and supplementary fit to explain why some teams perform better t...

2000
Henrik Lando Caspar Rose

We argue that enforcement costs, ignored in the literature on ‘efficient breach’, are important for the choice of contract breach remedy. Empirically we find that specific performance is almost never claimed in Civil Law countries. It involves forcing a party in breach to perform actions while damages involves extracting only a monetary payment. The former is more difficult and more coercive. W...

2008
Yinying Yang Mihaela Cardei

In wireless sensor networks, sensors can be equipped with one or more sensing components. An atomic event can be detected using one sensing component.A composite event is the combination of several atomic events. Themonitored area is divided into grids. To achieve high reliability, the composite event must be k-watched in each grid. Otherwise, a detection breach occurs. In this paper, we study ...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2013
Oliver Schilke Martin Reimann Karen S Cook

A violation of trust can have quite different consequences, depending on the nature of the relationship in which the trust breach occurs. In this article, we identify a key relationship characteristic that affects trust recovery: the extent of relationship experience before the trust breach. Across two experiments, this investigation establishes the behavioral effect that greater relationship e...

Journal: :پژوهشنامه بازرگانی 0

0

Journal: :JSW 2013
Jing Shen Yusong Du

Password-based authentications using smart cards are very necessary between login users and a remote server. Smart card security breach threatens the security of password-based authentication schemes with smart cards. A password-based authentication scheme with smart cards against smart card security breach was proposed by C.T. Li et al. recently. However, it is noted that Li et al.'s scheme ne...

2015
Vincent Cassar Rob B. Briner

Article history: Received 10 March 2010 Available online 16 September 2010 This study tested the mediating role of violation in the relationship between breach and both affective and continuance commitment and the extent to which this mediating role is moderated by exchange imbalance amongst a sample of 103 sales personnel. Results suggest that violation mediated the relationship between breach...

2010
Andrew Botterell ANDREW BOTTERELL

This paper is about the remedy of disgorgement for breach of contract. In it I argue for two conclusions. I first argue that, prima facie at least, disgorgement damages for breach of contract present something of a puzzle. But second, I argue that if we pay close attention to the notion of contractual performance, this puzzle can be resolved in a way that is consistent with principles of correc...

Journal: :Journal of Computer Security 2003
Katherine Campbell Lawrence A. Gordon Martin P. Loeb Lei Zhou

This study examines the economic effect of information security breaches reported in newspapers on publicly traded US corporations. We find limited evidence of an overall negative stock market reaction to public announcements of information security breaches. However, further investigation reveals that the nature of the breach affects this result. We find a highly significant negative market re...

2013
Himanshu Prasad G Jagadesh

INTRODUCTION Desmoid tumor of bone is a rare benign tumor. It is reported commonly in mandibular and meta-diaphyseal region of long bones. We report involvement of unusual site in ilio-acetabular region with breach in articular cartilage. CASE REPORT A 40 year old female presented with pain in the left hip. Radiologically, a lytic lesion at ilio-acetabular region was seen. Intra-operatively b...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید