نتایج جستجو برای: مدل breach
تعداد نتایج: 124667 فیلتر نتایج به سال:
This study explored the relationship between psychological contract breach and ethical decisionmaking intention. Previous studies analyzed the relation mainly from the Western cultural perspective, thus leaving the Eastern context. In this regard, the present study examined the cross-level moderating effect of ethical climate on variables at the individual level. Forty state-owned and private c...
Worldwide 83% of large dams are embankment structures (ICOLD, 1984), and the proportion is even greater for small dams. Embankment overtopping and breach is an important issue, and the Discusser congratulates the Author for his worthwhile contribution which complements the comprehensive study of Coleman et al. (2002). This discussion is focused on the breach development stage. It is shown that ...
IT managers often struggle to justify investments in information security. In addition to standard quantitative analyses such as Return on Security Investment (ROSI), executive management may also want to know what the effect of potential security breaches would be on the market value of a publicly-traded firm. This study attempts to shed light on the issue by examining the impact of informatio...
Determining the required number of sensors to be deployed is a critical decision for surveillance wireless sensor networks. In this paper, we discuss the trade-off between the number of sensors and the breach detection probability considering the effects of sensor parameters. We present the weakest breach path problem formulation and provide a solution by utilizing the Dijkstra’s shortest path ...
The laptop was missing. Previously stationed in the EEG department of NorthShore University HealthSystem, the laptop had been connected to equipment used by staff to treat patients. Just who took the laptop from the Evanston, IL-based facility—an employee, patient, or visitor—was not known. What was known was that 250 patients had personal information stored on the machine, including their name...
The ability of pressure-driven leaks to provide an effective barrier against microbial ingress was investigated experimentally. The leak was simulated by circulating growth promoting media through a section of flexible tubing that had a 3/4-inch breach. The flow rate of the media was adjusted until the leak was barely visible; the leak rate was minimized to enhance the possibility of microbial ...
Promises are positioned centrally in the study of psychological contract breach and are argued to distinguish psychological contracts from related constructs, such as employee expectations. However, because the effects of promises and delivered inducements are confounded in most research, the role of promises in perceptions of, and reactions to, breach remains unclear. If promises are not an im...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید