نتایج جستجو برای: مدل breach

تعداد نتایج: 124667  

2012
Gou-Fong Liaw

This study explored the relationship between psychological contract breach and ethical decisionmaking intention. Previous studies analyzed the relation mainly from the Western cultural perspective, thus leaving the Eastern context. In this regard, the present study examined the cross-level moderating effect of ethical climate on variables at the individual level. Forty state-owned and private c...

2005

Worldwide 83% of large dams are embankment structures (ICOLD, 1984), and the proportion is even greater for small dams. Embankment overtopping and breach is an important issue, and the Discusser congratulates the Author for his worthwhile contribution which complements the comprehensive study of Coleman et al. (2002). This discussion is focused on the breach development stage. It is shown that ...

2006
Kregg Aytes Steve Byers Mukunthan Santhanakrishnan

IT managers often struggle to justify investments in information security. In addition to standard quantitative analyses such as Return on Security Investment (ROSI), executive management may also want to know what the effect of potential security breaches would be on the market value of a publicly-traded firm. This study attempts to shed light on the issue by examining the impact of informatio...

Journal: :SSRN Electronic Journal 2004

Journal: :Computer Communications 2006
Ertan Onur Cem Ersoy Hakan Deliç

Determining the required number of sensors to be deployed is a critical decision for surveillance wireless sensor networks. In this paper, we discuss the trade-off between the number of sensors and the breach detection probability considering the effects of sensor parameters. We present the weakest breach path problem formulation and provide a solution by utilizing the Dijkstra’s shortest path ...

Journal: :Journal of AHIMA 2009
Chris Dimick

The laptop was missing. Previously stationed in the EEG department of NorthShore University HealthSystem, the laptop had been connected to equipment used by staff to treat patients. Just who took the laptop from the Evanston, IL-based facility—an employee, patient, or visitor—was not known. What was known was that 250 patients had personal information stored on the machine, including their name...

Journal: :Journal of the Korea Academia-Industrial cooperation Society 2016

Journal: :PDA journal of pharmaceutical science and technology 2007
Rizwan Sharnez Robert Stianchi Mark Stannard P K Yegneswaran

The ability of pressure-driven leaks to provide an effective barrier against microbial ingress was investigated experimentally. The leak was simulated by circulating growth promoting media through a section of flexible tubing that had a 3/4-inch breach. The flow rate of the media was adjusted until the leak was barely visible; the leak rate was minimized to enhance the possibility of microbial ...

Journal: :The Journal of applied psychology 2009
Samantha D Montes David Zweig

Promises are positioned centrally in the study of psychological contract breach and are argued to distinguish psychological contracts from related constructs, such as employee expectations. However, because the effects of promises and delivered inducements are confounded in most research, the role of promises in perceptions of, and reactions to, breach remains unclear. If promises are not an im...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید