نتایج جستجو برای: information leakage information disclosure

تعداد نتایج: 1200943  

Journal: :advances in mathematical finance and applications 0
hamidreza ghiabi department of accounting, arak branch, islamic azad university, arak, iran.

companies' continuity, because all companies have some relations with the society;therefore, the society provides long-term survival of the company.in this way, companies in addition to economic responsibility, must take responsibilityof social issues. therefore, with respect to corporate social responsibility andits revelations, the current paper examines the relationship between social r...

Journal: :مجله مطالعات حقوق تطبیقی 0
عباسعلی کدخدایی دانشیار گروه حقوق عمومی دانشکدۀ حقوق و علوم سیاسی دانشگاه تهران هیوا حاجی ملا دانش آموختۀ کارشناسی ارشد حقوق بین الملل دانشکدۀ حقوق و علوم سیاسی دانشگاه تهران

disclosure of classified public interest information has become one of the major legal challenges in recent years. in the past decades the conflict between the right of people to receive information and principle of sovereignty within the framework of traditional media (direct broadcast satellite) resolved in favor of  principle of free flow of information and the said conflict was replaced by ...

Journal: :middle east journal of cancer 0
ali m. al-amri department of internal medicine and oncology, college of medicine, university of dammam, king fahd university hospital, al-khobar, eastern province, kingdom of saudi arabia

background : the aim of this study was to explore saudi cancer patients' views regarding cancer information disclosure and whether differences existed between regions or gender. methods : in this cross-sectional questionnaire-based prospective survey, we interviewed 332 saudi cancer patients who received oncological care at king fahd university hospital, al-khobar, saudi arabia from july 2002 t...

Journal: :حقوق خصوصی 0
جلیل قنواتی دانشیارگروه حقوق خصوصی، دانشکدة حقوق، پردیس فارابی، دانشگاه تهران حسین جاور استادیارگروه حقوق خصوصی، دانشگاه حضرت معصومه (س) علی تقی خانی دانشجوی دکتری حقوق خصوصی، پردیس فارابی دانشگاه تهران

application of ipr and the right of investigation about the claim of its infringement, need issuing some protective orders. mostly, this is for avoiding destruction of evidences which can be effective in proving the right of the plaintiff. the purpose of this study is to find out how can protect the third party’s right of privacy in the process of ipr enforcement. in common law, there are two i...

Journal: :IEEE Transactions on Information Forensics and Security 2020

Journal: :ACM transactions on privacy and security 2022

A common goal in the areas of secure information flow and privacy is to build effective defenses against unwanted leakage information. To this end, one must be able reason about potential attacks their interplay with possible defenses. In article, we propose a game-theoretic framework formalize strategies attacker defender context leakage, provide basis for developing optimal defense methods. n...

بهزاد قربانی, زهرا محمدیلر, سید جلال الدین حسینی غنچه

در این مقاله تأثیر افشای اطلاعات استراتژیک، غیرمالی و مالی بر مدیریت سود شرکت‌های پذیرفته شده در بورس اوراق بهادار تهران مورد بررسی قرار گرفته است. برای سنجش متغیرهای افشای اطلاعات استراتژیک، غیرمالی و مالی به پیروی از ریاحی و عرب (2011) از یک فرم امتیاز بندی وی‍ژه (با اندکی تعدیل) و برای سنجش مدیریت سود از مدل کوتاری (2005) استفاده شده است. تحلیل داده‌های پژوهش از طریق مدل‌های رگرسیون خطی چند ...

Journal: :IEICE Transactions 2005
Kunihiko Miyazaki Mitsuru Iwamura Tsutomu Matsumoto Ryôichi Sasaki Hiroshi Yoshiura Satoru Tezuka Hideki Imai

A digital signature does not allow any alteration of the document to which it is attached. Appropriate alteration of some signed documents, however, should be allowed because there are security requirements other than that for the integrity of the document. In the disclosure of official information, for example, sensitive information such as personal information or national secrets is masked wh...

Journal: :ACM Transactions on Information and System Security 2002

Journal: :Mathematical Problems in Engineering 2013

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید