نتایج جستجو برای: breach flow

تعداد نتایج: 486434  

Journal: :SSRN Electronic Journal 2014

Journal: :Academic Medicine 1995

2014
Kholekile L. Gwebu Jing Wang Wenjuan Xie

To estimate the cost of a data breach to the inflicted firm, this study examines the relationship between a breach incident and changes in the inflicted firm’s profitability, perceived risk, and the inflicted firms’ information environment transparency. Profitability is measured as reported earnings and analysts’ earnings forecasts. Perceived risk is measured as reported stock return volatility...

Journal: :The Lancet 1837

Journal: :IOP Conference Series: Earth and Environmental Science 2021

2012
L. NAGY

Statistical evaluation of historical dike failure mechanism The failure mechanism of flood protection dikes includes physical (geotechnical, seepage) processes leading to a dike breach. An awareness of the failure mechanism is required directly in dike stability calculations and indirectly for risk calculations. Statistics of historical data indicate among others the distribution and frequency ...

2014
Sean Chester Bruce M. Kapron Gautam Srivastava Srinivasan Venkatesh Alex Thomo

Adversary: Somebody who, whether intentionally or not, reveals sensitive, private information Adversarial model: Formal description of the unique characteristics of a particular adversary Attribute disclosure: A privacy breach wherein some descriptive attribute of somebody is revealed Identity disclosure: A privacy breach in which a presumably anonymous person is in fact identifiable k-P-anonym...

2008
Anirvan DuttaGupta Arijit Ghosh Arijit Bishnu Indranil Sengupta

Coverage is an important issue in Wireless Sensors Networks (WSNs). It gives a measure of the quality of surveillance a WSN provides over a field it is designed to monitor. Different measures of coverage capture different aspects of surveillance. In this paper, we study two measures of coverage maximal breach/support, and all-pairs average maximal breach/support. The geometric characterisation ...

2000
Randolph Sloof Edwin Leuven Hessel Oosterbeek Joep Sonnemans

Breach remedies serve an important role in protecting relationship-specific investments. The theoretical literature predicts that some commonly used types of breach remedies may protect too well, in the sense that they induce overinvestment. The driving forces behind this result are the complete insurance against potential separation that breach remedies may provide, and the possibility to prev...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید