نتایج جستجو برای: data threats

تعداد نتایج: 2432735  

Journal: :Psychiatric services 1996
M T Lambert J Bonner

Retrospective review of patients' charts and other records was used to collect data on diagnoses, psychosocial characteristics, and subsequent suicide attempts of 45 patients who made contingent suicide threats, defined as threatened suicide or exaggerated suicidality reported to increase the likelihood of hospital admission, and 92 suicidal patients who did not make such threats. Patients who ...

Journal: :مجله دانشکده حقوق و علوم سیاسی 0
بهاره سازمند

association of southeast asia nations (asean) was created in 1967 in order to prevent the threat of communism in southeast asia. but, over time, new states joined it and goals and activities of this organization expanded to other areas such as economic, commercial, political and cultural ones. thus, over time, cooperation between members expanded in a way today this regional organization is con...

2006
Elena Vildjiounaite Petteri Alahuhta Pasi Ahonen David Wright Michael Friedewald

Realisation of the Ubicomp vision in the real world creates significant threats to personal privacy due to constant information collection by numerous tiny sensors, active information exchange over short and long distances, long-term storage of large quantities of data, and reasoning on collected and stored data. An analysis of more than 100 Ubicomp scenarios, however, shows that applications n...

Journal: :Conservation biology : the journal of the Society for Conservation Biology 2015
Sylvaine Giakoumi Benjamin S Halpern Loïc N Michel Sylvie Gobert Maria Sini Charles-François Boudouresque Maria-Cristina Gambi Stelios Katsanevakis Pierre Lejeune Monica Montefalcone Gerard Pergent Christine Pergent-Martini Pablo Sanchez-Jerez Branko Velimirov Salvatrice Vizzini Arnaud Abadie Marta Coll Paolo Guidetti Fiorenza Micheli Hugh P Possingham

Effective ecosystem-based management requires understanding ecosystem responses to multiple human threats, rather than focusing on single threats. To understand ecosystem responses to anthropogenic threats holistically, it is necessary to know how threats affect different components within ecosystems and ultimately alter ecosystem functioning. We used a case study of a Mediterranean seagrass (P...

2014
Mohammed M. Alani

This paper is aimed to present information about the most current threats and attacks on cloud computing, as well as security measures. The paper discusses threats and attacks that are most effective on cloud computing such as data breach, data loss, service traffic hijacking..etc. The severity and effect of these attacks are discussed along with real-life examples of these attacks. The paper a...

2003
Michael Bailey Farnam Jahanian G. Robert Malan Jose Nazario Dug Song

Networks are increasingly susceptible to a broad spectrum of vexing security and operational threats such as distributed denial of service attacks, zero-day worms, and routing exploits. The increasingly global scale of threats to the Internet demands a system capable of correlating data at a high level in order to identify and characterize these threats. In this talk we present an overview of a...

2012
Janine L. Spears

During a lawsuit, an organization is required to discover and produce relevant electronic data. In many cases, relevant data includes confidential data, such as personal information or trade secrets. During the course of a lawsuit, the discovered data may exchange many hands. This study analyzes data security threats and corresponding countermeasures within the eDiscovery process by constructin...

Journal: :Current Biology 2008

Journal: :Nature Reviews Neuroscience 2018

Journal: :The Journal of school nursing : the official publication of the National Association of School Nurses 2004
Martha Dewey Bergren

School nurses and health office employees are the creators and caretakers of legal documentation. School nurses have an ethical and legal obligation to protect the integrity of electronic student health records. Although there are many threats to data integrity, from inadequate hardware to electrical surges, one of the most pervasive threats to data is computer viruses. There are many precautio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید