The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for breach with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1979-1995 (17) 1996-2000 (15) 2001-2003 (24) 2004 (16) 2005 (22) 2006 (21) 2007 (34) 2008 (24) 2009 (23) 2010-2011 (20) 2012-2013 (21) 2014 (20) 2015 (21) 2016 (26) 2017 (24) 2018 (32) 2019 (33) 2020 (27) 2021 (35) 2022 (41) 2023 (40) 2024 (9)
Publication types (Num. hits)
article(247) incollection(5) inproceedings(292) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 227 occurrences of 185 keywords

Results
Found 550 publication records. Showing 545 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
117Maggie Xiaoyan Cheng, Lu Ruan 0001, Weili Wu 0001 Coverage breach problems in bandwidth-constrained sensor networks. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF coverage breach, scheduling, Sensor networks, energy efficiency, coverage, network lifetime
114Anne M. Payton Data security breach: seeking a prescription for adequate remedy. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF data breach, data custodian, negligence, notification laws, identity theft, personal information, security breach
84Lee T. Ayres, C. Matthew Curtin, Thomas A. Ng Standardizing Breach Incident Reporting: Introduction of a Key for Hierarchical Classification. Search on Bibsonomy SADFE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF data breach, security incident analysis, breach analysis, breach classification
82Maggie Xiaoyan Cheng, Lu Ruan 0001, Weili Wu 0001 Achieving minimum coverage breach under bandwidth constraints in wireless sensor networks. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
69Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Akarun Finding Breach Paths Using the Watershed Segmentation Algorithm in Surveillance Wireless Sensor Networks. Search on Bibsonomy ISCIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
57Jan Muntermann, Heiko Roßnagel On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the US Stock Market. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Privacy Breaches, Privacy Disclosure Regulation, Event Study
57Anirvan DuttaGupta, Arijit Bishnu, Indranil Sengupta 0001 Maximal Breach in Wireless Sensor Networks: Geometric Characterization and Algorithms. Search on Bibsonomy ALGOSENSORS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
57Anirvan DuttaGupta, Arijit Bishnu, Indranil Sengupta 0001 Optimisation Problems Based on the Maximal Breach Path Measure for Wireless Sensor Network Coverage. Search on Bibsonomy ICDCIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
53Jill Slay, Michael Miller Lessons Learned from the Maroochy Water Breach. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SCADA security, Maroochy Water Services breach
53Kjell Hausken Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security investment, Information protection, Returns assumptions, Information security breach, Logistic function, Vulnerability, Linearity, Convexity, Concavity
52Chen Wang, My T. Thai, Yingshu Li, Feng Wang 0002, Weili Wu 0001 Optimization scheme for sensor coverage scheduling with bandwidth constraints. Search on Bibsonomy Optim. Lett. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
48Wendy Hui Wang, Laks V. S. Lakshmanan Probabilistic privacy analysis of published views. Search on Bibsonomy WPES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy breach, private association, published views, probabilistic analysis
39Yinying Yang, Mihaela Cardei Sensor Deployment for Composite Event Detection in Mobile WSNs. Search on Bibsonomy WASA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF composite event detection, sensor mobility, wireless sensor networks, reliability, sensor deployment
39Jiexing Li, Yufei Tao 0001, Xiaokui Xiao Preservation of proximity privacy in publishing numerical sensitive data. Search on Bibsonomy SIGMOD Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF (?, m)-anonymity, privacy, anonymization, numeric
39Lawrence A. Gordon, Martin P. Loeb The economics of information security investment. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Optimal security investment
37Yuri Demchenko, Sonja Filiposka, Raimundas Tuminauskas, Anastas Mishev, Kurt Baumann, Damir Regvart, Tony Breach Enabling Automated Network Services Provisioning for Cloud Based Applications Using Zero Touch Provisioning. Search on Bibsonomy UCC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
37C. D. Breach, F. Wulff A brief review of selected aspects of the materials science of ball bonding. Search on Bibsonomy Microelectron. Reliab. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Michael R. Breach, Naseem Ansari Modeling non-ideal vapor-liquid phase equilibrium, mass and energy transfer in a binary system via augmentation of computational fluid dynamical methods. Search on Bibsonomy Comput. Chem. Eng. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37C. D. Breach, F. Wulff, C. W. Tok An unusual mechanical failure mode in gold ballbonds at 50mum pitch due to degradation at the Au-Au4Al interface during ageing in air at 175degreeC. Search on Bibsonomy Microelectron. Reliab. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37C. D. Breach, F. Wulff Oxidation of Au4Al in un-moulded gold ballbonds after high temperature storage (HTS) in air at 175degreeC. Search on Bibsonomy Microelectron. Reliab. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37C. D. Breach, F. Wulff New observations on intermetallic compound formation in gold ball bonds: general growth patterns and identification of two forms of Au4Al. Search on Bibsonomy Microelectron. Reliab. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
37Gurindar S. Sohi, Scott E. Breach, T. N. Vijaykumar Multiscalar Processors. Search on Bibsonomy 25 Years ISCA: Retrospectives and Reprints The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
37Andreas Moshovos, Scott E. Breach, T. N. Vijaykumar, Gurindar S. Sohi Dynamic Speculation and Synchronization of Data Dependences. Search on Bibsonomy ISCA The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
37D. R. Breach, Christian Krattenthaler, Marcus Schorn Two Combinatorial Identities (Ma Xin-Bong and Wang Tian-Ming). Search on Bibsonomy SIAM Rev. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
37Gurindar S. Sohi, Scott E. Breach, T. N. Vijaykumar Multiscalar Processors. Search on Bibsonomy ISCA The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
37Scott E. Breach, T. N. Vijaykumar, Gurindar S. Sohi The anatomy of the register file in a multiscalar processor. Search on Bibsonomy MICRO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
37Todd M. Austin, Scott E. Breach, Gurindar S. Sohi Efficient Detection of All Pointer and Array Access Errors. Search on Bibsonomy PLDI The full citation details ... 1994 DBLP  DOI  BibTeX  RDF C
37D. R. Breach, Anne Penfold Street In search of 4-(12, 6, 4) designs: Part III. Search on Bibsonomy Australas. J Comb. The full citation details ... 1993 DBLP  BibTeX  RDF
37D. R. Breach, Martin J. Sharry, Anne Penfold Street In search of 4-(12, 6, 4) designs: Part I. Search on Bibsonomy Australas. J Comb. The full citation details ... 1993 DBLP  BibTeX  RDF
37D. R. Breach In search of 4-(12, 6, 4) designs: Part II. Search on Bibsonomy Australas. J Comb. The full citation details ... 1993 DBLP  BibTeX  RDF
37D. R. Breach Double Sum of Bessel Functions in Computer Music (A. Ronveaux, J. P. Palamin, and P. Palamin). Search on Bibsonomy SIAM Rev. The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
37D. R. Breach The 2-(9, 4, 3) and 3-(10, 5, 3) Designs. Search on Bibsonomy J. Comb. Theory, Ser. A The full citation details ... 1979 DBLP  DOI  BibTeX  RDF
36Salma Banu Nazeer Khan, Debbie Richards 0001, Paul Formosa, Sarah Bankins To breach or not? Profiling students' likelihood of breaching university ICT Codes of Conduct: Student Profiling of Breach of ICT Codes of Conduct. Search on Bibsonomy ACSW The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Ehsan Ul Haque, Mohammad Maifi Hasan Khan, Md Abdullah Al Fahim, Theodore Jensen Divergences in Blame Attribution after a Security Breach based on Compliance Behavior: Implications for Post-breach Risk Communication. Search on Bibsonomy EuroUSEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Hartmut Hoehle, Jia Wei, Sebastian Walter Schuetz, Viswanath Venkatesh User compensation as a data breach recovery action: a methodological replication and investigation of generalizability based on the Home Depot breach. Search on Bibsonomy Internet Res. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
36Stephen Jackson, Nadia Vanteeva, Colm Fearon An Investigation of the Impact of Data Breach Severity on the Readability of Mandatory Data Breach Notification Letters: Evidence From U.S. Firms. Search on Bibsonomy J. Assoc. Inf. Sci. Technol. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
36Desmond Eseoghene Ighravwe, Daniel J. Mashao Development of a Differential Evolution-based Fuzzy Cognitive Maps for Data Breach in Health-care Sector Fuzzy Cognitive Maps for Data Breach. Search on Bibsonomy AFRICON The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
36Zahra Aivazpour, Rohit Valecha, Rajarshi Chakraborty The Impact of Data Breach Severity on Post-Breach Online Shopping Intention. Search on Bibsonomy ICIS The full citation details ... 2018 DBLP  BibTeX  RDF
36Sigi Goode, Hartmut Hoehle, Viswanath Venkatesh, Susan A. Brown User Compensation as a Data Breach Recovery Action: An Investigation of the Sony PlayStation Network Breach. Search on Bibsonomy MIS Q. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Griselda Sinanaj, Humayun Zafar Who Wins in a Data Breach? - a Comparative Study on the Intangible Costs of Data Breach Incidents. Search on Bibsonomy PACIS The full citation details ... 2016 DBLP  BibTeX  RDF
36Mark Kedgley If you can't stop the breach, at least spot the breach. Search on Bibsonomy Netw. Secur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
36Fer O'Neil Target data breach: applying user-centered design principles to data breach notifications. Search on Bibsonomy SIGDOC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
35Neil Cooke, Lee Gillam, Ahmet M. Kondoz IP protection: Detecting Email based breaches of confidence. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF breach of confidence, outgoing email filters, Intellectual property, text analysis
35Arunabha Mukhopadhyay, Samir Chatterjee, Debashis Saha, Ambuj Mahanti, Samir K. Sadhukhan e-Risk Management with Insurance: A Framework Using Copula Aided Bayesian Belief Networks. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF e-risk, premium, e-commerce, Bayesian Belief Network (BBN), copula, security breach
35Ragib Hasan, William Yurcik A statistical analysis of disclosed storage security breaches. Search on Bibsonomy StorageSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF breach disclosure laws, storage security, security breaches
35Stephen S. Yau, Jun Zhu Intrusion ripple analysis in distributed information systems. Search on Bibsonomy FTDCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF intrusion ripple analysis, security breach propagation, networked information system, internets, software maintenance, wide-area networks, distributed information systems, computer crime, ripple effect analysis
26Yuan Hong, Xiaoyun He, Jaideep Vaidya, Nabil R. Adam, Vijayalakshmi Atluri Effective anonymization of query logs. Search on Bibsonomy CIKM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF privacy
26Ting Wang 0006, Shicong Meng, Bhuvan Bamba, Ling Liu 0001, Calton Pu A General Proximity Privacy Principle. Search on Bibsonomy ICDE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Srivatsava Ranjit Ganta, Shiva Prasad Kasiviswanathan, Adam D. Smith Composition attacks and auxiliary information in data privacy. Search on Bibsonomy KDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF adversarial attacks, privacy, anonymization
26Manolis Terrovitis, Nikos Mamoulis Privacy Preservation in the Publication of Trajectories. Search on Bibsonomy MDM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF spatial l-diversity, privacy, trajectories, spatiotemporal
26Satoshi Hada, Kouichi Sakurai Ciphertext-Auditable Public Key Encryption. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Krishnaram Kenthapadi, Nina Mishra, Kobbi Nissim Simulatable auditing. Search on Bibsonomy PODS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Supriya Singh, Margaret Jackson, Jenny Waycott, Jenine P. Beekhuyzen Downloading vs Purchase: Music Industry vs Consumers. Search on Bibsonomy DRMTICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Cynthia Dwork, Kobbi Nissim Privacy-Preserving Datamining on Vertically Partitioned Databases. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Francis Kofi Andoh-Baidoo, Kwasi Amoako-Gyampah, Kweku-Muata Osei-Bryson How Internet Security Breaches Harm Market Value. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Internet security breach, abnormal returns, decision-tree induction, market value
22Esmiralda Moradian System Engineering Security. Search on Bibsonomy KES (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, software development, control, risk management, System engineering, security breach
22Gale D. Fritsche, Sara K. Rodgers Encryption technologies: testing and identifying campus needs. Search on Bibsonomy SIGUCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF breach, mandate, privacy, evaluation, protection, compliance, sensitive data
22Arunabha Mukhopadhyay, Samir Chatterjee, Rahul Roy, Debashis Saha, Ambuj Mahanti, Samir K. Sadhukhan Insuring Big Losses Due to Security Breaches through Insurance: A Business Model. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF e-risk, E-risk insurance, cyber-insurance, re-insurance, e-commerce, security breach
22Arunabha Mukhopadhyay, Binay Bhushan, Debashis Saha, Ambuj Mahanti E-Risk Management through Self Insurance: An Option Model. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF e-risk, option model, self-insurance, e-commerce, security breach
22Seapahn Megerian, Farinaz Koushanfar, Miodrag Potkonjak, Mani B. Srivastava Worst and Best-Case Coverage in Sensor Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF maximal breach, maximal support, best-case coverage, worst-case coverage, Sensor networks, coverage
22Stuart E. Schechter Toward Econometric Models of the Security Risk from Remote Attack. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF breach rates, forecasting risk, security, risk models
22Suan-Suan Chew, Kok-Leong Ng, Chye-Lin Chee IAuth: An authentication system for Internet applications. Search on Bibsonomy COMPSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF IAuth, authentication system, digital signing, Web application server, distributed computing, Internet applications, message authentication, client server, Web-based application, data encryption, security breach, cryptographic keys
18 RETRACTED: Yan et al. Forecasting the Landslide Blocking River Process and Cascading Dam Breach Flood Propagation by an Integrated Numerical Approach: A Reservoir Area Case Study. Remote Sens. 2023, 15, 4669. Search on Bibsonomy Remote. Sens. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Gabriel Arquelau Pimenta Rodrigues, André Luiz Marques Serrano, Amanda Nunes Lopes Espiñeira Lemos, Edna Dias Canedo, Fábio Lúcio Lopes de Mendonça, Robson de Oliveira Albuquerque, Ana Lucila Sandoval Orozco, Luis Javier García-Villalba Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review. Search on Bibsonomy Data The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Lilyan Leblanc, Elie Saghbini, Jimmy Da Silva, Antoine Harlé, Saman Vafadar, Thibault Chandanson, Raphaël Vialle, Guillaume Morel, Brahim Tamadazte Automatic Spinal Canal Breach Detection During Pedicle Screw Placement. Search on Bibsonomy IEEE Robotics Autom. Lett. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Kainat Ansar, Mansoor Ahmed, Saif Ur Rehman Malik, Markus Helfert, Jungsuk Kim Blockchain based general data protection regulation compliant data breach detection system. Search on Bibsonomy PeerJ Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Yuanyuan Guo, Chaoyou Wang, Xiaoting Chen Functional or financial remedies? The effectiveness of recovery strategies after a data breach. Search on Bibsonomy J. Enterp. Inf. Manag. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Zhiqiang Xiong, Guangcai Feng, Lijia He, Haiyan Wang, Jianchao Wei Reactivation/Acceleration of Landslides Caused by the 2018 Baige Landslide-Dammed Lake and its Breach Floods Revealed by InSAR and Optical Images. Search on Bibsonomy IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Murat Ozer, Yasin Kose, Mehmet F. Bastug, Goksel Kucukkaya, Eva Ruhsar Varlioglu The Shifting Landscape of Cybersecurity: The Impact of Remote Work and COVID-19 on Data Breach Trends. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Rajiv Thummala, Gregory Falco Hacktivism Goes Orbital: Investigating NB65's Breach of ROSCOSMOS. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18John N. Angelis, Rajendran Murthy, Tanya Beaulieu, Joseph C. Miller Better Angry Than Afraid: The Case of Post Data Breach Emotions on Customer Engagement. Search on Bibsonomy IEEE Trans. Engineering Management The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Yan Cheng, Shue Mei, Weijun Zhong, Xing Gao 0002 Managing consumer privacy risk: The effects of privacy breach insurance. Search on Bibsonomy Electron. Commer. Res. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Shaharyar Khan, Ilya Kabanov, Yunke Hua, Stuart E. Madnick A Systematic Analysis of the Capital One Data Breach: Critical Lessons Learned. Search on Bibsonomy ACM Trans. Priv. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Geir Helge Kiplesund, Fjola Gudrun Sigtryggsdottir, Leif Lia Breach Progression Observation in Rockfill Dam Models Using Photogrammetry. Search on Bibsonomy Remote. Sens. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18 Forecasting the Landslide Blocking River Process and Cascading Dam Breach Flood Propagation by an Integrated Numerical Approach: A Reservoir Area Case Study. Search on Bibsonomy Remote. Sens. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Muhammad Zia, M. Faisal Amjad, Zafar Iqbal, Abdul Rehman Javed, Thippa Reddy Gadekallu Circumventing Google Play vetting policies: a stealthy cyberattack that uses incremental updates to breach privacy. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Arif Rahman Hakim, Kalamullah Ramli, Teddy Surya Gunawan, Susila Windarta A Novel Digital Forensic Framework for Data Breach Investigation. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Daeun Lee, Harjinder Singh Lallie 0001, Nadine Michaelides The impact of an employee's psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation. Search on Bibsonomy Cogn. Technol. Work. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Aidana Massalimova, Maikel Timmermans, Nicola Cavalcanti, Daniel Suter, Matthias Seibold, Fabio Carrillo, Christoph J. Laux, Reto Sutter, Mazda Farshad, Kathleen Denis, Philipp Fürnstahl Automatic breach detection during spine pedicle drilling based on vibroacoustic sensing. Search on Bibsonomy Artif. Intell. Medicine The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Sung J. Choi, Min Chen 0026, Xuan Tan Assessing the impact of health information exchange on hospital data breach risk. Search on Bibsonomy Int. J. Medical Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Dominik Molitor, Wullianallur Raghupathi, Aditya N. Saharia, Viju Raghupathi Exploring Key Issues in Cybersecurity Data Breaches: Analyzing Data Breach Litigation with ML-Based Text Analytics. Search on Bibsonomy Inf. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Tianxi Dong, Suning Zhu, Mauro Oliveira, Xin (Robert) Luo Making better IS security investment decisions: discovering the cost of data breach announcements during the COVID-19 pandemic. Search on Bibsonomy Ind. Manag. Data Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Muhammad Waseem Bari, Qurrahtulain Khan, Asad Waqas Person related workplace bullying and knowledge hiding behaviors: relational psychological contract breach as an underlying mechanism. Search on Bibsonomy J. Knowl. Manag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Chris Zhijian He, Tianpei Li, Robert E. Pinsker Firm-Level Pay Disparity and Breach Risk. Search on Bibsonomy J. Inf. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Barri Litt, Paul Tanyi, Marcia Weidenmier Watson Cybersecurity Breach at a Big 4 Accounting Firm: Effects on Auditor Reputation. Search on Bibsonomy J. Inf. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Hussein Aly 0001, Abdulaziz Al-Ali 0001, Abdullah Al-Ali, Qutaibah M. Malluhi A Blackbox Model Is All You Need to Breach Privacy: Smart Grid Forecasting Models as a Use Case. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Robert Lee Poe Why Fair Automated Hiring Systems Breach EU Non-Discrimination Law. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Shreyansh Padarha Data-Driven Dystopia: an uninterrupted breach of ethics. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Aidana Massalimova, Maikel Timmermans, Nicola Cavalcanti, Daniel Suter, Matthias Seibold, Fabio Carrillo, Christoph J. Laux, Reto Sutter, Mazda Farshad, Kathleen Denis, Philipp Fürnstahl Automatic breach detection during spine pedicle drilling based on vibroacoustic sensing. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Svetlana Abramova, Rainer Böhme Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto-Wallet Case. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Daeun Lee, Harjinder Singh Lallie 0001, Nadine Michaelides The impact of an employee's psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Hung-Chung Su, Manus Johnny Rungtusanatham, Kevin W. Linderman Retail inventory shrinkage, sensing weak security breach signals, and organizational structure. Search on Bibsonomy Decis. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Emmanuel W. Ayaburi Understanding online information disclosure: examination of data breach victimization experience effect. Search on Bibsonomy Inf. Technol. People The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Giuseppe Persiano, Kevin Yeo Limits of Breach-Resistant and Snapshot-Oblivious RAMs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
18Dario Pasquini, Danilo Francati, Giuseppe Ateniese, Evgenios M. Kornaropoulos Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
18Jing Rong Goh, Shaun S. Wang, Yaniv Harel, Gabriel Toh Predictive Taxonomy Analytics (LASSO): Predicting Outcome Types of Cyber Breach. Search on Bibsonomy J. Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Zareef A. Mohammed, Gurvirender P. Tejay How to Compensate After a Data Breach?: Investigating Compensation Types and Role of Fairness in Customer Repatronage Intentions. Search on Bibsonomy ACM SIGMIS Database The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Meirong Zhou, Miao Hu, Shenyang Jiang Impact of Data Breach on IT Investment: Moderating Role of Buyer-Supplier Relationship. Search on Bibsonomy WHICEB (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Harshvardhan J. Pandit, Paul Ryan, Georg Philip Krog, Martin Crane, Rob Brennan Towards a Semantic Specification for GDPR Data Breach Reporting. Search on Bibsonomy JURIX The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Meenu Rani Dey, Moumita Patra Hand it Over Carefully: Security Breach during Handover in 5G-V2X. Search on Bibsonomy COMSNETS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 545 (100 per page; Change: )
Pages: [1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license