ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A survey on effective analysis and management of a data breach
International Journal of Security Technology for Smart Device
◽
10.21742/ijstsd.2018.5.1.01
◽
2018
◽
Vol 5
(1)
◽
Keyword(s):
Data Breach
◽
Effective Analysis
Download Full-text
Related Documents
Cited By
References
Evaluating Population Programs: International Experience with Cost-Effective Analysis and Cost-Benefit Analysis
Population Studies
◽
10.1080/0032472031000142266
◽
1986
◽
Vol 40
(2)
◽
pp. 333-334
Author(s):
C. Chandrasekaran
Keyword(s):
Cost Benefit Analysis
◽
Cost Benefit
◽
Cost Effective
◽
International Experience
◽
Benefit Analysis
◽
Effective Analysis
Download Full-text
Data Breach and the Liability of the Service Provider - The Supreme Court Decision 2015Da24904, 24928, 24935, Dated January 25, 2018 -
LAW RESEARCH INSTITUTE CHUNGBUK NATIONAL UNIVERSITY
◽
10.34267/cblj.2018.29.2.553
◽
2018
◽
Vol 29
(2)
◽
pp. 553-593
Author(s):
So Eun Lee
Keyword(s):
Supreme Court
◽
Service Provider
◽
Supreme Court Decision
◽
Court Decision
◽
Data Breach
◽
The Supreme Court
Download Full-text
Data Breach Notifications in the UK
PinG Privacy in Germany
◽
10.37307/j.2196-9817.2019.03.14
◽
2019
◽
Author(s):
Ronke Euler-Ajayi
◽
Malcolm Dowden
Keyword(s):
Data Breach
◽
The Uk
Download Full-text
Verwendungsverbot für Data Breach Notifications
PinG Privacy in Germany
◽
10.37307/j.2196-9817.2019.03.10
◽
2019
◽
Author(s):
Selina Ariane Pohl
Keyword(s):
Data Breach
Download Full-text
Response to the Commonwealth of Australia Attorney General's Discussion Paper on Mandatory Data Breach Notification (October, 2012)
SSRN Electronic Journal
◽
10.2139/ssrn.2245377
◽
2012
◽
Author(s):
Mark Burdon
Keyword(s):
Discussion Paper
◽
Data Breach
Download Full-text
Cybercrime and Data Breach: Privacy Protection through the Regulation of Voluntary Notification
SSRN Electronic Journal
◽
10.2139/ssrn.3042174
◽
2017
◽
Author(s):
Seung-Hun Hong
◽
Mamoun Alazab
Keyword(s):
Privacy Protection
◽
Data Breach
Download Full-text
Mergers and Acquisitions for Data Assets: Evidence from Data Breach Notification Laws
SSRN Electronic Journal
◽
10.2139/ssrn.3522032
◽
2020
◽
Author(s):
Lai Wei
◽
Yuan Sun
Keyword(s):
Mergers And Acquisitions
◽
Data Breach
Download Full-text
An Effective Analysis Method for Millimeter-wave Broadband Mixers
IEEE Microwave and Wireless Components Letters
◽
10.1109/lmwc.2021.3064332
◽
2021
◽
pp. 1-1
Author(s):
Jiangling Dou
◽
Jianxiao Ma
◽
Tao Shen
◽
Yuanxu Fu
◽
Shu Jiang
Keyword(s):
Millimeter Wave
◽
Analysis Method
◽
Effective Analysis
Download Full-text
Meta-analysis and cost effective analysis of portal-superior mesenteric vein resection during pancreatoduodenectomy: Impact on margin status and survival
Surgical Oncology
◽
10.1016/j.suronc.2016.12.007
◽
2017
◽
Vol 26
(1)
◽
pp. 53-62
◽
Cited By ~ 17
Author(s):
Richard Bell
◽
Braden Te Ao
◽
Natasha Ironside
◽
Adam Bartlett
◽
John A. Windsor
◽
...
Keyword(s):
Superior Mesenteric Vein
◽
Meta Analysis
◽
Cost Effective
◽
Margin Status
◽
Mesenteric Vein
◽
Vein Resection
◽
Effective Analysis
Download Full-text
Sustainable development path research on urban transportation based on synergistic and cost-effective analysis: A case of Guangzhou
Sustainable Cities and Society
◽
10.1016/j.scs.2021.102950
◽
2021
◽
Vol 71
◽
pp. 102950
Author(s):
Jiandong Jiao
◽
Ying Huang
◽
Cuiping Liao
◽
Daiqing Zhao
Keyword(s):
Sustainable Development
◽
Urban Transportation
◽
Cost Effective
◽
Development Path
◽
Effective Analysis
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close