In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ...In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.展开更多
Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This...Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This study analyzes trends in data breaches in the United States, examining the frequency, causes, and magnitude of breaches across various industries. We document that data breaches are increasing, with hacking emerging as the leading cause. Our descriptive analyses explore factors influencing breaches, including security vulnerabilities, human error, and malicious attacks. The findings provide policymakers and businesses with actionable insights to bolster data security through proactive audits, patching, encryption, and response planning. By better understanding breach patterns and risk factors, organizations can take targeted steps to enhance protections and mitigate the potential damage of future incidents.展开更多
Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publicati...Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publication base as an effective solution. The NIST Special Publication 800-66 Revision 1 was an essential standard in US healthcare, which was withdrawn in February 2024 and superseded by SP 800-66 Revision 2. This review investigates the academic papers concerning the application of the NIST SP 800-66 Revision 1 standard in the US healthcare literature. A systematic review method was used in this study to determine current knowledge gaps of the SP 800-66 Revision 1. Some limitations were employed in the search to enforce validity. A total of eleven articles were found eligible for the study. Consequently, this study suggests the necessity for additional academic papers pertaining to SP 800-66 Revision 2 in the US healthcare literature. In turn, it will enhance awareness of safeguarding electronic protected health information (ePHI), help to mitigate potential future risks, and eventually reduce breaches.展开更多
Farmers’contract breach behavior is cited as one of the major stumbling blocks in the sustainable expansion of contract farming in many developing countries.This paper examines farmers’contract breach decisions from...Farmers’contract breach behavior is cited as one of the major stumbling blocks in the sustainable expansion of contract farming in many developing countries.This paper examines farmers’contract breach decisions from the perspective of time preferences.The empirical analysis is based on a household survey and economic field experiments of poultry households participating in contract farming conducted in Jiangsu Province,China.A discounted utility model and a maximum likelihood technique are applied to estimate farmers’time preferences and the effect of time preferences on contract breach in the production and sales phases are explored with a bivariate probit model.The results show that,on average,the poultry farmers in the sample are generally present biased and impatient regarding future utility.The regression results show that farmers with a higher preference for the present and a higher discount rate are more likely to breach contracts,and time preferences play a greater role in the production phase than in the sales phase.When considering heterogeneity,specific investments and transaction costs promote contract stability only for farmers with a low degree of impatience.Moreover,compared with large-scale farmers,small-scale farmers’contract breach decisions are more significantly affected by their time preferences.These results have implications for contract stability policies and other issues that are impacted by the linking of behavioral preferences to agricultural decisions.展开更多
The debris flow dam is a common type of barrier dams,which shows significant differences from other types of barrier dam such as landslide dam,moraine dam in their formation processes,dam body shapes,and internal comp...The debris flow dam is a common type of barrier dams,which shows significant differences from other types of barrier dam such as landslide dam,moraine dam in their formation processes,dam body shapes,and internal compositions.The basic breaching parameters such as flood peak discharge are vital indicators of risk assessment.In this study,we elucidated the failure process of the debris flow dam through the flume experiment,and built the calculation equation of the breaching parameters by selecting critical factors.The result shows that the overtopping failure process of the debris flow dam is capable of forming significantly retrogressive scarps,and the failure process experiences three stages,the formation of the retrogressive scarp,the erosion of the retrogressive scarp,and the decline of the retrogressive scarp.Five factors used for establishing the calculation equations for peak discharge(Qp),final width(Wb)of the breach,and duration(T)of the debris flow dam failure are dam height(h),reservoir capacity(V),the fine grain content(P0.075)of the soil,the nonuniformity coefficient(Cu)of the soil,and the upper limit grain size(D90)of the soil,respectively.In the three equations,the correlation coefficients between Qp,Wb,T and the five factors were 0.86,0.70,0.63,respectively.The equations still need to be modified and verified in actual cases.展开更多
Whether,and how,to rescind the right of one party(the non-breaching party)to rescind a contract in case of an obviously minor breach by the other party(the breaching party)is a recurring topic in the field of contract...Whether,and how,to rescind the right of one party(the non-breaching party)to rescind a contract in case of an obviously minor breach by the other party(the breaching party)is a recurring topic in the field of contract law.The Minutes of the Ninth Work Conference of the Courts Nationwide on Civil and Commercial Trial(the Minutes of the Ninth Work Conference)stipulates that whether a contract shall be rescinded depends on whether a breach is obviously minor and affects the fulfillment of the contract purposes expected by the non-breaching party.In juridical practice,however,there are no clear criteria to define what constitutes obviously minor breaches,and the factors considered in such cases are often inadequate to allow for a fully considered decision.By analyzing Article 55 of the Judicial Interpretation of the General Provisions of Contracts of the Civil Code of the People’s Republic of China(Draft for Comments)and reviewing the previous juridical practices,we present our conclusions regarding the conditions and factors that should be considered when restricting the right of rescission in cases of obviously minor breaches with a view to unifying the judicial judgment criteria by differentiating the type of breaches.展开更多
The housing crisis in Ireland has rapidly grown in recent years. To make a more significant profit, many landlords are no longer renting out their houses under long-term tenancies but under short-term tenancies. Regul...The housing crisis in Ireland has rapidly grown in recent years. To make a more significant profit, many landlords are no longer renting out their houses under long-term tenancies but under short-term tenancies. Regulating rentals in Rent Pressure Zones with the highest and rising rents is becoming a tricky issue. In this paper, we develop a breach identifier to check short-term rentals located in Rent Pressure Zones with potential breaches only using publicly available data from Airbnb (an online marketplace focused on short-term home-stays) and Irish government websites. First, we use a Residual Neural Network to filter out outdoor landscape photos that negatively impact identifying whether an owner has multiple rentals in a Rent Pressure Zone. Second, a Siamese Neural Network is used to compare the similarity of indoor photos to determine if multiple rental posts correspond to the same residence. Next, we use the Haversine algorithm to locate short-term rentals within a circle centered on the coordinate of a permit. Short-term rentals with a permit will not be restricted. Finally, we improve the occupancy estimation model combined with sentiment analysis, which may provide higher accuracy.展开更多
Every year, a number of breach failures occur in Irrigation Canals in Sindh. Those failures cause displacement of thousands of people, destruction of properties, land, and damage to costly crops that worth millions Ru...Every year, a number of breach failures occur in Irrigation Canals in Sindh. Those failures cause displacement of thousands of people, destruction of properties, land, and damage to costly crops that worth millions Rupees. In addition to that, breach failures also can cause water shortages when the failure occurs during the peak demand period. There are various causes of embankment failures which include overtopping, internal erosion, structural defects and piping. State of art for breach failures is presented in this paper and suggestions for prediction of breaches in context to canals in Sindh are discussed. Seepage and slope stability analyses are recommended for a long-term breach predictions.展开更多
Based on model tests of earthen dam breach due to piping failure, a numerical model was developed.A key difference from previous research is the assumption that the cross-section of the pipe channel is an arch, with a...Based on model tests of earthen dam breach due to piping failure, a numerical model was developed.A key difference from previous research is the assumption that the cross-section of the pipe channel is an arch, with a rectangle at the bottom and a semicircle at the top before the collapse of the pipe roof, rather than a rectangular or circular cross-section.A shear stress-based erosion rate formula was utilized, and the arched pipe tunnel was assumed to enlarge along its length and width until the overlying soil could no longer maintain stability.Orifice flow and open channel flow were adopted to calculate the breach flow discharge for pressure and free surface flows, respectively.The collapse of the pipe roof was determined by comparing the weight of the overlying soil and the cohesion of the soil on the two sidewalls of the pipe.After the collapse, overtopping failure dominated, and the limit equilibrium method was adopted to estimate the stability of the breach slope when the water flow overtopped.In addition, incomplete and base erosion, as well as one-and two-sided breaches were taken into account.The USDAARS-HERU model test P1, with detailed measured data, was used as a case study, and two artificially filled earthen dam failure cases were studied to verify the model.Feedback analysis demonstrates that the proposed model can provide satisfactory results for modeling the breach flow discharge and breach development process.Sensitivity analysis shows that the soil erodibility and initial piping position significantly affect the prediction of the breach flow discharge.Furthermore, a comparison with a well-known numerical model shows that the proposed model performs better than the NWS BREACH model.展开更多
Based on the analysis of hanging rivers' actuality in the lower Yellow River and researches related to the evaluation of dike breach risks,it is put forward that the influencing factors of dike beach risks in the ...Based on the analysis of hanging rivers' actuality in the lower Yellow River and researches related to the evaluation of dike breach risks,it is put forward that the influencing factors of dike beach risks in the lower Yellow River should involve four aspects,the flow and sediment movement,the regional crustal stability,the variation of river regime and the stability of river dikes.With this,the evaluation indexes system of dike breach risks is established,and with the support of geographic information systems technology,the model of multi-hierarchical fuzzy comprehensive judgment is applied to estimate the dike beach risks of the hanging rivers in the lower Yellow River under different flood conditions.The evaluation results of dike breach risks show the following distributing regularities of dike breach risks in the lower Yellow River:(1) Dike breach risks increase with the increase of the flood.(2) Dike breach risks decrease with the changes of river patterns along the channel.(3) There are great risks of dike breach in the wandering reaches,and it is relatively higher in the south bank than in the north in wandering reaches.(4) There is a higher dike breach risk in the north bank than in the south in winding reaches.Simultaneously,the evaluation results manifest that the evaluation indexes system established from the flow and sediment movement,the regional crustal stability,the variation of river regime and the stability of river dikes can represent the actual situation of the lower Yellow River more comprehensively.The application of multihierarchical fuzzy comprehensive judgment can preferably resolve the problem of hanging river dike breach,which has numerous influencing factors and complicated functionary mechanisms.The applications of geographic information systems technology with powerful spatial analysis functions make dike beach risks quantificationally displayed in different spatial positions,and reflect the differences of dike beach risks in different spatial positions of the channel in the lower Yellow River.展开更多
Ethiopia has been booming with active construction of dams within the past few decades for different infrastructural needs, but has never experienced demolition or failure of dams in its history;hence little attention...Ethiopia has been booming with active construction of dams within the past few decades for different infrastructural needs, but has never experienced demolition or failure of dams in its history;hence little attention is being given to possible breach scenarios of dams and the resulting floodings. This paper makes analysis of the possible breach of kesem dam and the resulting flood inundation. In this study, the dam has been checked for both overtopping and piping failure modes using one dimensional river analysis model called HEC-RAS. Empirical equations were used to predict dam breach parameters of the two failure modes for use in this model. PMF inflow with a peak 9237.77 m3/s is used as an input to the reservoir to check if overtopping failure was possible. The spill way has proven to have adequate capacity for the flood due to the PMF. Therefore, breaching of the embankment was not possible. Piping failure was also simulated in HEC-RAS and the resulting breach due to piping failure, was analyzed and flood hydrograph was obtained at different cross sections along the river. These are flood hydrographs at 20 km, 40 km and 60 km at the downstream. The resulting flood plain was also mapped using HEC-GeoRas to show the extent of flooding.展开更多
文摘In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.
文摘Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This study analyzes trends in data breaches in the United States, examining the frequency, causes, and magnitude of breaches across various industries. We document that data breaches are increasing, with hacking emerging as the leading cause. Our descriptive analyses explore factors influencing breaches, including security vulnerabilities, human error, and malicious attacks. The findings provide policymakers and businesses with actionable insights to bolster data security through proactive audits, patching, encryption, and response planning. By better understanding breach patterns and risk factors, organizations can take targeted steps to enhance protections and mitigate the potential damage of future incidents.
文摘Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publication base as an effective solution. The NIST Special Publication 800-66 Revision 1 was an essential standard in US healthcare, which was withdrawn in February 2024 and superseded by SP 800-66 Revision 2. This review investigates the academic papers concerning the application of the NIST SP 800-66 Revision 1 standard in the US healthcare literature. A systematic review method was used in this study to determine current knowledge gaps of the SP 800-66 Revision 1. Some limitations were employed in the search to enforce validity. A total of eleven articles were found eligible for the study. Consequently, this study suggests the necessity for additional academic papers pertaining to SP 800-66 Revision 2 in the US healthcare literature. In turn, it will enhance awareness of safeguarding electronic protected health information (ePHI), help to mitigate potential future risks, and eventually reduce breaches.
基金supported by the National Natural Science Foundation of China(72003082 and 71573130)the Project of Philosophy and Social Science Research in Colleges and Universities in Jiangsu Province of China(2020SJA1015)+1 种基金the Priority Academic Program Development of Jiangsu Higher Education Institutions,China(PAPD)the China Center for Food Security Studies,Nanjing Agricultural University,China。
文摘Farmers’contract breach behavior is cited as one of the major stumbling blocks in the sustainable expansion of contract farming in many developing countries.This paper examines farmers’contract breach decisions from the perspective of time preferences.The empirical analysis is based on a household survey and economic field experiments of poultry households participating in contract farming conducted in Jiangsu Province,China.A discounted utility model and a maximum likelihood technique are applied to estimate farmers’time preferences and the effect of time preferences on contract breach in the production and sales phases are explored with a bivariate probit model.The results show that,on average,the poultry farmers in the sample are generally present biased and impatient regarding future utility.The regression results show that farmers with a higher preference for the present and a higher discount rate are more likely to breach contracts,and time preferences play a greater role in the production phase than in the sales phase.When considering heterogeneity,specific investments and transaction costs promote contract stability only for farmers with a low degree of impatience.Moreover,compared with large-scale farmers,small-scale farmers’contract breach decisions are more significantly affected by their time preferences.These results have implications for contract stability policies and other issues that are impacted by the linking of behavioral preferences to agricultural decisions.
基金supported by the National Natural Science Foundation of China(Grant Nos.U20A20112,U19A2049)Second Tibetan Plateau Scientific Expedition and Research Program(STEP)(Grant No.2019QZKK0904)CAS Light of West China Program。
文摘The debris flow dam is a common type of barrier dams,which shows significant differences from other types of barrier dam such as landslide dam,moraine dam in their formation processes,dam body shapes,and internal compositions.The basic breaching parameters such as flood peak discharge are vital indicators of risk assessment.In this study,we elucidated the failure process of the debris flow dam through the flume experiment,and built the calculation equation of the breaching parameters by selecting critical factors.The result shows that the overtopping failure process of the debris flow dam is capable of forming significantly retrogressive scarps,and the failure process experiences three stages,the formation of the retrogressive scarp,the erosion of the retrogressive scarp,and the decline of the retrogressive scarp.Five factors used for establishing the calculation equations for peak discharge(Qp),final width(Wb)of the breach,and duration(T)of the debris flow dam failure are dam height(h),reservoir capacity(V),the fine grain content(P0.075)of the soil,the nonuniformity coefficient(Cu)of the soil,and the upper limit grain size(D90)of the soil,respectively.In the three equations,the correlation coefficients between Qp,Wb,T and the five factors were 0.86,0.70,0.63,respectively.The equations still need to be modified and verified in actual cases.
文摘Whether,and how,to rescind the right of one party(the non-breaching party)to rescind a contract in case of an obviously minor breach by the other party(the breaching party)is a recurring topic in the field of contract law.The Minutes of the Ninth Work Conference of the Courts Nationwide on Civil and Commercial Trial(the Minutes of the Ninth Work Conference)stipulates that whether a contract shall be rescinded depends on whether a breach is obviously minor and affects the fulfillment of the contract purposes expected by the non-breaching party.In juridical practice,however,there are no clear criteria to define what constitutes obviously minor breaches,and the factors considered in such cases are often inadequate to allow for a fully considered decision.By analyzing Article 55 of the Judicial Interpretation of the General Provisions of Contracts of the Civil Code of the People’s Republic of China(Draft for Comments)and reviewing the previous juridical practices,we present our conclusions regarding the conditions and factors that should be considered when restricting the right of rescission in cases of obviously minor breaches with a view to unifying the judicial judgment criteria by differentiating the type of breaches.
文摘The housing crisis in Ireland has rapidly grown in recent years. To make a more significant profit, many landlords are no longer renting out their houses under long-term tenancies but under short-term tenancies. Regulating rentals in Rent Pressure Zones with the highest and rising rents is becoming a tricky issue. In this paper, we develop a breach identifier to check short-term rentals located in Rent Pressure Zones with potential breaches only using publicly available data from Airbnb (an online marketplace focused on short-term home-stays) and Irish government websites. First, we use a Residual Neural Network to filter out outdoor landscape photos that negatively impact identifying whether an owner has multiple rentals in a Rent Pressure Zone. Second, a Siamese Neural Network is used to compare the similarity of indoor photos to determine if multiple rental posts correspond to the same residence. Next, we use the Haversine algorithm to locate short-term rentals within a circle centered on the coordinate of a permit. Short-term rentals with a permit will not be restricted. Finally, we improve the occupancy estimation model combined with sentiment analysis, which may provide higher accuracy.
文摘Every year, a number of breach failures occur in Irrigation Canals in Sindh. Those failures cause displacement of thousands of people, destruction of properties, land, and damage to costly crops that worth millions Rupees. In addition to that, breach failures also can cause water shortages when the failure occurs during the peak demand period. There are various causes of embankment failures which include overtopping, internal erosion, structural defects and piping. State of art for breach failures is presented in this paper and suggestions for prediction of breaches in context to canals in Sindh are discussed. Seepage and slope stability analyses are recommended for a long-term breach predictions.
基金supported by the National Key Research and Development Program of China(Grant No.2017YFC0404805)the National Natural Science Foundation of China(Grants No.51779153 and 51539006)+1 种基金the Central Public-interest Scientific Institution Basal Research Fund(Grant No.Y717012)the Natural Science Foundation of Jiangsu Province(Grant No.BK20161121)
文摘Based on model tests of earthen dam breach due to piping failure, a numerical model was developed.A key difference from previous research is the assumption that the cross-section of the pipe channel is an arch, with a rectangle at the bottom and a semicircle at the top before the collapse of the pipe roof, rather than a rectangular or circular cross-section.A shear stress-based erosion rate formula was utilized, and the arched pipe tunnel was assumed to enlarge along its length and width until the overlying soil could no longer maintain stability.Orifice flow and open channel flow were adopted to calculate the breach flow discharge for pressure and free surface flows, respectively.The collapse of the pipe roof was determined by comparing the weight of the overlying soil and the cohesion of the soil on the two sidewalls of the pipe.After the collapse, overtopping failure dominated, and the limit equilibrium method was adopted to estimate the stability of the breach slope when the water flow overtopped.In addition, incomplete and base erosion, as well as one-and two-sided breaches were taken into account.The USDAARS-HERU model test P1, with detailed measured data, was used as a case study, and two artificially filled earthen dam failure cases were studied to verify the model.Feedback analysis demonstrates that the proposed model can provide satisfactory results for modeling the breach flow discharge and breach development process.Sensitivity analysis shows that the soil erodibility and initial piping position significantly affect the prediction of the breach flow discharge.Furthermore, a comparison with a well-known numerical model shows that the proposed model performs better than the NWS BREACH model.
基金The State Science Research Plan (Grant no.96-920-09-01)
文摘Based on the analysis of hanging rivers' actuality in the lower Yellow River and researches related to the evaluation of dike breach risks,it is put forward that the influencing factors of dike beach risks in the lower Yellow River should involve four aspects,the flow and sediment movement,the regional crustal stability,the variation of river regime and the stability of river dikes.With this,the evaluation indexes system of dike breach risks is established,and with the support of geographic information systems technology,the model of multi-hierarchical fuzzy comprehensive judgment is applied to estimate the dike beach risks of the hanging rivers in the lower Yellow River under different flood conditions.The evaluation results of dike breach risks show the following distributing regularities of dike breach risks in the lower Yellow River:(1) Dike breach risks increase with the increase of the flood.(2) Dike breach risks decrease with the changes of river patterns along the channel.(3) There are great risks of dike breach in the wandering reaches,and it is relatively higher in the south bank than in the north in wandering reaches.(4) There is a higher dike breach risk in the north bank than in the south in winding reaches.Simultaneously,the evaluation results manifest that the evaluation indexes system established from the flow and sediment movement,the regional crustal stability,the variation of river regime and the stability of river dikes can represent the actual situation of the lower Yellow River more comprehensively.The application of multihierarchical fuzzy comprehensive judgment can preferably resolve the problem of hanging river dike breach,which has numerous influencing factors and complicated functionary mechanisms.The applications of geographic information systems technology with powerful spatial analysis functions make dike beach risks quantificationally displayed in different spatial positions,and reflect the differences of dike beach risks in different spatial positions of the channel in the lower Yellow River.
文摘Ethiopia has been booming with active construction of dams within the past few decades for different infrastructural needs, but has never experienced demolition or failure of dams in its history;hence little attention is being given to possible breach scenarios of dams and the resulting floodings. This paper makes analysis of the possible breach of kesem dam and the resulting flood inundation. In this study, the dam has been checked for both overtopping and piping failure modes using one dimensional river analysis model called HEC-RAS. Empirical equations were used to predict dam breach parameters of the two failure modes for use in this model. PMF inflow with a peak 9237.77 m3/s is used as an input to the reservoir to check if overtopping failure was possible. The spill way has proven to have adequate capacity for the flood due to the PMF. Therefore, breaching of the embankment was not possible. Piping failure was also simulated in HEC-RAS and the resulting breach due to piping failure, was analyzed and flood hydrograph was obtained at different cross sections along the river. These are flood hydrographs at 20 km, 40 km and 60 km at the downstream. The resulting flood plain was also mapped using HEC-GeoRas to show the extent of flooding.