Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This...Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This study analyzes trends in data breaches in the United States, examining the frequency, causes, and magnitude of breaches across various industries. We document that data breaches are increasing, with hacking emerging as the leading cause. Our descriptive analyses explore factors influencing breaches, including security vulnerabilities, human error, and malicious attacks. The findings provide policymakers and businesses with actionable insights to bolster data security through proactive audits, patching, encryption, and response planning. By better understanding breach patterns and risk factors, organizations can take targeted steps to enhance protections and mitigate the potential damage of future incidents.展开更多
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ...In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.展开更多
Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publicati...Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publication base as an effective solution. The NIST Special Publication 800-66 Revision 1 was an essential standard in US healthcare, which was withdrawn in February 2024 and superseded by SP 800-66 Revision 2. This review investigates the academic papers concerning the application of the NIST SP 800-66 Revision 1 standard in the US healthcare literature. A systematic review method was used in this study to determine current knowledge gaps of the SP 800-66 Revision 1. Some limitations were employed in the search to enforce validity. A total of eleven articles were found eligible for the study. Consequently, this study suggests the necessity for additional academic papers pertaining to SP 800-66 Revision 2 in the US healthcare literature. In turn, it will enhance awareness of safeguarding electronic protected health information (ePHI), help to mitigate potential future risks, and eventually reduce breaches.展开更多
Farmers’contract breach behavior is cited as one of the major stumbling blocks in the sustainable expansion of contract farming in many developing countries.This paper examines farmers’contract breach decisions from...Farmers’contract breach behavior is cited as one of the major stumbling blocks in the sustainable expansion of contract farming in many developing countries.This paper examines farmers’contract breach decisions from the perspective of time preferences.The empirical analysis is based on a household survey and economic field experiments of poultry households participating in contract farming conducted in Jiangsu Province,China.A discounted utility model and a maximum likelihood technique are applied to estimate farmers’time preferences and the effect of time preferences on contract breach in the production and sales phases are explored with a bivariate probit model.The results show that,on average,the poultry farmers in the sample are generally present biased and impatient regarding future utility.The regression results show that farmers with a higher preference for the present and a higher discount rate are more likely to breach contracts,and time preferences play a greater role in the production phase than in the sales phase.When considering heterogeneity,specific investments and transaction costs promote contract stability only for farmers with a low degree of impatience.Moreover,compared with large-scale farmers,small-scale farmers’contract breach decisions are more significantly affected by their time preferences.These results have implications for contract stability policies and other issues that are impacted by the linking of behavioral preferences to agricultural decisions.展开更多
The debris flow dam is a common type of barrier dams,which shows significant differences from other types of barrier dam such as landslide dam,moraine dam in their formation processes,dam body shapes,and internal comp...The debris flow dam is a common type of barrier dams,which shows significant differences from other types of barrier dam such as landslide dam,moraine dam in their formation processes,dam body shapes,and internal compositions.The basic breaching parameters such as flood peak discharge are vital indicators of risk assessment.In this study,we elucidated the failure process of the debris flow dam through the flume experiment,and built the calculation equation of the breaching parameters by selecting critical factors.The result shows that the overtopping failure process of the debris flow dam is capable of forming significantly retrogressive scarps,and the failure process experiences three stages,the formation of the retrogressive scarp,the erosion of the retrogressive scarp,and the decline of the retrogressive scarp.Five factors used for establishing the calculation equations for peak discharge(Qp),final width(Wb)of the breach,and duration(T)of the debris flow dam failure are dam height(h),reservoir capacity(V),the fine grain content(P0.075)of the soil,the nonuniformity coefficient(Cu)of the soil,and the upper limit grain size(D90)of the soil,respectively.In the three equations,the correlation coefficients between Qp,Wb,T and the five factors were 0.86,0.70,0.63,respectively.The equations still need to be modified and verified in actual cases.展开更多
The housing crisis in Ireland has rapidly grown in recent years. To make a more significant profit, many landlords are no longer renting out their houses under long-term tenancies but under short-term tenancies. Regul...The housing crisis in Ireland has rapidly grown in recent years. To make a more significant profit, many landlords are no longer renting out their houses under long-term tenancies but under short-term tenancies. Regulating rentals in Rent Pressure Zones with the highest and rising rents is becoming a tricky issue. In this paper, we develop a breach identifier to check short-term rentals located in Rent Pressure Zones with potential breaches only using publicly available data from Airbnb (an online marketplace focused on short-term home-stays) and Irish government websites. First, we use a Residual Neural Network to filter out outdoor landscape photos that negatively impact identifying whether an owner has multiple rentals in a Rent Pressure Zone. Second, a Siamese Neural Network is used to compare the similarity of indoor photos to determine if multiple rental posts correspond to the same residence. Next, we use the Haversine algorithm to locate short-term rentals within a circle centered on the coordinate of a permit. Short-term rentals with a permit will not be restricted. Finally, we improve the occupancy estimation model combined with sentiment analysis, which may provide higher accuracy.展开更多
Whether,and how,to rescind the right of one party(the non-breaching party)to rescind a contract in case of an obviously minor breach by the other party(the breaching party)is a recurring topic in the field of contract...Whether,and how,to rescind the right of one party(the non-breaching party)to rescind a contract in case of an obviously minor breach by the other party(the breaching party)is a recurring topic in the field of contract law.The Minutes of the Ninth Work Conference of the Courts Nationwide on Civil and Commercial Trial(the Minutes of the Ninth Work Conference)stipulates that whether a contract shall be rescinded depends on whether a breach is obviously minor and affects the fulfillment of the contract purposes expected by the non-breaching party.In juridical practice,however,there are no clear criteria to define what constitutes obviously minor breaches,and the factors considered in such cases are often inadequate to allow for a fully considered decision.By analyzing Article 55 of the Judicial Interpretation of the General Provisions of Contracts of the Civil Code of the People’s Republic of China(Draft for Comments)and reviewing the previous juridical practices,we present our conclusions regarding the conditions and factors that should be considered when restricting the right of rescission in cases of obviously minor breaches with a view to unifying the judicial judgment criteria by differentiating the type of breaches.展开更多
足球合同违约不仅导致赔偿,还可能引发体育制裁。将此类由体育制裁引发的争议提交至国际体育仲裁院(Court of Arbitration for Sport,CAS),须将足球主管机构作为被诉方。在审查此类案件中,仲裁庭首先确认合同违约是否发生在保护期内;对...足球合同违约不仅导致赔偿,还可能引发体育制裁。将此类由体育制裁引发的争议提交至国际体育仲裁院(Court of Arbitration for Sport,CAS),须将足球主管机构作为被诉方。在审查此类案件中,仲裁庭首先确认合同违约是否发生在保护期内;对违约球员、违约俱乐部和诱导球员违约俱乐部施加的体育制裁不同,仲裁庭的审查要件和裁判标准也存在区别。在处理此类案件的过程中,CAS尊重足球主管机构在体育制裁方面的裁量权,同时确保这一裁量权的行使正当及在合理范围之内。展开更多
文摘Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This study analyzes trends in data breaches in the United States, examining the frequency, causes, and magnitude of breaches across various industries. We document that data breaches are increasing, with hacking emerging as the leading cause. Our descriptive analyses explore factors influencing breaches, including security vulnerabilities, human error, and malicious attacks. The findings provide policymakers and businesses with actionable insights to bolster data security through proactive audits, patching, encryption, and response planning. By better understanding breach patterns and risk factors, organizations can take targeted steps to enhance protections and mitigate the potential damage of future incidents.
文摘In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.
文摘Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publication base as an effective solution. The NIST Special Publication 800-66 Revision 1 was an essential standard in US healthcare, which was withdrawn in February 2024 and superseded by SP 800-66 Revision 2. This review investigates the academic papers concerning the application of the NIST SP 800-66 Revision 1 standard in the US healthcare literature. A systematic review method was used in this study to determine current knowledge gaps of the SP 800-66 Revision 1. Some limitations were employed in the search to enforce validity. A total of eleven articles were found eligible for the study. Consequently, this study suggests the necessity for additional academic papers pertaining to SP 800-66 Revision 2 in the US healthcare literature. In turn, it will enhance awareness of safeguarding electronic protected health information (ePHI), help to mitigate potential future risks, and eventually reduce breaches.
基金supported by the National Natural Science Foundation of China(72003082 and 71573130)the Project of Philosophy and Social Science Research in Colleges and Universities in Jiangsu Province of China(2020SJA1015)+1 种基金the Priority Academic Program Development of Jiangsu Higher Education Institutions,China(PAPD)the China Center for Food Security Studies,Nanjing Agricultural University,China。
文摘Farmers’contract breach behavior is cited as one of the major stumbling blocks in the sustainable expansion of contract farming in many developing countries.This paper examines farmers’contract breach decisions from the perspective of time preferences.The empirical analysis is based on a household survey and economic field experiments of poultry households participating in contract farming conducted in Jiangsu Province,China.A discounted utility model and a maximum likelihood technique are applied to estimate farmers’time preferences and the effect of time preferences on contract breach in the production and sales phases are explored with a bivariate probit model.The results show that,on average,the poultry farmers in the sample are generally present biased and impatient regarding future utility.The regression results show that farmers with a higher preference for the present and a higher discount rate are more likely to breach contracts,and time preferences play a greater role in the production phase than in the sales phase.When considering heterogeneity,specific investments and transaction costs promote contract stability only for farmers with a low degree of impatience.Moreover,compared with large-scale farmers,small-scale farmers’contract breach decisions are more significantly affected by their time preferences.These results have implications for contract stability policies and other issues that are impacted by the linking of behavioral preferences to agricultural decisions.
基金supported by the National Natural Science Foundation of China(Grant Nos.U20A20112,U19A2049)Second Tibetan Plateau Scientific Expedition and Research Program(STEP)(Grant No.2019QZKK0904)CAS Light of West China Program。
文摘The debris flow dam is a common type of barrier dams,which shows significant differences from other types of barrier dam such as landslide dam,moraine dam in their formation processes,dam body shapes,and internal compositions.The basic breaching parameters such as flood peak discharge are vital indicators of risk assessment.In this study,we elucidated the failure process of the debris flow dam through the flume experiment,and built the calculation equation of the breaching parameters by selecting critical factors.The result shows that the overtopping failure process of the debris flow dam is capable of forming significantly retrogressive scarps,and the failure process experiences three stages,the formation of the retrogressive scarp,the erosion of the retrogressive scarp,and the decline of the retrogressive scarp.Five factors used for establishing the calculation equations for peak discharge(Qp),final width(Wb)of the breach,and duration(T)of the debris flow dam failure are dam height(h),reservoir capacity(V),the fine grain content(P0.075)of the soil,the nonuniformity coefficient(Cu)of the soil,and the upper limit grain size(D90)of the soil,respectively.In the three equations,the correlation coefficients between Qp,Wb,T and the five factors were 0.86,0.70,0.63,respectively.The equations still need to be modified and verified in actual cases.
文摘The housing crisis in Ireland has rapidly grown in recent years. To make a more significant profit, many landlords are no longer renting out their houses under long-term tenancies but under short-term tenancies. Regulating rentals in Rent Pressure Zones with the highest and rising rents is becoming a tricky issue. In this paper, we develop a breach identifier to check short-term rentals located in Rent Pressure Zones with potential breaches only using publicly available data from Airbnb (an online marketplace focused on short-term home-stays) and Irish government websites. First, we use a Residual Neural Network to filter out outdoor landscape photos that negatively impact identifying whether an owner has multiple rentals in a Rent Pressure Zone. Second, a Siamese Neural Network is used to compare the similarity of indoor photos to determine if multiple rental posts correspond to the same residence. Next, we use the Haversine algorithm to locate short-term rentals within a circle centered on the coordinate of a permit. Short-term rentals with a permit will not be restricted. Finally, we improve the occupancy estimation model combined with sentiment analysis, which may provide higher accuracy.
文摘Whether,and how,to rescind the right of one party(the non-breaching party)to rescind a contract in case of an obviously minor breach by the other party(the breaching party)is a recurring topic in the field of contract law.The Minutes of the Ninth Work Conference of the Courts Nationwide on Civil and Commercial Trial(the Minutes of the Ninth Work Conference)stipulates that whether a contract shall be rescinded depends on whether a breach is obviously minor and affects the fulfillment of the contract purposes expected by the non-breaching party.In juridical practice,however,there are no clear criteria to define what constitutes obviously minor breaches,and the factors considered in such cases are often inadequate to allow for a fully considered decision.By analyzing Article 55 of the Judicial Interpretation of the General Provisions of Contracts of the Civil Code of the People’s Republic of China(Draft for Comments)and reviewing the previous juridical practices,we present our conclusions regarding the conditions and factors that should be considered when restricting the right of rescission in cases of obviously minor breaches with a view to unifying the judicial judgment criteria by differentiating the type of breaches.
文摘足球合同违约不仅导致赔偿,还可能引发体育制裁。将此类由体育制裁引发的争议提交至国际体育仲裁院(Court of Arbitration for Sport,CAS),须将足球主管机构作为被诉方。在审查此类案件中,仲裁庭首先确认合同违约是否发生在保护期内;对违约球员、违约俱乐部和诱导球员违约俱乐部施加的体育制裁不同,仲裁庭的审查要件和裁判标准也存在区别。在处理此类案件的过程中,CAS尊重足球主管机构在体育制裁方面的裁量权,同时确保这一裁量权的行使正当及在合理范围之内。