Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This...Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This study analyzes trends in data breaches in the United States, examining the frequency, causes, and magnitude of breaches across various industries. We document that data breaches are increasing, with hacking emerging as the leading cause. Our descriptive analyses explore factors influencing breaches, including security vulnerabilities, human error, and malicious attacks. The findings provide policymakers and businesses with actionable insights to bolster data security through proactive audits, patching, encryption, and response planning. By better understanding breach patterns and risk factors, organizations can take targeted steps to enhance protections and mitigate the potential damage of future incidents.展开更多
Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publicati...Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publication base as an effective solution. The NIST Special Publication 800-66 Revision 1 was an essential standard in US healthcare, which was withdrawn in February 2024 and superseded by SP 800-66 Revision 2. This review investigates the academic papers concerning the application of the NIST SP 800-66 Revision 1 standard in the US healthcare literature. A systematic review method was used in this study to determine current knowledge gaps of the SP 800-66 Revision 1. Some limitations were employed in the search to enforce validity. A total of eleven articles were found eligible for the study. Consequently, this study suggests the necessity for additional academic papers pertaining to SP 800-66 Revision 2 in the US healthcare literature. In turn, it will enhance awareness of safeguarding electronic protected health information (ePHI), help to mitigate potential future risks, and eventually reduce breaches.展开更多
Whether,and how,to rescind the right of one party(the non-breaching party)to rescind a contract in case of an obviously minor breach by the other party(the breaching party)is a recurring topic in the field of contract...Whether,and how,to rescind the right of one party(the non-breaching party)to rescind a contract in case of an obviously minor breach by the other party(the breaching party)is a recurring topic in the field of contract law.The Minutes of the Ninth Work Conference of the Courts Nationwide on Civil and Commercial Trial(the Minutes of the Ninth Work Conference)stipulates that whether a contract shall be rescinded depends on whether a breach is obviously minor and affects the fulfillment of the contract purposes expected by the non-breaching party.In juridical practice,however,there are no clear criteria to define what constitutes obviously minor breaches,and the factors considered in such cases are often inadequate to allow for a fully considered decision.By analyzing Article 55 of the Judicial Interpretation of the General Provisions of Contracts of the Civil Code of the People’s Republic of China(Draft for Comments)and reviewing the previous juridical practices,we present our conclusions regarding the conditions and factors that should be considered when restricting the right of rescission in cases of obviously minor breaches with a view to unifying the judicial judgment criteria by differentiating the type of breaches.展开更多
As an only child is pampered and spoiled by parents, the contemporary student easily breaches class discipline. Class management appears more concerned than ever because breaches of class discipline have great impact ...As an only child is pampered and spoiled by parents, the contemporary student easily breaches class discipline. Class management appears more concerned than ever because breaches of class discipline have great impact on teaching. The author clarifies the necessity to study the management of classes with breaches of class discipline, numerates the phenomena of breaches of class discipline, precisely analyzes the causes from teachers and students and especially submits several measures to effectively prevent breaches of class discipline.展开更多
The purpose of this manuscript is to present research findings based on the reported cases of medical information breaches due to Social Media (SM) usage, in selected medical institutions in Uganda. The study employed...The purpose of this manuscript is to present research findings based on the reported cases of medical information breaches due to Social Media (SM) usage, in selected medical institutions in Uganda. The study employed online survey techniques. Altogether, 710 questionnaires (Google forms) were developed, and operationalized. The main respondents included 566 medical students, and 143 medical staff from Mbarara University of Science and Technology (MUST), and Kampala International University (KIU), accordingly. Using SPSS, the main statistical analysis tools employed include frequency distribution summary, and Chi-square (x<sup>2</sup>) test. According to the frequency distribution summary, 27% to 42% of the respondents within categorical divides acknowledged occurrence of medical information breaches due to SM usage. Notably, higher levels of the breaches were reported among male students (64%), age-group 18 to 35 years (68%), and WhatsApp users (63%). On the other hand, Chi-square results showed significant levels (p p > 0.05) between medical institutions and medical information breaches. Overall, the vulnerable areas of the breaches identified would serve as important reference points in the process of rationalizing SM usage in medical institutions. Nevertheless, further studies could focus on identification of the key SM usage factors associated with medical information breaches in medical institutions in Uganda.展开更多
Every year, a number of breach failures occur in Irrigation Canals in Sindh. Those failures cause displacement of thousands of people, destruction of properties, land, and damage to costly crops that worth millions Ru...Every year, a number of breach failures occur in Irrigation Canals in Sindh. Those failures cause displacement of thousands of people, destruction of properties, land, and damage to costly crops that worth millions Rupees. In addition to that, breach failures also can cause water shortages when the failure occurs during the peak demand period. There are various causes of embankment failures which include overtopping, internal erosion, structural defects and piping. State of art for breach failures is presented in this paper and suggestions for prediction of breaches in context to canals in Sindh are discussed. Seepage and slope stability analyses are recommended for a long-term breach predictions.展开更多
This research paper analyzes data breaches in the human service sector. The hypothesis for the solution to this problem is that there will be a significant reduction in data breaches in the human service sector due to...This research paper analyzes data breaches in the human service sector. The hypothesis for the solution to this problem is that there will be a significant reduction in data breaches in the human service sector due to an increase in information assurance. The hypothesis is tested using data from the United States Department of Health and Human Services data breach notification repository during January 2018-December 2020. Our result shows that without the increased mitigation of information assurance, data breaches in the human service sector will continue to increase.展开更多
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ...In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.展开更多
A physically-based numerical three-dimensional earthen dam piping failure model is developed for homogeneous and zoned soil dams.This model is an erosion model,coupled with force/moment equilibrium analyses.Orifice fl...A physically-based numerical three-dimensional earthen dam piping failure model is developed for homogeneous and zoned soil dams.This model is an erosion model,coupled with force/moment equilibrium analyses.Orifice flow and two-dimensional(2D)shallow water equations(SWE)are solved to simulate dam break flows at different breaching stages.Erosion rates of different soils with different construction compaction efforts are calculated using corresponding erosion formulae.The dam's real shape,soil properties,and surrounding area are programmed.Large outer 2D-SWE grids are used to control upstream and downstream hydraulic conditions and control the boundary conditions of orifice flow,and inner 2D-SWE flow is used to scour soil and perform force/moment equilibrium analyses.This model is validated using the European Commission IMPACT(Investigation of Extreme Flood Processes and Uncertainty)Test#5 in Norway,Teton Dam failure in Idaho,USA,and Quail Creek Dike failure in Utah,USA.All calculated peak outflows are within 10%errors of observed values.Simulation results show that,for a V-shaped dam like Teton Dam,a piping breach location at the abutment tends to result in a smaller peak breach outflow than the piping breach location at the dam's center;and if Teton Dam had broken from its center for internal erosion,a peak outflow of 117851 m'/s,which is 81%larger than the peak outflow of 65120 m3/s released from its right abutment,would have been released from Teton Dam.A lower piping inlet elevation tends to cause a faster/earlier piping breach than a higher piping inlet elevation.展开更多
Technological shifts—coupled with infrastructure, techniques, and applications for big data—have created many new opportunities, business models, and industry expansion that benefit entrepreneurs. At the same time, ...Technological shifts—coupled with infrastructure, techniques, and applications for big data—have created many new opportunities, business models, and industry expansion that benefit entrepreneurs. At the same time, however, entrepreneurs are often unprepared for cybersecurity needs—and the policymakers, industry, and nonprofit groups that support them also face technological and knowledge constraints in keeping up with their needs. To improve the ability of entrepreneurship research to understand, identify, and ultimately help address cybersecurity challenges, we conduct a literature review on the state of cybersecurity. The research highlights the necessity for additional investigation to aid small businesses in securing their confidential data and client information from cyber threats, thereby preventing the potential shutdown of the business.展开更多
Legislative changes have altered the way imported edible seafood is inspected in Australia.Greater onus of responsibility has been placed on exporting countries to provide documentary evidence of adherence to internal...Legislative changes have altered the way imported edible seafood is inspected in Australia.Greater onus of responsibility has been placed on exporting countries to provide documentary evidence of adherence to internally recognized food safety standards.According to global trade agreements,any additional safety tests applied to freshwater fish imported into Australia must be justified.Therefore,the aim of this study was to develop a risk scoring method to provide justification for identifying countries as'Freshwater fish high risk'and to examine the seafood they export to Australia for seafood supply chain breaches.Scori ng was con ducted using six predictor variables,identified in the literature as important contributors to seafood supply chain breaches,to achieve the outcome variable,Country considered'Freshwater fish high risk.Sixty-seven fish fillets(9.55 kg)of the same species were examined from the third highest scoring country(Country 20)and 562(5.6 kg)whole fish from the sixth highest scoring country(Country 22).Country 20 had supply chain breaches of 28 macroscopic yellow cysts in one fillet.Two hundred and thirteen parasites and other supply chain breaches were identified in fish from Country 22,in eluding retai ned liver(91 per cent),visible mud(11 per cent),a variety of debris(16 per cent)and,depending on the commodity code,these fish were imported to Australia under full intestine(90 per cent),retained gills(89 per cent),and partial intestine(9 per cent).Three serious physical hazards were recovered from the edible portion of three'consumer-ready' fish and snails of Genus Lymnaea and Indoplanorbis were recovered from gill mud also from'consumer-readyz fish.The study showed variable results from the scoring system and vast differences in seafood supply chain breaches between the third and sixth highest scoring countries.展开更多
This paper documents the emergency response to the breaches of the Baige Barrier Lake. The lake was successively formed by landslides that occurred on October 10 and November 3, 2018 at the provincial border between S...This paper documents the emergency response to the breaches of the Baige Barrier Lake. The lake was successively formed by landslides that occurred on October 10 and November 3, 2018 at the provincial border between Sichuan and Tibet in China. The barrier lake created by the "10.10" landslide breached on October 12 and triggered a flood with a peak discharge around 10000 m^3/s. The residual landslide barrier was enhanced by a second landslide on November 3, resulting in a higher barrier with larger flood potential. An overflow channel was excavated in the crest of the barrier to prompt the breach to be triggered at a lower water level. The second breach happened on November 12 with a measured peak discharge of 31000 m^3/s. Nearly 75000 people were evacuated before the two breaches. In order to prevent the downstream dams from possible over-topping, nearly 3.27×10~8 m^3 of the stored volume was released from the Liyuan reservoir 688 km downstream of Baige Barrier Lake. This paper presents the measured hydrographs and the back-analysis results for the "11.03" barrier lake. It is shown that the modern models of dam breach hydraulics can reasonably reproduce the barrier breach hydrographs;however, further studies are needed to define the key parameters which highly influence the calculated results. Knowledge acquired during the emergency response to the case can be shared with experts working on breaches of embankment dams and can be referenced to promote both the theory study and the engineering practice to mitigate the potential risks caused by this type of catastrophic events.展开更多
This paper explores the dimensions of resolving disputes in cybersecurity and uses the Federal Arbitration Statute and the Courts to bind the parties to their contracts.The paper explores artificial intelligence and t...This paper explores the dimensions of resolving disputes in cybersecurity and uses the Federal Arbitration Statute and the Courts to bind the parties to their contracts.The paper explores artificial intelligence and the nuances of legal issues that potentially could arise and applies dispute resolution modalities to help businesses become more productive as opposed to being mired down in litigation,creating an efficient path forward.Reading this paper is worth your time because:(1)you will learn how to use the court system to achieve good results in cybersecurity and artificial intelligence disputes applying the Federal Arbitration Statute;(2)you will become more efficient many times over;(3)with so many disputes and so little time,and inflation having increased the cost of doing business,we can ill afford to waste money.Finding solutions that have the full authority of the courts,without going through litigation,is essential to profitability.The need is great to stop fighting and start mending.The method prescribed in this paper solves problems with the support of a court judgment without the entanglement and the expense of litigation.展开更多
Farmers’contract breach behavior is cited as one of the major stumbling blocks in the sustainable expansion of contract farming in many developing countries.This paper examines farmers’contract breach decisions from...Farmers’contract breach behavior is cited as one of the major stumbling blocks in the sustainable expansion of contract farming in many developing countries.This paper examines farmers’contract breach decisions from the perspective of time preferences.The empirical analysis is based on a household survey and economic field experiments of poultry households participating in contract farming conducted in Jiangsu Province,China.A discounted utility model and a maximum likelihood technique are applied to estimate farmers’time preferences and the effect of time preferences on contract breach in the production and sales phases are explored with a bivariate probit model.The results show that,on average,the poultry farmers in the sample are generally present biased and impatient regarding future utility.The regression results show that farmers with a higher preference for the present and a higher discount rate are more likely to breach contracts,and time preferences play a greater role in the production phase than in the sales phase.When considering heterogeneity,specific investments and transaction costs promote contract stability only for farmers with a low degree of impatience.Moreover,compared with large-scale farmers,small-scale farmers’contract breach decisions are more significantly affected by their time preferences.These results have implications for contract stability policies and other issues that are impacted by the linking of behavioral preferences to agricultural decisions.展开更多
The debris flow dam is a common type of barrier dams,which shows significant differences from other types of barrier dam such as landslide dam,moraine dam in their formation processes,dam body shapes,and internal comp...The debris flow dam is a common type of barrier dams,which shows significant differences from other types of barrier dam such as landslide dam,moraine dam in their formation processes,dam body shapes,and internal compositions.The basic breaching parameters such as flood peak discharge are vital indicators of risk assessment.In this study,we elucidated the failure process of the debris flow dam through the flume experiment,and built the calculation equation of the breaching parameters by selecting critical factors.The result shows that the overtopping failure process of the debris flow dam is capable of forming significantly retrogressive scarps,and the failure process experiences three stages,the formation of the retrogressive scarp,the erosion of the retrogressive scarp,and the decline of the retrogressive scarp.Five factors used for establishing the calculation equations for peak discharge(Qp),final width(Wb)of the breach,and duration(T)of the debris flow dam failure are dam height(h),reservoir capacity(V),the fine grain content(P0.075)of the soil,the nonuniformity coefficient(Cu)of the soil,and the upper limit grain size(D90)of the soil,respectively.In the three equations,the correlation coefficients between Qp,Wb,T and the five factors were 0.86,0.70,0.63,respectively.The equations still need to be modified and verified in actual cases.展开更多
The housing crisis in Ireland has rapidly grown in recent years. To make a more significant profit, many landlords are no longer renting out their houses under long-term tenancies but under short-term tenancies. Regul...The housing crisis in Ireland has rapidly grown in recent years. To make a more significant profit, many landlords are no longer renting out their houses under long-term tenancies but under short-term tenancies. Regulating rentals in Rent Pressure Zones with the highest and rising rents is becoming a tricky issue. In this paper, we develop a breach identifier to check short-term rentals located in Rent Pressure Zones with potential breaches only using publicly available data from Airbnb (an online marketplace focused on short-term home-stays) and Irish government websites. First, we use a Residual Neural Network to filter out outdoor landscape photos that negatively impact identifying whether an owner has multiple rentals in a Rent Pressure Zone. Second, a Siamese Neural Network is used to compare the similarity of indoor photos to determine if multiple rental posts correspond to the same residence. Next, we use the Haversine algorithm to locate short-term rentals within a circle centered on the coordinate of a permit. Short-term rentals with a permit will not be restricted. Finally, we improve the occupancy estimation model combined with sentiment analysis, which may provide higher accuracy.展开更多
With a view to adopting to the globalized business landscape,organizations rely on third-party business relationships to enhance their operations,expand their capabilities,and drive innovation.While these collaboratio...With a view to adopting to the globalized business landscape,organizations rely on third-party business relationships to enhance their operations,expand their capabilities,and drive innovation.While these collaborations offer numerous benefits,they also introduce a range of risks that organizations must carefully mitigate.If the obligation to meet the regulatory requirements is added to the equation,mitigating the third-party risk related to data governance,becomes one of the biggest challenges.展开更多
Cyber losses in terms of number of records breached under cyber incidents commonly feature a significant portion of zeros, specific characteristics of mid-range losses and large losses, which make it hard to model the...Cyber losses in terms of number of records breached under cyber incidents commonly feature a significant portion of zeros, specific characteristics of mid-range losses and large losses, which make it hard to model the whole range of the losses using a standard loss distribution. We tackle this modeling problem by proposing a three-component spliced regression model that can simultaneously model zeros, moderate and large losses and consider heterogeneous effects in mixture components. To apply our proposed model to Privacy Right Clearinghouse (PRC) data breach chronology, we segment geographical groups using unsupervised cluster analysis, and utilize a covariate-dependent probability to model zero losses, finite mixture distributions for moderate body and an extreme value distribution for large losses capturing the heavy-tailed nature of the loss data. Parameters and coefficients are estimated using the Expectation-Maximization (EM) algorithm. Combining with our frequency model (generalized linear mixed model) for data breaches, aggregate loss distributions are investigated and applications on cyber insurance pricing and risk management are discussed.展开更多
文摘Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This study analyzes trends in data breaches in the United States, examining the frequency, causes, and magnitude of breaches across various industries. We document that data breaches are increasing, with hacking emerging as the leading cause. Our descriptive analyses explore factors influencing breaches, including security vulnerabilities, human error, and malicious attacks. The findings provide policymakers and businesses with actionable insights to bolster data security through proactive audits, patching, encryption, and response planning. By better understanding breach patterns and risk factors, organizations can take targeted steps to enhance protections and mitigate the potential damage of future incidents.
文摘Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publication base as an effective solution. The NIST Special Publication 800-66 Revision 1 was an essential standard in US healthcare, which was withdrawn in February 2024 and superseded by SP 800-66 Revision 2. This review investigates the academic papers concerning the application of the NIST SP 800-66 Revision 1 standard in the US healthcare literature. A systematic review method was used in this study to determine current knowledge gaps of the SP 800-66 Revision 1. Some limitations were employed in the search to enforce validity. A total of eleven articles were found eligible for the study. Consequently, this study suggests the necessity for additional academic papers pertaining to SP 800-66 Revision 2 in the US healthcare literature. In turn, it will enhance awareness of safeguarding electronic protected health information (ePHI), help to mitigate potential future risks, and eventually reduce breaches.
文摘Whether,and how,to rescind the right of one party(the non-breaching party)to rescind a contract in case of an obviously minor breach by the other party(the breaching party)is a recurring topic in the field of contract law.The Minutes of the Ninth Work Conference of the Courts Nationwide on Civil and Commercial Trial(the Minutes of the Ninth Work Conference)stipulates that whether a contract shall be rescinded depends on whether a breach is obviously minor and affects the fulfillment of the contract purposes expected by the non-breaching party.In juridical practice,however,there are no clear criteria to define what constitutes obviously minor breaches,and the factors considered in such cases are often inadequate to allow for a fully considered decision.By analyzing Article 55 of the Judicial Interpretation of the General Provisions of Contracts of the Civil Code of the People’s Republic of China(Draft for Comments)and reviewing the previous juridical practices,we present our conclusions regarding the conditions and factors that should be considered when restricting the right of rescission in cases of obviously minor breaches with a view to unifying the judicial judgment criteria by differentiating the type of breaches.
文摘As an only child is pampered and spoiled by parents, the contemporary student easily breaches class discipline. Class management appears more concerned than ever because breaches of class discipline have great impact on teaching. The author clarifies the necessity to study the management of classes with breaches of class discipline, numerates the phenomena of breaches of class discipline, precisely analyzes the causes from teachers and students and especially submits several measures to effectively prevent breaches of class discipline.
文摘The purpose of this manuscript is to present research findings based on the reported cases of medical information breaches due to Social Media (SM) usage, in selected medical institutions in Uganda. The study employed online survey techniques. Altogether, 710 questionnaires (Google forms) were developed, and operationalized. The main respondents included 566 medical students, and 143 medical staff from Mbarara University of Science and Technology (MUST), and Kampala International University (KIU), accordingly. Using SPSS, the main statistical analysis tools employed include frequency distribution summary, and Chi-square (x<sup>2</sup>) test. According to the frequency distribution summary, 27% to 42% of the respondents within categorical divides acknowledged occurrence of medical information breaches due to SM usage. Notably, higher levels of the breaches were reported among male students (64%), age-group 18 to 35 years (68%), and WhatsApp users (63%). On the other hand, Chi-square results showed significant levels (p p > 0.05) between medical institutions and medical information breaches. Overall, the vulnerable areas of the breaches identified would serve as important reference points in the process of rationalizing SM usage in medical institutions. Nevertheless, further studies could focus on identification of the key SM usage factors associated with medical information breaches in medical institutions in Uganda.
文摘Every year, a number of breach failures occur in Irrigation Canals in Sindh. Those failures cause displacement of thousands of people, destruction of properties, land, and damage to costly crops that worth millions Rupees. In addition to that, breach failures also can cause water shortages when the failure occurs during the peak demand period. There are various causes of embankment failures which include overtopping, internal erosion, structural defects and piping. State of art for breach failures is presented in this paper and suggestions for prediction of breaches in context to canals in Sindh are discussed. Seepage and slope stability analyses are recommended for a long-term breach predictions.
文摘This research paper analyzes data breaches in the human service sector. The hypothesis for the solution to this problem is that there will be a significant reduction in data breaches in the human service sector due to an increase in information assurance. The hypothesis is tested using data from the United States Department of Health and Human Services data breach notification repository during January 2018-December 2020. Our result shows that without the increased mitigation of information assurance, data breaches in the human service sector will continue to increase.
文摘In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.
文摘A physically-based numerical three-dimensional earthen dam piping failure model is developed for homogeneous and zoned soil dams.This model is an erosion model,coupled with force/moment equilibrium analyses.Orifice flow and two-dimensional(2D)shallow water equations(SWE)are solved to simulate dam break flows at different breaching stages.Erosion rates of different soils with different construction compaction efforts are calculated using corresponding erosion formulae.The dam's real shape,soil properties,and surrounding area are programmed.Large outer 2D-SWE grids are used to control upstream and downstream hydraulic conditions and control the boundary conditions of orifice flow,and inner 2D-SWE flow is used to scour soil and perform force/moment equilibrium analyses.This model is validated using the European Commission IMPACT(Investigation of Extreme Flood Processes and Uncertainty)Test#5 in Norway,Teton Dam failure in Idaho,USA,and Quail Creek Dike failure in Utah,USA.All calculated peak outflows are within 10%errors of observed values.Simulation results show that,for a V-shaped dam like Teton Dam,a piping breach location at the abutment tends to result in a smaller peak breach outflow than the piping breach location at the dam's center;and if Teton Dam had broken from its center for internal erosion,a peak outflow of 117851 m'/s,which is 81%larger than the peak outflow of 65120 m3/s released from its right abutment,would have been released from Teton Dam.A lower piping inlet elevation tends to cause a faster/earlier piping breach than a higher piping inlet elevation.
文摘Technological shifts—coupled with infrastructure, techniques, and applications for big data—have created many new opportunities, business models, and industry expansion that benefit entrepreneurs. At the same time, however, entrepreneurs are often unprepared for cybersecurity needs—and the policymakers, industry, and nonprofit groups that support them also face technological and knowledge constraints in keeping up with their needs. To improve the ability of entrepreneurship research to understand, identify, and ultimately help address cybersecurity challenges, we conduct a literature review on the state of cybersecurity. The research highlights the necessity for additional investigation to aid small businesses in securing their confidential data and client information from cyber threats, thereby preventing the potential shutdown of the business.
文摘Legislative changes have altered the way imported edible seafood is inspected in Australia.Greater onus of responsibility has been placed on exporting countries to provide documentary evidence of adherence to internally recognized food safety standards.According to global trade agreements,any additional safety tests applied to freshwater fish imported into Australia must be justified.Therefore,the aim of this study was to develop a risk scoring method to provide justification for identifying countries as'Freshwater fish high risk'and to examine the seafood they export to Australia for seafood supply chain breaches.Scori ng was con ducted using six predictor variables,identified in the literature as important contributors to seafood supply chain breaches,to achieve the outcome variable,Country considered'Freshwater fish high risk.Sixty-seven fish fillets(9.55 kg)of the same species were examined from the third highest scoring country(Country 20)and 562(5.6 kg)whole fish from the sixth highest scoring country(Country 22).Country 20 had supply chain breaches of 28 macroscopic yellow cysts in one fillet.Two hundred and thirteen parasites and other supply chain breaches were identified in fish from Country 22,in eluding retai ned liver(91 per cent),visible mud(11 per cent),a variety of debris(16 per cent)and,depending on the commodity code,these fish were imported to Australia under full intestine(90 per cent),retained gills(89 per cent),and partial intestine(9 per cent).Three serious physical hazards were recovered from the edible portion of three'consumer-ready' fish and snails of Genus Lymnaea and Indoplanorbis were recovered from gill mud also from'consumer-readyz fish.The study showed variable results from the scoring system and vast differences in seafood supply chain breaches between the third and sixth highest scoring countries.
基金supported by the National Key R&D Program of China(Grant No. 2018YFC1508600)。
文摘This paper documents the emergency response to the breaches of the Baige Barrier Lake. The lake was successively formed by landslides that occurred on October 10 and November 3, 2018 at the provincial border between Sichuan and Tibet in China. The barrier lake created by the "10.10" landslide breached on October 12 and triggered a flood with a peak discharge around 10000 m^3/s. The residual landslide barrier was enhanced by a second landslide on November 3, resulting in a higher barrier with larger flood potential. An overflow channel was excavated in the crest of the barrier to prompt the breach to be triggered at a lower water level. The second breach happened on November 12 with a measured peak discharge of 31000 m^3/s. Nearly 75000 people were evacuated before the two breaches. In order to prevent the downstream dams from possible over-topping, nearly 3.27×10~8 m^3 of the stored volume was released from the Liyuan reservoir 688 km downstream of Baige Barrier Lake. This paper presents the measured hydrographs and the back-analysis results for the "11.03" barrier lake. It is shown that the modern models of dam breach hydraulics can reasonably reproduce the barrier breach hydrographs;however, further studies are needed to define the key parameters which highly influence the calculated results. Knowledge acquired during the emergency response to the case can be shared with experts working on breaches of embankment dams and can be referenced to promote both the theory study and the engineering practice to mitigate the potential risks caused by this type of catastrophic events.
文摘This paper explores the dimensions of resolving disputes in cybersecurity and uses the Federal Arbitration Statute and the Courts to bind the parties to their contracts.The paper explores artificial intelligence and the nuances of legal issues that potentially could arise and applies dispute resolution modalities to help businesses become more productive as opposed to being mired down in litigation,creating an efficient path forward.Reading this paper is worth your time because:(1)you will learn how to use the court system to achieve good results in cybersecurity and artificial intelligence disputes applying the Federal Arbitration Statute;(2)you will become more efficient many times over;(3)with so many disputes and so little time,and inflation having increased the cost of doing business,we can ill afford to waste money.Finding solutions that have the full authority of the courts,without going through litigation,is essential to profitability.The need is great to stop fighting and start mending.The method prescribed in this paper solves problems with the support of a court judgment without the entanglement and the expense of litigation.
基金supported by the National Natural Science Foundation of China(72003082 and 71573130)the Project of Philosophy and Social Science Research in Colleges and Universities in Jiangsu Province of China(2020SJA1015)+1 种基金the Priority Academic Program Development of Jiangsu Higher Education Institutions,China(PAPD)the China Center for Food Security Studies,Nanjing Agricultural University,China。
文摘Farmers’contract breach behavior is cited as one of the major stumbling blocks in the sustainable expansion of contract farming in many developing countries.This paper examines farmers’contract breach decisions from the perspective of time preferences.The empirical analysis is based on a household survey and economic field experiments of poultry households participating in contract farming conducted in Jiangsu Province,China.A discounted utility model and a maximum likelihood technique are applied to estimate farmers’time preferences and the effect of time preferences on contract breach in the production and sales phases are explored with a bivariate probit model.The results show that,on average,the poultry farmers in the sample are generally present biased and impatient regarding future utility.The regression results show that farmers with a higher preference for the present and a higher discount rate are more likely to breach contracts,and time preferences play a greater role in the production phase than in the sales phase.When considering heterogeneity,specific investments and transaction costs promote contract stability only for farmers with a low degree of impatience.Moreover,compared with large-scale farmers,small-scale farmers’contract breach decisions are more significantly affected by their time preferences.These results have implications for contract stability policies and other issues that are impacted by the linking of behavioral preferences to agricultural decisions.
基金supported by the National Natural Science Foundation of China(Grant Nos.U20A20112,U19A2049)Second Tibetan Plateau Scientific Expedition and Research Program(STEP)(Grant No.2019QZKK0904)CAS Light of West China Program。
文摘The debris flow dam is a common type of barrier dams,which shows significant differences from other types of barrier dam such as landslide dam,moraine dam in their formation processes,dam body shapes,and internal compositions.The basic breaching parameters such as flood peak discharge are vital indicators of risk assessment.In this study,we elucidated the failure process of the debris flow dam through the flume experiment,and built the calculation equation of the breaching parameters by selecting critical factors.The result shows that the overtopping failure process of the debris flow dam is capable of forming significantly retrogressive scarps,and the failure process experiences three stages,the formation of the retrogressive scarp,the erosion of the retrogressive scarp,and the decline of the retrogressive scarp.Five factors used for establishing the calculation equations for peak discharge(Qp),final width(Wb)of the breach,and duration(T)of the debris flow dam failure are dam height(h),reservoir capacity(V),the fine grain content(P0.075)of the soil,the nonuniformity coefficient(Cu)of the soil,and the upper limit grain size(D90)of the soil,respectively.In the three equations,the correlation coefficients between Qp,Wb,T and the five factors were 0.86,0.70,0.63,respectively.The equations still need to be modified and verified in actual cases.
文摘The housing crisis in Ireland has rapidly grown in recent years. To make a more significant profit, many landlords are no longer renting out their houses under long-term tenancies but under short-term tenancies. Regulating rentals in Rent Pressure Zones with the highest and rising rents is becoming a tricky issue. In this paper, we develop a breach identifier to check short-term rentals located in Rent Pressure Zones with potential breaches only using publicly available data from Airbnb (an online marketplace focused on short-term home-stays) and Irish government websites. First, we use a Residual Neural Network to filter out outdoor landscape photos that negatively impact identifying whether an owner has multiple rentals in a Rent Pressure Zone. Second, a Siamese Neural Network is used to compare the similarity of indoor photos to determine if multiple rental posts correspond to the same residence. Next, we use the Haversine algorithm to locate short-term rentals within a circle centered on the coordinate of a permit. Short-term rentals with a permit will not be restricted. Finally, we improve the occupancy estimation model combined with sentiment analysis, which may provide higher accuracy.
文摘With a view to adopting to the globalized business landscape,organizations rely on third-party business relationships to enhance their operations,expand their capabilities,and drive innovation.While these collaborations offer numerous benefits,they also introduce a range of risks that organizations must carefully mitigate.If the obligation to meet the regulatory requirements is added to the equation,mitigating the third-party risk related to data governance,becomes one of the biggest challenges.
文摘Cyber losses in terms of number of records breached under cyber incidents commonly feature a significant portion of zeros, specific characteristics of mid-range losses and large losses, which make it hard to model the whole range of the losses using a standard loss distribution. We tackle this modeling problem by proposing a three-component spliced regression model that can simultaneously model zeros, moderate and large losses and consider heterogeneous effects in mixture components. To apply our proposed model to Privacy Right Clearinghouse (PRC) data breach chronology, we segment geographical groups using unsupervised cluster analysis, and utilize a covariate-dependent probability to model zero losses, finite mixture distributions for moderate body and an extreme value distribution for large losses capturing the heavy-tailed nature of the loss data. Parameters and coefficients are estimated using the Expectation-Maximization (EM) algorithm. Combining with our frequency model (generalized linear mixed model) for data breaches, aggregate loss distributions are investigated and applications on cyber insurance pricing and risk management are discussed.