In " leading enterprise + farmer" cooperation model,farmer's behavior of breaching contract exists generally. In this paper,from the angle of incomplete contract,the influencial factors of farmer breakin...In " leading enterprise + farmer" cooperation model,farmer's behavior of breaching contract exists generally. In this paper,from the angle of incomplete contract,the influencial factors of farmer breaking contract are analyzed. It is found that farmer sex,age,culture degree and farming period have obvious effects on the behavior of breaching contract. Under regulating effect of relationship quality,farmer assest specificity,exogenous uncertainty and endogenous uncertainty affect farmer's breaking behavior. That is,the higher the farmer assest specificity,the lower the farmer breaching tendency; higher exogenous uncertainty causes that farmer is easy to generate breaching behavior; higher endogenous uncertainty causes that farmer is also easy to take breaching behavior.展开更多
The debris flow dam is a common type of barrier dams,which shows significant differences from other types of barrier dam such as landslide dam,moraine dam in their formation processes,dam body shapes,and internal comp...The debris flow dam is a common type of barrier dams,which shows significant differences from other types of barrier dam such as landslide dam,moraine dam in their formation processes,dam body shapes,and internal compositions.The basic breaching parameters such as flood peak discharge are vital indicators of risk assessment.In this study,we elucidated the failure process of the debris flow dam through the flume experiment,and built the calculation equation of the breaching parameters by selecting critical factors.The result shows that the overtopping failure process of the debris flow dam is capable of forming significantly retrogressive scarps,and the failure process experiences three stages,the formation of the retrogressive scarp,the erosion of the retrogressive scarp,and the decline of the retrogressive scarp.Five factors used for establishing the calculation equations for peak discharge(Qp),final width(Wb)of the breach,and duration(T)of the debris flow dam failure are dam height(h),reservoir capacity(V),the fine grain content(P0.075)of the soil,the nonuniformity coefficient(Cu)of the soil,and the upper limit grain size(D90)of the soil,respectively.In the three equations,the correlation coefficients between Qp,Wb,T and the five factors were 0.86,0.70,0.63,respectively.The equations still need to be modified and verified in actual cases.展开更多
Landslide dams,as frequent natural hazards,pose significant risks to human lives,property,and ecological environments.The grading characteristics and density of dam materials play a crucial role in determining the sta...Landslide dams,as frequent natural hazards,pose significant risks to human lives,property,and ecological environments.The grading characteristics and density of dam materials play a crucial role in determining the stability of landslide dams and the potential for dam breaches.To explore the failure mechanisms and evolutionary processes of landslide dams with varying soil properties,this study conducted a series of flume experiments,considering different grain compositions and material densities.The results demonstrated that grading characteristics significantly influence landslide dam stability,affecting failure patterns,breach processes,and final breach morphologies.Fine-graded materials exhibited a sequence of surface erosion,head-cut erosion,and subsequent surface erosion during the breach process,while well-graded materials typically experienced head-cut erosion followed by surface erosion.In coarse-graded dams,the high permeability of coarse particles allowed the dam to remain stable,as inflows matched outflows.The dam breach model experiments also showed that increasing material density effectively delayed the breach and reduced peak breach flow discharge.Furthermore,higher fine particle content led to a reduction in the residual dam height and the base slope of the final breach profile,although the relationship between peak breach discharge and the content of fine and coarse particles was nonlinear.To better understand breach morphology evolution under different soil characteristics and hydraulic conditions,three key points were identified—erosion point,control point,and scouring point.This study,by examining the evolution of failure patterns,breach processes,and breach flow discharges under various grading and density conditions,offers valuable insights into the mechanisms behind landslide dam failures.展开更多
Breaching of embankments has recently drawn more and more attention due to its importance in the development of early warning systems for embankment failures,in the evacuation plans of people at risk,in the design met...Breaching of embankments has recently drawn more and more attention due to its importance in the development of early warning systems for embankment failures,in the evacuation plans of people at risk,in the design method of embankments based on a risk-approach,etc. The erosion process observed during embankment breaching tests in the laboratory and the analysis of the results are described in this paper. Five embankments,one constructed with pure sand,four with different sand-silt-clay mixtures were tested. The height of the embankments was 75 cm and the width at the crest was 60 cm. Examination of the data from these tests indicated that headcut erosion played an important role in the process of breach growth in the embankments made of cohesive soil mixtures. Flow shear erosion,fluidization of the headcut slope surface,undermining of the headcut due to impinging jet scour and discrete soil mechanical slope mass failure from the headcut were all observed during these tests. For the embankment constructed with pure sand,the breach erosion process was dominated by shear erosion,which led to a gradual and relatively uniform retreat of the downstream slope. The cohesive proportion in the sand-silt-clay mixtures strongly slowed down the erosion process.展开更多
Introduction: The therapeutic approach to benign prostatic hyperplasia (BPH) has evolved profoundly. Surgical treatment is reserved for complicated cases and the reference surgical technique is transurethral resection...Introduction: The therapeutic approach to benign prostatic hyperplasia (BPH) has evolved profoundly. Surgical treatment is reserved for complicated cases and the reference surgical technique is transurethral resection of the prostate (TURP). This work aims to study the epidemiological, clinical and therapeutic aspects of monopolar transurethral resection of the prostate in our department. Materials and Methods: We conducted a descriptive study with retrospective data collection over a 12-month period from November 1, 2023 to December 31, 2024. The urology unit, an integral part of the surgery department, of the Sino-Guinean Friendship Hospital in Conakry served as the setting for this study. It included 27 patients with benign prostatic hypertrophy treated surgically by monopolar transurethral resection and having a usable medical record. The parameters studied were epidemiological, clinics and therapeutic. Results: The mean age of the patients was 68.57 ± 5.7 years with extremes from 50 to 79 years. The peak frequency was observed between 70 and 79 years (48.15%). All our patients had lower urinary tract disorders, i.e. 100% of cases. On digital rectal examination, an increase in the volume of the prostate of benign appearance was observed in all cases. The mean prostate volume was 43.7 cc on ultrasound with extremes from 34 cc to 58 cc. The total PSA level was less than 4 ng/ml in the majority of cases. The postoperative course was generally uncomplicated (n = 26) with removal of the urinary catheter on the second postoperative day (D2). However, one peroperative complication was observed in one patient;it was a bladder breach, leading to the passage of glycine into the peritoneum. Conclusion: Transurethral resection of the prostate has reduced the length of hospital stay of our patients, as well as the comorbidities associated with the treatment. The complications associated with it are rare but potentially serious. Its performance requires in-depth mastery of the endoscopic anatomy of the lower urinary tract as well as technical operative expertise.展开更多
The classification of dams or off-stream reservoirs concerning potential hazards in the event of failure often involves the use of two-dimensional hydraulic models for computing floodwave effects.These models necessit...The classification of dams or off-stream reservoirs concerning potential hazards in the event of failure often involves the use of two-dimensional hydraulic models for computing floodwave effects.These models necessitate defining breach geometry and formation time,for which various parametric models have been proposed.These models yield different values for average breach width,time of failure,and consequently,peak flows,as demonstrated by several researchers.This study analyzed the effect of selecting a breach parametric model on the hydraulic variables,potential damages,and hazard classification of structures.Three common parametric models were compared using a set of synthetic cases and a real off-stream reservoir.Results indicated significant effects of model choice.Material erodibility exerted a significant impact,surpassing that of failure mode.Other factors,such as the Manning coefficient,significantly affected the results.Utilizing an inadequate model or lacking information on dike material can lead to overly conservative or underestimated outcomes,thereby affecting hazard classification.展开更多
In consideration of the range of clay content of Chinese earth dams, the world's highest prototype tests have been made to research on the effects of cohesive strength of filling of cohesive homogeneous earth dam ...In consideration of the range of clay content of Chinese earth dams, the world's highest prototype tests have been made to research on the effects of cohesive strength of filling of cohesive homogeneous earth dam on breach formation. Three breach mechanisms were presented, they were the source-tracing erosion of dam body with the form of "multilevel headcut", "two-helix flow" erosion of dam crest and collapse of breach sidewalls due to instability. It can be concluded that the cohesive strength of filling of earth dam has great effect on breach formation. When the cohesive strength is bigger, the breach process becomes slower, and the peak outflow and the final width and depth of breach become smaller. The main character of the breach formation is head cutting and dumping collapse. When the cohesive strength is smaller, the breach process becomes faster, and the peak outflow, the final width and depth of breach become bigger. The main character of the breach formation is single level head cutting and shearing collapse.展开更多
A physically-based numerical three-dimensional earthen dam piping failure model is developed for homogeneous and zoned soil dams.This model is an erosion model,coupled with force/moment equilibrium analyses.Orifice fl...A physically-based numerical three-dimensional earthen dam piping failure model is developed for homogeneous and zoned soil dams.This model is an erosion model,coupled with force/moment equilibrium analyses.Orifice flow and two-dimensional(2D)shallow water equations(SWE)are solved to simulate dam break flows at different breaching stages.Erosion rates of different soils with different construction compaction efforts are calculated using corresponding erosion formulae.The dam's real shape,soil properties,and surrounding area are programmed.Large outer 2D-SWE grids are used to control upstream and downstream hydraulic conditions and control the boundary conditions of orifice flow,and inner 2D-SWE flow is used to scour soil and perform force/moment equilibrium analyses.This model is validated using the European Commission IMPACT(Investigation of Extreme Flood Processes and Uncertainty)Test#5 in Norway,Teton Dam failure in Idaho,USA,and Quail Creek Dike failure in Utah,USA.All calculated peak outflows are within 10%errors of observed values.Simulation results show that,for a V-shaped dam like Teton Dam,a piping breach location at the abutment tends to result in a smaller peak breach outflow than the piping breach location at the dam's center;and if Teton Dam had broken from its center for internal erosion,a peak outflow of 117851 m'/s,which is 81%larger than the peak outflow of 65120 m3/s released from its right abutment,would have been released from Teton Dam.A lower piping inlet elevation tends to cause a faster/earlier piping breach than a higher piping inlet elevation.展开更多
Purpose: This research aims to evaluate the potential threats to patient privacy and confidentiality posed by mHealth applications on mobile devices. Methodology: A comprehensive literature review was conducted, selec...Purpose: This research aims to evaluate the potential threats to patient privacy and confidentiality posed by mHealth applications on mobile devices. Methodology: A comprehensive literature review was conducted, selecting eighty-eight articles published over the past fifteen years. The study assessed data gathering and storage practices, regulatory adherence, legal structures, consent procedures, user education, and strategies to mitigate risks. Results: The findings reveal significant advancements in technologies designed to safeguard privacy and facilitate the widespread use of mHealth apps. However, persistent ethical issues related to privacy remain largely unchanged despite these technological strides.展开更多
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering...This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.展开更多
Technological shifts—coupled with infrastructure, techniques, and applications for big data—have created many new opportunities, business models, and industry expansion that benefit entrepreneurs. At the same time, ...Technological shifts—coupled with infrastructure, techniques, and applications for big data—have created many new opportunities, business models, and industry expansion that benefit entrepreneurs. At the same time, however, entrepreneurs are often unprepared for cybersecurity needs—and the policymakers, industry, and nonprofit groups that support them also face technological and knowledge constraints in keeping up with their needs. To improve the ability of entrepreneurship research to understand, identify, and ultimately help address cybersecurity challenges, we conduct a literature review on the state of cybersecurity. The research highlights the necessity for additional investigation to aid small businesses in securing their confidential data and client information from cyber threats, thereby preventing the potential shutdown of the business.展开更多
Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This...Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This study analyzes trends in data breaches in the United States, examining the frequency, causes, and magnitude of breaches across various industries. We document that data breaches are increasing, with hacking emerging as the leading cause. Our descriptive analyses explore factors influencing breaches, including security vulnerabilities, human error, and malicious attacks. The findings provide policymakers and businesses with actionable insights to bolster data security through proactive audits, patching, encryption, and response planning. By better understanding breach patterns and risk factors, organizations can take targeted steps to enhance protections and mitigate the potential damage of future incidents.展开更多
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ...In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.展开更多
Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publicati...Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publication base as an effective solution. The NIST Special Publication 800-66 Revision 1 was an essential standard in US healthcare, which was withdrawn in February 2024 and superseded by SP 800-66 Revision 2. This review investigates the academic papers concerning the application of the NIST SP 800-66 Revision 1 standard in the US healthcare literature. A systematic review method was used in this study to determine current knowledge gaps of the SP 800-66 Revision 1. Some limitations were employed in the search to enforce validity. A total of eleven articles were found eligible for the study. Consequently, this study suggests the necessity for additional academic papers pertaining to SP 800-66 Revision 2 in the US healthcare literature. In turn, it will enhance awareness of safeguarding electronic protected health information (ePHI), help to mitigate potential future risks, and eventually reduce breaches.展开更多
基金Supported by Natural Science Research Project Fund,Ministry of Education(71573100)
文摘In " leading enterprise + farmer" cooperation model,farmer's behavior of breaching contract exists generally. In this paper,from the angle of incomplete contract,the influencial factors of farmer breaking contract are analyzed. It is found that farmer sex,age,culture degree and farming period have obvious effects on the behavior of breaching contract. Under regulating effect of relationship quality,farmer assest specificity,exogenous uncertainty and endogenous uncertainty affect farmer's breaking behavior. That is,the higher the farmer assest specificity,the lower the farmer breaching tendency; higher exogenous uncertainty causes that farmer is easy to generate breaching behavior; higher endogenous uncertainty causes that farmer is also easy to take breaching behavior.
基金supported by the National Natural Science Foundation of China(Grant Nos.U20A20112,U19A2049)Second Tibetan Plateau Scientific Expedition and Research Program(STEP)(Grant No.2019QZKK0904)CAS Light of West China Program。
文摘The debris flow dam is a common type of barrier dams,which shows significant differences from other types of barrier dam such as landslide dam,moraine dam in their formation processes,dam body shapes,and internal compositions.The basic breaching parameters such as flood peak discharge are vital indicators of risk assessment.In this study,we elucidated the failure process of the debris flow dam through the flume experiment,and built the calculation equation of the breaching parameters by selecting critical factors.The result shows that the overtopping failure process of the debris flow dam is capable of forming significantly retrogressive scarps,and the failure process experiences three stages,the formation of the retrogressive scarp,the erosion of the retrogressive scarp,and the decline of the retrogressive scarp.Five factors used for establishing the calculation equations for peak discharge(Qp),final width(Wb)of the breach,and duration(T)of the debris flow dam failure are dam height(h),reservoir capacity(V),the fine grain content(P0.075)of the soil,the nonuniformity coefficient(Cu)of the soil,and the upper limit grain size(D90)of the soil,respectively.In the three equations,the correlation coefficients between Qp,Wb,T and the five factors were 0.86,0.70,0.63,respectively.The equations still need to be modified and verified in actual cases.
基金financially supported by the National Natural Science Foundation of China(Grant Nos.U22A20602,U2040221,and 42207228)the Sichuan Science and Technology Program(2022NSFSC1060)the Fundamental Research Funds for Central Public Research Institutes(Grant No.Y324006)。
文摘Landslide dams,as frequent natural hazards,pose significant risks to human lives,property,and ecological environments.The grading characteristics and density of dam materials play a crucial role in determining the stability of landslide dams and the potential for dam breaches.To explore the failure mechanisms and evolutionary processes of landslide dams with varying soil properties,this study conducted a series of flume experiments,considering different grain compositions and material densities.The results demonstrated that grading characteristics significantly influence landslide dam stability,affecting failure patterns,breach processes,and final breach morphologies.Fine-graded materials exhibited a sequence of surface erosion,head-cut erosion,and subsequent surface erosion during the breach process,while well-graded materials typically experienced head-cut erosion followed by surface erosion.In coarse-graded dams,the high permeability of coarse particles allowed the dam to remain stable,as inflows matched outflows.The dam breach model experiments also showed that increasing material density effectively delayed the breach and reduced peak breach flow discharge.Furthermore,higher fine particle content led to a reduction in the residual dam height and the base slope of the final breach profile,although the relationship between peak breach discharge and the content of fine and coarse particles was nonlinear.To better understand breach morphology evolution under different soil characteristics and hydraulic conditions,three key points were identified—erosion point,control point,and scouring point.This study,by examining the evolution of failure patterns,breach processes,and breach flow discharges under various grading and density conditions,offers valuable insights into the mechanisms behind landslide dam failures.
基金supported by the National Basic Research Program ("973" Program) of China (Grant No.2007CB714106)the Scientific Research Foundation for the Returned Overseas Chinese Scholars,Ministry of Hu-man Resources and Social Security of China+1 种基金the National Natural Science Foundation of China (Grant No.51009012)the Scientific Research Foundation for the Returned Overseas Chinese Scholars,State Education Ministry
文摘Breaching of embankments has recently drawn more and more attention due to its importance in the development of early warning systems for embankment failures,in the evacuation plans of people at risk,in the design method of embankments based on a risk-approach,etc. The erosion process observed during embankment breaching tests in the laboratory and the analysis of the results are described in this paper. Five embankments,one constructed with pure sand,four with different sand-silt-clay mixtures were tested. The height of the embankments was 75 cm and the width at the crest was 60 cm. Examination of the data from these tests indicated that headcut erosion played an important role in the process of breach growth in the embankments made of cohesive soil mixtures. Flow shear erosion,fluidization of the headcut slope surface,undermining of the headcut due to impinging jet scour and discrete soil mechanical slope mass failure from the headcut were all observed during these tests. For the embankment constructed with pure sand,the breach erosion process was dominated by shear erosion,which led to a gradual and relatively uniform retreat of the downstream slope. The cohesive proportion in the sand-silt-clay mixtures strongly slowed down the erosion process.
文摘Introduction: The therapeutic approach to benign prostatic hyperplasia (BPH) has evolved profoundly. Surgical treatment is reserved for complicated cases and the reference surgical technique is transurethral resection of the prostate (TURP). This work aims to study the epidemiological, clinical and therapeutic aspects of monopolar transurethral resection of the prostate in our department. Materials and Methods: We conducted a descriptive study with retrospective data collection over a 12-month period from November 1, 2023 to December 31, 2024. The urology unit, an integral part of the surgery department, of the Sino-Guinean Friendship Hospital in Conakry served as the setting for this study. It included 27 patients with benign prostatic hypertrophy treated surgically by monopolar transurethral resection and having a usable medical record. The parameters studied were epidemiological, clinics and therapeutic. Results: The mean age of the patients was 68.57 ± 5.7 years with extremes from 50 to 79 years. The peak frequency was observed between 70 and 79 years (48.15%). All our patients had lower urinary tract disorders, i.e. 100% of cases. On digital rectal examination, an increase in the volume of the prostate of benign appearance was observed in all cases. The mean prostate volume was 43.7 cc on ultrasound with extremes from 34 cc to 58 cc. The total PSA level was less than 4 ng/ml in the majority of cases. The postoperative course was generally uncomplicated (n = 26) with removal of the urinary catheter on the second postoperative day (D2). However, one peroperative complication was observed in one patient;it was a bladder breach, leading to the passage of glycine into the peritoneum. Conclusion: Transurethral resection of the prostate has reduced the length of hospital stay of our patients, as well as the comorbidities associated with the treatment. The complications associated with it are rare but potentially serious. Its performance requires in-depth mastery of the endoscopic anatomy of the lower urinary tract as well as technical operative expertise.
基金supported by the Spanish Ministry of Science,Innovation and Universities through the projects ACROPOLIS(Grant No.RTC2019-007343-5)and DOLMEN(Grant No.PID2021-122661OB-I00)the Spanish Ministry of Economy and Competitiveness through the project“Severo Ochoa Programme for Centres of Excellence in R&D”(Grant No.CEX2018-000797-S).
文摘The classification of dams or off-stream reservoirs concerning potential hazards in the event of failure often involves the use of two-dimensional hydraulic models for computing floodwave effects.These models necessitate defining breach geometry and formation time,for which various parametric models have been proposed.These models yield different values for average breach width,time of failure,and consequently,peak flows,as demonstrated by several researchers.This study analyzed the effect of selecting a breach parametric model on the hydraulic variables,potential damages,and hazard classification of structures.Three common parametric models were compared using a set of synthetic cases and a real off-stream reservoir.Results indicated significant effects of model choice.Material erodibility exerted a significant impact,surpassing that of failure mode.Other factors,such as the Manning coefficient,significantly affected the results.Utilizing an inadequate model or lacking information on dike material can lead to overly conservative or underestimated outcomes,thereby affecting hazard classification.
基金Supported by National Key Technology R&D Program in the 11th Five-year Plan of China (Grant No. 2006BAC14B00)
文摘In consideration of the range of clay content of Chinese earth dams, the world's highest prototype tests have been made to research on the effects of cohesive strength of filling of cohesive homogeneous earth dam on breach formation. Three breach mechanisms were presented, they were the source-tracing erosion of dam body with the form of "multilevel headcut", "two-helix flow" erosion of dam crest and collapse of breach sidewalls due to instability. It can be concluded that the cohesive strength of filling of earth dam has great effect on breach formation. When the cohesive strength is bigger, the breach process becomes slower, and the peak outflow and the final width and depth of breach become smaller. The main character of the breach formation is head cutting and dumping collapse. When the cohesive strength is smaller, the breach process becomes faster, and the peak outflow, the final width and depth of breach become bigger. The main character of the breach formation is single level head cutting and shearing collapse.
文摘A physically-based numerical three-dimensional earthen dam piping failure model is developed for homogeneous and zoned soil dams.This model is an erosion model,coupled with force/moment equilibrium analyses.Orifice flow and two-dimensional(2D)shallow water equations(SWE)are solved to simulate dam break flows at different breaching stages.Erosion rates of different soils with different construction compaction efforts are calculated using corresponding erosion formulae.The dam's real shape,soil properties,and surrounding area are programmed.Large outer 2D-SWE grids are used to control upstream and downstream hydraulic conditions and control the boundary conditions of orifice flow,and inner 2D-SWE flow is used to scour soil and perform force/moment equilibrium analyses.This model is validated using the European Commission IMPACT(Investigation of Extreme Flood Processes and Uncertainty)Test#5 in Norway,Teton Dam failure in Idaho,USA,and Quail Creek Dike failure in Utah,USA.All calculated peak outflows are within 10%errors of observed values.Simulation results show that,for a V-shaped dam like Teton Dam,a piping breach location at the abutment tends to result in a smaller peak breach outflow than the piping breach location at the dam's center;and if Teton Dam had broken from its center for internal erosion,a peak outflow of 117851 m'/s,which is 81%larger than the peak outflow of 65120 m3/s released from its right abutment,would have been released from Teton Dam.A lower piping inlet elevation tends to cause a faster/earlier piping breach than a higher piping inlet elevation.
文摘Purpose: This research aims to evaluate the potential threats to patient privacy and confidentiality posed by mHealth applications on mobile devices. Methodology: A comprehensive literature review was conducted, selecting eighty-eight articles published over the past fifteen years. The study assessed data gathering and storage practices, regulatory adherence, legal structures, consent procedures, user education, and strategies to mitigate risks. Results: The findings reveal significant advancements in technologies designed to safeguard privacy and facilitate the widespread use of mHealth apps. However, persistent ethical issues related to privacy remain largely unchanged despite these technological strides.
文摘This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.
文摘Technological shifts—coupled with infrastructure, techniques, and applications for big data—have created many new opportunities, business models, and industry expansion that benefit entrepreneurs. At the same time, however, entrepreneurs are often unprepared for cybersecurity needs—and the policymakers, industry, and nonprofit groups that support them also face technological and knowledge constraints in keeping up with their needs. To improve the ability of entrepreneurship research to understand, identify, and ultimately help address cybersecurity challenges, we conduct a literature review on the state of cybersecurity. The research highlights the necessity for additional investigation to aid small businesses in securing their confidential data and client information from cyber threats, thereby preventing the potential shutdown of the business.
文摘Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This study analyzes trends in data breaches in the United States, examining the frequency, causes, and magnitude of breaches across various industries. We document that data breaches are increasing, with hacking emerging as the leading cause. Our descriptive analyses explore factors influencing breaches, including security vulnerabilities, human error, and malicious attacks. The findings provide policymakers and businesses with actionable insights to bolster data security through proactive audits, patching, encryption, and response planning. By better understanding breach patterns and risk factors, organizations can take targeted steps to enhance protections and mitigate the potential damage of future incidents.
文摘In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.
文摘Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publication base as an effective solution. The NIST Special Publication 800-66 Revision 1 was an essential standard in US healthcare, which was withdrawn in February 2024 and superseded by SP 800-66 Revision 2. This review investigates the academic papers concerning the application of the NIST SP 800-66 Revision 1 standard in the US healthcare literature. A systematic review method was used in this study to determine current knowledge gaps of the SP 800-66 Revision 1. Some limitations were employed in the search to enforce validity. A total of eleven articles were found eligible for the study. Consequently, this study suggests the necessity for additional academic papers pertaining to SP 800-66 Revision 2 in the US healthcare literature. In turn, it will enhance awareness of safeguarding electronic protected health information (ePHI), help to mitigate potential future risks, and eventually reduce breaches.