Results 31 to 40 of about 11,188 (132)

Data Driven Exploratory Attacks on Black Box Classifiers in Adversarial Domains

open access: yes, 2017
While modern day web applications aim to create impact at the civilization level, they have become vulnerable to adversarial activity, where the next cyber-attack can take any shape and can originate from anywhere. The increasing scale and sophistication
Kantardzic, Mehmed, Sethi, Tegjyot Singh
core   +1 more source

Whose lips are sealed? Gender differences in knowledge hiding at work [PDF]

open access: yes, 2023
Knowledge hiding – intentionally concealing knowledge from a colleague who requested it – is often damaging for individuals and organizations. Amongst the factors explaining knowledge hiding, one has been overlooked, despite being an important lens for ...
Andreeva, Tatiana, Zappa, Paola
core  

Deceptive Knowledge Hiding in Organizations: Psychological Distress as an Underlying Mechanism

open access: yesSAGE Open
This study investigates the role of employee cynicism and perceived organizational politics in deceptive knowledge-hiding behaviors (evasive hiding and playing dumb). Besides, this work aims to measure the mediating role of psychological distress between
Hafsa Bashir   +2 more
doaj   +1 more source

Cultivating Knowledge: Development, Dissemblance, and Discursive Contradictions among the Diola of Guinea-Bissau [PDF]

open access: yes, 2012
Author's final manuscript.Development practitioners are eager to “learn from farmers” in their efforts to address Africa’s deteriorating agricultural output.
Davidson, Joanna
core   +1 more source

Impostor leader and knowledge hiding: Attachment avoidance as underlying mechanism

open access: yesActa Psychologica
Impostorism and knowledge-hiding behaviors negatively impact employees and organizational performance. This study examines the association between impostor leaders and knowledge hiding (evasive hiding, playing dumb, and rationalized hiding).
Laibin Wang   +3 more
doaj   +1 more source

Review article of recent literature on the Democratic Republic of Congo. (Nzongola-Ntalaja: The Congo from Leopold to Kabila, Trefon (ed): Reinventing Order in the Congo, and Clark (ed): The African Stakes of the Congo War) [PDF]

open access: yes, 2008
By survival in conditions that are murderous, by evading forms of control and de-linking from the system, people in Congo ultimately limit the reach of the power imposed on them.
Marriage, Zoe
core   +1 more source

Does Humor Style Affect Knowledge Hiding Behavior? The Roles of Personality and Communication Climate in Organizations

open access: yesSAGE Open
This paper aims to examine the personal, interpersonal, and organizational predictors of knowledge hiding behaviors in organizations. The results of a three-wave longitudinal study indicated that (i) the dark triad personality (Machiavellianism and ...
Anıl Boz Semerci   +2 more
doaj   +1 more source

Report on estimating the size of dolphin schools, based on data obtained during a charter cruise of the M/V Gina Anne, October 11 -November 25, 1979 [PDF]

open access: yes, 1980
Estimates of dolphin school sizes made by observers and crew members aboard tuna seiners or by observers on ship or aerial surveys are important components of population estimates of dolphins which are involved in the yellowfin tuna fishery in the ...
Allen, R.L.   +5 more
core  

Active Solidarity: Centering The Demands And Vision Of The Black Lives Matter Movement In Teacher Education [PDF]

open access: yes, 2017
In the era of Black Lives Matter (#BLM), urban teacher education does not exist in isolation. The White supremacist, neoliberal context that impacts all aspects of Black lives also serves to support antiblackness within the structures of teacher ...
Mayorga, Edwin, Picower, B.
core   +3 more sources

Telephoning Fish: An Examination of the Creative Deviance Used by Wildlife Violators in the United States [PDF]

open access: yes, 2011
Wildlife poachers throughout the world have developed innovative techniques to commit their crimes and evade arrest by law enforcement. By taking advantage of technological advances as well as legitimate wildlife management practices, the poachers are
Green, Egan K.
core   +2 more sources

Home - About - Disclaimer - Privacy