Results 131 to 140 of about 321,364 (156)
Some of the next articles are maybe not open access.
F̄-ladder knowledge and F̄-hiding knowledge discovery
2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), 2015By employing dual of one direction S-rough sets (dual of one direction singular rough sets) and its dynamic characteristic, this paper presents the concepts of F-ladder knowledge and F-ladder degree. Using these concepts, the discernibility theorem of F-ladder knowledge, the hiding-discovery theorem of maximum F-ladder knowledge, the hiding-discovery ...
null Xiumei Hao +2 more
openaire +1 more source
Other Knowledge Hiding Methodologies
2010Association rule hiding algorithms aim at protecting sensitive knowledge captured in the form of frequent itemsets or association rules. However, (sensitive) knowledge may appear in various forms directly related to the applied data mining algorithm that achieved to expose it.
Aris Gkoulalas-Divanis +1 more
openaire +1 more source
EXACT KNOWLEDGE HIDING IN TRANSACTIONAL DATABASES
International Journal on Artificial Intelligence Tools, 2009The hiding of sensitive knowledge in the form of frequent itemsets, has gained increasing attention over the past years. This paper highlights the process of border revision, which is essential for the identification of hiding solutions bearing no side-effects, and provides efficient algorithms for the computation of the revised positive and the ...
ARIS GKOULALAS-DIVANIS +1 more
openaire +1 more source
Sensitive Knowledge Hiding Application
2021Diverse organizations store their business related data in their own databases. Some of them publish their data as is to third parties for research purposes. However, this way of data sharing has the risk of disclosing sensitive knowledge which the database may entail.
Abul, O., Gökçe H.
openaire +1 more source
The dark triad and knowledge hiding
International Journal of Information Management, 2018Abstract By drawing on psychological contract theory, this study examined the effects of the dark triad of personality traits (Machiavellianism, narcissism, and psychopathy) on knowledge hiding within organizations. We obtained 251 matched-pair data from respondents in a manufacturing company.
Wei Pan +3 more
openaire +1 more source
Exact Knowledge Hiding through Database Extension
IEEE Transactions on Knowledge and Data Engineering, 2009In this paper, we propose a novel, exact border-based approach that provides an optimal solution for the hiding of sensitive frequent itemsets by (i) minimally extending the original database by a synthetically generated database part - the database extension, (ii) formulating the creation of the database extension as a constraint satisfaction problem,
A. Gkoulalas-Divanis, V.S. Verykios
openaire +1 more source
Global Knowledge, Memory and Communication, 2023
Purpose The purpose of this study was to explicate how leaders’ knowledge hiding results in employees’ knowledge hiding. In addition, the study was intended to explore under what conditions leaders’ knowledge hiding affects employees’ moral disengagement more deleteriously.
Muhammad Mumtaz Khan +3 more
openaire +1 more source
Purpose The purpose of this study was to explicate how leaders’ knowledge hiding results in employees’ knowledge hiding. In addition, the study was intended to explore under what conditions leaders’ knowledge hiding affects employees’ moral disengagement more deleteriously.
Muhammad Mumtaz Khan +3 more
openaire +1 more source
Border Revision for Knowledge Hiding
2010In this chapter, we highlight the process of border revision, which plays a significant role on both border-based and exact approaches for association rule hiding. Simply stated, the process of border revision captures those itemsets of the original database which need to remain frequent and those that need to become infrequent in the sanitized version
Aris Gkoulalas-Divanis +1 more
openaire +1 more source
Hiding sensitive knowledge without side effects
Knowledge and Information Systems, 2008Sensitive knowledge hiding in large transactional databases is one of the major goals of privacy preserving data mining. However, it is only recently that researchers were able to identify exact solutions for the hiding of knowledge, depicted in the form of sensitive frequent itemsets and their related association rules.
Aris Gkoulalas-Divanis +1 more
openaire +1 more source
From hiding to sharing: a knowledge hiding perspective on knowledge management in MNEs
Journal of Knowledge ManagementPurpose Knowledge is a vital strategic resource for multinational enterprises (MNEs). As MNEs expand internationally, knowledge transfer through expatriates is a crucial part of the value proposition of outward foreign direct investment. However, this is undermined if knowledge is hidden rather than shared.
Ruoting Zhi +2 more
openaire +1 more source

