Results 271 to 280 of about 321,049 (289)
Some of the next articles are maybe not open access.

Border Revision for Knowledge Hiding

2010
In this chapter, we highlight the process of border revision, which plays a significant role on both border-based and exact approaches for association rule hiding. Simply stated, the process of border revision captures those itemsets of the original database which need to remain frequent and those that need to become infrequent in the sanitized version
Aris Gkoulalas-Divanis   +1 more
openaire   +1 more source

Hiding sensitive knowledge without side effects

Knowledge and Information Systems, 2008
Sensitive knowledge hiding in large transactional databases is one of the major goals of privacy preserving data mining. However, it is only recently that researchers were able to identify exact solutions for the hiding of knowledge, depicted in the form of sensitive frequent itemsets and their related association rules.
Aris Gkoulalas-Divanis   +1 more
openaire   +1 more source

From hiding to sharing: a knowledge hiding perspective on knowledge management in MNEs

Journal of Knowledge Management
Purpose Knowledge is a vital strategic resource for multinational enterprises (MNEs). As MNEs expand internationally, knowledge transfer through expatriates is a crucial part of the value proposition of outward foreign direct investment. However, this is undermined if knowledge is hidden rather than shared.
Ruoting Zhi   +2 more
openaire   +1 more source

What is bullying hiding? Exploring antecedents and potential dimension of knowledge hiding

Journal of Knowledge Management, 2020
PurposeThe purpose of this study is to examine the relationships among knowledge attributes (complexity and implicitness), interpersonal distrust, knowledge hiding (KH) and team efficacy and second, to explore a new dimension of KH.Design/methodology/approachData for this research were collected from more than 940 employees working in manufacturing ...
Yunyun Yuan   +3 more
openaire   +1 more source

The curvilinear relationship between knowledge leadership and knowledge hiding

Leadership & Organization Development Journal, 2019
PurposeThe purpose of this paper is to examine the curvilinear relationship between knowledge leadership and knowledge hiding and the moderating role of psychological ownership on influencing the curvilinear relationship.Design/methodology/approachIn total, 403 data were collected from participants in a high-technology company via a two-wave survey ...
Qing Xia   +3 more
openaire   +1 more source

Investigation of Teachers' Knowledge Management and Knowledge Hiding Behaviors

2024 12th International Symposium on Digital Forensics and Security (ISDFS)
The aim of this study is to investigate the correlation between teachers' knowledge management and their knowledge hiding behaviors. The sample for this study, which was constructed using the correlational model as one of the quantitative research approaches, consists of 201 teachers selected through simple random sampling.
Karabatak, Songul   +2 more
openaire   +2 more sources

Knowledge Hiding in Emerging Application Domains

2010
Without any doubt data is among the most valuable assets of many profit or non-profit organizations including government agencies, corporations and non-governmental institutions. Apart from daily operational use, this is simply because data is the source of precise information and knowledge that organizations need to stay in business, i.e., their ...
openaire   +3 more sources

The Dark Side of Knowledge Sharing and Knowledge Hiding

Journal of Research in Business and Management
Knowledge sharing can be an advantage to organizational success as it propels innovation, collaboration, and growth. However, knowledge hiding-a phenomenon when individuals hide or distort information intentionally-leads a very critical challenge for organizations.
Dr.Venkateswararao Podile   +4 more
openaire   +1 more source

MotifHider: A knowledge hiding approach to sequence masking

2009 24th International Symposium on Computer and Information Sciences, 2009
In a typical de novo motif discovery process, it is quite common that many of the motif candidates output from motif discovery programs are either already known motifs or motif-like decoy/repeat patterns. To prevent the false discovery and also to increase the chance of authentic novel motif discovery, some motif discovery programs employ a pre ...
openaire   +2 more sources

Hide and Seek: The Antecedents and Process of Knowledge Hiding

Academy of Management Proceedings, 2023
Ruoting Zhi, Martin Lockett, Jingzi Zhou
openaire   +1 more source

Home - About - Disclaimer - Privacy