Results 271 to 280 of about 321,049 (289)
Some of the next articles are maybe not open access.
Border Revision for Knowledge Hiding
2010In this chapter, we highlight the process of border revision, which plays a significant role on both border-based and exact approaches for association rule hiding. Simply stated, the process of border revision captures those itemsets of the original database which need to remain frequent and those that need to become infrequent in the sanitized version
Aris Gkoulalas-Divanis +1 more
openaire +1 more source
Hiding sensitive knowledge without side effects
Knowledge and Information Systems, 2008Sensitive knowledge hiding in large transactional databases is one of the major goals of privacy preserving data mining. However, it is only recently that researchers were able to identify exact solutions for the hiding of knowledge, depicted in the form of sensitive frequent itemsets and their related association rules.
Aris Gkoulalas-Divanis +1 more
openaire +1 more source
From hiding to sharing: a knowledge hiding perspective on knowledge management in MNEs
Journal of Knowledge ManagementPurpose Knowledge is a vital strategic resource for multinational enterprises (MNEs). As MNEs expand internationally, knowledge transfer through expatriates is a crucial part of the value proposition of outward foreign direct investment. However, this is undermined if knowledge is hidden rather than shared.
Ruoting Zhi +2 more
openaire +1 more source
What is bullying hiding? Exploring antecedents and potential dimension of knowledge hiding
Journal of Knowledge Management, 2020PurposeThe purpose of this study is to examine the relationships among knowledge attributes (complexity and implicitness), interpersonal distrust, knowledge hiding (KH) and team efficacy and second, to explore a new dimension of KH.Design/methodology/approachData for this research were collected from more than 940 employees working in manufacturing ...
Yunyun Yuan +3 more
openaire +1 more source
The curvilinear relationship between knowledge leadership and knowledge hiding
Leadership & Organization Development Journal, 2019PurposeThe purpose of this paper is to examine the curvilinear relationship between knowledge leadership and knowledge hiding and the moderating role of psychological ownership on influencing the curvilinear relationship.Design/methodology/approachIn total, 403 data were collected from participants in a high-technology company via a two-wave survey ...
Qing Xia +3 more
openaire +1 more source
Investigation of Teachers' Knowledge Management and Knowledge Hiding Behaviors
2024 12th International Symposium on Digital Forensics and Security (ISDFS)The aim of this study is to investigate the correlation between teachers' knowledge management and their knowledge hiding behaviors. The sample for this study, which was constructed using the correlational model as one of the quantitative research approaches, consists of 201 teachers selected through simple random sampling.
Karabatak, Songul +2 more
openaire +2 more sources
Knowledge Hiding in Emerging Application Domains
2010Without any doubt data is among the most valuable assets of many profit or non-profit organizations including government agencies, corporations and non-governmental institutions. Apart from daily operational use, this is simply because data is the source of precise information and knowledge that organizations need to stay in business, i.e., their ...
openaire +3 more sources
The Dark Side of Knowledge Sharing and Knowledge Hiding
Journal of Research in Business and ManagementKnowledge sharing can be an advantage to organizational success as it propels innovation, collaboration, and growth. However, knowledge hiding-a phenomenon when individuals hide or distort information intentionally-leads a very critical challenge for organizations.
Dr.Venkateswararao Podile +4 more
openaire +1 more source
MotifHider: A knowledge hiding approach to sequence masking
2009 24th International Symposium on Computer and Information Sciences, 2009In a typical de novo motif discovery process, it is quite common that many of the motif candidates output from motif discovery programs are either already known motifs or motif-like decoy/repeat patterns. To prevent the false discovery and also to increase the chance of authentic novel motif discovery, some motif discovery programs employ a pre ...
openaire +2 more sources
Hide and Seek: The Antecedents and Process of Knowledge Hiding
Academy of Management Proceedings, 2023Ruoting Zhi, Martin Lockett, Jingzi Zhou
openaire +1 more source

