Results 41 to 50 of about 321,049 (289)
With the normalization of epidemic prevention and control, the expression of the public’s demand for health information on online platforms continues to increase, while knowledge hiding behavior has seriously hindered the communication and dissemination ...
Wen-Zhu Li +3 more
doaj +1 more source
Subspace Methods for Data Attack on State Estimation: A Data Driven Approach [PDF]
Data attacks on state estimation modify part of system measurements such that the tempered measurements cause incorrect system state estimates. Attack techniques proposed in the literature often require detailed knowledge of system parameters.
Jinsub Kim +3 more
core +1 more source
The purpose of the study is to uncover how and when ethical leadership impacts knowledge hiding behavior. First, by examining the individual level morality-based characteristics (moral identity and reflective moral attentiveness) as separate and serial ...
Hina Shahid +4 more
doaj +1 more source
Top management team (TMT) knowledge hiding, which is not only related to the normal operation of the team but also closely related to enterprise innovation performance, has been paid little attention to in the previous studies.
Pengfei Rong, Shuang Liu
doaj +1 more source
ABAKA : a novel attribute-based k-anonymous collaborative solution for LBSs [PDF]
The increasing use of mobile devices, along with advances in telecommunication systems, increased the popularity of Location-Based Services (LBSs). In LBSs, users share their exact location with a potentially untrusted Location-Based Service Provider ...
Ambrosin, M +3 more
core +2 more sources
The Psychology behind Knowledge Hiding in an Organization [PDF]
This study aimed to understand the psychological process behind employees’ knowledge hiding (KH) behaviors in organizations. KH is an intentional act of concealing knowledge when it is requested by a colleague and can lead to counterproductive consequences for the organization. Therefore, this study synthesized previous studies (n = 88) on KH through a
Roksana Binte Rezwan, Yoshi Takahashi
openaire +3 more sources
JPEG steganography with particle swarm optimization accelerated by AVX [PDF]
Digital steganography aims at hiding secret messages in digital data transmitted over insecure channels. The JPEG format is prevalent in digital communication, and images are often used as cover objects in digital steganography.
Bramas B +7 more
core +1 more source
What Kind of Knowledge Is Concealed by Project Team Members? (Case Study: Oil Industries’ Commissioning and Operation Company (OICO)) [PDF]
Knowledge hiding is one of the new concepts in the management of organizational knowledge. Although the nature of the relationship between projects teams members will have a substantial impact on the knowledge hiding behavior, different characteristics ...
malihe Kamareiy +2 more
doaj +1 more source
Purpose: The purpose of the current study was to examine the impact of workplace incivility on knowledge hiding behavior. The study also empirically analyzed the moderating effect of psychological entitlement between workplace incivility and knowledge ...
Hamna Zaheer +2 more
doaj +1 more source
Does Darker Hide More Knowledge? The Relationship between Machiavellianism and Knowledge Hiding
Machiavellianism is deemed as one of the dark personalities. Knowledge hiding refers to employee’s intentional attempt to withhold or conceal knowledge that has been requested by another person, and it is comprised of three related sub-dimensions: playing dumb, evasive hiding, and rationalized hiding.
Wei Pan, Yang Zhou, Qingpu Zhang
openaire +1 more source

