Results 41 to 50 of about 322,113 (276)

Empirical Research on the Influencing Factors of Users' Knowledge Hiding Behavior in Virtual Question-and-Answer Community [PDF]

open access: yesNongye tushu qingbao xuebao, 2022
[Purpose/Significance] Knowledge hiding behaviors in virtual communities seriously hinder knowledge communication and dissemination. This paper aims to explore the influencing factors of users' knowledge hiding behaviors in virtual question-and-answer ...
LI Jiawen, QIN Qin, KE Qing
doaj   +1 more source

Sealed containers in Z [PDF]

open access: yes, 2014
Physical means of securing information, such as sealed envelopes and scratch cards, can be used to achieve cryptographic objectives. Reasoning about this has so far been informal.
C. Morgan   +7 more
core   +1 more source

Does Darker Hide More Knowledge? The Relationship between Machiavellianism and Knowledge Hiding

open access: yesInternational Journal of Security and Its Applications, 2016
Machiavellianism is deemed as one of the dark personalities. Knowledge hiding refers to employee’s intentional attempt to withhold or conceal knowledge that has been requested by another person, and it is comprised of three related sub-dimensions: playing dumb, evasive hiding, and rationalized hiding.
Wei Pan, Yang Zhou, Qingpu Zhang
openaire   +1 more source

UNDERSTANDING NARCISSISTS’ KNOWLEDGE HIDING BEHAVIOUR: A MORAL DISENGAGEMENT MECHANISM PERSPECTIVE

open access: yesReviews of Management Sciences, 2021
Purpose:  Narcissistic people have a strong desire to hold focus only around themselves. Their self-love triggers them to create their monopoly and involve in deviant behavioral outcomes such as knowledge hiding.
Nasira Jabeen, Muhammad Anwar ul Haq
doaj   +1 more source

Knowledge hiding from tree and graph databases

open access: yesData & Knowledge Engineering, 2012
Sensitive knowledge hiding is the problem of removing sensitive knowledge from databases before publishing. The problem is extensively studied in the context of relational databases to hide frequent itemsets and association rules. Recently, sequential pattern hiding from sequential (both sequence and spatio-temporal) databases has been investigated [1].
Abul, Osman, Gokce, Harun
openaire   +3 more sources

RETRACTED: Ethical Conflict and Knowledge Hiding in Teams: Moderating Role of Workplace Friendship in Education Sector

open access: yesFrontiers in Psychology, 2022
Ethical conflicts arise when there is no unity between the team members and shared ethical priorities. This study aimed to identify the relationship between ethical value unity, team knowledge hiding, the relationship between the lack of shared ethical ...
Shuo Xing
doaj   +1 more source

Load Hiding of Household's Power Demand [PDF]

open access: yes, 2014
With the development and introduction of smart metering, the energy information for costumers will change from infrequent manual meter readings to fine-grained energy consumption data.
Egarter, Dominik   +2 more
core   +1 more source

HOW TRANSACTIONAL LEADERSHIP IMPACTS TACIT AND EXPLICIT KNOWLEDGE HIDING: THE ROLE OF PERCEIVED COMPETITION AND LEADER KNOWLEDGE HIDING [PDF]

open access: yesJournal of Applied Structural Equation Modeling
This study investigates the role of transactional leadership as a pivotal antecedent to employee knowledge hiding, specifically focusing on tacit and explicit forms.
Kanwal Zahoor   +3 more
doaj   +1 more source

Privacy Preserving Utility Mining: A Survey

open access: yes, 2018
In big data era, the collected data usually contains rich information and hidden knowledge. Utility-oriented pattern mining and analytics have shown a powerful ability to explore these ubiquitous data, which may be collected from various fields and ...
Chao, Han-Chieh   +4 more
core   +1 more source

SecMon: End-to-End Quality and Security Monitoring System [PDF]

open access: yes, 2008
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype).
Ciszkowski, Tomasz   +5 more
core   +4 more sources

Home - About - Disclaimer - Privacy