Results 51 to 60 of about 302,884 (283)

Do Morality-Based Individual Differences and Relational Climates Matter? Ethical Leadership and Knowledge Hiding: A Multilevel Framework

open access: yesSAGE Open, 2023
The purpose of the study is to uncover how and when ethical leadership impacts knowledge hiding behavior. First, by examining the individual level morality-based characteristics (moral identity and reflective moral attentiveness) as separate and serial ...
Hina Shahid   +4 more
doaj   +1 more source

ABAKA : a novel attribute-based k-anonymous collaborative solution for LBSs [PDF]

open access: yes, 2016
The increasing use of mobile devices, along with advances in telecommunication systems, increased the popularity of Location-Based Services (LBSs). In LBSs, users share their exact location with a potentially untrusted Location-Based Service Provider ...
Ambrosin, M   +3 more
core   +2 more sources

Top Management Team Knowledge Hiding and Enterprise Innovation Performance: A Moderated Mediation Model

open access: yesFrontiers in Psychology, 2021
Top management team (TMT) knowledge hiding, which is not only related to the normal operation of the team but also closely related to enterprise innovation performance, has been paid little attention to in the previous studies.
Pengfei Rong, Shuang Liu
doaj   +1 more source

Empirical Research on the Influencing Factors of Users' Knowledge Hiding Behavior in Virtual Question-and-Answer Community [PDF]

open access: yesNongye tushu qingbao xuebao, 2022
[Purpose/Significance] Knowledge hiding behaviors in virtual communities seriously hinder knowledge communication and dissemination. This paper aims to explore the influencing factors of users' knowledge hiding behaviors in virtual question-and-answer ...
LI Jiawen, QIN Qin, KE Qing
doaj   +1 more source

Consequences of knowledge hiding: The differential compensatory effects of guilt and shame [PDF]

open access: yes, 2018
The nature of the consequences of knowledge hiding, defined as an intentional attempt to withhold knowledge that has been requested, and the mechanisms through which knowledge hiding affects outcomes are undertheorized.
Burmeister, Anne   +2 more
core   +1 more source

Dynamic Parameter Allocation in Parameter Servers [PDF]

open access: yes, 2020
To keep up with increasing dataset sizes and model complexity, distributed training has become a necessity for large machine learning tasks. Parameter servers ease the implementation of distributed parameter management---a key concern in distributed ...
Gemulla, Rainer   +3 more
core   +1 more source

Does Darker Hide More Knowledge? The Relationship between Machiavellianism and Knowledge Hiding

open access: yesInternational Journal of Security and Its Applications, 2016
Machiavellianism is deemed as one of the dark personalities. Knowledge hiding refers to employee’s intentional attempt to withhold or conceal knowledge that has been requested by another person, and it is comprised of three related sub-dimensions: playing dumb, evasive hiding, and rationalized hiding.
Qingpu Zhang, Wei Pan, Yang Zhou
openaire   +2 more sources

What Kind of Knowledge Is Concealed by Project Team Members? (Case Study: Oil Industries’ Commissioning and Operation Company (OICO)) [PDF]

open access: yesJournal of Information Technology Management, 2018
Knowledge hiding is one of the new concepts in the management of organizational knowledge. Although the nature of the relationship between projects teams members will have a substantial impact on the knowledge hiding behavior, different characteristics ...
malihe Kamareiy   +2 more
doaj   +1 more source

Study on the Configuration of Knowledge Hiding Behaviors in Social Q&A Community Based on FsQCA

open access: yesZhishi guanli luntan, 2022
[Purpose/significance]Knowledge hiding behavior is not only detrimental to the generation of individual knowledge, but also affects the healthy development of social Q&A communities.
Lu Xinyuan, Xu Xiaoqing, Wang Xuelin
doaj   +1 more source

Subspace Methods for Data Attack on State Estimation: A Data Driven Approach [PDF]

open access: yes, 2014
Data attacks on state estimation modify part of system measurements such that the tempered measurements cause incorrect system state estimates. Attack techniques proposed in the literature often require detailed knowledge of system parameters.
Jinsub Kim   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy