Results 51 to 60 of about 321,049 (289)
UNDERSTANDING NARCISSISTS’ KNOWLEDGE HIDING BEHAVIOUR: A MORAL DISENGAGEMENT MECHANISM PERSPECTIVE
Purpose: Narcissistic people have a strong desire to hold focus only around themselves. Their self-love triggers them to create their monopoly and involve in deviant behavioral outcomes such as knowledge hiding.
Nasira Jabeen, Muhammad Anwar ul Haq
doaj +1 more source
Steganography: a class of secure and robust algorithms [PDF]
This research work presents a new class of non-blind information hiding algorithms that are stego-secure and robust. They are based on some finite domains iterations having the Devaney's topological chaos property.
Bahi, Jacques M. +2 more
core +4 more sources
Physical means of securing information, such as sealed envelopes and scratch cards, can be used to achieve cryptographic objectives. Reasoning about this has so far been informal.
C. Morgan +7 more
core +1 more source
Knowledge hiding from tree and graph databases
Sensitive knowledge hiding is the problem of removing sensitive knowledge from databases before publishing. The problem is extensively studied in the context of relational databases to hide frequent itemsets and association rules. Recently, sequential pattern hiding from sequential (both sequence and spatio-temporal) databases has been investigated [1].
Abul, Osman, Gokce, Harun
openaire +3 more sources
Ethical conflicts arise when there is no unity between the team members and shared ethical priorities. This study aimed to identify the relationship between ethical value unity, team knowledge hiding, the relationship between the lack of shared ethical ...
Shuo Xing
doaj +1 more source
HOW TRANSACTIONAL LEADERSHIP IMPACTS TACIT AND EXPLICIT KNOWLEDGE HIDING: THE ROLE OF PERCEIVED COMPETITION AND LEADER KNOWLEDGE HIDING [PDF]
This study investigates the role of transactional leadership as a pivotal antecedent to employee knowledge hiding, specifically focusing on tacit and explicit forms.
Kanwal Zahoor +3 more
doaj +1 more source
How Hidden Can Be Even More Hidden?
The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform.
Fraczek, Wojciech +2 more
core +1 more source
Load Hiding of Household's Power Demand [PDF]
With the development and introduction of smart metering, the energy information for costumers will change from infrequent manual meter readings to fine-grained energy consumption data.
Egarter, Dominik +2 more
core +1 more source
Automated Cryptographic Analysis of the Pedersen Commitment Scheme
Aiming for strong security assurance, recently there has been an increasing interest in formal verification of cryptographic constructions. This paper presents a mechanised formal verification of the popular Pedersen commitment protocol, proving its ...
Dong, Changyu, Metere, Roberto
core +1 more source
Knowledge hiding and knowledge hoarding: A systematic literature review
The present study aims to present a consolidated view of the quantitative research on Knowledge Hiding (KHi) and Knowledge Hoarding (Kho), and the relationship with Knowledge Sharing (KS), and propose guidelines for future research. A systematic literature review was adopted, following rigorous procedures.
Mírian Oliveira +2 more
openaire +2 more sources

