Results 51 to 60 of about 321,049 (289)

UNDERSTANDING NARCISSISTS’ KNOWLEDGE HIDING BEHAVIOUR: A MORAL DISENGAGEMENT MECHANISM PERSPECTIVE

open access: yesReviews of Management Sciences, 2021
Purpose:  Narcissistic people have a strong desire to hold focus only around themselves. Their self-love triggers them to create their monopoly and involve in deviant behavioral outcomes such as knowledge hiding.
Nasira Jabeen, Muhammad Anwar ul Haq
doaj   +1 more source

Steganography: a class of secure and robust algorithms [PDF]

open access: yes, 2011
This research work presents a new class of non-blind information hiding algorithms that are stego-secure and robust. They are based on some finite domains iterations having the Devaney's topological chaos property.
Bahi, Jacques M.   +2 more
core   +4 more sources

Sealed containers in Z [PDF]

open access: yes, 2014
Physical means of securing information, such as sealed envelopes and scratch cards, can be used to achieve cryptographic objectives. Reasoning about this has so far been informal.
C. Morgan   +7 more
core   +1 more source

Knowledge hiding from tree and graph databases

open access: yesData & Knowledge Engineering, 2012
Sensitive knowledge hiding is the problem of removing sensitive knowledge from databases before publishing. The problem is extensively studied in the context of relational databases to hide frequent itemsets and association rules. Recently, sequential pattern hiding from sequential (both sequence and spatio-temporal) databases has been investigated [1].
Abul, Osman, Gokce, Harun
openaire   +3 more sources

RETRACTED: Ethical Conflict and Knowledge Hiding in Teams: Moderating Role of Workplace Friendship in Education Sector

open access: yesFrontiers in Psychology, 2022
Ethical conflicts arise when there is no unity between the team members and shared ethical priorities. This study aimed to identify the relationship between ethical value unity, team knowledge hiding, the relationship between the lack of shared ethical ...
Shuo Xing
doaj   +1 more source

HOW TRANSACTIONAL LEADERSHIP IMPACTS TACIT AND EXPLICIT KNOWLEDGE HIDING: THE ROLE OF PERCEIVED COMPETITION AND LEADER KNOWLEDGE HIDING [PDF]

open access: yesJournal of Applied Structural Equation Modeling
This study investigates the role of transactional leadership as a pivotal antecedent to employee knowledge hiding, specifically focusing on tacit and explicit forms.
Kanwal Zahoor   +3 more
doaj   +1 more source

How Hidden Can Be Even More Hidden?

open access: yes, 2011
The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform.
Fraczek, Wojciech   +2 more
core   +1 more source

Load Hiding of Household's Power Demand [PDF]

open access: yes, 2014
With the development and introduction of smart metering, the energy information for costumers will change from infrequent manual meter readings to fine-grained energy consumption data.
Egarter, Dominik   +2 more
core   +1 more source

Automated Cryptographic Analysis of the Pedersen Commitment Scheme

open access: yes, 2017
Aiming for strong security assurance, recently there has been an increasing interest in formal verification of cryptographic constructions. This paper presents a mechanised formal verification of the popular Pedersen commitment protocol, proving its ...
Dong, Changyu, Metere, Roberto
core   +1 more source

Knowledge hiding and knowledge hoarding: A systematic literature review

open access: yesKnowledge and Process Management, 2021
The present study aims to present a consolidated view of the quantitative research on Knowledge Hiding (KHi) and Knowledge Hoarding (Kho), and the relationship with Knowledge Sharing (KS), and propose guidelines for future research. A systematic literature review was adopted, following rigorous procedures.
Mírian Oliveira   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy