Results 61 to 70 of about 302,884 (283)

The Influence of Career Plateau on Knowledge Hiding of Knowledge Workers [PDF]

open access: yesJournal of Business Administration Research, 2021
This study takes the cognitive-affective system theory of personality as the whole logic, integrates resource preservation theory and cooperation and competition theory to investigate the influence mechanism of Career Plateau on knowledge workers' knowledge hiding.
openaire   +1 more source

UNDERSTANDING NARCISSISTS’ KNOWLEDGE HIDING BEHAVIOUR: A MORAL DISENGAGEMENT MECHANISM PERSPECTIVE

open access: yesReviews of Management Sciences, 2021
Purpose:  Narcissistic people have a strong desire to hold focus only around themselves. Their self-love triggers them to create their monopoly and involve in deviant behavioral outcomes such as knowledge hiding.
Nasira Jabeen, Muhammad Anwar ul Haq
doaj   +1 more source

How do individuals with Williams syndrome learn a route in a real-world environment? [PDF]

open access: yes, 2009
Individuals with Williams syndrome (WS) show a specific deficit in visuo-spatial abilities. This finding, however, is mainly based on performance on small-scale laboratory-based tasks.
Allen   +46 more
core   +3 more sources

Ethical Conflict and Knowledge Hiding in Teams: Moderating Role of Workplace Friendship in Education Sector

open access: yesFrontiers in Psychology, 2022
Ethical conflicts arise when there is no unity between the team members and shared ethical priorities. This study aimed to identify the relationship between ethical value unity, team knowledge hiding, the relationship between the lack of shared ethical ...
Shuo Xing
doaj   +1 more source

Steganography: a class of secure and robust algorithms [PDF]

open access: yes, 2011
This research work presents a new class of non-blind information hiding algorithms that are stego-secure and robust. They are based on some finite domains iterations having the Devaney's topological chaos property.
Bahi, Jacques M.   +2 more
core   +4 more sources

Preventing Disclosure of Sensitive Knowledge by Hiding Inference [PDF]

open access: yesInternational Journal of Computer Applications, 2013
7 ...
T. Prabhu, M. Ravi, A. S. Syed Navaz
openaire   +3 more sources

How Hidden Can Be Even More Hidden?

open access: yes, 2011
The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform.
Fraczek, Wojciech   +2 more
core   +1 more source

Knowledge hiding from tree and graph databases

open access: yesData & Knowledge Engineering, 2012
Sensitive knowledge hiding is the problem of removing sensitive knowledge from databases before publishing. The problem is extensively studied in the context of relational databases to hide frequent itemsets and association rules. Recently, sequential pattern hiding from sequential (both sequence and spatio-temporal) databases has been investigated [1].
Abul, Osman, Gokce, Harun
openaire   +4 more sources

How to Bootstrap Anonymous Communication [PDF]

open access: yes, 2015
We ask whether it is possible to anonymously communicate a large amount of data using only public (non-anonymous) communication together with a small anonymous channel.
Fazio Nelly   +3 more
core   +2 more sources

Automated Cryptographic Analysis of the Pedersen Commitment Scheme

open access: yes, 2017
Aiming for strong security assurance, recently there has been an increasing interest in formal verification of cryptographic constructions. This paper presents a mechanised formal verification of the popular Pedersen commitment protocol, proving its ...
Dong, Changyu, Metere, Roberto
core   +1 more source

Home - About - Disclaimer - Privacy