Results 71 to 80 of about 321,364 (156)
Privacy, Visibility, Transparency, and Exposure [PDF]
This essay considers the relationship between privacy and visibility in the networked information age. Visibility is an important determinant of harm to privacy, but a persistent tendency to conceptualize privacy harms and expectations in terms of ...
Cohen, Julie E.
core +2 more sources
Managed Forgetting to Support Information Management and Knowledge Work
Trends like digital transformation even intensify the already overwhelming mass of information knowledge workers face in their daily life. To counter this, we have been investigating knowledge work and information management support measures inspired by ...
Dengel, Andreas +6 more
core +1 more source
In this paper we raise questions regarding the socio-cultural aspects of knowledge hiding. Specifically, we aim to deepen understanding regarding the role that national cultural dimensions and motivation plays in stimulating or preventing knowledge ...
Katja Babič +3 more
doaj +1 more source
Execution Integrity with In-Place Encryption
Instruction set randomization (ISR) was initially proposed with the main goal of countering code-injection attacks. However, ISR seems to have lost its appeal since code-injection attacks became less attractive because protection mechanisms such as data ...
Arias, Orlando +5 more
core
The present study explains how different factors of knowledge hiding (e.g., evasive, playing dumb, and rationalized) influence on team creativity. Drawn on social exchange theory, the present study theorizes that factors of knowledge hiding have a ...
Muhammad Waseem Bari +4 more
doaj +1 more source
Consequences of top-down knowledge hiding in firms: A pilot study
While knowledge hiding has been the subject of some research in the management discipline, extant literature is scant on the consequences of top-down knowledge hiding in firms.
Atif Saleem Butt
doaj +1 more source
Transparent authentication methodology in electronic education
In the context of on-line assessment in e-learning, a problem arises when a student taking an exam may wish to cheat by handing over personal credentials to someone else to take their place in an exam, Another problem is that there is no method for ...
Argles, David +3 more
core
This paper aims to examine the personal, interpersonal, and organizational predictors of knowledge hiding behaviors in organizations. The results of a three-wave longitudinal study indicated that (i) the dark triad personality (Machiavellianism and ...
Anıl Boz Semerci +2 more
doaj +1 more source
Investigating the Antecedents of Knowledge Hiding and Reciprocation of Knowledge Hiding Behavior
Yassir Mahmood +4 more
openaire +1 more source
This research aims to explore the influencing mechanism of a caring ethical climate on knowledge-hiding behavior in large construction firms according to the reciprocity principle of social exchange theory.
Zhen Chen, Zixin Tang
doaj +1 more source

