Results 281 to 290 of about 48,023,182 (329)
Some of the next articles are maybe not open access.

Secrecy and ‘Studying-up’

2019
Secrecy and deception are under-explored in sociology. Secrecy may be considered negatively in contrast to the more positive status of privacy, yet boundaries between them can be blurred. These issues provide a backdrop for a discussion on problems in studying the state, with attention to Laura Nader’s call for ‘studying-up’ of powerful groups in ...
openaire   +1 more source

Everyday secrecy: Oral history and the social life of a top-secret weapons research establishment during the Cold War

, 2020
Despite the welcome turn within security studies towards a more material- and practice-oriented understanding of state secrecy, the ways in which security actors experience, practise and negotiate secrecy in their everyday work lives has been rather ...
W. Walters
semanticscholar   +1 more source

Secrecy Rate Analysis Against Aerial Eavesdropper

IEEE Transactions on Communications, 2019
This paper studies the threat that an aerial eavesdropper can pose to terrestrial wireless communications, from an information-theoretic point of view.
Xin Yuan   +5 more
semanticscholar   +1 more source

Exact secrecy throughput capacity study in mobile ad hoc networks

Ad Hoc Networks, 2018
Abstract The secrecy throughput capacity (STC) performance study of mobile ad hoc networks (MANETs) is critical for supporting their applications in security-sensitive scenarios. Despite much work on the scaling law results of MANET STC, the exact STC study of such networks remains an open problem.
Xiaochen Li   +4 more
openaire   +1 more source

Secrecy and the force of truth: countering post-truth regimes

Cultural Studies, 2018
Post-truth regimes are disconcerting to the extent that they confuse the distinction between true and false and thus obfuscate and obstruct political debate.
Susanne Krasmann
semanticscholar   +1 more source

Pay Secrecy versus Pay Disclosure for Salesmen: A Longitudinal Study

Journal of Marketing Research, 1978
On the basis of a “before-after with control group” experimental design, empirical evidence is provided that shows the amount of information disclosed about pay had a major impact on salesmen's performance and job satisfaction.
Charles M. Futrell, Omer C. Jenkins
openaire   +1 more source

Strictly positive secrecy of IoT: A case study involving correlated eavesdroppers

MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM), 2017
The evaluation of an IoMT system needs to include the assessment of LPI, LPE, or LPD. To provide a building block for these metrics, in this paper, we introduce the notion of the information-theoretic secrecy. In particular, we focus on the shadowing fading with the log-normal distribution.
openaire   +1 more source

The Torment of Secrecy: Ethical and Epistemological Problems in the Study of Esoteric Traditions

History of Religions, 1998
L'A. propose une strategie alternative pour l'analyse des traditions religieuses esoteriques. Dans la plupart des cas, il peut etre plus utile d'analyser le caractere secret en terme de forme et de tactique plutot que de contenu. Le secret est une strategie de discours specifique et un mecanisme de production de valeur symbolique.
openaire   +1 more source

The Experience of Secrecy

Journal of Personality and Social Psychology, 2017
M. Slepian, Jinseok S. Chun, M. Mason
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy