Results 281 to 290 of about 48,023,182 (329)
Some of the next articles are maybe not open access.
2019
Secrecy and deception are under-explored in sociology. Secrecy may be considered negatively in contrast to the more positive status of privacy, yet boundaries between them can be blurred. These issues provide a backdrop for a discussion on problems in studying the state, with attention to Laura Nader’s call for ‘studying-up’ of powerful groups in ...
openaire +1 more source
Secrecy and deception are under-explored in sociology. Secrecy may be considered negatively in contrast to the more positive status of privacy, yet boundaries between them can be blurred. These issues provide a backdrop for a discussion on problems in studying the state, with attention to Laura Nader’s call for ‘studying-up’ of powerful groups in ...
openaire +1 more source
, 2020
Despite the welcome turn within security studies towards a more material- and practice-oriented understanding of state secrecy, the ways in which security actors experience, practise and negotiate secrecy in their everyday work lives has been rather ...
W. Walters
semanticscholar +1 more source
Despite the welcome turn within security studies towards a more material- and practice-oriented understanding of state secrecy, the ways in which security actors experience, practise and negotiate secrecy in their everyday work lives has been rather ...
W. Walters
semanticscholar +1 more source
Secrecy Rate Analysis Against Aerial Eavesdropper
IEEE Transactions on Communications, 2019This paper studies the threat that an aerial eavesdropper can pose to terrestrial wireless communications, from an information-theoretic point of view.
Xin Yuan +5 more
semanticscholar +1 more source
Exact secrecy throughput capacity study in mobile ad hoc networks
Ad Hoc Networks, 2018Abstract The secrecy throughput capacity (STC) performance study of mobile ad hoc networks (MANETs) is critical for supporting their applications in security-sensitive scenarios. Despite much work on the scaling law results of MANET STC, the exact STC study of such networks remains an open problem.
Xiaochen Li +4 more
openaire +1 more source
Secrecy and the force of truth: countering post-truth regimes
Cultural Studies, 2018Post-truth regimes are disconcerting to the extent that they confuse the distinction between true and false and thus obfuscate and obstruct political debate.
Susanne Krasmann
semanticscholar +1 more source
Pay Secrecy versus Pay Disclosure for Salesmen: A Longitudinal Study
Journal of Marketing Research, 1978On the basis of a “before-after with control group” experimental design, empirical evidence is provided that shows the amount of information disclosed about pay had a major impact on salesmen's performance and job satisfaction.
Charles M. Futrell, Omer C. Jenkins
openaire +1 more source
Strictly positive secrecy of IoT: A case study involving correlated eavesdroppers
MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM), 2017The evaluation of an IoMT system needs to include the assessment of LPI, LPE, or LPD. To provide a building block for these metrics, in this paper, we introduce the notion of the information-theoretic secrecy. In particular, we focus on the shadowing fading with the log-normal distribution.
openaire +1 more source
The Torment of Secrecy: Ethical and Epistemological Problems in the Study of Esoteric Traditions
History of Religions, 1998L'A. propose une strategie alternative pour l'analyse des traditions religieuses esoteriques. Dans la plupart des cas, il peut etre plus utile d'analyser le caractere secret en terme de forme et de tactique plutot que de contenu. Le secret est une strategie de discours specifique et un mecanisme de production de valeur symbolique.
openaire +1 more source
Journal of Personality and Social Psychology, 2017
M. Slepian, Jinseok S. Chun, M. Mason
semanticscholar +1 more source
M. Slepian, Jinseok S. Chun, M. Mason
semanticscholar +1 more source

