Academic literature on the topic 'Business secret'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Business secret.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Business secret"
Alexander, Sheryl. "Secret midwives business." Australian Journal of Midwifery 14, no. 2 (January 2001): 4. http://dx.doi.org/10.1016/s1445-4386(01)80041-0.
Full textParsons, Louise. "Secret women's business." Women and Birth 26 (October 2013): S49. http://dx.doi.org/10.1016/j.wombi.2013.08.153.
Full textKonek, Carol Wolfe. "Women's secret business." Peace Review 9, no. 4 (December 1997): 469–74. http://dx.doi.org/10.1080/10402659708426095.
Full textGillam, Lynn. "Secret ethics business?" Monash Bioethics Review 22, no. 1 (January 2003): S52—S62. http://dx.doi.org/10.1007/bf03351387.
Full textPutri, Fiona eriba Rahma, and Sri Maharani MTVM. "A Legal Protection On Owner Of Trade Secret On Coffe Powder Blend That Violate Trade Secret Act No 30 Of 2000." LIGAHUKUM 2, no. 1 (July 23, 2021): 87–96. http://dx.doi.org/10.33005/ligahukum.v2i1.75.
Full textTesk, Kirk. "Trade Secrets 101." Mechanical Engineering 130, no. 10 (October 1, 2008): 36–38. http://dx.doi.org/10.1115/1.2008-oct-4.
Full textFriedman, David D., William M. Landes, and Richard A. Posner. "Some Economics of Trade Secret Law." Journal of Economic Perspectives 5, no. 1 (February 1, 1991): 61–72. http://dx.doi.org/10.1257/jep.5.1.61.
Full textMALIK, ZAKI, and ATHMAN BOUGUETTAYA. "PRESERVING TRADE SECRETS BETWEEN COMPETITORS IN B2B INTERACTIONS." International Journal of Cooperative Information Systems 14, no. 02n03 (June 2005): 265–97. http://dx.doi.org/10.1142/s0218843005001146.
Full textWiderski, Piotr. "Protection of trade secrets in polish and european legislation." ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 22, no. 2 (July 25, 2018): 58–68. http://dx.doi.org/10.5604/01.3001.0012.5316.
Full textMbachu, Dulue. "A dastardly business." Index on Censorship 24, no. 4 (July 1995): 20. http://dx.doi.org/10.1177/030642209502400407.
Full textDissertations / Theses on the topic "Business secret"
Brands, Raina Annelise. "Secret women's business : gender stereotypes bias the perception of social networks." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609422.
Full textHannah, David Ramsay. "An investigation of the effects of trade secret protection procedures and psychological contract violations on employees' tendencies to divulge trade secrets /." Digital version accessible at:, 2000. http://wwwlib.umi.com/cr/utexas/main.
Full textChui, Kit-ching, and 崔潔貞. "The secret behind the screen : a tale of Hong Kong's pawnbroking business." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2014. http://hdl.handle.net/10722/208081.
Full textpublished_or_final_version
Conservation
Master
Master of Science in Conservation
Garinot, Jean-Marie. "Le secret des affaires." Thesis, Dijon, 2011. http://www.theses.fr/2011DIJOD007.
Full textDespite its practical relevance, business secrecy remains barely recognized under French law. Even if various texts refer to that concept, it cannot be considered as a legal concept under French law. In order to face the defects of our law, courts are bound to apply ordinary law to guarantee the protection of sensitive business information. However, applying article 1382 of the French civil code (torts) as well as referring to the concepts of robbery or handling (criminal law) are inappropriate solutions. Nevertheless, some foreign legal systems have demonstrated that protecting business secrecy was necessary. Therefore, our study will seek the grounds of that need for protection. Protecting confidential data, although justified, must be compatible with other key principles: individual rights to information, civil trial practice standards, financial transparency or freedom of work. Thus, the purpose of that study is to delimitate the concept of business secrecy before suggesting new measures to protect it while preserving third parties beneficiaries
Kim, Michelle. "Cracking the Hollywood Formula: The Secret Powers of the Superhero Franchise." Scholarship @ Claremont, 2012. http://scholarship.claremont.edu/cmc_theses/396.
Full textAzizi, Farnoush, and XiLu Wang. "Your secret weapon to achieve E-Loyalty : A Quantitative Study On Antecedents Leading To E-loyalty." Thesis, Linnéuniversitetet, Institutionen för marknadsföring (MF), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-76083.
Full textAtkins, Matthew. "What is the purpose of the ongoing use of fiduciary duties in English business law, with particular reference to breaches of duty in relation to bribery, secret profits, conflicts of interest and unconscionability?" Thesis, Lancaster University, 2018. http://eprints.lancs.ac.uk/127025/.
Full textTassabehji, Rana. "Secure use of the Internet by business." Thesis, University of Salford, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.366312.
Full textČech, Petr. "Konkurenční strategie firmy." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2010. http://www.nusl.cz/ntk/nusl-222473.
Full textArgyropoulos, Nikolaos. "Designing secure business processes from organisational goal models." Thesis, University of Brighton, 2018. https://research.brighton.ac.uk/en/studentTheses/6aca6ecc-0073-48dd-a781-6cb66de28272.
Full textBooks on the topic "Business secret"
Elizabeth, Coleman. Secret bridesmaids' business. Sydney: Currency Press in association with Playbox Theatre Centre, Monash University, 1999.
Find full textHogan, Kevin. The Secret Language of Business. New York: John Wiley & Sons, Ltd., 2008.
Find full textHogan, Kevin. The Secret Language of Business. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2008. http://dx.doi.org/10.1002/9781118257845.
Full textAlbrecht, Steven. Service, service, service: The growing business' secret weapon. Holbrook, Massachusetts: Bob Adams, 1995.
Find full textJess, Todtfeld, ed. TJ Walker's secret to foolproof presentations. Austin, TX: Green Leaf Book Group Press, 2009.
Find full textBook chapters on the topic "Business secret"
Josef, Alex, Alex Van Lepp, and Marshal Carper. "The Secret Economy of Steam Wishlists." In The Business of Indie Games, 37–42. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003215264-5.
Full textJones, Jan. "Your Executive Assistant Is Your Secret Weapon and Business Partner." In The CEO’s Secret Weapon, 13–33. New York: Palgrave Macmillan US, 2015. http://dx.doi.org/10.1007/978-1-137-44424-0_2.
Full textNorton, Paley. "Employment of Secret Agents." In Timeless Leadership Truths: The Origins and Applications of Business Strategy, 90–95. 1 Edition. | New York : Routledge, [2020]: Productivity Press, 2019. http://dx.doi.org/10.4324/9780429317163-17.
Full textLee, Byoungcheon, Kim-Kwang Raymond Choo, Jeongmo Yang, and Seungjae Yoo. "Secret Signatures: How to Achieve Business Privacy Efficiently?" In Information Security Applications, 30–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77535-5_3.
Full textRomaniello, Matthew P. "‘This whole business should be kept very Secret’." In Commercial Cosmopolitanism?, 92–107. Milton Park, Abingdon, Oxon; New York, NY: Routledge, 2021.: Routledge, 2021. http://dx.doi.org/10.4324/9781003028871-5-7.
Full textCatrina, Octavian. "Evaluation of Floating-Point Arithmetic Protocols Based on Shamir Secret Sharing." In E-Business and Telecommunications, 108–31. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52686-3_5.
Full textKoslowski, Peter. "The “Banking Secret”, the Right to Privacy, and the Banks’ Duty to Confidentiality." In Issues in Business Ethics, 105–16. Dordrecht: Springer Netherlands, 2011. http://dx.doi.org/10.1007/978-94-007-0656-9_8.
Full textBockmann, Johannes O. "Determinants of Trade with Sub-Saharan Africa: The Secret of German Companies’ Success." In Frontiers in African Business Research, 207–35. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-4451-9_10.
Full textRehn, Alf. "From ‘My First Business Day’ to ‘The Secret Millionaire’s Club’." In The Management of Everyday Life, 149–63. London: Macmillan Education UK, 2009. http://dx.doi.org/10.1007/978-1-137-08344-9_9.
Full textHsiang, Tzu-Wei. "Top Secret: Hacking and Fraud Detection in Business Emails of a Taiwanese Company." In Email Discourse Among Chinese Using English as a Lingua Franca, 285–96. Singapore: Springer Singapore, 2015. http://dx.doi.org/10.1007/978-981-287-888-5_13.
Full textConference papers on the topic "Business secret"
Imai, Takato, and Keiichi Iwamura. "Secret Verification Method Suitable for the Asymmetric Secret Sharing Scheme." In 16th International Conference on e-Business. SCITEPRESS - Science and Technology Publications, 2019. http://dx.doi.org/10.5220/0007958201720179.
Full textArslan, Çetin, and Didar Özdemir. "The Protection of Confidential Business Information by Criminal Law." In International Conference on Eurasian Economies. Eurasian Economists Association, 2017. http://dx.doi.org/10.36880/c08.01824.
Full textFeng, Yi. "Victoria's Secret Performance Report 2019." In ICSEB 2019: 2019 The 3rd International Conference on Software and e-Business. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3374549.3374585.
Full textLi, Da-wei, and Geng Yang. "An Identity-Based Rational Secret Sharing Scheme." In 2010 International Conference on E-Business and E-Government (ICEE). IEEE, 2010. http://dx.doi.org/10.1109/icee.2010.330.
Full textErmakova, Tatiana, and Benjamin Fabian. "Secret Sharing for Health Data in Multi-provider Clouds." In 2013 IEEE 15th Conference on Business Informatics (CBI). IEEE, 2013. http://dx.doi.org/10.1109/cbi.2013.22.
Full text"SECRET LOCKING: EXPLORING NEW APPROACHES TO BIOMETRIC KEY ENCAPSULATION." In 2nd International Conference on E-business and Telecommunication Networks. SciTePress - Science and and Technology Publications, 2005. http://dx.doi.org/10.5220/0001408002540261.
Full textWeicong Wang, Zhihui Li, and Yun Song. "The optimal information rate of perfect secret sharing schemes." In 2011 International Conference on Business Management and Electronic Information (BMEI). IEEE, 2011. http://dx.doi.org/10.1109/icbmei.2011.5917883.
Full textHe, Jun, Lijuan Li, Ximei Li, and Chunming Tang. "Verifiable Multi-Secret Sharing Schemes from Homogeneous Linear Recursion." In 2010 2nd International Conference on E-business and Information System Security (EBISS 2010). IEEE, 2010. http://dx.doi.org/10.1109/ebiss.2010.5473686.
Full textRaza, Agha Haider, and Krishnadas Nanath. "Predicting a Hit Song with Machine Learning: Is there an apriori secret formula?" In 2020 International Conference on Data Science, Artificial Intelligence, and Business Analytics (DATABIA). IEEE, 2020. http://dx.doi.org/10.1109/databia50434.2020.9190613.
Full textOlalia, Romulo L., Ariel M. Sison, and Ruji P. Medina. "Security Assessment of Brute-Force Attack to Subset Sum-Based Verifiable Secret Sharing Scheme." In ICIBE' 18: 2018 4th International Conference on Industrial and Business Engineering. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3288155.3288190.
Full textReports on the topic "Business secret"
Bickett-Weddle, Danelle. Secure Milk Supply (SMS) Plan for Continuity of Business. Ames (Iowa): Iowa State University, January 2018. http://dx.doi.org/10.31274/ans_air-180814-395.
Full textHarding, T., R. Drummond, and C. Shih. MIME-based Secure Peer-to-Peer Business Data Interchange over the Internet. RFC Editor, September 2002. http://dx.doi.org/10.17487/rfc3335.
Full textHarding, T., and R. Scott. FTP Transport for Secure Peer-to-Peer Business Data Interchange over the Internet. RFC Editor, April 2007. http://dx.doi.org/10.17487/rfc4823.
Full textMoberg, D., and R. Drummond. MIME-Based Secure Peer-to-Peer Business Data Interchange Using HTTP, Applicability Statement 2 (AS2). RFC Editor, July 2005. http://dx.doi.org/10.17487/rfc4130.
Full textFlagg, Melissa, and Zachary Arnold. A New Institutional Approach to Research Security in the United States: Defending a Diverse R&D Ecosystem. Center for Security and Emerging Technology, January 2021. http://dx.doi.org/10.51593/20200051.
Full textWøien Meijer, Mari, and Alberto Giacometti. Nordic border communities in the time of COVID-19. Nordregio, May 2021. http://dx.doi.org/10.6027/pb2021:3.2001-3876.
Full textResilient by Nature: Increasing Private Sector Uptake of Nature-based Solutions for Climate-resilient Infrastructure: A Market Assessment for Latin America and the Caribbean. Inter-American Development Bank, October 2021. http://dx.doi.org/10.18235/0003711.
Full text