Academic literature on the topic 'Business secret'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Business secret.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Business secret":

1

Alexander, Sheryl. "Secret midwives business." Australian Journal of Midwifery 14, no. 2 (January 2001): 4. http://dx.doi.org/10.1016/s1445-4386(01)80041-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Parsons, Louise. "Secret women's business." Women and Birth 26 (October 2013): S49. http://dx.doi.org/10.1016/j.wombi.2013.08.153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Konek, Carol Wolfe. "Women's secret business." Peace Review 9, no. 4 (December 1997): 469–74. http://dx.doi.org/10.1080/10402659708426095.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gillam, Lynn. "Secret ethics business?" Monash Bioethics Review 22, no. 1 (January 2003): S52—S62. http://dx.doi.org/10.1007/bf03351387.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Putri, Fiona eriba Rahma, and Sri Maharani MTVM. "A Legal Protection On Owner Of Trade Secret On Coffe Powder Blend That Violate Trade Secret Act No 30 Of 2000." LIGAHUKUM 2, no. 1 (July 23, 2021): 87–96. http://dx.doi.org/10.33005/ligahukum.v2i1.75.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The development of business activities that are very competitive in Indonesia today has led to quite fierce business competition among the business world. Every company must have information that is kept secret from the public, usually referred to as trade secrets. This is the most important aspect for the business owner of the trade itself because the trade information owned holds commercial points and is tied to the quality of the business produced. When a company's trade confidential information is leaked, the impact will be detrimental to the company itself. Before the problem occurred, it could be seen that the government was serious when dealing with this problem and therefore the government began to formalize Law No 30 Of 2000 concerning Trade Secrets. The hope is that this will provide legal protection for trade business owners who keep the confidential nature of company trade information so that competitors are not easily owned. The purpose of this study is to provide legal protection for the owners of trading businesses. So as to reduce the form of violations of trade secrets that often occur, granting legal protection for trade business owners can be done by optimizing the implementation of Law No 30 Of 2000 concerning Trade Secrets and improving the performance of the Directorate General of Intellectual Property. The type of research applied in this study is normative juridical legal research, this research is based on legislation relating to trade secrets, namely Law No 30 Of 2000 and for the collection of data such as from legal books, legal journals, and news articles. The results of the study can be concluded that in guaranteeing a legal protection for trade secret owners there must be cooperation between several parties, not only from the Directorate General of Intellectual Property, but also from business actors, the community and law enforcement as well. In the application of Law No 30 Of 2000 concerning Trade Secrets, it should be carried out effectively, in order to reduce the form of violations of trade secrets that often occur lately among the business world.
6

Tesk, Kirk. "Trade Secrets 101." Mechanical Engineering 130, no. 10 (October 1, 2008): 36–38. http://dx.doi.org/10.1115/1.2008-oct-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This article focuses on advantages to protect intellectual property by keeping it under wraps. There are some things that just cannot keep from getting out. Probably nothing in the law breeds as many myths as trade secrets. One positive aspect of trade secrets is that they can protect things patents cannot, since the general definition of a trade secret is any information that is in some way valuable, provided that reasonable efforts are used to maintain the secret. Trade secret protection can also last indefinitely. Patents, by contrast, expire 20 years after they are filed. The problem with trade secrets begins when engineering managers rely on trade secrets without understanding their limits or use trade secrets as a fall-back business decision. Conducting regular trade secret audits is a mechanism where a trade secret specialist gains an understanding of a company’s secrets, ensures that they are sufficiently defined, and that they are adequately protected. After the product is released, its high-level functionality is no longer a trade secret, but could be protected via a patent. Marketing literature and data sheets are also no longer trade secrets because they are usually made public.
7

Friedman, David D., William M. Landes, and Richard A. Posner. "Some Economics of Trade Secret Law." Journal of Economic Perspectives 5, no. 1 (February 1, 1991): 61–72. http://dx.doi.org/10.1257/jep.5.1.61.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Despite the practical importance of trade secrets to the business community, the law of trade secrets is a neglected orphan in economic analysis. This paper sketches an approach to the economics of trade secret law that connects it more closely both to other areas of intellectual property and to broader issues in the positive economic theory of the common law.
8

MALIK, ZAKI, and ATHMAN BOUGUETTAYA. "PRESERVING TRADE SECRETS BETWEEN COMPETITORS IN B2B INTERACTIONS." International Journal of Cooperative Information Systems 14, no. 02n03 (June 2005): 265–97. http://dx.doi.org/10.1142/s0218843005001146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In this paper, we propose an approach for preserving trade secrets in B2B interactions among competitors. Customer information exchanged during Business-to-Business (B2B) collaborations is usually considered as a business asset not to be freely shared with other businesses. This customer information is in essence a business trade secret. The full automation of B2B interactions is now possible because of the wide deployment of such technologies as Web services. However, these advances also create greater opportunities for businesses in acquiring sensitive customer data from other transacting businesses, thus creating an impediment for potential B2B collaboration between competitors. This calls for techniques to protect disclosure of sensitive data. Our approach leverages psycholinguistic knowledge to perturb data to computationally impede the disclosure of privileged customer information. We present an analytical model and a set of experiments to demonstrate the robustness of the proposed techniques.
9

Widerski, Piotr. "Protection of trade secrets in polish and european legislation." ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 22, no. 2 (July 25, 2018): 58–68. http://dx.doi.org/10.5604/01.3001.0012.5316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Trade secrets are valuable business assets to all companies on the market irrespective of their size and sector. Empirical evidence prompts clear dependency between innovation and trade secret protection (Ec.europa.eu, 2013). Trade secrets represent the results of R&D investments, innovation and creativity. They are often located as the decisive element of economic advantage in business relationship. The lack of sufficient legal protection of secrets reduces confidence of business creators, researchers and innovators. A current state of protection in the EU has proven to be inadequate to create a satisfactory level of entrepreneurship. Directive 2016/943 endorses a minimum standard requirement for the EU legislation but the Member States may introduce to their own legal systems more far-reaching protection against unlawful acquisition, use or disclosure of trade secrets. Trade secrets play an important role in protecting the exchange of know-how between businesses, especially SMEs, and research institutions both within and across the borders of the internal market, in the context of research, development, and innovation. Trade secrets are one of the most commonly used forms of protection of intellectual creation and innovative know-how by businesses, yet at the same time, they are not sufficiently protected by the existing European Union legal framework.
10

Mbachu, Dulue. "A dastardly business." Index on Censorship 24, no. 4 (July 1995): 20. http://dx.doi.org/10.1177/030642209502400407.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Business secret":

1

Brands, Raina Annelise. "Secret women's business : gender stereotypes bias the perception of social networks." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hannah, David Ramsay. "An investigation of the effects of trade secret protection procedures and psychological contract violations on employees' tendencies to divulge trade secrets /." Digital version accessible at:, 2000. http://wwwlib.umi.com/cr/utexas/main.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chui, Kit-ching, and 崔潔貞. "The secret behind the screen : a tale of Hong Kong's pawnbroking business." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2014. http://hdl.handle.net/10722/208081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
High counter top, full-height screen in front of main hall and accompanied with narrow staircase, which never see another end, pawnshop seems very mystery to everyone. Never having visited a pawnshop before, the author interviewed and tried to unfold this mysterious mask. Pawnbroking business is an interesting traditional business. It is full of old traditions and customs. Through more than eight months of research and several interviews, the author has documented and analyzed this old business in Hong Kong. Pawnbroking business is an ancient trade in the world. Although different countries have different traditions and practices, it is believed that it originated from a temple in China. It can be traced back to AD420-589. Sharing the same origin with China, Hong Kong pawnbroking business is still keeping its traditional business practices. However, little literature about the Hong Kong pawnbroking business can be found. Published documentations about the topic are not based on in-depth research. Besides, the general public and scholars tend to focus on the pawnshop building with little attention on its traditional trade. This paper aims to recognize the tangible and intangible features of pawnbroking by documentation of a traditional pawnshop in Hong Kong. Through the understanding of its significance, hopefully a way to preserve this traditional trade can be determined, raising the general public’s and scholar’s attention and keeping it sustainable in the future.
published_or_final_version
Conservation
Master
Master of Science in Conservation
4

Garinot, Jean-Marie. "Le secret des affaires." Thesis, Dijon, 2011. http://www.theses.fr/2011DIJOD007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
En dépit de son importance pratique, le secret des affaires n’est guère pris en compte par le droit français. Bien que mentionné par quelques textes épars, il ne peut être qualifié de notion juridique. Face aux lacunes de notre législation, les tribunaux sont contraints d’appliquer le droit commun pour protéger les informations économiques sensibles : or, l’article 1382 du Code civil, comme les textes réprimant le vol et le recel, ne sont pas adaptés. Pourtant, comme en témoignent certains systèmes juridiques étrangers, la protection du secret est nécessaire ; il convient donc d’en rechercher les fondements. Bien que justifiée, la sauvegarde des renseignements confidentiels doit toutefois être conciliée avec les autres intérêts en présence, tels que les droits particuliers à l’information, les principes directeurs du procès, la transparence financière ou encore la liberté du travail. Le but de cette étude est donc de cerner la notion de secret des affaires, puis de proposer des modalités de protection, en respectant les intérêts des tiers
Despite its practical relevance, business secrecy remains barely recognized under French law. Even if various texts refer to that concept, it cannot be considered as a legal concept under French law. In order to face the defects of our law, courts are bound to apply ordinary law to guarantee the protection of sensitive business information. However, applying article 1382 of the French civil code (torts) as well as referring to the concepts of robbery or handling (criminal law) are inappropriate solutions. Nevertheless, some foreign legal systems have demonstrated that protecting business secrecy was necessary. Therefore, our study will seek the grounds of that need for protection. Protecting confidential data, although justified, must be compatible with other key principles: individual rights to information, civil trial practice standards, financial transparency or freedom of work. Thus, the purpose of that study is to delimitate the concept of business secrecy before suggesting new measures to protect it while preserving third parties beneficiaries
5

Kim, Michelle. "Cracking the Hollywood Formula: The Secret Powers of the Superhero Franchise." Scholarship @ Claremont, 2012. http://scholarship.claremont.edu/cmc_theses/396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
There are many perceived advantages of developing a film from a comic book series such as its preexisting built-in audiences, easy marketability, licensing opportunities of comic book characters, and easily adaptable stories. All these qualities make the comic book conducive to film adaptation and profitable franchises. Studios have also taken notice and have been producing comic book inspired films in record numbers in the past decade. This thesis will investigate the comic book-to-film phenomena and will attempt to quantify whether it is in fact as lucrative as it appears. In order to quantify the effect of the comic book variable on film's success, this study will utilize the ordinary least squares method. By regressing the comic variable along with all other control variables, we hope to determine if the effect of the comic variable varies between two different measures of success.
6

Azizi, Farnoush, and XiLu Wang. "Your secret weapon to achieve E-Loyalty : A Quantitative Study On Antecedents Leading To E-loyalty." Thesis, Linnéuniversitetet, Institutionen för marknadsföring (MF), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-76083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
With the rise of e-commerce, more and more retailers switch the focus to online environment. In order to gain customers’ e-loyalty, e-retailers have to pay more attention to e-loyalty itself and its antecedents. To help practitioners and academicians better understand e-loyalty, theory of e-satisfaction, e-trust and perceived value were introduced in this thesis. A conceptual model was structured to further explain the relationships towards e-loyalty. The purpose of this thesis is to explain the relationship of e-loyalty and its antecedents (e-satisfaction, e-trust and perceived value) and identify the strongest antecedent leading to e-loyalty.
7

Atkins, Matthew. "What is the purpose of the ongoing use of fiduciary duties in English business law, with particular reference to breaches of duty in relation to bribery, secret profits, conflicts of interest and unconscionability?" Thesis, Lancaster University, 2018. http://eprints.lancs.ac.uk/127025/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tassabehji, Rana. "Secure use of the Internet by business." Thesis, University of Salford, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.366312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Čech, Petr. "Konkurenční strategie firmy." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2010. http://www.nusl.cz/ntk/nusl-222473.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The aim of the diploma thesis is to create competitive strategy of a middle-size company working in mechanical industry. The thesis analysis the current state and the internal factors of the analyzed firm with respect to the external factors. The competitive strategy and its implementation are suggested on the base of defined firm´s target and competitive advantages.
10

Argyropoulos, Nikolaos. "Designing secure business processes from organisational goal models." Thesis, University of Brighton, 2018. https://research.brighton.ac.uk/en/studentTheses/6aca6ecc-0073-48dd-a781-6cb66de28272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Business processes are essential instruments used for the coordination of organisational activities in order to produce value in the form of products and services. Information security is an important non-functional characteristic of business processes due to the involvement of sensitive data exchanged between their participants. Therefore, potential security shortfalls can severely impact organisational reputation, customer trust and cause compliance issues. Nevertheless, despite its importance, security is often considered as a technical concern and treated as an afterthought during the design of information systems and the business processes which they support. The consideration of security during the early design stages of information systems is highly beneficial. Goal-oriented security requirements engineering approaches can contribute to the early elicitation of system requirements at a high level of abstraction and capture the organisational context and rationale behind design choices. Aligning such requirements with process activities at the operational level augments the traceability between system models of different abstraction levels and leads to more robust and context-aware operationalisations of security. Therefore, there needs to be a well-defined and verifiable interconnection between a system’s security requirements and its business process models. This work introduces a framework for the design of secure business process models. It uses security-oriented goal models as its starting point to capture a socio-technical view of the system to-be and its security requirements during its early design stages. Concept mappings and model transformation rules are also introduced as a structured way of extracting business process skeletons from such goal models, in order to facilitate the alignment between the two different levels of abstraction. The extracted business process skeletons, are refined to complete business process models through the use of a set of security patterns, which standardise proven solutions to recurring security problems. Finally, the framework also offers security verification capabilities of the produced process models through the introduction of security-related attributes and model checking algorithms. Evaluation of this work is performed: (i) through individual evaluation of its components via their application in real-life systems, (ii) a workshop-based modelling exercise where participants used and evaluated parts of the framework and (iii) a case study from the public administration domain where the overall framework was applied in cooperation with stakeholders of the studied system. The evaluation indicated that the developed framework provides a structured approach which supports stakeholders in designing and evaluating secure business process models.

Books on the topic "Business secret":

1

Elizabeth, Coleman. Secret bridesmaids' business. Sydney: Currency Press in association with Playbox Theatre Centre, Monash University, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hogan, Kevin. The Secret Language of Business. New York: John Wiley & Sons, Ltd., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hogan, Kevin. The Secret Language of Business. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2008. http://dx.doi.org/10.1002/9781118257845.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cates, W. R. Don't Keep Me A Secret. New York: McGraw-Hill, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cates, W. R. Don't keep me a secret. New York: McGraw-Hill, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fleet, Bruce. The Solomon Secret. New York: Penguin USA, Inc., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Joseph, Epstein. Ambition, the secret passion. Chicago: Elephant Paperbacks, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Albrecht, Steven. Service, service, service: The growing business' secret weapon. Holbrook, Massachusetts: Bob Adams, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chu, Yiu-Kong. The Triads as Business. London: Taylor & Francis Group Plc, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Walker, T. J. TJ Walker's secret to foolproof presentations. Austin, TX: Green Leaf Book Group Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Business secret":

1

Josef, Alex, Alex Van Lepp, and Marshal Carper. "The Secret Economy of Steam Wishlists." In The Business of Indie Games, 37–42. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003215264-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jones, Jan. "Your Executive Assistant Is Your Secret Weapon and Business Partner." In The CEO’s Secret Weapon, 13–33. New York: Palgrave Macmillan US, 2015. http://dx.doi.org/10.1007/978-1-137-44424-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Norton, Paley. "Employment of Secret Agents." In Timeless Leadership Truths: The Origins and Applications of Business Strategy, 90–95. 1 Edition. | New York : Routledge, [2020]: Productivity Press, 2019. http://dx.doi.org/10.4324/9780429317163-17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lee, Byoungcheon, Kim-Kwang Raymond Choo, Jeongmo Yang, and Seungjae Yoo. "Secret Signatures: How to Achieve Business Privacy Efficiently?" In Information Security Applications, 30–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77535-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Romaniello, Matthew P. "‘This whole business should be kept very Secret’." In Commercial Cosmopolitanism?, 92–107. Milton Park, Abingdon, Oxon; New York, NY: Routledge, 2021.: Routledge, 2021. http://dx.doi.org/10.4324/9781003028871-5-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Catrina, Octavian. "Evaluation of Floating-Point Arithmetic Protocols Based on Shamir Secret Sharing." In E-Business and Telecommunications, 108–31. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52686-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Koslowski, Peter. "The “Banking Secret”, the Right to Privacy, and the Banks’ Duty to Confidentiality." In Issues in Business Ethics, 105–16. Dordrecht: Springer Netherlands, 2011. http://dx.doi.org/10.1007/978-94-007-0656-9_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bockmann, Johannes O. "Determinants of Trade with Sub-Saharan Africa: The Secret of German Companies’ Success." In Frontiers in African Business Research, 207–35. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-4451-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rehn, Alf. "From ‘My First Business Day’ to ‘The Secret Millionaire’s Club’." In The Management of Everyday Life, 149–63. London: Macmillan Education UK, 2009. http://dx.doi.org/10.1007/978-1-137-08344-9_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hsiang, Tzu-Wei. "Top Secret: Hacking and Fraud Detection in Business Emails of a Taiwanese Company." In Email Discourse Among Chinese Using English as a Lingua Franca, 285–96. Singapore: Springer Singapore, 2015. http://dx.doi.org/10.1007/978-981-287-888-5_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Business secret":

1

Imai, Takato, and Keiichi Iwamura. "Secret Verification Method Suitable for the Asymmetric Secret Sharing Scheme." In 16th International Conference on e-Business. SCITEPRESS - Science and Technology Publications, 2019. http://dx.doi.org/10.5220/0007958201720179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Arslan, Çetin, and Didar Özdemir. "The Protection of Confidential Business Information by Criminal Law." In International Conference on Eurasian Economies. Eurasian Economists Association, 2017. http://dx.doi.org/10.36880/c08.01824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Turkish Penal Code (TPC) no.5237 embodies “the reveal of confidential business information and documents” as a crime. However, neither article 6 of the TPC titled “definitions” nor the legal justification of the article contains the definition of the confidential business information or commercial secret. The abrogated Turkish Commercial Code no.6762 disposes the reveal of this kind of information as an act of unfair competition. In a similar vein, the current Turkish Commercial Code no.6102 assumes the illegal acquisition and the reveal of business secrets as acts of unfair competition and subjects them to criminal sanction. Also the article 562 of the TCC no.6102 disposes that if the auditors reveal the confidential business information of the auditee company, they are punished according to the article 239 of the TPC. The Proposal of Code on Business, Bank and Client Secrets refers to the article 239 of the TPC in case of the violation of the confidentiality obligation. Finally, the Act of the Protection of Competition no.4054 brings a confidentiality obligation for the Council and staff members. In this study, we will try to explain first the notion of confidential business information or commercial secret, then the penal norms about the confidential business information and the confidentiality obligation and last, the elements of the crime disposed in the article 239 of the TPC which is referred by most of the other penal norms in this respect.
3

Feng, Yi. "Victoria's Secret Performance Report 2019." In ICSEB 2019: 2019 The 3rd International Conference on Software and e-Business. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3374549.3374585.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Da-wei, and Geng Yang. "An Identity-Based Rational Secret Sharing Scheme." In 2010 International Conference on E-Business and E-Government (ICEE). IEEE, 2010. http://dx.doi.org/10.1109/icee.2010.330.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ermakova, Tatiana, and Benjamin Fabian. "Secret Sharing for Health Data in Multi-provider Clouds." In 2013 IEEE 15th Conference on Business Informatics (CBI). IEEE, 2013. http://dx.doi.org/10.1109/cbi.2013.22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"SECRET LOCKING: EXPLORING NEW APPROACHES TO BIOMETRIC KEY ENCAPSULATION." In 2nd International Conference on E-business and Telecommunication Networks. SciTePress - Science and and Technology Publications, 2005. http://dx.doi.org/10.5220/0001408002540261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Weicong Wang, Zhihui Li, and Yun Song. "The optimal information rate of perfect secret sharing schemes." In 2011 International Conference on Business Management and Electronic Information (BMEI). IEEE, 2011. http://dx.doi.org/10.1109/icbmei.2011.5917883.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

He, Jun, Lijuan Li, Ximei Li, and Chunming Tang. "Verifiable Multi-Secret Sharing Schemes from Homogeneous Linear Recursion." In 2010 2nd International Conference on E-business and Information System Security (EBISS 2010). IEEE, 2010. http://dx.doi.org/10.1109/ebiss.2010.5473686.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Raza, Agha Haider, and Krishnadas Nanath. "Predicting a Hit Song with Machine Learning: Is there an apriori secret formula?" In 2020 International Conference on Data Science, Artificial Intelligence, and Business Analytics (DATABIA). IEEE, 2020. http://dx.doi.org/10.1109/databia50434.2020.9190613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Olalia, Romulo L., Ariel M. Sison, and Ruji P. Medina. "Security Assessment of Brute-Force Attack to Subset Sum-Based Verifiable Secret Sharing Scheme." In ICIBE' 18: 2018 4th International Conference on Industrial and Business Engineering. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3288155.3288190.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Business secret":

1

Bickett-Weddle, Danelle. Secure Milk Supply (SMS) Plan for Continuity of Business. Ames (Iowa): Iowa State University, January 2018. http://dx.doi.org/10.31274/ans_air-180814-395.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Harding, T., R. Drummond, and C. Shih. MIME-based Secure Peer-to-Peer Business Data Interchange over the Internet. RFC Editor, September 2002. http://dx.doi.org/10.17487/rfc3335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Harding, T., and R. Scott. FTP Transport for Secure Peer-to-Peer Business Data Interchange over the Internet. RFC Editor, April 2007. http://dx.doi.org/10.17487/rfc4823.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Moberg, D., and R. Drummond. MIME-Based Secure Peer-to-Peer Business Data Interchange Using HTTP, Applicability Statement 2 (AS2). RFC Editor, July 2005. http://dx.doi.org/10.17487/rfc4130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Flagg, Melissa, and Zachary Arnold. A New Institutional Approach to Research Security in the United States: Defending a Diverse R&D Ecosystem. Center for Security and Emerging Technology, January 2021. http://dx.doi.org/10.51593/20200051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
U.S. research security requires trust and collaboration between those conducting R&D and the federal government. Most R&D takes place in the private sector, outside of government authority and control, and researchers are wary of federal government or law enforcement involvement in their work. Despite these challenges, as adversaries work to extract science, technology, data and know-how from the United States, the U.S. government is pursuing an ambitious research security initiative. In order to secure the 78 percent of U.S. R&D funded outside the government, authors Melissa Flagg and Zachary Arnold propose a new, public-private research security clearinghouse, with leadership from academia, business, philanthropy, and government and a presence in the most active R&D hubs across the United States.
6

Wøien Meijer, Mari, and Alberto Giacometti. Nordic border communities in the time of COVID-19. Nordregio, May 2021. http://dx.doi.org/10.6027/pb2021:3.2001-3876.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Re-building cross-border collaboration will be vital after the COVID-19 crisis to secure resilient border communities and Nordic collaboration. The measures to limit the spread of the COVID-19 virus were disproportionally damaging for border communities. Healing the wounds inflicted on society, business and institutions demand coordinated actions at local, national, and Nordic levels. This policy brief gives a brief overview of the impact of border restrictions on border communities during the first nine months of the COVID-19 pandemic. The social and economic implications of closed borders have exposed the fragility of Nordic co-operation. The ability of border areas to exist side-by-side in an integrated, seamless way corresponds to the Nordic vision of being the most integrated region in the world, but the situation that unfolded shows a different story.
7

Resilient by Nature: Increasing Private Sector Uptake of Nature-based Solutions for Climate-resilient Infrastructure: A Market Assessment for Latin America and the Caribbean. Inter-American Development Bank, October 2021. http://dx.doi.org/10.18235/0003711.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Climate change is one of the greatest challenges facing humanity affecting our ability to deliver energy, transport, logistics, water, sanitation, and communications services. Investment for climate-resilient infrastructure is at the core of the IDB Groups agenda. In particular, nature-based Solutions (NbS) are a cost-effective way to build infrastructure resilient to climate change while delivering societal benefits. As many LAC governments and businesses are unaware of the opportunities and cost-efficiencies of NbS, setting out the business case for these solutions is an important first step to build support and secure funding. This Market Assessment examines how NbS can contribute to climate-resilient infrastructure through the protection, management, and restoration of natural capital. It examines existing barriers and the opportunities to increase private sector use of NbS focusing on the role of policy in NbS uptake; awareness, governance, and capacity; technical tools and skills to deliver NbS; and finance and funding. It provides recommendations for infrastructure project developers and operators, financial institutions, and policymakers to create a more enabling environment for NbS in LAC.

To the bibliography