Academic literature on the topic 'Business secret'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Business secret.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Business secret":
Alexander, Sheryl. "Secret midwives business." Australian Journal of Midwifery 14, no. 2 (January 2001): 4. http://dx.doi.org/10.1016/s1445-4386(01)80041-0.
Parsons, Louise. "Secret women's business." Women and Birth 26 (October 2013): S49. http://dx.doi.org/10.1016/j.wombi.2013.08.153.
Konek, Carol Wolfe. "Women's secret business." Peace Review 9, no. 4 (December 1997): 469–74. http://dx.doi.org/10.1080/10402659708426095.
Gillam, Lynn. "Secret ethics business?" Monash Bioethics Review 22, no. 1 (January 2003): S52—S62. http://dx.doi.org/10.1007/bf03351387.
Putri, Fiona eriba Rahma, and Sri Maharani MTVM. "A Legal Protection On Owner Of Trade Secret On Coffe Powder Blend That Violate Trade Secret Act No 30 Of 2000." LIGAHUKUM 2, no. 1 (July 23, 2021): 87–96. http://dx.doi.org/10.33005/ligahukum.v2i1.75.
Tesk, Kirk. "Trade Secrets 101." Mechanical Engineering 130, no. 10 (October 1, 2008): 36–38. http://dx.doi.org/10.1115/1.2008-oct-4.
Friedman, David D., William M. Landes, and Richard A. Posner. "Some Economics of Trade Secret Law." Journal of Economic Perspectives 5, no. 1 (February 1, 1991): 61–72. http://dx.doi.org/10.1257/jep.5.1.61.
MALIK, ZAKI, and ATHMAN BOUGUETTAYA. "PRESERVING TRADE SECRETS BETWEEN COMPETITORS IN B2B INTERACTIONS." International Journal of Cooperative Information Systems 14, no. 02n03 (June 2005): 265–97. http://dx.doi.org/10.1142/s0218843005001146.
Widerski, Piotr. "Protection of trade secrets in polish and european legislation." ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 22, no. 2 (July 25, 2018): 58–68. http://dx.doi.org/10.5604/01.3001.0012.5316.
Mbachu, Dulue. "A dastardly business." Index on Censorship 24, no. 4 (July 1995): 20. http://dx.doi.org/10.1177/030642209502400407.
Dissertations / Theses on the topic "Business secret":
Brands, Raina Annelise. "Secret women's business : gender stereotypes bias the perception of social networks." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609422.
Hannah, David Ramsay. "An investigation of the effects of trade secret protection procedures and psychological contract violations on employees' tendencies to divulge trade secrets /." Digital version accessible at:, 2000. http://wwwlib.umi.com/cr/utexas/main.
Chui, Kit-ching, and 崔潔貞. "The secret behind the screen : a tale of Hong Kong's pawnbroking business." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2014. http://hdl.handle.net/10722/208081.
published_or_final_version
Conservation
Master
Master of Science in Conservation
Garinot, Jean-Marie. "Le secret des affaires." Thesis, Dijon, 2011. http://www.theses.fr/2011DIJOD007.
Despite its practical relevance, business secrecy remains barely recognized under French law. Even if various texts refer to that concept, it cannot be considered as a legal concept under French law. In order to face the defects of our law, courts are bound to apply ordinary law to guarantee the protection of sensitive business information. However, applying article 1382 of the French civil code (torts) as well as referring to the concepts of robbery or handling (criminal law) are inappropriate solutions. Nevertheless, some foreign legal systems have demonstrated that protecting business secrecy was necessary. Therefore, our study will seek the grounds of that need for protection. Protecting confidential data, although justified, must be compatible with other key principles: individual rights to information, civil trial practice standards, financial transparency or freedom of work. Thus, the purpose of that study is to delimitate the concept of business secrecy before suggesting new measures to protect it while preserving third parties beneficiaries
Kim, Michelle. "Cracking the Hollywood Formula: The Secret Powers of the Superhero Franchise." Scholarship @ Claremont, 2012. http://scholarship.claremont.edu/cmc_theses/396.
Azizi, Farnoush, and XiLu Wang. "Your secret weapon to achieve E-Loyalty : A Quantitative Study On Antecedents Leading To E-loyalty." Thesis, Linnéuniversitetet, Institutionen för marknadsföring (MF), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-76083.
Atkins, Matthew. "What is the purpose of the ongoing use of fiduciary duties in English business law, with particular reference to breaches of duty in relation to bribery, secret profits, conflicts of interest and unconscionability?" Thesis, Lancaster University, 2018. http://eprints.lancs.ac.uk/127025/.
Tassabehji, Rana. "Secure use of the Internet by business." Thesis, University of Salford, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.366312.
Čech, Petr. "Konkurenční strategie firmy." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2010. http://www.nusl.cz/ntk/nusl-222473.
Argyropoulos, Nikolaos. "Designing secure business processes from organisational goal models." Thesis, University of Brighton, 2018. https://research.brighton.ac.uk/en/studentTheses/6aca6ecc-0073-48dd-a781-6cb66de28272.
Books on the topic "Business secret":
Elizabeth, Coleman. Secret bridesmaids' business. Sydney: Currency Press in association with Playbox Theatre Centre, Monash University, 1999.
Hogan, Kevin. The Secret Language of Business. New York: John Wiley & Sons, Ltd., 2008.
Hogan, Kevin. The Secret Language of Business. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2008. http://dx.doi.org/10.1002/9781118257845.
Cates, W. R. Don't Keep Me A Secret. New York: McGraw-Hill, 2007.
Cates, W. R. Don't keep me a secret. New York: McGraw-Hill, 2008.
Fleet, Bruce. The Solomon Secret. New York: Penguin USA, Inc., 2009.
Joseph, Epstein. Ambition, the secret passion. Chicago: Elephant Paperbacks, 1989.
Albrecht, Steven. Service, service, service: The growing business' secret weapon. Holbrook, Massachusetts: Bob Adams, 1995.
Chu, Yiu-Kong. The Triads as Business. London: Taylor & Francis Group Plc, 2003.
Walker, T. J. TJ Walker's secret to foolproof presentations. Austin, TX: Green Leaf Book Group Press, 2009.
Book chapters on the topic "Business secret":
Josef, Alex, Alex Van Lepp, and Marshal Carper. "The Secret Economy of Steam Wishlists." In The Business of Indie Games, 37–42. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003215264-5.
Jones, Jan. "Your Executive Assistant Is Your Secret Weapon and Business Partner." In The CEO’s Secret Weapon, 13–33. New York: Palgrave Macmillan US, 2015. http://dx.doi.org/10.1007/978-1-137-44424-0_2.
Norton, Paley. "Employment of Secret Agents." In Timeless Leadership Truths: The Origins and Applications of Business Strategy, 90–95. 1 Edition. | New York : Routledge, [2020]: Productivity Press, 2019. http://dx.doi.org/10.4324/9780429317163-17.
Lee, Byoungcheon, Kim-Kwang Raymond Choo, Jeongmo Yang, and Seungjae Yoo. "Secret Signatures: How to Achieve Business Privacy Efficiently?" In Information Security Applications, 30–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77535-5_3.
Romaniello, Matthew P. "‘This whole business should be kept very Secret’." In Commercial Cosmopolitanism?, 92–107. Milton Park, Abingdon, Oxon; New York, NY: Routledge, 2021.: Routledge, 2021. http://dx.doi.org/10.4324/9781003028871-5-7.
Catrina, Octavian. "Evaluation of Floating-Point Arithmetic Protocols Based on Shamir Secret Sharing." In E-Business and Telecommunications, 108–31. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52686-3_5.
Koslowski, Peter. "The “Banking Secret”, the Right to Privacy, and the Banks’ Duty to Confidentiality." In Issues in Business Ethics, 105–16. Dordrecht: Springer Netherlands, 2011. http://dx.doi.org/10.1007/978-94-007-0656-9_8.
Bockmann, Johannes O. "Determinants of Trade with Sub-Saharan Africa: The Secret of German Companies’ Success." In Frontiers in African Business Research, 207–35. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-4451-9_10.
Rehn, Alf. "From ‘My First Business Day’ to ‘The Secret Millionaire’s Club’." In The Management of Everyday Life, 149–63. London: Macmillan Education UK, 2009. http://dx.doi.org/10.1007/978-1-137-08344-9_9.
Hsiang, Tzu-Wei. "Top Secret: Hacking and Fraud Detection in Business Emails of a Taiwanese Company." In Email Discourse Among Chinese Using English as a Lingua Franca, 285–96. Singapore: Springer Singapore, 2015. http://dx.doi.org/10.1007/978-981-287-888-5_13.
Conference papers on the topic "Business secret":
Imai, Takato, and Keiichi Iwamura. "Secret Verification Method Suitable for the Asymmetric Secret Sharing Scheme." In 16th International Conference on e-Business. SCITEPRESS - Science and Technology Publications, 2019. http://dx.doi.org/10.5220/0007958201720179.
Arslan, Çetin, and Didar Özdemir. "The Protection of Confidential Business Information by Criminal Law." In International Conference on Eurasian Economies. Eurasian Economists Association, 2017. http://dx.doi.org/10.36880/c08.01824.
Feng, Yi. "Victoria's Secret Performance Report 2019." In ICSEB 2019: 2019 The 3rd International Conference on Software and e-Business. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3374549.3374585.
Li, Da-wei, and Geng Yang. "An Identity-Based Rational Secret Sharing Scheme." In 2010 International Conference on E-Business and E-Government (ICEE). IEEE, 2010. http://dx.doi.org/10.1109/icee.2010.330.
Ermakova, Tatiana, and Benjamin Fabian. "Secret Sharing for Health Data in Multi-provider Clouds." In 2013 IEEE 15th Conference on Business Informatics (CBI). IEEE, 2013. http://dx.doi.org/10.1109/cbi.2013.22.
"SECRET LOCKING: EXPLORING NEW APPROACHES TO BIOMETRIC KEY ENCAPSULATION." In 2nd International Conference on E-business and Telecommunication Networks. SciTePress - Science and and Technology Publications, 2005. http://dx.doi.org/10.5220/0001408002540261.
Weicong Wang, Zhihui Li, and Yun Song. "The optimal information rate of perfect secret sharing schemes." In 2011 International Conference on Business Management and Electronic Information (BMEI). IEEE, 2011. http://dx.doi.org/10.1109/icbmei.2011.5917883.
He, Jun, Lijuan Li, Ximei Li, and Chunming Tang. "Verifiable Multi-Secret Sharing Schemes from Homogeneous Linear Recursion." In 2010 2nd International Conference on E-business and Information System Security (EBISS 2010). IEEE, 2010. http://dx.doi.org/10.1109/ebiss.2010.5473686.
Raza, Agha Haider, and Krishnadas Nanath. "Predicting a Hit Song with Machine Learning: Is there an apriori secret formula?" In 2020 International Conference on Data Science, Artificial Intelligence, and Business Analytics (DATABIA). IEEE, 2020. http://dx.doi.org/10.1109/databia50434.2020.9190613.
Olalia, Romulo L., Ariel M. Sison, and Ruji P. Medina. "Security Assessment of Brute-Force Attack to Subset Sum-Based Verifiable Secret Sharing Scheme." In ICIBE' 18: 2018 4th International Conference on Industrial and Business Engineering. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3288155.3288190.
Reports on the topic "Business secret":
Bickett-Weddle, Danelle. Secure Milk Supply (SMS) Plan for Continuity of Business. Ames (Iowa): Iowa State University, January 2018. http://dx.doi.org/10.31274/ans_air-180814-395.
Harding, T., R. Drummond, and C. Shih. MIME-based Secure Peer-to-Peer Business Data Interchange over the Internet. RFC Editor, September 2002. http://dx.doi.org/10.17487/rfc3335.
Harding, T., and R. Scott. FTP Transport for Secure Peer-to-Peer Business Data Interchange over the Internet. RFC Editor, April 2007. http://dx.doi.org/10.17487/rfc4823.
Moberg, D., and R. Drummond. MIME-Based Secure Peer-to-Peer Business Data Interchange Using HTTP, Applicability Statement 2 (AS2). RFC Editor, July 2005. http://dx.doi.org/10.17487/rfc4130.
Flagg, Melissa, and Zachary Arnold. A New Institutional Approach to Research Security in the United States: Defending a Diverse R&D Ecosystem. Center for Security and Emerging Technology, January 2021. http://dx.doi.org/10.51593/20200051.
Wøien Meijer, Mari, and Alberto Giacometti. Nordic border communities in the time of COVID-19. Nordregio, May 2021. http://dx.doi.org/10.6027/pb2021:3.2001-3876.
Resilient by Nature: Increasing Private Sector Uptake of Nature-based Solutions for Climate-resilient Infrastructure: A Market Assessment for Latin America and the Caribbean. Inter-American Development Bank, October 2021. http://dx.doi.org/10.18235/0003711.