Dissertations / Theses on the topic 'Business secret'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Business secret.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Brands, Raina Annelise. "Secret women's business : gender stereotypes bias the perception of social networks." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609422.
Full textHannah, David Ramsay. "An investigation of the effects of trade secret protection procedures and psychological contract violations on employees' tendencies to divulge trade secrets /." Digital version accessible at:, 2000. http://wwwlib.umi.com/cr/utexas/main.
Full textChui, Kit-ching, and 崔潔貞. "The secret behind the screen : a tale of Hong Kong's pawnbroking business." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2014. http://hdl.handle.net/10722/208081.
Full textpublished_or_final_version
Conservation
Master
Master of Science in Conservation
Garinot, Jean-Marie. "Le secret des affaires." Thesis, Dijon, 2011. http://www.theses.fr/2011DIJOD007.
Full textDespite its practical relevance, business secrecy remains barely recognized under French law. Even if various texts refer to that concept, it cannot be considered as a legal concept under French law. In order to face the defects of our law, courts are bound to apply ordinary law to guarantee the protection of sensitive business information. However, applying article 1382 of the French civil code (torts) as well as referring to the concepts of robbery or handling (criminal law) are inappropriate solutions. Nevertheless, some foreign legal systems have demonstrated that protecting business secrecy was necessary. Therefore, our study will seek the grounds of that need for protection. Protecting confidential data, although justified, must be compatible with other key principles: individual rights to information, civil trial practice standards, financial transparency or freedom of work. Thus, the purpose of that study is to delimitate the concept of business secrecy before suggesting new measures to protect it while preserving third parties beneficiaries
Kim, Michelle. "Cracking the Hollywood Formula: The Secret Powers of the Superhero Franchise." Scholarship @ Claremont, 2012. http://scholarship.claremont.edu/cmc_theses/396.
Full textAzizi, Farnoush, and XiLu Wang. "Your secret weapon to achieve E-Loyalty : A Quantitative Study On Antecedents Leading To E-loyalty." Thesis, Linnéuniversitetet, Institutionen för marknadsföring (MF), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-76083.
Full textAtkins, Matthew. "What is the purpose of the ongoing use of fiduciary duties in English business law, with particular reference to breaches of duty in relation to bribery, secret profits, conflicts of interest and unconscionability?" Thesis, Lancaster University, 2018. http://eprints.lancs.ac.uk/127025/.
Full textTassabehji, Rana. "Secure use of the Internet by business." Thesis, University of Salford, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.366312.
Full textČech, Petr. "Konkurenční strategie firmy." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2010. http://www.nusl.cz/ntk/nusl-222473.
Full textArgyropoulos, Nikolaos. "Designing secure business processes from organisational goal models." Thesis, University of Brighton, 2018. https://research.brighton.ac.uk/en/studentTheses/6aca6ecc-0073-48dd-a781-6cb66de28272.
Full textSadique, Kazi Masum. "Secure Mobile POS System : A point of sale application for secure financial transitions in a mobile business enviroment." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-127459.
Full textO'Neal, Matthew R., and Joshua S. Dixon. "Defense Strategic and Business case analyses for commercial products in secure mobile computing." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10773.
Full textThe Defense (DoD) lags behind commercial entities in terms of adopting mobile computing technologies. Commercial smartphones offer scalable solutions to meet requirements ranging from business functions to tactical operations; however, these solutions require considerations beyond those applicable to the commercial sector. This research identifies whether potential solutions may contribute to three objectives: 1) reduce the DoD's currently high device and service costs; 2) increase the DoD's smartphone functionality; 3) maintain or increase the level of security functionality available in commercial devices for DoD. A strategic analysis of the commercial mobile communications industry highlights the business drivers and motivations of industry participants. This information is used to identify the DoD's strategic options, which, in turn, serve as the basis of business cases for adopting future smartphone capabilities. Business case analyses compare proposed cost models with the cost models for current smartphone implementations. Results indicate growing strategic opportunities for the DoD to acquire more economical commercial handsets and more flexible network services. The business cases may potentially save billions of dollars over seven years-i.e., the estimated life cycle of cellular network equipment. Risk assessments demonstrate the strong potential for the proposed solutions to maintain handset functionality, security features, and network coverage.
Xue, Feng 1970. "A secure, anonymous and scalable digital cash system /." Thesis, McGill University, 1999. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=30773.
Full textCorris, Alexander Grosholz. "Secure Mobile Deployment of NFL Training Materials." Thesis, Nova Southeastern University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3642884.
Full textThe problem addressed is the lack of empirical research describing the delivery of individualized learning material in a secure and mobile manner. The goal was to investigate the effectiveness of deploying training materials to National Football League (NFL) players during a recent NFL season.
Over the past few seasons, NFL teams have started to deliver player training material to mobile devices. The training material is sensitive and includes planning documents for upcoming games. An effort was made to survey a representative at each of the 32 NFL teams in order to gain insight on effectiveness, security, and process. Nearly half of the league responded with 14 of the 32 franchises reporting back.
The results demonstrate that mobile devices can be an effective means to distribute educational materials to individuals in secure manner. The iPad was identified as a suitable platform for delivery of instructional material. Security elements such as encryption and using mobile security products should be strongly considered. The results are discussed in detail. A set of standards and guidelines were created based on the responses provided by club employees.
Bianco, Alessandro. "Le contrat de franchise : contribution à une analyse relationnelle." Thesis, Poitiers, 2014. http://www.theses.fr/2014POIT3012.
Full textThe franchise agreement organizes the transmission of trade secrets and business plans. Given the complex nature of this performance , the contracting parties over time become true partners , so that the franchise agreement acquires a relational dimension. Despite the existence of a relational dimension, French contract law still rule the franchise agreement using the standard cognitive model offered by classic contract theory. Such an approach risks ignoring the real problems that partners can meet , which may lead to the application of inappropriate solutions. The proposal for a relational analysis aims to reduce such a risk. Based largely on the work of the North American contract law doctrine , the relational analysis is attracting more and more French scholars especially because the proposed arguments follow the French legal system's evolution. The relational analysis allows us to understand the franchise agreement's context and propose solutions in harmony with the needs and concerns of contractual partners
Locust, Valencia Y. "Strategies Used by Women to Secure SBA's 8(a) and 504 Loan financing." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5498.
Full textDu, Rong. "Secure electronic tendering." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16606/.
Full textMIRANDA, SANDRA MARA SANTA BARBA. "IS SECRECY STILL THE SOUL OF BUSINESS?: A DISCOURSE ANALYSIS OF NATIONAL INTELLIGENCE SERVICES' HOME PAGES." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2006. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=9569@1.
Full textOs serviços nacionais de inteligência são instituições que, tradicionalmente, têm se fechado ao escrutínio público e cujas atividades são cercadas por certo mistério. Este trabalho investiga a página inicial (home page) na internet de três serviços nacionais de inteligência: o turco, o italiano e o australiano. A análise das páginas discute o discurso institucional dos serviços em duas esferas: a verbal e a visual. A análise verbal focaliza a declaração de missão/lema dessas instituições e a análise visual contempla as imagens e o layout das páginas como um todo. Como suporte teórico para a análise verbal, utiliza-se a gramática funcional de Halliday (1994). Já a análise visual se fundamenta na teoria da multimodalidade de Kress e van Leeuwen (1996). O estudo sugere que, embora a presença dos serviços nacionais de inteligência na internet possa parecer, à primeira vista, uma mudança de postura de relacionamento para com o público em geral, muito pouco é dito acerca de princípios, objetivos específicos ou métodos de atuação pelos quais se pautam essas instituições.
National intelligence services are institutions which have traditionally avoided public scrutiny and whose activities have been clothed in some mistery. This study investigates the home page of three national intelligence services: the Turkish, the Italian and the Australian. The analysis examines two aspects of the institutional discourse of the services: the verbal and the visual. The verbal analysis centers on the institutional mission statement/motto and the visual analysis focuses on images and layout of the pages as a whole. The verbal analysis is based on Halliday's functional grammar (1994) and critical discourse analysis. The verbal analysis draws on Kress and van Leeuwen's theory of multimodality (1996). The results suggest that, although the presence of national intelligence services on the internet may seem to be a step forward toward a more transparent relationship with the general public, very little is actually said about specific principles, objectives and modus operandi these institutions guide themselves.
Hardy, Jasmine Y. "Strategies to Secure Sustainable Funding for Nonprofit Organizations." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4632.
Full textZajac, Michal. "La sélection des projets innovants : les critères mis en oeuvre par les investisseurs en capital dans le secteur du numérique." Paris 13, 2013. http://scbd-sto.univ-paris13.fr/secure/ederasme_th_2013_zajac.pdf.
Full textWe study the selection criteria of Venture Capitalists and Business Angels. In order to take into account the complexity of the selection process, we propose a new theoretical model of the economic incentives to think. We first show that, if thinking has an opportunity cost, a rational investor will tend to use simplistic and biased heuristics when analyzing the surrounding universe. We then apply this result to the case of venture capital and show that the selection criteria will be subjective and biased. We thus succeed in creating a model of human thinking that not only gives rise to classical cognitive biases, like the confirmation bias and categorical thinking, but also predicts the existence of new biases, such as “limited patience” and “ignorance aversion”. We then test empirically our hypotheses, by analyzing the selection criteria of a sample of fifty French Venture Capitalists and Business Angels. We show that their criteria are highly heterogeneous and are based upon subjective ways of analyzing the surrounding universe. In particular, we confirm our theoretical insights that selection criteria are fraught with cognitive biases, including “limited patience” and “ignorance aversion”
Bou, Abdo Jacques. "Efficient and secure mobile cloud networking." Thesis, Paris 6, 2014. http://www.theses.fr/2014PA066551.
Full textMobile cloud computing is a very strong candidate for the title "Next Generation Network" which empowers mobile users with extended mobility, service continuity and superior performance. Users can expect to execute their jobs faster, with lower battery consumption and affordable prices; however this is not always the case. Various mobile applications have been developed to take advantage of this new technology, but each application has its own requirements. Several mobile cloud architectures have been proposed but none was suitable for all mobile applications which resulted in lower customer satisfaction. In addition to that, the absence of a valid business model to motivate investors hindered its deployment on production scale. This dissertation proposes a new mobile cloud architecture which positions the mobile operator at the core of this technology equipped with a revenue-making business model. This architecture, named OCMCA (Operator Centric Mobile Cloud Architecture), connects the user from one side and the Cloud Service Provider (CSP) from the other and hosts a cloud within its network. The OCMCA/user connection can utilize multicast channels leading to a much cheaper service for the users and more revenues, lower congestion and rejection rates for the operator. The OCMCA/CSP connection is based on federation, thus a user who has been registered with any CSP, can request her environment to be offloaded to the mobile operator's hosted cloud in order to receive all OCMCA's services and benefits
Adia, Ibrahim. "Strategies to Secure Sustainable Funding for the Successful Conclusion of Infrastructure Projects." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7581.
Full textLipkins, Lisa. "Strategies Used by African American Women to Secure Financial Capital to Start New Businesses." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7936.
Full textLi, Weifeng, and Weifeng Li. "Towards Secure and Trustworthy Cyberspace: Social Media Analytics on Hacker Communities." Diss., The University of Arizona, 2017. http://hdl.handle.net/10150/625640.
Full textAlotaibi, Hind. "Context-aware and secure workflow systems." Thesis, De Montfort University, 2012. http://hdl.handle.net/2086/8052.
Full textAlva, Cruz Josselyn Estefanía. "The implementation of business policies of use and control of technological work tools as an effective mechanism to suspend the expectation of confidentiality in the employment relationship." Derecho & Sociedad, 2017. http://repositorio.pucp.edu.pe/index/handle/123456789/117473.
Full textA partir de las consideraciones expuestas por el Tribunal Constitucional en atención a un caso en concreto, el presente artículo aborda la discusión sobre el límite de intervención que posee el empleador para interceptar y recaudar aquellas comunicaciones que se encuentran protegidas por el secreto al derecho de las comunicaciones de los trabajadores, estableciendo la posibilidad de implementar nuevos mecanismos de control que suspenden cualquier tipo de expectativa de confidencialidad.
Essaidi, Moez. "Model-Driven Data Warehouse and its Automation Using Machine Learning Techniques." Paris 13, 2013. http://scbd-sto.univ-paris13.fr/secure/edgalilee_th_2013_essaidi.pdf.
Full textThis thesis aims at proposing an end-to-end approach which allows the automation of the process of model transformations for the development of data warehousing components. The main idea is to reduce as much as possible the intervention of human experts by using once again the traces of transformations produced on similar projects. The goal is to use supervised learning techniques to handle concept definitions with the same expressive level as manipulated data. The nature of the manipulated data leads us to choose relational languages for the description of examples and hypothesises. These languages have the advantage of being expressive by giving the possibility to express relationships between the manipulated objects, but they have the major disadvantage of not having algorithms allowing the application on large scales of industrial applications. To solve this problem, we have proposed an architecture that allows the perfect exploitation of the knowledge obtained from transformations' invariants between models and metamodels. This way of proceeding has highlighted the dependencies between the concepts to learn and has led us to propose a learning paradigm, called dependent-concept learning. Finally, this thesis presents various aspects that may inuence the next generation of data warehousing platforms. The latter suggests, in particular, an architecture for business intelligence-as-a-service based on the most recent and promising industrial standards and technologies
Lichtenberg, Alex Leon. "A Historical Review of Five of the Top Fast Food Restaurant Chains to Determine the Secrets of Their Success." Scholarship @ Claremont, 2012. http://scholarship.claremont.edu/cmc_theses/361.
Full textGustafsson, Jacob, and Adam Törnkvist. "Secure handling of encryption keys for small businesses : A comparative study of key management systems." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18225.
Full textBakgrund: En ny studie visar att nyckelhantering i företagsvärlden är väldigt omständligt, bland annat på grund av brist av kunskap och resurser. Istället väljer vissa företag att inkludera krypteringsnycklar och andra mjukvaruhemligheter direkt i källkoden för applikationen som ska använda dem, och därmed introducerar risken att exponera hemligheterna om källkoden skulle bli tillgänglig för en obehörig part. Syfte: Syftet med denna avhandling är att identifiera tillgängliga nyckelhanteringssystem för att säkra upp mjukvaruhemligheter, bedöma deras lämplighet för småföretag genom att utvärdera dem baserat på olika egenskaper, och rekommendera bästa praxis för att konfigurera det mest lämpliga nyckelhanteringssystemet. Metod: Nyckelhanteringssystem har identifierats genom en omfattande sökning i både vetenskapliga och icke-vetenskapliga sökmotorer. Identifierade nyckelhanteringssystem jämfördes med ett antal krav skapade från ett småföretags-perspektiv. De systemen som uppfyllde kraven implementerades och utvärderades omfattande genom SWOT analyser baserade på attribut för exempelvis funktioner, prestanda, användarvänlighet och uppskattat framtida stöd. Varje system fick sedan en poäng som jämfördes mot de andra systemen baserat på dessa attributen. Till sist togs även en bästa praxis fram för det mest lämpade nyckelhanteringssystemet. Resultat: Under avhandlingen identifierades totalt 54 nyckelhanteringssystem med olika funktioner och syften. Utav dessa system jämfördes fem omfattande. Dessa var Pinterest Knox, Hashicorp Vault, Square Keywhiz, OpenStack Barbican och Cyberark Conjur. Utav dessa fem ansågs Hachicorp Vault vara det mest lämpade systemet för småföretag. Slutsatser: Det finns nuvarande ett brett utbud av nyckelhanteringssystem tillgängliga. Kvalitén, priset och deras syfte varierar vilket gör det tidskrävande att identifiera det systemet som best lämpar sig till ens behov. Avhandlingen anser Hachicorp Vault vara den mest lämpliga baserat på de presenterade behoven, men avhandlingen kan också användas av företag med andra behov som en guide för att underlätta problemet med att välja ett lämpligt nyckelhanteringssystem.
Efendic, Elvira, and Sabina Lajiq. "Service Quality : A research on how recruitment companies secure service quality." Thesis, Linnéuniversitetet, Ekonomihögskolan, ELNU, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-19422.
Full textDomeher, Daniel. "Secure property rights and access to small enterprises' (SEs) credit : a comparative study of Ghana and England." Thesis, Liverpool John Moores University, 2013. http://researchonline.ljmu.ac.uk/6177/.
Full textMa, Lai No. "Personal financial planning : a way to make a better and more secure life." Thesis, University of Macau, 1997. http://umaclib3.umac.mo/record=b1644067.
Full textAlzahrani, Naif Saeed. "A Secure Anti-Counterfeiting System using Near Field Communication, Public Key Cryptography, Blockchain, and Bayesian Games." PDXScholar, 2019. https://pdxscholar.library.pdx.edu/open_access_etds/5038.
Full textMunteanu, Radu. "Three essays on licensing university inventions." Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2007. http://wwwlib.umi.com/cr/ucsd/fullcit?p3268347.
Full textTitle from first page of PDF file (viewed August 7, 2007). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references.
Pool, Estelle. "Insider trading : has legislation been successful?" Thesis, Stellenbosch : Stellenbosch University, 2008. http://hdl.handle.net/10019.1/6172.
Full textENGLISH ABSTRACT: This research report reviews South African and international legislation aimed at preventing insider trading and provides an overview of the successful criminal and civil proceedings taken against insiders. It highlights the possible preventative measures South African companies and legislature can take to reduce insider trading. The United States of America is one of the few countries that had successfully implemented legislation prohibiting insider trading prior to the 1990s. Most countries, including South Africa, only implemented legislation prohibiting insider trading in the late 1990s. Due to apartheid and sanctions against South Africa, the JSE has built up a legacy of being an insider's haven. The Directorate of Market Abuse has the task of transforming this legacy to restore investors' confidence in the market in order to promote economic growth. The success of the legislation is firstly measured by the knowledge the market has gained relating to insider trading since the implementation of the legislation. According to the South African market, insider trading is unethical, but 22% of the participants in the G:cnesis survey still believe that it is an acceptable practice in the South African market. South African companies therefore need to educate their employees and take preventative measures to reduce insider trading in order to erode this culture. Insider trading can only be prevented and reduced if legislation is enforced. Globally, few legal criminal proceedings have been successful, therefore legislation in most countries makes provision for civil remedies. As the burden of proof in a civil legal proceeding is only on "a balance of probabilities", civil proceedings against insiders have been successful. In South Africa, the majority of cases referred for civil legal action have been settled out of court by the alleged insider without admitting guilt to a criminal offence. The South African legislation regulating insider trading in the market is aligned with legislation globally. South Africa's future challenges are to maintain the initial success achieved in reducing insider trading. The establishment of a specific court specialising in financial crime and monitoring specific changes to legislation could increase the possibility of future success.
AFRIKAANSE OPSOMMING: Die projek ondersoek die Suid-Afikaanse en internasionale wetgewing teen binnehandel. Verder word die suksesvolle kriminele en siviele verrigtinge teen diegene wat hulle aan binnehandel skuldig maak onder die soeklig geplaas. Die projek beklemtoon die moontlike voorkomingsmaatreels wat Suid-Afrikaanse maatskappye en regslui kan implementeer om moontlike toekomstige binnehandel te bekamp. Die Verenigde State van Amerika is een van die min lande wat reeds voor die 1990s wetgewing teen binnehandel suksesvol geimplementeer bet. Ander lande, insluitend Suid-Afrika, het eers in die laat 1990s wetgewing teen binnehandel geproklameer. Apartheid en sanksies teen Suid-Afrika het 'n nalatenskap van vrye binnehandel op die JSE gelaat. Dit is die taak van die Direktoraat van Markmisbruik om hierdie nalatenskap uit te wis, sodat beleggersvertroue in die mark herstel kan word, wat weer tot ekonomiese groei sal lei. Een van die maatstawwe om die sukses van die wetgewing te meet, is om te bepaal hoeveel kennis die finansiele gemeenskap sedert die implementering van die nuwe wetgewing ingewin het. Volgens die finansiele gemeenskap is binnehandel oneties, maar 22% van die deelnemers aan die G:encsis-opname glo dat binnehandel wel in Suid-Afrika aanvaarbaar is. Daarom moet Suid-Afrikaanse maatskappye hulle werknemers se kennis oor binnehandel verbreed en ander voorkomende maatreels in plek stel om die kultuur van binnehandel te elimineer. Binnebandel kan slegs voorkom en verminder word indien wetgewing geimplementeer word. Relatief min kriminele sake teen binnehandel lei tot skuldigbevinding, maar plaaslike en internasionale wetgewing maak voorsiening vir siviele aksies. In 'n siviele hofsaak moet ingediende bewyse slegs na alle waarskynlikheid die skuld van die oortreder bewys, wat suksesvolle siviele vervolging moontlik maak. Die meerderheid siviele sake in Suid-Afrika word buite die bar geskik sonder dat die aangeklaagde skuld aan 'n kriminele daad erken. Die Suid-Afrikaanse wetgewing is in lyn met internasionale standaarde. Suid-Afrika staar verskeie uitdagings in die gesig ten opsigte van die handhawing van die huidige suksesvolle bekamping van binnehandel. Die moontlike totstandkoming van 'n spesiale hof, wat slegs finansiele verwante oortredings aanhoor en veranderings aan die wetgewing kontroleer, kan bydra tot die toekomstige sukses van die Suid-Afrikaanse wetgewing.
Fairhurst, Keith. "Investigating funding board composition and turnaround potential of private firms in financial distress." Thesis, University of Pretoria, 2017. http://hdl.handle.net/2263/62694.
Full textThesis (PhD)--University of Pretoria, 2017.
Business Management
PhD
Unrestricted
Stenberg, Enbuske Jenny, and Erika Göransson. "Bakomliggande orsaker till uppdelning i intern- och externredovisning : - En studie av tre K3-företag i tillverkningsbranschen." Thesis, Högskolan i Halmstad, Akademin för ekonomi, teknik och naturvetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-34482.
Full textAccounting is used to easily communicate financial information to the company's various stakeholders, such as shareholders, potential investors, managers, employees, lenders and state. It is based on that the company's various stakeholders, which can be divided into internal and external, want access to certain information. There are several differences between what is reported internally and what is reported externally. These differences include the statutory requirements, who will use the information, the context in which the information is to be used and how often and current information the stakeholder needs. There is also a big difference between the access the external and internal stakeholders have to the information. Internal stakeholders have direct access to information while external stakeholders have to rely on information that the company selects to publish. The purpose of this study is to investigate why companies make a division of their accounts in management and financial accounting and why they do not report them together. The study is based on theories about isomorphism, legitimacy, stakeholders, and theory of competition, business secrets and risks. Theories are linked to interviews made with representatives from three manufacturing K3 companies to answer the study's research question regarding the division of the accounts. The interviews were conducted with a semi-structured interview guide where the interviewers have a greater opportunity to ask supplementary questions. The responses from the interviews contribute to show how the accounting in manufacturing companies works in 2017, in a contemporary and realistic perspective. The study's results show that the companies make a division of the accounts in management and financial accounting due to factors such as decision-making and competition. The company's internal and external stakeholders have different needs and requirements for the information that companies provide in order to use it for decision-making. The financial accounting does not provide sufficient information for the decision-making of internal stakeholders in order to make quick and correct decisions. While management accounting could be too extensive for some external stakeholders. From a competitive perspective, companies do not want their competitors to be able to access the company's management accounting so that they cannot access their recipe of success. The companies included in the study want to maintain their competitive advantages and protect their business opportunities to increase its profitability and efficiency.
Zacher, Benedikt. "Risikobewusstes Wissensmanagement in Technologiekooperationen : theoretische Grundlagen und Realisierungsmöglichkeiten /." Frankfurt am Main [u.a.] : Lang, 2008. http://www.gbv.de/dms/ilmenau/toc/559215711.PDF.
Full textRylander, Malin, and Sofia Thörnberg. "Revisorns tystnads- och anmälningsplikt : tala är silver, tiga är guld?" Thesis, Kristianstad University, School of Health and Society, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-6857.
Full textSwedish accountants are, amongst other laws, controlled by a couple of so called duties. One of those is the professional secrecy, which guarantees the safety of company secrets and other important information that the accountant needs to know but shouldn’t tell anybody. Since 1999 Swedish accountants also need to follow the regulations of the reporting duty. In short, this means that in some cases of suspected crime within a company, auditors are obliged to report this to the authorities. Some auditors consider these two duties to be in conflict with one another. This specific conflict is very rarely touched upon in other media than essays.A few auditors have, in case of a suspected crime with very vague evidence, gone against the law by getting rid of their client thus not having to take the risk of being sued because of violation of the professional secrecy by reporting the crime in vain. This fact, that some auditors even break the law, is reason enough to investigate why some auditors consider the two duties to be in conflict with one another.During our study, personal interviews with four auditors and two persons of authority were carried out. None of them have experienced any negative emotions about the reporting duty, but when it comes to the auditors that in fact do consider the two duties to be in conflict with one another, the opinions start to differ. Some say that it is practically impossible to get rid of a client by the above reasons without reporting the suspected crime, while others claim the opposite. A possible explanation for the different opinions regarding the two duties could be due to the fact that the regulations surrounding the reporting duty are very differently interpreted by different people. Does the law guarantee the safety of the auditor, or does it not? Is there a conflict between the two duties or not?We are of the opinion that there is absolutely a need to thoroughly investigate this topic, possibly by deciding upon which interpretation of the law is the right one. Swedish accounting organizations need to take this case more seriously than they have so far. Or could it be that they simply don’t want to?
Svenska revisorer lyder bland annat under ett antal olika plikter. En av dessa är tystnadsplikten, som garanterar säkerheten för företagshemligheter och annan viktig information som revisorn måste känna till men inte får yppa för någon. Sedan år 1999 måste svenska revisorer också ta hänsyn till anmälningsplikten. Kortfattat innebär denna att revisorn, i vissa fall, själv måste anmäla misstänkta brott denne upptäckt i företaget till myndigheterna. En del revisorer upplever att dessa två plikter befinner sig i konflikt med varandra. Denna konflikt berörs ytterst sällan i annan media än uppsatser.Några revisorer har, i fall då ett misstänkt brott upptäckts men bevisningen är mycket vag, begått ett lagbrott genom att göra sig av med klienten. På så vis slipper de ta risken att anmälan inte leder någon vart och då riskera att bli stämd för att ha brutit mot tystnadsplikten. Detta, att vissa revisorer går så långt som till att bryta mot lagen, är skäl nog att utreda varför vissa revisorer upplever en konflikt mellan de två plikterna.Vi utförde under denna studie personliga samtal med fyra revisorer och två myndighetspersoner. De upplever personligen inga problem med anmälningsplikten, men har olika åsikter om de revisorer i tidigare studier som faktiskt menar sig uppleva en konflikt. Vissa menar att det är fullständigt omöjligt att göra sig av med en klient för att slippa anmäla ett misstänkt brott - andra det motsatta. En förklaring till att åsikterna om konflikten mellan plikterna varierar skulle kunna vara att tolkningen av lagtexten är föremål för många varierande tolkningar. Garanterar lagtexten revisorns säkerhet eller ej? Finns det en konflikt mellan de två plikterna?Avslutningsvis anser vi att det finns ett stort behov av att utreda detta, förslagsvis genom att bestämma vilken lagtolkning som är den korrekta. Svenska revisorsorganisationer måste ta ämnet på större allvar än hittills. Eller de kanske inte vill?
Söderbergh, Veronica, and Zainab Mahdizadeh. "Handel på Facebook och Instagram : Och faktorer som kan påverka benägenheten till det." Thesis, Högskolan i Borås, Akademin för textil, teknik och ekonomi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-26599.
Full textThe Internet is a growing phenomenon with new innovations. The development of the Internet caused e-commerce and shopping via social media, such as Facebook and Instagram, to emerge. Since a large proportion of the Internet users are using both platforms, companies can benefit from having a presence and enabling for consumers to shop from there in ordr to reach more consumers. For the consumers shopping on the platforms can make it easier for people to buy products when they a purchase can be done as soon as a product is seen in the Instagram feed. The purpose of this essay is to study commerce on Facebook and Instagram in order to contribute with more information about the subject. Furthermore, the study will provide an insight into the actions and thoughts the consumers have about what makes them willing to make purchases on these platforms. Companies have a self-interest to gain an increased insight into the subject as there are two different channels on which companies can develop trade, and thus invest both time and money in them. There are various concepts that emerge as important for respondents which are used in this paper and are going to be studied in more detail which are, perceived security, experience, mood, advertisement, and product as well as credibility. The results indicate that most consumers prefer to use the company's website when shopping on the Internet. However, there are a large proportion of consumers who consider making purchases on Facebook and Instagram sometimes. The consumers who have not yet made a purchase via these channels stated that they do not have the need to do so and that they would rather visit the company's website. When it comes to factors that influence a purchase, the majority of consumers stated that it needed to be simple, flexible and secure, in addition to customized advertising and the company’ s credibility. The company’s credibility is also the defining factor. The essay is written in Swedish.
張雯吉. "論企業商業秘密權與自由擇業權的衝突與平衡 :以競業禁止為研究視角 = A discussion on the conflicts and balances between the right of the commercial secrets and the right of freedom in choosing a job : based on the "non compete aggrement"." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3950703.
Full textSvensson, Linda, and Caroline Nävemark. "Revisionens nytta och kommunikation : En intervjustudie om revisorers respektive företagsledningars uppfattning om kommunikationen som sker mellan parterna." Thesis, Linnéuniversitetet, Institutionen för ekonomistyrning och logistik (ELO), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-68725.
Full textBackground: The auditor is responsible for quality assurance of his client company's accounts, which gives increased public confidence. That the auditor has a relationship with his client which is based on trust has proven to be important in order to obtain the necessary information and to be able to perform the audit properly, but at the same time the auditor is required to be completely independent of the company they are auditing. They are faced with pressure from the public regarding more transparency and information about the company, which may be in conflict to its confidentiality. Based on these dilemmas, we have conducted our study, examining the communication and relationship between the auditor and the client company. Purpose: To contribute knowledge about the communication between auditor and the top management team and their perceptions about it. Method: In order to complete our study, we have used a deductive approach, based on existing theory which has been the foundation of our empirical study. Conclusions: What both auditors and representatives of the top management teams consider to be most central to building trust are the independence of the auditor, confidentiality and competence. The study has also shown that the audit report, which is the auditor's communication to the public, largely loses its usefulness if it consists mostly of standard text, which means that the auditor does not always meet the public's expectations. In the relationship between the auditor and management, no mistrust is experienced between the parties, which will be a positive effect of the build-up of confidence.
Landin, Frida, and Magdalena Zawada. "Interorganisatorisk samverkan : En kvalitativ studie om hur myndigheter samverkar för att återvinna brottsutbyten." Thesis, Högskolan Väst, Avd för företagsekonomi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-11218.
Full textAuthorities play a central role in today's society. We meet many of them every day, which makes their work very actual. Their responsibilities sometimes overlap, which requires them to interact. Through this collaboration, the authorities can improve their efficiency and achieve better results. However, their collaboration does not always work well but is something that has to be created and developed together. The purpose of this study was to contribute with knowledge about inter-organizational collaboration in the reclaiming of profits from crime. We wanted to get a wider understanding of government collaboration that takes place with particular focus on factors that can promote or constitute barriers to collaboration. After completing the study, we have made a contribution about the factors that characterize inter-organizational collaboration in the reclaiming of profits from crime and suggest improvements. We have conducted a qualitative case study as a method. To get different perspectives and an increased understanding of the phenomenon studied, we have interviewed six experts, one from each authority. Our theoretical framework consists of research addressed the importance of collaborations as well as forms and conditions of collaboration with particular focus on facilitators and barriers for inter-organizational collaboration. We also present an analysis model which was used as a starting point for our information needs. In the empirical part of the present study we present the authorities' role in the collaboration as well as the results of the interviews. Information about the reclaiming the profits from crime is also presented and it forms the basis for the empirical background and the empirical study. This, together with the theoretical framework, forms the basis for our discussion and conclusion. This study identifies important facilitators and barriers for the inter-organizational collaboration in the reclaiming of profits from crime. The factors such as commitment impacts the collaboration positively. Communication between the authorities constitutes a promotion factor while there are also obstacles in the communication. Other barriers in collaboration are confidentiality and lack of relevant follow-up tools. As the authorities work on different responsibilities, tasks and regulations, we conclude that the collaboration requires better governance that would support ongoing projects and contribute to better synchronization, coordination and integration of the work processes.
Ren, Esther, and 任祥棣. "Trade Secret Act and the Research of Business Management System Concerning Trade Secret." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/24816802872664191149.
Full text國立成功大學
企業管理學系
87
Information revolution increased the speed of superseding of technology and products. To survive and make profit in markets,business need to be engaging in the updating of products and technology . So, intangible intellectual property becomes the key component of competing. For the sake of being conscious of the importance of intellectual property, even advanced countries seek the protections of intellectual property abroad by political forces. In whole global, the protection of IPRs has become a magatrend .Our country exerted also the Law of Trade Secret at Jan 17,1996. Business need to establish security programs to prevent outside trespass toward trade secret and make confidence clause to avoid exposure of secret by people inside the company. When business faces the suit of trade secret, the clear identification concerning the range of trade secret, the proper activities of the protection of secret and proving of the trespass will be the key factor to win the suit .
吳岱臻. "Identification of Business Secret Protection and Analysis of Court Judgment Practice." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/hmg58e.
Full text南臺科技大學
財經法律研究所
106
In recent years, there have been many cases of business secret leaks and job-hopping incidents in Taiwan by current or former employees of the benchmark enterprise. In the case of global talent circulation, companies often use irresistible high salaries to attract talents. For employees, this may give the most leverage for them to discuss terms of the career plan. Therefore, there is a tendency to “go together” or “stay together”, which has an impact on the company. For the company, in the face of international talent competition, how to retain talents, as well as how to protect business secrets and core assets have become the most important issue for business operators. In the field of intellectual property, the protection of business secrets has gradually become a core issue besides patents, trademarks, and copyrights. It includes mutual accusations of poaching employees between enterprises, as well as differences in perceptions of rights and obligations between companies and former employees. Many high-tech companies are involved, which also extends to international business competition. The confirmation of business secrets (specific confidential objects) and the adoption of reasonable confidentiality measures are the two major key points for protecting business secrets, as well as the core basis for litigation evidence. This paper explores the internal management system of the industry through the development trend and theoretical opinions of the relevant judgments of Taiwan courts, as well as what reasonable confidentiality measures should be taken for the holders of business secrets. Moreover, it identifies the kind of information that is required for the protection of business secrets, and establishes the sound management system based on it. Based on the requirements of the Business Secrets Act for “confidentiality measures”, confidentiality contracts are used to make persons with access to business secrets subject to the obligation of confidentiality. There are several common forms of confidentiality. This paper proposes to bring the act of simply bringing out business secrets to foreign countries into the scope of punishment, which has not been included in the scope of punishment. It is suggested that in addition to the law amendments, in order to avoid the business secrets being easily stolen and utilized, each company should establish the complete confidentiality protection mechanism for business secrets.
Jakl, Jan. "Obchodní tajemství v obchodních závazkových vztazích." Master's thesis, 2013. http://www.nusl.cz/ntk/nusl-329815.
Full textLin, Chia-Ching, and 林家慶. "A Study on business management of trade secret: focus on obligations of Confidentiality and Non-Competition." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/y76egv.
Full text國立臺灣大學
科際整合法律學研究所
105
Protecting trade secrets well which helps business to obtain an advantaged status of market. According to Trade Secret Act, the term “trade secret” must meet the three requirements: 1.Secrecy 2.Economical value 3.Taking measures of maintaining secrecy. In recent years, a lot of threats not come from competitive business but employees violating obligations of confidentiality and non-competition decrease benefits of business. So how to manage the trade secret of business in a complying with obligations of confidentiality and non-competition aspect which is the most important key for business management. Trade secret Protection and management of Human resource and labor contract, relief management and development of court opinions are all essential to trade secret management of business.
Chin, Wei-Hsiang, and 金偉翔. "The Secret behind Corporate R&D Expenditure: Group Density and Affiliate Centrality of IT Business Groups in Taiwan." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/19028650545437889097.
Full text中國文化大學
國際貿易學系碩士班
98
In the contemporary business landscape, firm’s competitive position and advantage is supported on inimitable and idiosyncratic assets, particularly their knowledge-based resources or capabilities. R&D (Research and Development) plays an important role for the creation and maintenance of a sustainable competitive advantage, and impact on firms’ performance. Many studies have examined how R&D expenditure is influenced by firm’s size, past performance and firm’s age. Despite this extensive line of research, our study adds to this literature on another dimension to discuss the relation between firm R&D expenditure and its social network. While Taiwan is famous for its small and medium sized enterprises, business groups also are important players in the country. Business groups are a type of multi-business firm that combines elements of conglomerate holding companies and multidivisional corporations, creating what some theorists view as a network form of organization. This study considers one type of intra-group linkages: director ties. The ties create opportunities for innovation by affiliates and, in aggregate, for the group as a whole-opportunities that arise from access to information. This study investigate how the overall density and individual centrality of ties affects group and affiliate innovativeness among about 542 firms within 127 IT business groups in Taiwan between 2003 and 2007. We also find (1) the greater the centrality of an affiliate within its group, the greater the innovative activity of the affiliate and (2) the higher the intra-group density, the greater the group’s innovative activity.
HUANG, AI-CHEN, and 黃愛珍. "A Research on the Business Strategy of Beauty and SPA Industry in Taiwan - A Case Study of Elite Secret Biotech." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/5ja3bu.
Full text環球科技大學
中小企業經營策略管理研究所
107
The beauty and SPA industry will definitely become an industry with economies of scale in the future. With the improvement of the life quality and the changes in the social and economic environment, modern people always work under great stress. Therefore, people pay more and more attention to their health and beauty regardless of genders, which triggers the strong demand of SPA relaxation. Indeed, many women are willing to have facial skin care and body SPA treatment to maintain youth. Moreover, skin care and body SPA also serve as relaxation ways for men to relieve stress. In this study, we want to discuss the situation of the beauty and SPA industry in Taiwan. Due to the development of aesthetic medicine and the health club, the beauty and SPA industry has faced fierce competition in recent years. The increase of different franchises and diversified sales channels has led to the price reduction competition (e.g., promotion of cosmetics and skin care products), and also restrained the willingness of consumers to purchase products in local beauty SPAs. To have effective and continuous business operation, the business strategy of local beauty SPAs becomes essential in such competitive markets. Herein, we focus on the case study of Elite Biotech, one of the most successful local beauty SPA franchises, and how will they maintain their business leadership and customer loyalty through improving its high service quality in the future, in order to promote the dominant competitiveness of Taiwanese beauty SPAs. Based on the qualitative interviews with Elite Biotech franchises, our study used SWOT and Porter five forces analysis to discuss the successful factors of beauty SPAs management. Finally, we analyzed the advantages of the brand including technique quality, vertical integration, and diversified channels, thereby offering suggestions and directions for Elite Biotech.
Correia, João Fialho Neiva. "O segredo comercial e a sua relevância jurídica no domínio comercial contemporâneo." Master's thesis, 2021. http://hdl.handle.net/10400.14/36333.
Full textWe live, more and more, in a technological and digital world, which instigates production, innovation and industrial evolution, which in turn creates new challenges, and simultaneously, in a strongly outsourced information society. In this context, trade or business secrets play an increasingly relevant role. For this reason, there is a serious concern in the interested circles to safeguard the secret information of businesses with commercial value, which translates into the increasing adoption of measures aimed at this effect. That is not enough, it is also necessary to have legal protection. Historically, this has been linked to the problem of unfair competition and, despite the recent autonomy of this protection, it still largely happens. Indeed, in times of strong competition and competitiveness in the commercial, industrial and services sectors, confidential information qualifying as a business secret gives those who have their domain and the respective productive organization a competitive advantage, in the respective sector or market, which can be of great magnitude. Hence the natural temptation of competitors to access it, not only by lawful, but also by illicit or unfair means.