Journal articles on the topic 'Business secret'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Business secret.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Alexander, Sheryl. "Secret midwives business." Australian Journal of Midwifery 14, no. 2 (January 2001): 4. http://dx.doi.org/10.1016/s1445-4386(01)80041-0.
Full textParsons, Louise. "Secret women's business." Women and Birth 26 (October 2013): S49. http://dx.doi.org/10.1016/j.wombi.2013.08.153.
Full textKonek, Carol Wolfe. "Women's secret business." Peace Review 9, no. 4 (December 1997): 469–74. http://dx.doi.org/10.1080/10402659708426095.
Full textGillam, Lynn. "Secret ethics business?" Monash Bioethics Review 22, no. 1 (January 2003): S52—S62. http://dx.doi.org/10.1007/bf03351387.
Full textPutri, Fiona eriba Rahma, and Sri Maharani MTVM. "A Legal Protection On Owner Of Trade Secret On Coffe Powder Blend That Violate Trade Secret Act No 30 Of 2000." LIGAHUKUM 2, no. 1 (July 23, 2021): 87–96. http://dx.doi.org/10.33005/ligahukum.v2i1.75.
Full textTesk, Kirk. "Trade Secrets 101." Mechanical Engineering 130, no. 10 (October 1, 2008): 36–38. http://dx.doi.org/10.1115/1.2008-oct-4.
Full textFriedman, David D., William M. Landes, and Richard A. Posner. "Some Economics of Trade Secret Law." Journal of Economic Perspectives 5, no. 1 (February 1, 1991): 61–72. http://dx.doi.org/10.1257/jep.5.1.61.
Full textMALIK, ZAKI, and ATHMAN BOUGUETTAYA. "PRESERVING TRADE SECRETS BETWEEN COMPETITORS IN B2B INTERACTIONS." International Journal of Cooperative Information Systems 14, no. 02n03 (June 2005): 265–97. http://dx.doi.org/10.1142/s0218843005001146.
Full textWiderski, Piotr. "Protection of trade secrets in polish and european legislation." ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 22, no. 2 (July 25, 2018): 58–68. http://dx.doi.org/10.5604/01.3001.0012.5316.
Full textMbachu, Dulue. "A dastardly business." Index on Censorship 24, no. 4 (July 1995): 20. http://dx.doi.org/10.1177/030642209502400407.
Full textYanuarsi, Susi. "PERLINDUNGAN HUKUM TERHADAP PEMILIK RAHASIA DAGANG YANG BERSIFAT KOMERSIL." Solusi 17, no. 2 (May 1, 2019): 122–31. http://dx.doi.org/10.36546/solusi.v17i2.146.
Full textKNOWLES, OWEN. "FISHY BUSINESS IN CONRAD'S THE SECRET AGENT." Notes and Queries 37, no. 4 (December 1, 1990): 433–34. http://dx.doi.org/10.1093/nq/37-4-433.
Full textGARCÍA PASTOR, IMANOL, FRANCISCO SANCHEZ FUENTE, and JOSE RAMON OTEGI OLASO. "MODELLING A BLOCKCHAIN SOLUTION FOR INTELLECTUAL PROPERTY MANAGEMENT IN DIGITISED INDUSTRIAL ENVIRONMENTS." DYNA 96, no. 6 (November 1, 2021): 576–80. http://dx.doi.org/10.6036/10294.
Full textAliyeva-Baranovska, Vira, and Olha Sirenko. "Comparative characteristics of trade secret in the legislation of foreign countries and in international law." Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav 4, no. 4 (December 29, 2020): 135–49. http://dx.doi.org/10.31733/2078-3566-2020-4-135-149.
Full textHollman, Wayne A., and Brian H. Kleiner. "Establishing rapport: the secret business tool to success." Managing Service Quality: An International Journal 7, no. 4 (August 1997): 194–97. http://dx.doi.org/10.1108/09604529710173015.
Full textHume, Margee, and Michael Mills. "Uncovering Victoria's Secret." Journal of Fashion Marketing and Management: An International Journal 17, no. 4 (September 13, 2013): 460–85. http://dx.doi.org/10.1108/jfmm-03-2013-0020.
Full textZhao, Gui Fen, Ying Li, Li Ping Du, and Jian Wei Guo. "Security Middleware Based on Smart Card for E-Business." Applied Mechanics and Materials 380-384 (August 2013): 2451–54. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2451.
Full textZerra Sasicha, Agestania, Idah Hadijah, and Nurul Aini. "Profil Pemasaran Madame Wang Secret Garden Kota Malang." Jurnal Inovasi Teknologi dan Edukasi Teknik 1, no. 3 (June 28, 2021): 169–74. http://dx.doi.org/10.17977/um068v1n3p169-174.
Full textDUNCAN, BRIAN. "SECRET SANTA REVEALS THE SECRET SIDE OF GIVING." Economic Inquiry 47, no. 1 (January 2009): 165–81. http://dx.doi.org/10.1111/j.1465-7295.2008.00145.x.
Full textAmidon, Debra M. "Dialogue with Customers: Secret to Innovation Strategy." International Journal of Innovation Management 01, no. 01 (March 1997): 73–87. http://dx.doi.org/10.1142/s136391969700005x.
Full textClarke, Philip A. "Response to ‘secret women's business: The Hindmarsh Island affair’." Journal of Australian Studies 20, no. 50-51 (January 1996): 141–49. http://dx.doi.org/10.1080/14443059609387285.
Full textMcCrystal, Cal. "The sub-secret underworld of the D-Notice business." British Journalism Review 10, no. 2 (June 1999): 26–33. http://dx.doi.org/10.1177/095647489901000205.
Full textKatrinasari, Bella, and Hernawan Hadi. "TINJAUAN HUKUM TERHADAP WANPRESTASI ROYALTY RAHASIA DAGANG DALAM PERJANJIAN WARALABA." Jurnal Privat Law 5, no. 1 (February 2, 2017): 85. http://dx.doi.org/10.20961/privat.v5i1.19364.
Full textMashingaidze, Sivave. "Corporate espionage masquerading as business intelligence in local banks: A descriptive cross-sectional research." Corporate Ownership and Control 12, no. 4 (2015): 653–59. http://dx.doi.org/10.22495/cocv12i4c6p5.
Full textTerasaki, Shinichiro, and Shin’ya Nagasawa. "The Relationship Between Brand Integrity and Business Continuity – A Case Study of Japanese Long-Standing Company, Shioyoshiken –." Journal of Advanced Computational Intelligence and Intelligent Informatics 16, no. 4 (June 20, 2012): 547–52. http://dx.doi.org/10.20965/jaciii.2012.p0547.
Full textListiasari, Faranita Ratih. "RAHASIA DAGANG SEBAGAI SALAH SATU PERLINDUNGAN HAK KEKAYAAN INTELEKTUAL DARI HASIL PENELITIAN HIBAH SEKOLAH VOKASI IPB TAHUN 2020." Jurnal Sains Terapan 11, no. 1 (September 18, 2021): 104–15. http://dx.doi.org/10.29244/jstsv.11.1.104-115.
Full textSchaefer, K. Aleks. "The Meat Racket: The Secret Takeover of America's Food Business." American Journal of Agricultural Economics 96, no. 5 (October 2014): 1507–8. http://dx.doi.org/10.1093/ajae/aau075.
Full textRevzan, Henry A. "The “secret” response to kidnapping." Business Horizons 33, no. 3 (May 1990): 79–81. http://dx.doi.org/10.1016/0007-6813(90)90046-e.
Full textZhao, Xuemei, Tongtong Zhang, Jun Liu, Canju Lu, Huan Lu, and Xuehu Yan. "Applying Secret Image Sharing to Economics." International Journal of Digital Crime and Forensics 13, no. 4 (July 2021): 16–25. http://dx.doi.org/10.4018/ijdcf.20210701.oa2.
Full textZavršnik, Bruno. "Slovenian Managers in Business Negotiations." Annals of the Alexandru Ioan Cuza University - Economics 61, no. 1 (July 1, 2014): 108–15. http://dx.doi.org/10.2478/aicue-2014-0005.
Full textAkinbola, Amos Olufemi, Nureni Sanusi Alaka, Solomon Akpoviroro Kowo, and Adesola Alex Adeyemo. "Family Business Operations and Sequel of Internationalisation in Nigeria." Economics and Business 34, no. 1 (February 1, 2020): 126–38. http://dx.doi.org/10.2478/eb-2020-0009.
Full textAlZain, Mohammed A., Alice S. Li, Ben Soh, and Eric Pardede. "Multi-Cloud Data Management using Shamir's Secret Sharing and Quantum Byzantine Agreement Schemes." International Journal of Cloud Applications and Computing 5, no. 3 (July 2015): 35–52. http://dx.doi.org/10.4018/ijcac.2015070103.
Full textFletcher, Stella. "Abbot Edmund Ford, secret agent." British Catholic History 35, no. 4 (October 2021): 440–61. http://dx.doi.org/10.1017/bch.2021.18.
Full textVijaykumar, S., K. S. Rajkarthick, and J. Priya. "Innovative Business Opportunities and Smart Business Management Techniques from Green Cloud TPS." International Journal of Asian Business and Information Management 3, no. 4 (October 2012): 62–72. http://dx.doi.org/10.4018/jabim.2012100107.
Full textScott, Craig R., and SoeYoon Choi. "Top secret from the bottom up." Corporate Communications: An International Journal 22, no. 4 (October 2, 2017): 556–61. http://dx.doi.org/10.1108/ccij-08-2017-0072.
Full textVenkadesh, P., Julia Punitha Malar Dhas, and S. V. Divya. "A technique for transmitting secret message using secret matrix in SCTP." International Journal of Enterprise Network Management 7, no. 1 (2016): 1. http://dx.doi.org/10.1504/ijenm.2016.075171.
Full textFrame, Alicia. "Is graph data science the secret to accelerating machine learning?" ITNOW 63, no. 2 (June 1, 2021): 54–55. http://dx.doi.org/10.1093/itnow/bwab058.
Full textAmrani, Clare. "A helping hand in aesthetic challenges: professional practice and overcoming hurdles." Journal of Aesthetic Nursing 8, no. 8 (October 2, 2019): 392–94. http://dx.doi.org/10.12968/joan.2019.8.8.392.
Full textDhanania, Kusum, and Sandhya Gopakumaran. "Marwari business discourse." Journal of Asian Pacific Communication 15, no. 2 (November 18, 2005): 287–312. http://dx.doi.org/10.1075/japc.15.2.05dha.
Full textUtami, Dian Arlupi, Noviyanti Noviyanti, Gading Gama Putra, and Agus Prasetyawan. "Sociopreneurship sebagai Alternatif Pemberdayaan Masyarakat dan Pengentasan Kemiskinan." Jurnal Ilmu Administrasi Negara ASIAN (Asosiasi Ilmuwan Administrasi Negara) 5, no. 2 (April 2, 2018): 31–46. http://dx.doi.org/10.47828/jianaasian.v5i2.4.
Full textUrbaczewski, Andrew, and Leonard M. Jessup. "Web browser, what's that secret you're keeping?" Business Horizons 46, no. 5 (September 2003): 25–32. http://dx.doi.org/10.1016/s0007-6813(03)00068-5.
Full textRodas, Maria A., and Deborah Roedder John. "The Secrecy Effect: Secret Consumption Increases Women’s Product Evaluations and Choice." Journal of Consumer Research 46, no. 6 (September 14, 2019): 1093–109. http://dx.doi.org/10.1093/jcr/ucz041.
Full textMiller, Kimberly A. "Dress: Private and Secret Self-Expression." Clothing and Textiles Research Journal 15, no. 4 (October 1997): 223–34. http://dx.doi.org/10.1177/0887302x9701500404.
Full textSampson, Jesse. "Secret digital coin mining and trading is a threat to your business." Computer Fraud & Security 2018, no. 4 (April 2018): 8–10. http://dx.doi.org/10.1016/s1361-3723(18)30032-0.
Full textBenham Dittoe, Alanna. "To learn the secret of success in business, listen to consumer needs." Journal of the American Dietetic Association 93, no. 4 (April 1993): 397–99. http://dx.doi.org/10.1016/0002-8223(93)92277-5.
Full textYeo, Roland K. "Learning: The Secret to the Art of War." Management Research News 28, no. 8 (August 2005): 27–33. http://dx.doi.org/10.1108/01409170510784931.
Full textCross, Robert G., and Ashutosh Dixit. "Customer-centric pricing: The surprising secret for profitability." Business Horizons 48, no. 6 (November 2005): 483–91. http://dx.doi.org/10.1016/j.bushor.2005.04.005.
Full textNirmala, Endar. "Penerapan Steganografi File Gambar Menggunakan Metode Least Significant Bit (LSB) dan Algoritma Kriptografi Advanced Encryption Standard (AES) Berbasis Android." Jurnal Informatika Universitas Pamulang 5, no. 1 (March 31, 2020): 36. http://dx.doi.org/10.32493/informatika.v5i1.4646.
Full textWang, Rui, Guohua Wu, Qiuhua Wang, Lifeng Yuan, Zhen Zhang, and Gongxun Miao. "Reversible Data Hiding in Encrypted Images Using Median Edge Detector and Two’s Complement." Symmetry 13, no. 6 (May 21, 2021): 921. http://dx.doi.org/10.3390/sym13060921.
Full textZaitseva-Kalaur, Inna. "Оrganizational and legal procedures for protection of a commercial secret of business subsidiary." Aktual’ni problemi pravoznavstva 1, no. 4 (October 24, 2018): 110–15. http://dx.doi.org/10.35774/app2018.04.110.
Full text