Journal articles on the topic 'Business secret'

To see the other types of publications on this topic, follow the link: Business secret.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Business secret.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Alexander, Sheryl. "Secret midwives business." Australian Journal of Midwifery 14, no. 2 (January 2001): 4. http://dx.doi.org/10.1016/s1445-4386(01)80041-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Parsons, Louise. "Secret women's business." Women and Birth 26 (October 2013): S49. http://dx.doi.org/10.1016/j.wombi.2013.08.153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Konek, Carol Wolfe. "Women's secret business." Peace Review 9, no. 4 (December 1997): 469–74. http://dx.doi.org/10.1080/10402659708426095.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gillam, Lynn. "Secret ethics business?" Monash Bioethics Review 22, no. 1 (January 2003): S52—S62. http://dx.doi.org/10.1007/bf03351387.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Putri, Fiona eriba Rahma, and Sri Maharani MTVM. "A Legal Protection On Owner Of Trade Secret On Coffe Powder Blend That Violate Trade Secret Act No 30 Of 2000." LIGAHUKUM 2, no. 1 (July 23, 2021): 87–96. http://dx.doi.org/10.33005/ligahukum.v2i1.75.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The development of business activities that are very competitive in Indonesia today has led to quite fierce business competition among the business world. Every company must have information that is kept secret from the public, usually referred to as trade secrets. This is the most important aspect for the business owner of the trade itself because the trade information owned holds commercial points and is tied to the quality of the business produced. When a company's trade confidential information is leaked, the impact will be detrimental to the company itself. Before the problem occurred, it could be seen that the government was serious when dealing with this problem and therefore the government began to formalize Law No 30 Of 2000 concerning Trade Secrets. The hope is that this will provide legal protection for trade business owners who keep the confidential nature of company trade information so that competitors are not easily owned. The purpose of this study is to provide legal protection for the owners of trading businesses. So as to reduce the form of violations of trade secrets that often occur, granting legal protection for trade business owners can be done by optimizing the implementation of Law No 30 Of 2000 concerning Trade Secrets and improving the performance of the Directorate General of Intellectual Property. The type of research applied in this study is normative juridical legal research, this research is based on legislation relating to trade secrets, namely Law No 30 Of 2000 and for the collection of data such as from legal books, legal journals, and news articles. The results of the study can be concluded that in guaranteeing a legal protection for trade secret owners there must be cooperation between several parties, not only from the Directorate General of Intellectual Property, but also from business actors, the community and law enforcement as well. In the application of Law No 30 Of 2000 concerning Trade Secrets, it should be carried out effectively, in order to reduce the form of violations of trade secrets that often occur lately among the business world.
6

Tesk, Kirk. "Trade Secrets 101." Mechanical Engineering 130, no. 10 (October 1, 2008): 36–38. http://dx.doi.org/10.1115/1.2008-oct-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This article focuses on advantages to protect intellectual property by keeping it under wraps. There are some things that just cannot keep from getting out. Probably nothing in the law breeds as many myths as trade secrets. One positive aspect of trade secrets is that they can protect things patents cannot, since the general definition of a trade secret is any information that is in some way valuable, provided that reasonable efforts are used to maintain the secret. Trade secret protection can also last indefinitely. Patents, by contrast, expire 20 years after they are filed. The problem with trade secrets begins when engineering managers rely on trade secrets without understanding their limits or use trade secrets as a fall-back business decision. Conducting regular trade secret audits is a mechanism where a trade secret specialist gains an understanding of a company’s secrets, ensures that they are sufficiently defined, and that they are adequately protected. After the product is released, its high-level functionality is no longer a trade secret, but could be protected via a patent. Marketing literature and data sheets are also no longer trade secrets because they are usually made public.
7

Friedman, David D., William M. Landes, and Richard A. Posner. "Some Economics of Trade Secret Law." Journal of Economic Perspectives 5, no. 1 (February 1, 1991): 61–72. http://dx.doi.org/10.1257/jep.5.1.61.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Despite the practical importance of trade secrets to the business community, the law of trade secrets is a neglected orphan in economic analysis. This paper sketches an approach to the economics of trade secret law that connects it more closely both to other areas of intellectual property and to broader issues in the positive economic theory of the common law.
8

MALIK, ZAKI, and ATHMAN BOUGUETTAYA. "PRESERVING TRADE SECRETS BETWEEN COMPETITORS IN B2B INTERACTIONS." International Journal of Cooperative Information Systems 14, no. 02n03 (June 2005): 265–97. http://dx.doi.org/10.1142/s0218843005001146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In this paper, we propose an approach for preserving trade secrets in B2B interactions among competitors. Customer information exchanged during Business-to-Business (B2B) collaborations is usually considered as a business asset not to be freely shared with other businesses. This customer information is in essence a business trade secret. The full automation of B2B interactions is now possible because of the wide deployment of such technologies as Web services. However, these advances also create greater opportunities for businesses in acquiring sensitive customer data from other transacting businesses, thus creating an impediment for potential B2B collaboration between competitors. This calls for techniques to protect disclosure of sensitive data. Our approach leverages psycholinguistic knowledge to perturb data to computationally impede the disclosure of privileged customer information. We present an analytical model and a set of experiments to demonstrate the robustness of the proposed techniques.
9

Widerski, Piotr. "Protection of trade secrets in polish and european legislation." ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 22, no. 2 (July 25, 2018): 58–68. http://dx.doi.org/10.5604/01.3001.0012.5316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Trade secrets are valuable business assets to all companies on the market irrespective of their size and sector. Empirical evidence prompts clear dependency between innovation and trade secret protection (Ec.europa.eu, 2013). Trade secrets represent the results of R&D investments, innovation and creativity. They are often located as the decisive element of economic advantage in business relationship. The lack of sufficient legal protection of secrets reduces confidence of business creators, researchers and innovators. A current state of protection in the EU has proven to be inadequate to create a satisfactory level of entrepreneurship. Directive 2016/943 endorses a minimum standard requirement for the EU legislation but the Member States may introduce to their own legal systems more far-reaching protection against unlawful acquisition, use or disclosure of trade secrets. Trade secrets play an important role in protecting the exchange of know-how between businesses, especially SMEs, and research institutions both within and across the borders of the internal market, in the context of research, development, and innovation. Trade secrets are one of the most commonly used forms of protection of intellectual creation and innovative know-how by businesses, yet at the same time, they are not sufficiently protected by the existing European Union legal framework.
10

Mbachu, Dulue. "A dastardly business." Index on Censorship 24, no. 4 (July 1995): 20. http://dx.doi.org/10.1177/030642209502400407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Yanuarsi, Susi. "PERLINDUNGAN HUKUM TERHADAP PEMILIK RAHASIA DAGANG YANG BERSIFAT KOMERSIL." Solusi 17, no. 2 (May 1, 2019): 122–31. http://dx.doi.org/10.36546/solusi.v17i2.146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Normative trade secrets are formulated as information that is not known to the public in the field of technology and / or business that has economic value because they are useful in business activities, and are kept confidential by the owners of trade secrets. Ownership and protection of confidential information that is categorized as trade secrets and is an intangible asset of the company, occurs automatically. Whoever discovers or makes this trade secret, it is automatically by law that he is considered to be the owner and this owner has the right to use or complain given a permit made by everyone for commercial support purposes
12

KNOWLES, OWEN. "FISHY BUSINESS IN CONRAD'S THE SECRET AGENT." Notes and Queries 37, no. 4 (December 1, 1990): 433–34. http://dx.doi.org/10.1093/nq/37-4-433.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

GARCÍA PASTOR, IMANOL, FRANCISCO SANCHEZ FUENTE, and JOSE RAMON OTEGI OLASO. "MODELLING A BLOCKCHAIN SOLUTION FOR INTELLECTUAL PROPERTY MANAGEMENT IN DIGITISED INDUSTRIAL ENVIRONMENTS." DYNA 96, no. 6 (November 1, 2021): 576–80. http://dx.doi.org/10.6036/10294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In the industry 4.0 vision, the competitiveness of companies is based on innovation, business-to-business collaboration and digitalisation. In such collaborative frameworks, the sharing of trade secrets depends to a greater or lesser extent on the degree of trust between the parties involved in the collaboration. This paper proposes an application model for trade secret protection based on blockchain, using the smart contracts support and tokenization capabilities available in the Ethereum network. The application of the model along the value chain of the collaborative industrial environment promotes the sharing of industrial secrets with the guarantee provided by blockchain technology, increasing trust and added value in the relationship. Keywords: Industry 4.0, blockchain, innovation, intellectual property, knowledge management
14

Aliyeva-Baranovska, Vira, and Olha Sirenko. "Comparative characteristics of trade secret in the legislation of foreign countries and in international law." Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav 4, no. 4 (December 29, 2020): 135–49. http://dx.doi.org/10.31733/2078-3566-2020-4-135-149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The purpose of the article is to investigate the place of trade secrets in regulations, international treaties, foreign legislation, and key means of protecting trade secrets in accordance with these regulations. A comparative analysis of current norms and provisions of the system of legislation of foreign countries in terms of protection of trade secrets. An analysis is performed of international treaties and the legal framework of foreign countries, namely, the Paris Convention for the Protection of Industrial Property, the Stockholm Convention establishing the World Intellectual Property Organization of 1967 in terms of protection of trade secrets in order to improve national legislation in this area. It has been emphasized that the definition of trade secrets is similar in the Civil Code of Ukraine and in the TRIPS Agreement, which enshrines three criteria of trade secrets: secrecy, commercial value and taking adequate measures to ensure secrecy. It is noted that legal protection provides for and requires the owner of the commercial secrecy to take appropriate measures to ensure the protection of relevant information from unfair commercial use. Sometimes the misappropriation of a trade secret is the result of industrial espionage, when a person provides classified information to a competitor for monetary or other remuneration. The main provisions of the North American Free Trade Agreement (NAFTA) on trade secrets are analyzed in comparison with the EU legal system, according to which patent law provides additional incentives for the application of the commercial secrecy regime to protect confidential information. Four approaches to understanding this legal regime in the doctrine of Anglo-Saxon legal systems are analyzed: the theory of contractual obligation, the theory of fiduciary (trust) relations, the theory of misappropriation and the theory of unfair competition. It is concluded that the applied criteria for classifying information as a trade secret are similar, in relation to actions that are not appropriation of a trade secret, in particular, in relation to the ‘legalization’ of reverse development, which is relevant for the information technology industry. Ukraine has the prospect of including in its legislation an important legal act – the Law of Ukraine on Trade Secrets, which will have a positive impact on the business climate, promote investment attractiveness, and meet the needs of businesses and the state.
15

Hollman, Wayne A., and Brian H. Kleiner. "Establishing rapport: the secret business tool to success." Managing Service Quality: An International Journal 7, no. 4 (August 1997): 194–97. http://dx.doi.org/10.1108/09604529710173015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Hume, Margee, and Michael Mills. "Uncovering Victoria's Secret." Journal of Fashion Marketing and Management: An International Journal 17, no. 4 (September 13, 2013): 460–85. http://dx.doi.org/10.1108/jfmm-03-2013-0020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Zhao, Gui Fen, Ying Li, Li Ping Du, and Jian Wei Guo. "Security Middleware Based on Smart Card for E-Business." Applied Mechanics and Materials 380-384 (August 2013): 2451–54. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
With the increasing amount of online shoppers, the security for E-Business becomes more important. Security middleware is one of the methods to achieve secure E-Business application. A security middleware based on smart card and combined secret key is proposed for mobile users and PC users. The security components are developed on the basis of cipher service provide by smart cards, encryption cards and combined secret key method, and provide security service interfaces based on J2EE. The middleware is proved valid for protecting the secrecy and integrity of order information during payment test.
18

Zerra Sasicha, Agestania, Idah Hadijah, and Nurul Aini. "Profil Pemasaran Madame Wang Secret Garden Kota Malang." Jurnal Inovasi Teknologi dan Edukasi Teknik 1, no. 3 (June 28, 2021): 169–74. http://dx.doi.org/10.17977/um068v1n3p169-174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The purpose of this research was to get information about Madame Wang Secret Garden marketing profile that expected to be a reference for another business development in overcoming the tight competition of business in fashion. Based on observations and interviews, Madame Wang Secret Garden started from a small boutique in 2013 with offline and online marketing and merged the marketing system concept from boutique only to boutique-café in 2014. This makes Madame Wang Secret Garden more crowded because they both have a balanced and profitable reciprocity, so that Madame Wang Secret Garden boutiques are able to survive and compete with another competitors. This is evidenced by some awards that Madam Wang Secret Garden has received until now. Tujuan penelitian ini adalah untuk mendapatkan informasi tentang profil pemasaran Madame Wang Secret Garden yang kemudian diharapkan dapat menjadi rujukan atau referensi bagi pengembangan usaha yang lainnya dalam mengatasi ketatnya persaingan usaha pada bidang busana. Berdasarkan observasi dan wawancara, Madame Wang Secret Garden berawal dari sebuah butik kecil pada tahun 2013 dengan sistem pemasaran offline dan online. Lalu terjadi pengubahan konsep pemasaran dari butik saja menjadi butik-kafe yang menyatu pada tahun 2014. Hal ini membuat Madame Wang Secret Garden semakin ramai pengunjung karena keduanya memiliki timbal balik yang seimbang dan menguntungkan, sehingga butik Madame Wang Secret Garden mampu bertahan dan bersaing dengan kompetitor. Hal ini dibuktikan dengan beberapa penghargaan yang telah didapatkan oleh Madam Wang Secret Garden.
19

DUNCAN, BRIAN. "SECRET SANTA REVEALS THE SECRET SIDE OF GIVING." Economic Inquiry 47, no. 1 (January 2009): 165–81. http://dx.doi.org/10.1111/j.1465-7295.2008.00145.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Amidon, Debra M. "Dialogue with Customers: Secret to Innovation Strategy." International Journal of Innovation Management 01, no. 01 (March 1997): 73–87. http://dx.doi.org/10.1142/s136391969700005x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Enterprises are discovering a rededication to customers in ways rarely practised other than by the entrepreneurial firm. However, quality and restructuring methodologies have returned executives to their own raison d'etre by positioning customers at the heart of business survival. At the same time, cross-boundary alliances are demanding new partnering techniques with all stakeholders, including customers. New initiatives are commonplace, but are generally without an understanding that something is fundamentally different between customer satisfaction and the success of your customers. This article introduces the concepts in ways that are easily practised. Simply stated, treat your customers as sources of knowledge, not someone to whom you solely deliver products and services. By practising value-system (rather than value-chain) strategies, companies can take advantage of the business opportunities afforded by a collaborative economy. Similarly, by defining Strategic Business Network (SBN's) rather than Strategic Business Units (SBU's), companies can leverage all available knowledge sources. Most importantly, a symbiotic relationship with consumers, customers or clients can help a company envision products and services for unarticulated needs and unserved markets. Companies which are practising new ways of interfacing with customers are realising significant business results. A profile of customer innovation at Steelcase North America provides an illustration of this new partnering relationship.
21

Clarke, Philip A. "Response to ‘secret women's business: The Hindmarsh Island affair’." Journal of Australian Studies 20, no. 50-51 (January 1996): 141–49. http://dx.doi.org/10.1080/14443059609387285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

McCrystal, Cal. "The sub-secret underworld of the D-Notice business." British Journalism Review 10, no. 2 (June 1999): 26–33. http://dx.doi.org/10.1177/095647489901000205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Katrinasari, Bella, and Hernawan Hadi. "TINJAUAN HUKUM TERHADAP WANPRESTASI ROYALTY RAHASIA DAGANG DALAM PERJANJIAN WARALABA." Jurnal Privat Law 5, no. 1 (February 2, 2017): 85. http://dx.doi.org/10.20961/privat.v5i1.19364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
<p align="center"><strong><em>Abstract</em></strong></p><p><em>The purpose of this article is to review the form of the </em><em>breach law and the legal protection of trade secrets in franchisor business in Indonesia. Collecting primary and secondary law material through literature review technique. Agreement arranged in III KUHP about engagement. In Komala restaurant franchise agreement there are due to law in case of breach, that is when the franchisee do not pay the royalty fee to the franchisor, so franchisee obliged to pay the royalty fee who have not paid to the franchisor interest expense in payment royalty fee. In an culinary enterprise which is franchised must be have a secret like secret ingredients also the business implementation method. Trade secrets in franchise need to be protected to prevent recipe burglaries and unhealthy business competition. The franchisee must replace the loss of the secret company ownership. The franchise agreement is one of the law protection aspects. It is because agreement can be used as strong legal fundament to enforce legal protection of trade secrets and for both sides.</em></p><p><em>Keywords: Franchise, Trade Secrets, Breach.</em></p><p align="center"><strong>Abstrak</strong></p><p>Tujuan artikel ini adalah untuk mengetahui akibat hukum dari kelalaian dalam perjanjian serta perlindungan hukum rahasia dagang dalam bisnis waralaba kuliner di Indonesia. Dengan mengumpulkan bahan hukum primer dan sekunder melalui teknik studi kepustakaan. Perjanjian diatur dalam buku III KUH Perdata tentang Perikatan. Perjanjian waralaba Komala restaurant terdapat akibat hukum dalam hal terjadi wanprestasi, yaitu apabila pihak penerima waralaba tidak membayar <em>royalty fee</em> yang menjadi hak pihak pemberi waralaba, maka diwajibkan membayar <em>royalty fee</em> yang belum dibayarkan kepada pihak pemberi waralaba/franchisor serta bunga keterlambatan dalam pembayaran <em>royalty fee</em>. Dalam suatu perusahaan kuliner yang diwaralabakan pasti memiliki rahasia perusahaan berupa resep rahasia serta metode pelaksanaan bisnis tersebut. Rahasia dagang perlu dilindungi untuk mencegah pencurian resep dan persaingan usaha yang tidak sehat. Pihak penerima waralaba diwajibkan mengganti kerugian terhadap hak kemilikan rahasia perusahaan. Perjanjian waralaba merupakan salah satu aspek perlindungan hukum. Hal ini dikarenakan perjanjian dapat menjadi dasar hukum yang kuat untuk menegakkan perlindungan hukum rahasia dagang dan bagi para pihak.</p><p>Kata Kunci: Waralaba, Rahasia Dagang, Wanprestasi.</p>
24

Mashingaidze, Sivave. "Corporate espionage masquerading as business intelligence in local banks: A descriptive cross-sectional research." Corporate Ownership and Control 12, no. 4 (2015): 653–59. http://dx.doi.org/10.22495/cocv12i4c6p5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Information can make the difference between success and failure or profit and loss in the business world. If a trade secret is stolen, then the competitive playing field is leveled or worse, tipped in favor of the competitor. To complicate the problem even more, trade secrets are not only being sought after by a company’s competitors, but from foreign nations as well. They are hoping to use stolen corporate information to increase that nation’s competitive edge in the global marketplace. This article looked at corporate espionage, how it’s done, how it masquerades as business intelligence. Some solutions to reduce the risk of espionage were given. The methodology used was a descriptive cross-sectional research approach. The results found were that many banks and companies disguise corporate espionage as business intelligence and hack or steal other companies’ information.
25

Terasaki, Shinichiro, and Shin’ya Nagasawa. "The Relationship Between Brand Integrity and Business Continuity – A Case Study of Japanese Long-Standing Company, Shioyoshiken –." Journal of Advanced Computational Intelligence and Intelligent Informatics 16, no. 4 (June 20, 2012): 547–52. http://dx.doi.org/10.20965/jaciii.2012.p0547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The number 22,000 represents how many Japanese companies have lasted more than 100 years. This fact attracts the attention of the many researchers who explore the secrets of such business continuity, mainly from the angles of management philosophy, product innovation, and successful business succession. This paper, however, focuses more on brand management for identifying the relationship between brand building and business continuity, employing of the case of Shioyoshiken. Shioyoshiken is renowned for manufacturing sophisticated Japanese sweets for more than 130 years. The Shioyoshiken brand is well appreciated by private customers who emphasize the value of specialized sweets, particularly for Japanese tea parties and weddings. In this case study, we (1) explore Shioyoshiken “rashisa,” which means “identity” in English and (2) identify the secret of Shioyoshiken’s long-lasting brand strength, referring to an interview with Masaaki Takaya, the owner of Shioyoshiken, and deploying analytical frameworks such as 4M, 4P and Kotler’s 3i.
26

Listiasari, Faranita Ratih. "RAHASIA DAGANG SEBAGAI SALAH SATU PERLINDUNGAN HAK KEKAYAAN INTELEKTUAL DARI HASIL PENELITIAN HIBAH SEKOLAH VOKASI IPB TAHUN 2020." Jurnal Sains Terapan 11, no. 1 (September 18, 2021): 104–15. http://dx.doi.org/10.29244/jstsv.11.1.104-115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
ABSTRACTThe Research results as the result of thoughts from researchers or lecturers need to be protected from harmful fraudulent actions. Protection of the research results also provides motivation for researchers or lecturers to continue working. One form of protection provided is the protection of Intellectual Property Rights (IPR). Various forms of IPR can be utilized as long as it meets the criteria of the IPR field. The purpose of this study was to determine the form of protection of trade secrets for the Research Results. In addition, to find out the efforts that need to be made to fulfill trade secret requirements. This research is normative legal research with a qualitative approach. The Research results of The College of Vocational Studies IPB University’s lecturer who research grants in 2020 that can be given protection as trade secrets. The Research results can be protected as trade secrets if they meet the criteria that the research results are confidential information in the field of technology and/or business, have economic value and are kept confidential by researchers or lecturers. To maintain the confidentiality of the research results, efforts were made such as providing a password, writing the word "Secret", storing documents in a safe place, making a confidentiality agreement and inserting a confidentiality clause in the license agreement.
27

Schaefer, K. Aleks. "The Meat Racket: The Secret Takeover of America's Food Business." American Journal of Agricultural Economics 96, no. 5 (October 2014): 1507–8. http://dx.doi.org/10.1093/ajae/aau075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Revzan, Henry A. "The “secret” response to kidnapping." Business Horizons 33, no. 3 (May 1990): 79–81. http://dx.doi.org/10.1016/0007-6813(90)90046-e.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Zhao, Xuemei, Tongtong Zhang, Jun Liu, Canju Lu, Huan Lu, and Xuehu Yan. "Applying Secret Image Sharing to Economics." International Journal of Digital Crime and Forensics 13, no. 4 (July 2021): 16–25. http://dx.doi.org/10.4018/ijdcf.20210701.oa2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Economics has some limitations, such as insecure multiple parties economical investment decision and leakage of business quotation. Secret image sharing (SIS) for (k, n)-threshold is such a technique that protects an image through splitting it into n shadows, a.k.a. shadow images or shares, assigned to n corresponding participants. The secret image can be disclosed by obtaining k or more shadows. Polynomial-based SIS and visual secret sharing (VSS) are the chief research branches. This paper first analyzes the insecure issues in economics and then introduces two methods to apply typical SIS schemes to improve economical security. Finally, experiments are realized to illustrate the efficiency of the methods.
30

Završnik, Bruno. "Slovenian Managers in Business Negotiations." Annals of the Alexandru Ioan Cuza University - Economics 61, no. 1 (July 1, 2014): 108–15. http://dx.doi.org/10.2478/aicue-2014-0005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract Negotiations are an integral part of our life, both personal as well as at business level. The negotiations are old just as much as the human race and covering all human activities. They are the most complex forms of relationships between people, which represent a number of interdisciplinary knowledge and skills. The secret of successful negotiations is usually good prepared of the negotiators. Negotiations do not begin when we meet with opposite negotiator, but much earlier. The purpose of this study was to find out the negotiations in practice, what the negotiators, the Slovenian managers how to prepare for negotiations, how to negotiate, what negotiating tactics used, what personal qualities emphasize in the negotiations and, and finally how to evaluate themselves as negotiators
31

Akinbola, Amos Olufemi, Nureni Sanusi Alaka, Solomon Akpoviroro Kowo, and Adesola Alex Adeyemo. "Family Business Operations and Sequel of Internationalisation in Nigeria." Economics and Business 34, no. 1 (February 1, 2020): 126–38. http://dx.doi.org/10.2478/eb-2020-0009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
AbstractThe concept of family business in Nigeria has become significantly attractive; its root is in sole proprietorship form of business. Family businesses have the unique strength to separate culture, language and personality. The research analyses the effect of interpersonal relationship on internationalisation and determines the extent to which succession planning affects internationalisation. Research presents that a positive relationship exists between internationalisation and interpersonal relationship. It has also been discovered that no positive relationship exists between succession planning and internationalisation. This study therefore concludes that family businesses which proceed to internationalisation enjoy growth in productivity, adequate brand awareness in the world, diversification of political and financial risks, as well as experience an increase in the share of the market, capital base, asset and open up opportunities in regional markets for workers. The study also recommends that employees in family businesses should communicate with each other effectively for a healthy relationship and managers should not make secret preparations for successors.
32

AlZain, Mohammed A., Alice S. Li, Ben Soh, and Eric Pardede. "Multi-Cloud Data Management using Shamir's Secret Sharing and Quantum Byzantine Agreement Schemes." International Journal of Cloud Applications and Computing 5, no. 3 (July 2015): 35–52. http://dx.doi.org/10.4018/ijcac.2015070103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Cloud computing is a phenomenal distributed computing paradigm that provides flexible, low-cost on-demand data management to businesses. However, this so-called outsourcing of computing resources causes business data security and privacy concerns. Although various methods have been proposed to deal with these concerns, none of these relates to multi-clouds. This paper presents a practical data management model in a public and private multi-cloud environment. The proposed model BFT-MCDB incorporates Shamir's Secret Sharing approach and Quantum Byzantine Agreement protocol to improve trustworthiness and security of business data storage, without compromising performance. The performance evaluation is carried out using a cloud computing simulator called CloudSim. The experimental results show significantly better performance in terms of data storage and data retrieval compared to other common cloud cryptographic based models. The performance evaluation based on CloudSim experiments demonstrates the feasibility of the proposed multi-cloud data management model.
33

Fletcher, Stella. "Abbot Edmund Ford, secret agent." British Catholic History 35, no. 4 (October 2021): 440–61. http://dx.doi.org/10.1017/bch.2021.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Hugh Edmund Ford (1851–1930), first abbot of the English Benedictine monastery at Downside in Somerset, had a reputation, especially in monastic circles, as a scholarly and reforming monk. He is much less well known than his contemporary confrères, Cardinal Aidan Gasquet and Abbot Cuthbert Butler, lacking Gasquet’s public profile and Butler’s list of much-respected publications. Ford’s considerable political and diplomatic skills were honed in the promotion of a monastic reform movement which transformed the English Benedictine Congregation. He travelled widely on monastic business and also on account of his always delicate health. More surprisingly, in 1918, he acted as an agent for the British government on a mission to neutral Switzerland, where the Benedictine abbey of Einsiedeln provided a refuge for many Germans displaced from Rome when Italy entered the Great War in 1915. Ford made use of the various ecclesiastical networks available to him,including the Benedictine Confederation centred on S. Anselmo in Rome and connections made through the school at Downside. This article places Ford in these and other Catholic networks and demonstrates how they were put to use in the Allied cause during the First World War.
34

Vijaykumar, S., K. S. Rajkarthick, and J. Priya. "Innovative Business Opportunities and Smart Business Management Techniques from Green Cloud TPS." International Journal of Asian Business and Information Management 3, no. 4 (October 2012): 62–72. http://dx.doi.org/10.4018/jabim.2012100107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Presently, technology plays a vital role in the field of business to acquire its position in the global market. The authors’ proposal brings a smart way of making business by the eco-friendly and economical friendly Cloud TPS. Cloud TPS provides advance features compare with cloud computing because Cloud TPS bears with ACID property which is not acquired in cloud computing. It reveals the secret behind it and gives opportunities for students, house hold businesses and corporation in this fourth version of the authors’ research bringing you the most advanced technology and its latest opportunities. In addition it deals with how it supports to reduce global warming and an overview to which way society can be able to gives their pc to cloud and ways to earn money. The authors classified the opportunities into three categories of opportunities. An additional supporting feature behind this business opportunity is reducing global warming, as well as satisfy the RRD concept and gives an idea to utilize it in an efficient manner, which will be reveal by this paper as we take you to the next generation computing based business opportunities.
35

Scott, Craig R., and SoeYoon Choi. "Top secret from the bottom up." Corporate Communications: An International Journal 22, no. 4 (October 2, 2017): 556–61. http://dx.doi.org/10.1108/ccij-08-2017-0072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Purpose The emerging area of message classification is one of growing relevance to a wide range of organizational communicators as a variety of non-state organizations and their members increasingly use and misuse various terms to restrict their communication. This includes formal classifications for data security, financial/knowledge management, human resources, and other functions as well as those used informally by organizational members. Especially in a data-rich environment where our word-processing programs, e-mail tools, and other technologies afford us opportunities to engage in classification, a wide range of people at all organizational levels may serve as custodians of their own data and thus have the ability (as well as perhaps the need) to classify messages in various ways. The purpose of this paper is to describe key classification terms ranging from those found in government (e.g. top secret, confidential) to those in the private sector (e.g. business use only, trademarked) to an even wider set of terms used informally by organizational members (e.g. personal, preliminary). The growing use of message classifications will likely create various challenges and opportunities for organizations, their members, and the broader public/society. A set of future research questions is offered for corporate communication researchers and practitioners, who are well positioned to examine this emerging phenomenon. Design/methodology/approach This paper draws on existing literature related to the growing use of message classifications to offer a list of classification terms and an agenda for future research. Findings This work describes key classification terms ranging from those found in government (e.g. top secret, confidential) to those in the private sector (e.g. business use only, trademarked) to an even wider set of terms used informally by organizational members (e.g. personal, preliminary). This expanded notion of classification will likely create various challenges and opportunities for organizations, their members, and the broader public/society. Originality/value The emerging area of message classification is one of growing relevance to a wide range of organizational communicators as a variety of non-state organizations and their members increasingly use and misuse various terms to restrict their communication. A set of future research questions is offered for corporate communication researchers and practitioners, who are well positioned to examine this emerging phenomenon.
36

Venkadesh, P., Julia Punitha Malar Dhas, and S. V. Divya. "A technique for transmitting secret message using secret matrix in SCTP." International Journal of Enterprise Network Management 7, no. 1 (2016): 1. http://dx.doi.org/10.1504/ijenm.2016.075171.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Frame, Alicia. "Is graph data science the secret to accelerating machine learning?" ITNOW 63, no. 2 (June 1, 2021): 54–55. http://dx.doi.org/10.1093/itnow/bwab058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Amrani, Clare. "A helping hand in aesthetic challenges: professional practice and overcoming hurdles." Journal of Aesthetic Nursing 8, no. 8 (October 2, 2019): 392–94. http://dx.doi.org/10.12968/joan.2019.8.8.392.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
It is no secret that running a private aesthetic clinic can be a lonely business. The BACN's Clare Amrani expands on the association's values and its mission to make aesthetic practice safer for all involved
39

Dhanania, Kusum, and Sandhya Gopakumaran. "Marwari business discourse." Journal of Asian Pacific Communication 15, no. 2 (November 18, 2005): 287–312. http://dx.doi.org/10.1075/japc.15.2.05dha.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The aim of this article is to analyse the patterns of the business discourse of the Marwari community, one of the most successful business communities in India. Two specific business contexts — of the dispute situation and non-dispute situation — have been examined across the pre-colonial, the colonial and post-colonial period to gauge the Marwari responses to social, cultural and political changes in the history of India. The Marwari culture is synonymous with their business ethos. Migration, religion and family are factors that contribute to their distinct identity as a business community. Various observations made by business historians about the community have been examined through the lenses of communication and discourse to highlight the distinguishing features of the Marwari business ethos. The second part of the article examines the Marwari dispute resolution method as the secret behind the success of the Marwaris as a business community, when compared to the adversarial method of dispute resolution adopted by disputing parties at large in India. The concluding part of the paper recognizes certain ambivalences in the context of a confluence between the pre-colonial, colonial and post-colonial methods of dispute resolutions in Marwari dispute resolution contexts in the globalization era in India.
40

Utami, Dian Arlupi, Noviyanti Noviyanti, Gading Gama Putra, and Agus Prasetyawan. "Sociopreneurship sebagai Alternatif Pemberdayaan Masyarakat dan Pengentasan Kemiskinan." Jurnal Ilmu Administrasi Negara ASIAN (Asosiasi Ilmuwan Administrasi Negara) 5, no. 2 (April 2, 2018): 31–46. http://dx.doi.org/10.47828/jianaasian.v5i2.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Not the secret of Indonesia's social and economic problems are poverty and unemployment. Sociopreneuship as an economic driver, provides business opportunities, business views and practical aspects in solving social and economic problems. In addition to macroeconomic improvements, sociopreneurship is a solution to improve the national economy. This paper describes sociopreneurship, poverty, theoretical community empowerment and best practice sociopreneurship in Indonesia
41

Urbaczewski, Andrew, and Leonard M. Jessup. "Web browser, what's that secret you're keeping?" Business Horizons 46, no. 5 (September 2003): 25–32. http://dx.doi.org/10.1016/s0007-6813(03)00068-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Rodas, Maria A., and Deborah Roedder John. "The Secrecy Effect: Secret Consumption Increases Women’s Product Evaluations and Choice." Journal of Consumer Research 46, no. 6 (September 14, 2019): 1093–109. http://dx.doi.org/10.1093/jcr/ucz041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract Advertisers often depict their products being consumed in a social setting, but they also depict people secretly consuming their products. Will consumers like a product more if they are prompted to consume it in secret? We report eight studies, where women consumed and evaluated products such as cookies, chocolate, and apple chips. Women in secret consumption conditions were instructed to imagine eating the food in secret, instructed to hide the food from others while consuming it, or shown an advertisement encouraging eating the food in secret. These secret consumption prompts resulted in more positive product evaluations and increased product choice, compared to evaluations in non-secret conditions. We identify preoccupation and attitude polarization as the primary drivers for these outcomes. When women consume a product in secret, they become preoccupied with the product, as thoughts about the product continually pop into mind. Increased thinking leads to attitude polarization, where evaluations for products they like become even more positive. Finally, we also identify moderators of these secrecy effects.
43

Miller, Kimberly A. "Dress: Private and Secret Self-Expression." Clothing and Textiles Research Journal 15, no. 4 (October 1997): 223–34. http://dx.doi.org/10.1177/0887302x9701500404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Sampson, Jesse. "Secret digital coin mining and trading is a threat to your business." Computer Fraud & Security 2018, no. 4 (April 2018): 8–10. http://dx.doi.org/10.1016/s1361-3723(18)30032-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Benham Dittoe, Alanna. "To learn the secret of success in business, listen to consumer needs." Journal of the American Dietetic Association 93, no. 4 (April 1993): 397–99. http://dx.doi.org/10.1016/0002-8223(93)92277-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Yeo, Roland K. "Learning: The Secret to the Art of War." Management Research News 28, no. 8 (August 2005): 27–33. http://dx.doi.org/10.1108/01409170510784931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Cross, Robert G., and Ashutosh Dixit. "Customer-centric pricing: The surprising secret for profitability." Business Horizons 48, no. 6 (November 2005): 483–91. http://dx.doi.org/10.1016/j.bushor.2005.04.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Nirmala, Endar. "Penerapan Steganografi File Gambar Menggunakan Metode Least Significant Bit (LSB) dan Algoritma Kriptografi Advanced Encryption Standard (AES) Berbasis Android." Jurnal Informatika Universitas Pamulang 5, no. 1 (March 31, 2020): 36. http://dx.doi.org/10.32493/informatika.v5i1.4646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Sending messages in the form of image files among the public or business people using the SMS feature from time to time is increasingly easy and often done. Messages can be sent from business partners or from clients. If the file is used for business purposes, it is an important secret for the company, and very dangerous if it falls into the hands of an undue. Therefore the security and confidentiality of the files sent are important and are very necessary in the exchange of information in this case in the form of image files through internet media. The method used to overcome this problem applies a combination of Advanced Encrytion Standard (AES) Cryptographic Algorithm techniques integrated with the Least Significant Bit (LSB) method. The integration of these techniques aims to provide protection or security systems on secret file messages in the form of images sent. The results of this study are applications called "StegoKripto" which is a combination of steganography and cryptography. The application runs on the Android platform which can encrypt text messages and hide the messages in pictures in the format .jpg and .png.
49

Wang, Rui, Guohua Wu, Qiuhua Wang, Lifeng Yuan, Zhen Zhang, and Gongxun Miao. "Reversible Data Hiding in Encrypted Images Using Median Edge Detector and Two’s Complement." Symmetry 13, no. 6 (May 21, 2021): 921. http://dx.doi.org/10.3390/sym13060921.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
With the rapid development of cloud storage, an increasing number of users store their images in the cloud. These images contain many business secrets or personal information, such as engineering design drawings and commercial contracts. Thus, users encrypt images before they are uploaded. However, cloud servers have to hide secret data in encrypted images to enable the retrieval and verification of massive encrypted images. To ensure that both the secret data and the original images can be extracted and recovered losslessly, researchers have proposed a method that is known as reversible data hiding in encrypted images (RDHEI). In this paper, a new RDHEI method using median edge detector (MED) and two’s complement is proposed. The MED prediction method is used to generate the predicted values of the original pixels and calculate the prediction errors. The adaptive-length two’s complement is used to encode the most prediction errors. To reserve room, the two’s complement is labeled in the pixels. To record the unlabeled pixels, a label map is generated and embedded into the image. After the image has been encrypted, it can be embedded with the data. The experimental results indicate that the proposed method can reach an average embedding rate of 2.58 bpp, 3.04 bpp, and 2.94 bpp on the three datasets, i.e., UCID, BOSSbase, BOWS-2, which outperforms the previous work.
50

Zaitseva-Kalaur, Inna. "Оrganizational and legal procedures for protection of a commercial secret of business subsidiary." Aktual’ni problemi pravoznavstva 1, no. 4 (October 24, 2018): 110–15. http://dx.doi.org/10.35774/app2018.04.110.

Full text
APA, Harvard, Vancouver, ISO, and other styles

To the bibliography