Journal articles on the topic 'Business secret'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Business secret.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Alexander, Sheryl. "Secret midwives business." Australian Journal of Midwifery 14, no. 2 (January 2001): 4. http://dx.doi.org/10.1016/s1445-4386(01)80041-0.
Parsons, Louise. "Secret women's business." Women and Birth 26 (October 2013): S49. http://dx.doi.org/10.1016/j.wombi.2013.08.153.
Konek, Carol Wolfe. "Women's secret business." Peace Review 9, no. 4 (December 1997): 469–74. http://dx.doi.org/10.1080/10402659708426095.
Gillam, Lynn. "Secret ethics business?" Monash Bioethics Review 22, no. 1 (January 2003): S52—S62. http://dx.doi.org/10.1007/bf03351387.
Putri, Fiona eriba Rahma, and Sri Maharani MTVM. "A Legal Protection On Owner Of Trade Secret On Coffe Powder Blend That Violate Trade Secret Act No 30 Of 2000." LIGAHUKUM 2, no. 1 (July 23, 2021): 87–96. http://dx.doi.org/10.33005/ligahukum.v2i1.75.
Tesk, Kirk. "Trade Secrets 101." Mechanical Engineering 130, no. 10 (October 1, 2008): 36–38. http://dx.doi.org/10.1115/1.2008-oct-4.
Friedman, David D., William M. Landes, and Richard A. Posner. "Some Economics of Trade Secret Law." Journal of Economic Perspectives 5, no. 1 (February 1, 1991): 61–72. http://dx.doi.org/10.1257/jep.5.1.61.
MALIK, ZAKI, and ATHMAN BOUGUETTAYA. "PRESERVING TRADE SECRETS BETWEEN COMPETITORS IN B2B INTERACTIONS." International Journal of Cooperative Information Systems 14, no. 02n03 (June 2005): 265–97. http://dx.doi.org/10.1142/s0218843005001146.
Widerski, Piotr. "Protection of trade secrets in polish and european legislation." ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 22, no. 2 (July 25, 2018): 58–68. http://dx.doi.org/10.5604/01.3001.0012.5316.
Mbachu, Dulue. "A dastardly business." Index on Censorship 24, no. 4 (July 1995): 20. http://dx.doi.org/10.1177/030642209502400407.
Yanuarsi, Susi. "PERLINDUNGAN HUKUM TERHADAP PEMILIK RAHASIA DAGANG YANG BERSIFAT KOMERSIL." Solusi 17, no. 2 (May 1, 2019): 122–31. http://dx.doi.org/10.36546/solusi.v17i2.146.
KNOWLES, OWEN. "FISHY BUSINESS IN CONRAD'S THE SECRET AGENT." Notes and Queries 37, no. 4 (December 1, 1990): 433–34. http://dx.doi.org/10.1093/nq/37-4-433.
GARCÍA PASTOR, IMANOL, FRANCISCO SANCHEZ FUENTE, and JOSE RAMON OTEGI OLASO. "MODELLING A BLOCKCHAIN SOLUTION FOR INTELLECTUAL PROPERTY MANAGEMENT IN DIGITISED INDUSTRIAL ENVIRONMENTS." DYNA 96, no. 6 (November 1, 2021): 576–80. http://dx.doi.org/10.6036/10294.
Aliyeva-Baranovska, Vira, and Olha Sirenko. "Comparative characteristics of trade secret in the legislation of foreign countries and in international law." Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav 4, no. 4 (December 29, 2020): 135–49. http://dx.doi.org/10.31733/2078-3566-2020-4-135-149.
Hollman, Wayne A., and Brian H. Kleiner. "Establishing rapport: the secret business tool to success." Managing Service Quality: An International Journal 7, no. 4 (August 1997): 194–97. http://dx.doi.org/10.1108/09604529710173015.
Hume, Margee, and Michael Mills. "Uncovering Victoria's Secret." Journal of Fashion Marketing and Management: An International Journal 17, no. 4 (September 13, 2013): 460–85. http://dx.doi.org/10.1108/jfmm-03-2013-0020.
Zhao, Gui Fen, Ying Li, Li Ping Du, and Jian Wei Guo. "Security Middleware Based on Smart Card for E-Business." Applied Mechanics and Materials 380-384 (August 2013): 2451–54. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2451.
Zerra Sasicha, Agestania, Idah Hadijah, and Nurul Aini. "Profil Pemasaran Madame Wang Secret Garden Kota Malang." Jurnal Inovasi Teknologi dan Edukasi Teknik 1, no. 3 (June 28, 2021): 169–74. http://dx.doi.org/10.17977/um068v1n3p169-174.
DUNCAN, BRIAN. "SECRET SANTA REVEALS THE SECRET SIDE OF GIVING." Economic Inquiry 47, no. 1 (January 2009): 165–81. http://dx.doi.org/10.1111/j.1465-7295.2008.00145.x.
Amidon, Debra M. "Dialogue with Customers: Secret to Innovation Strategy." International Journal of Innovation Management 01, no. 01 (March 1997): 73–87. http://dx.doi.org/10.1142/s136391969700005x.
Clarke, Philip A. "Response to ‘secret women's business: The Hindmarsh Island affair’." Journal of Australian Studies 20, no. 50-51 (January 1996): 141–49. http://dx.doi.org/10.1080/14443059609387285.
McCrystal, Cal. "The sub-secret underworld of the D-Notice business." British Journalism Review 10, no. 2 (June 1999): 26–33. http://dx.doi.org/10.1177/095647489901000205.
Katrinasari, Bella, and Hernawan Hadi. "TINJAUAN HUKUM TERHADAP WANPRESTASI ROYALTY RAHASIA DAGANG DALAM PERJANJIAN WARALABA." Jurnal Privat Law 5, no. 1 (February 2, 2017): 85. http://dx.doi.org/10.20961/privat.v5i1.19364.
Mashingaidze, Sivave. "Corporate espionage masquerading as business intelligence in local banks: A descriptive cross-sectional research." Corporate Ownership and Control 12, no. 4 (2015): 653–59. http://dx.doi.org/10.22495/cocv12i4c6p5.
Terasaki, Shinichiro, and Shin’ya Nagasawa. "The Relationship Between Brand Integrity and Business Continuity – A Case Study of Japanese Long-Standing Company, Shioyoshiken –." Journal of Advanced Computational Intelligence and Intelligent Informatics 16, no. 4 (June 20, 2012): 547–52. http://dx.doi.org/10.20965/jaciii.2012.p0547.
Listiasari, Faranita Ratih. "RAHASIA DAGANG SEBAGAI SALAH SATU PERLINDUNGAN HAK KEKAYAAN INTELEKTUAL DARI HASIL PENELITIAN HIBAH SEKOLAH VOKASI IPB TAHUN 2020." Jurnal Sains Terapan 11, no. 1 (September 18, 2021): 104–15. http://dx.doi.org/10.29244/jstsv.11.1.104-115.
Schaefer, K. Aleks. "The Meat Racket: The Secret Takeover of America's Food Business." American Journal of Agricultural Economics 96, no. 5 (October 2014): 1507–8. http://dx.doi.org/10.1093/ajae/aau075.
Revzan, Henry A. "The “secret” response to kidnapping." Business Horizons 33, no. 3 (May 1990): 79–81. http://dx.doi.org/10.1016/0007-6813(90)90046-e.
Zhao, Xuemei, Tongtong Zhang, Jun Liu, Canju Lu, Huan Lu, and Xuehu Yan. "Applying Secret Image Sharing to Economics." International Journal of Digital Crime and Forensics 13, no. 4 (July 2021): 16–25. http://dx.doi.org/10.4018/ijdcf.20210701.oa2.
Završnik, Bruno. "Slovenian Managers in Business Negotiations." Annals of the Alexandru Ioan Cuza University - Economics 61, no. 1 (July 1, 2014): 108–15. http://dx.doi.org/10.2478/aicue-2014-0005.
Akinbola, Amos Olufemi, Nureni Sanusi Alaka, Solomon Akpoviroro Kowo, and Adesola Alex Adeyemo. "Family Business Operations and Sequel of Internationalisation in Nigeria." Economics and Business 34, no. 1 (February 1, 2020): 126–38. http://dx.doi.org/10.2478/eb-2020-0009.
AlZain, Mohammed A., Alice S. Li, Ben Soh, and Eric Pardede. "Multi-Cloud Data Management using Shamir's Secret Sharing and Quantum Byzantine Agreement Schemes." International Journal of Cloud Applications and Computing 5, no. 3 (July 2015): 35–52. http://dx.doi.org/10.4018/ijcac.2015070103.
Fletcher, Stella. "Abbot Edmund Ford, secret agent." British Catholic History 35, no. 4 (October 2021): 440–61. http://dx.doi.org/10.1017/bch.2021.18.
Vijaykumar, S., K. S. Rajkarthick, and J. Priya. "Innovative Business Opportunities and Smart Business Management Techniques from Green Cloud TPS." International Journal of Asian Business and Information Management 3, no. 4 (October 2012): 62–72. http://dx.doi.org/10.4018/jabim.2012100107.
Scott, Craig R., and SoeYoon Choi. "Top secret from the bottom up." Corporate Communications: An International Journal 22, no. 4 (October 2, 2017): 556–61. http://dx.doi.org/10.1108/ccij-08-2017-0072.
Venkadesh, P., Julia Punitha Malar Dhas, and S. V. Divya. "A technique for transmitting secret message using secret matrix in SCTP." International Journal of Enterprise Network Management 7, no. 1 (2016): 1. http://dx.doi.org/10.1504/ijenm.2016.075171.
Frame, Alicia. "Is graph data science the secret to accelerating machine learning?" ITNOW 63, no. 2 (June 1, 2021): 54–55. http://dx.doi.org/10.1093/itnow/bwab058.
Amrani, Clare. "A helping hand in aesthetic challenges: professional practice and overcoming hurdles." Journal of Aesthetic Nursing 8, no. 8 (October 2, 2019): 392–94. http://dx.doi.org/10.12968/joan.2019.8.8.392.
Dhanania, Kusum, and Sandhya Gopakumaran. "Marwari business discourse." Journal of Asian Pacific Communication 15, no. 2 (November 18, 2005): 287–312. http://dx.doi.org/10.1075/japc.15.2.05dha.
Utami, Dian Arlupi, Noviyanti Noviyanti, Gading Gama Putra, and Agus Prasetyawan. "Sociopreneurship sebagai Alternatif Pemberdayaan Masyarakat dan Pengentasan Kemiskinan." Jurnal Ilmu Administrasi Negara ASIAN (Asosiasi Ilmuwan Administrasi Negara) 5, no. 2 (April 2, 2018): 31–46. http://dx.doi.org/10.47828/jianaasian.v5i2.4.
Urbaczewski, Andrew, and Leonard M. Jessup. "Web browser, what's that secret you're keeping?" Business Horizons 46, no. 5 (September 2003): 25–32. http://dx.doi.org/10.1016/s0007-6813(03)00068-5.
Rodas, Maria A., and Deborah Roedder John. "The Secrecy Effect: Secret Consumption Increases Women’s Product Evaluations and Choice." Journal of Consumer Research 46, no. 6 (September 14, 2019): 1093–109. http://dx.doi.org/10.1093/jcr/ucz041.
Miller, Kimberly A. "Dress: Private and Secret Self-Expression." Clothing and Textiles Research Journal 15, no. 4 (October 1997): 223–34. http://dx.doi.org/10.1177/0887302x9701500404.
Sampson, Jesse. "Secret digital coin mining and trading is a threat to your business." Computer Fraud & Security 2018, no. 4 (April 2018): 8–10. http://dx.doi.org/10.1016/s1361-3723(18)30032-0.
Benham Dittoe, Alanna. "To learn the secret of success in business, listen to consumer needs." Journal of the American Dietetic Association 93, no. 4 (April 1993): 397–99. http://dx.doi.org/10.1016/0002-8223(93)92277-5.
Yeo, Roland K. "Learning: The Secret to the Art of War." Management Research News 28, no. 8 (August 2005): 27–33. http://dx.doi.org/10.1108/01409170510784931.
Cross, Robert G., and Ashutosh Dixit. "Customer-centric pricing: The surprising secret for profitability." Business Horizons 48, no. 6 (November 2005): 483–91. http://dx.doi.org/10.1016/j.bushor.2005.04.005.
Nirmala, Endar. "Penerapan Steganografi File Gambar Menggunakan Metode Least Significant Bit (LSB) dan Algoritma Kriptografi Advanced Encryption Standard (AES) Berbasis Android." Jurnal Informatika Universitas Pamulang 5, no. 1 (March 31, 2020): 36. http://dx.doi.org/10.32493/informatika.v5i1.4646.
Wang, Rui, Guohua Wu, Qiuhua Wang, Lifeng Yuan, Zhen Zhang, and Gongxun Miao. "Reversible Data Hiding in Encrypted Images Using Median Edge Detector and Two’s Complement." Symmetry 13, no. 6 (May 21, 2021): 921. http://dx.doi.org/10.3390/sym13060921.
Zaitseva-Kalaur, Inna. "Оrganizational and legal procedures for protection of a commercial secret of business subsidiary." Aktual’ni problemi pravoznavstva 1, no. 4 (October 24, 2018): 110–15. http://dx.doi.org/10.35774/app2018.04.110.