To see the other types of publications on this topic, follow the link: The Secret History.

Journal articles on the topic 'The Secret History'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'The Secret History.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Barbosa, Marcia. "Secret history." Physics World 20, no. 1 (January 2007): 40. http://dx.doi.org/10.1088/2058-7058/20/1/38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kurti, Nicholas. "Secret history." Nature 364, no. 6433 (July 1993): 114. http://dx.doi.org/10.1038/364114a0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Värv, Age, Heiki Pisuke, Tõnis Mets, Elise Vasamäe, and Aleksei Kelli. "Trade Secrets in the Intellectual Property Strategies of Entrepreneurs: The Estonian Experience." Review of Central and East European Law 35, no. 4 (2010): 315–39. http://dx.doi.org/10.1163/157303510x12650378240476.

Full text
Abstract:
AbstractSecrecy is a traditional method of knowledge protection. The protection and management of trade secrets has high strategic relevance for small transition economies. As the majority of Estonian entrepreneurs are SMEs in low-tech sectors, the implementation of adequate trade-secret protection strategy is vital. There are several advantages to trade-secret protection. First, the scope of trade-secret protection can be extensive and includes non-patentable knowledge. Second, it does not require the registration or fulfilment of any formal procedures.The Estonian high-tech sector also relies on trade-secret protection. Concentration of activities in a low- or high-tech sector only determines whether entrepreneurs combine patent and trade-secret protection or whether they are solely dependent on trade-secret protection.The enhancement of entrepreneurial skills to manage trade-secrets is crucial. Despite the high strategic relevance of trade secret protection, Estonian entrepreneurs do not, yet, seem to have the necessary capabilities to leverage trade-secret protection. A similar situation can be detected in other Baltic states. Therefore, the main focus of this article is on the exploration of how to control and utilize trade secrets in the value creation process by entrepreneurs in the Estonian legal and economic environment through appropriate economic and legal strategies and relevant legal implementation and protection measures. The authors analyze theoretical and practical issues concerning trade-secret protection, argue their own concepts and put forward several proposals.
APA, Harvard, Vancouver, ISO, and other styles
4

Rabb, Melinda Alliker. "Swift, Secret History, and War." Eighteenth-Century Life 44, no. 3 (September 1, 2020): 30–50. http://dx.doi.org/10.1215/00982601-8718644.

Full text
Abstract:
“Swift, Secret History, and War” argues that the relationship between Swift’s writing, reading, and his abiding interest in the English Civil Wars produced a distinctive contribution to the discourses that arose after the reestablishment of monarchy, called “secret histories.” These narratives claim to expose clandestine acts, to pull away veils that hide petty motives, and to expose abuses underlying the exercise of power. In Swift’s work, however, the impulse to dig up embarrassing or disillusioning secrets serves yet another purpose; it allows more painful realities to remain buried and thus provides a means of displacing, postponing, and avoiding direct confrontation with the devastation caused by war. The following discussion identifies and analyzes some of the ways in which traumatic conflict—especially within a nation in which neighbor has fought neighbor—requires indirection, delayed response, and the transference of the burden of representation onto succeeding generations. Literature can play a crucial role in the process of displacement when human history has proven (as Gulliver’s Houyhnhnm master observes) “capable of such Enormities, . . . worse than Brutality itself.” Swift’s distinctive deployment of secret history’s strategies allows an ironic historian a mechanism to look directly at and disclose some of the follies and vices of his culture, but also to remain cognizant, at some level, of what remains buried under “the heap” of a traumatic past.
APA, Harvard, Vancouver, ISO, and other styles
5

Boyce, Niall. "A secret history." Lancet 380, no. 9855 (November 2012): 1732–33. http://dx.doi.org/10.1016/s0140-6736(12)61978-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Janzen, Saskia. "The Secret History." Tijdschrift voor Psychotherapie 19, no. 6 (December 1993): 275–78. http://dx.doi.org/10.1007/bf03061816.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Piliavsky, Anastasia. "A Secret in the Oxford Sense: Thieves and the Rhetoric of Mystification in Western India." Comparative Studies in Society and History 53, no. 2 (March 29, 2011): 290–313. http://dx.doi.org/10.1017/s0010417511000065.

Full text
Abstract:
Common sense commodifies the secret, alienating the value of its content from its social context. But a secret perfectly kept dies in its circle of initiates. Few secrets, however, are dead on arrival, since their seduction lies precisely in their revelation. Most things said to be hidden are in fact nurtured through the processes of calculated concealment, allusion, and revelation, the secrets propagating themselves through circles of conspiracy, rumor, and gossip. As Tim Jenkins observed, “What is concealed, and the reasons for its concealment, serve to distract attention from the dynamic of the secret: what at first sight appears to be static and indeed dead, possessed by and known to only a few, kept in some dark place, in fact has a life and movement of its own; the secret propagates itself through a structure of secret and betrayal” (1999: 225–26).
APA, Harvard, Vancouver, ISO, and other styles
8

van Meter, Ryan. "A Family's Secret History." Iowa Review 37, no. 2 (October 2007): 175–77. http://dx.doi.org/10.17077/0021-065x.6376.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

A., MUNTIAN, and SHPAK I. "A SECRET HISTORY: CHARACTER ANALYSIS." South archive (philological sciences), no. 77 (March 25, 2019): 41–44. http://dx.doi.org/10.32999/ksu2663-2691/2019-77-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Silver, Daniel. "The Secret History of Mathematicians." American Scientist 94, no. 6 (2006): 556. http://dx.doi.org/10.1511/2006.62.556.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Cowan, Brian. "The History of Secret Histories." Huntington Library Quarterly 81, no. 1 (2018): 121–51. http://dx.doi.org/10.1353/hlq.2018.0004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Prawer, S. S. "Thackeray's Goethe: A ‘Secret History’." Publications of the English Goethe Society 62, no. 1 (January 1991): 1–34. http://dx.doi.org/10.1080/09593683.1991.11716263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Hobson, Christopher. "The secret history of democracy." Global Change, Peace & Security 24, no. 1 (February 2012): 193–94. http://dx.doi.org/10.1080/14781158.2012.641283.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Dimitrakaki, Angela. "Elements of a secret history." Third Text 10, no. 37 (December 1996): 63–74. http://dx.doi.org/10.1080/09528829608576642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Levine-Keating, Helane. "Secret History of Writing Programs." American Book Review 37, no. 2 (2016): 26–27. http://dx.doi.org/10.1353/abr.2016.0009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Sherman, Sandra. "The secret history ofthe secret history:Grub street decorum inRobinson Crusoe." Prose Studies 17, no. 2 (August 1994): 1–22. http://dx.doi.org/10.1080/01440359408586520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Urban, Hugh B. "“The Third Wall of Fire”." Nova Religio 20, no. 4 (May 1, 2017): 13–36. http://dx.doi.org/10.1525/nr.2017.20.4.13.

Full text
Abstract:
This article examines the role of secrecy in the Church of Scientology, focusing on one of the most confidential and least studied aspects of the Church’s advanced auditing levels—Operating Thetan VIII. I use this example as a way of highlighting the complex ethical and epistemological problems in the study of secrecy in new religions. Here, I suggest an alternative approach to the study of secrecy by shifting our gaze away from the attempt to uncover the content of the secret and instead focusing on the more visible forms and strategies through which secrets are maintained, transmitted, revealed and concealed. I trace the “history of a secret” by examining five periods and five key strategies in the Operating Thetan materials from the late 1960s to the present: the advertisement of the secret; secrecy as an adorning possession; the litigation of the secret; the liability of the secret; and the irrelevance of the secret. Finally, I conclude with reflections on the comparative implications of this example for the study of new religions more broadly.
APA, Harvard, Vancouver, ISO, and other styles
18

Herdt, Gilbert. "SECRET SOCIETIES AND SECRET COLLECTIVES." Oceania 60, no. 4 (June 1990): 360–81. http://dx.doi.org/10.1002/j.1834-4461.1990.tb01561.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Abrahamian, Levon H. "The Secret Police As a Secret Society." Anthropology & Archeology of Eurasia 32, no. 3 (December 1993): 12–31. http://dx.doi.org/10.2753/aae1061-1959320312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Gubarev, V. "Building an automatic model of the admission system to state secrets based on the IDEF0 model." National Security and Strategic Planning 2021, no. 4 (January 29, 2022): 77–82. http://dx.doi.org/10.37468/2307-1400-2022-2021-4-77-82.

Full text
Abstract:
Currently, it is an urgent task to increase the efficiency of the system of access to state secrets through the creation and implementation of modern information technologies. The article proposes an approach to the transition from the conceptual model of the system of access to state secrets to the model of finite automata. The scientific novelty of the research lies in the fact that for the first time an approach has been proposed to build an automatic model of the state secret access system based on the IDEF0 model describing the processes occurring in the state secret access system. The practical significance of the research lies in simplifying the construction of a mathematical model of the state secret access system, which can be used to develop an appropriate automated information system.
APA, Harvard, Vancouver, ISO, and other styles
21

Cutter, S. L. "The secret history of natural disaster." Environmental Hazards 3, no. 1 (January 2001): 29. http://dx.doi.org/10.3763/ehaz.2001.0303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Steinberg, Ted. "The secret history of natural disaster." Environmental Hazards 3, no. 1 (January 2001): 31–35. http://dx.doi.org/10.3763/ehaz.2001.0304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Carnell, Rachel. "Slipping from Secret History to Novel." Eighteenth-Century Fiction 28, no. 1 (September 2015): 1–24. http://dx.doi.org/10.3138/ecf.28.1.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

CUTTER, S. "The secret history of natural disaster." Global Environmental Change Part B: Environmental Hazards 3, no. 1 (March 2001): 29. http://dx.doi.org/10.1016/s1464-2867(01)00015-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

STEINBERG, T. "The secret history of natural disaster." Global Environmental Change Part B: Environmental Hazards 3, no. 1 (March 2001): 31–35. http://dx.doi.org/10.1016/s1464-2867(01)00016-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Rigby, Darrell. "The secret history of process reengineering." Planning Review 21, no. 2 (February 1993): 24–27. http://dx.doi.org/10.1108/eb054408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Rothman, Tony. "The Secret History of Gravitational Waves." American Scientist 106, no. 2 (2018): 96. http://dx.doi.org/10.1511/2018.106.2.96.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Toffoletti, Kim. "The Secret History of Wonder Woman." Australian Feminist Studies 30, no. 85 (July 3, 2015): 309–11. http://dx.doi.org/10.1080/08164649.2015.1107948.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Luebke, Sam, and Jennifer Luff. "Contemporary Affairs: Organizing: a secret history." Labor History 44, no. 4 (November 2003): 421–32. http://dx.doi.org/10.1080/0023656032000170041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

James, Harold. "A Secret History of the Crash?" Current History 117, no. 802 (November 1, 2018): 325–27. http://dx.doi.org/10.1525/curh.2018.117.802.325.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Ellis, J. H. "THE HISTORY OF NON-SECRET ENCRYPTION." Cryptologia 23, no. 3 (July 1999): 267–73. http://dx.doi.org/10.1080/0161-119991887919.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Goodman, Dena. "A Secret History of Learned Societies." Studies in Eighteenth-Century Culture 48, no. 1 (2019): 3–22. http://dx.doi.org/10.1353/sec.2019.0002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Gretchen Woertendyke. "Romance to Novel: A Secret History." Narrative 17, no. 3 (2009): 255–73. http://dx.doi.org/10.1353/nar.0.0028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Mackie, E. "The Secret History of Almost Everything." Eighteenth-Century Life 33, no. 1 (January 1, 2009): 132–37. http://dx.doi.org/10.1215/00982601-2007-037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Alexander, Amir. "The Secret Spiritual History of Calculus." Scientific American 310, no. 4 (March 18, 2014): 82–85. http://dx.doi.org/10.1038/scientificamerican0414-82.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Wald, Chelsea. "The secret history of ancient toilets." Nature 533, no. 7604 (May 2016): 456–58. http://dx.doi.org/10.1038/533456a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Lorange, Astrid. "READING HISTORY AGAINST THE STATE SECRET." Angelaki 27, no. 2 (March 4, 2022): 17–29. http://dx.doi.org/10.1080/0969725x.2022.2046356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Y. Rudi Kriswanto and Ignatius Trisna Setiadi. "PERAWATAN DAN KEAMANAN ARSIP RAHASIA GEREJA: STUDI KASUS DI PAROKI ST. ANTONIUS KOTABARU, PAROKI KRISTUS RAJA BACIRO, DAN PAROKI ST. YOHANES RASUL PRINGWULUNG." Jurnal Pustaka Budaya 7, no. 1 (January 28, 2020): 10–17. http://dx.doi.org/10.31849/pb.v7i1.3334.

Full text
Abstract:
This paper will provide an overview of how the security and persevation of the Church’s secreat archive. This case study was conducted in three parishes; St. Antonius, Kotabaru, St. John the Apostle, Pringwulung, and Christ the King, Baciro parish. The reason for the election of these three parishes is because they are interconnected in history. This research is descriptive research using qualitative approach method. Data collection techniques used were in depth interviews with staff and Priest. The collected data were analyzed by comparing how the security and perservation of the secret archives were conducted in all three places. The case study results are discussed in four sections: the secret archive storage space, storage and access rights, the maintenance of the secret archive and the prevention of the destruction of the secret archives of the Church. Treatment of secret archives, new to the stage of how to make good and neat arrangements, numbering (catalog). Another treatment effort is the prevention of damage by inserting the file in plastic. Standarization of mamp storage space.
APA, Harvard, Vancouver, ISO, and other styles
39

Emmerson, Richard K. "The Secret." American Historical Review 104, no. 5 (December 1999): 1603. http://dx.doi.org/10.2307/2649353.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Gordon, Bonnie. "The Secret of the Secret Chromatic Art." Journal of Musicology 28, no. 3 (2011): 325–67. http://dx.doi.org/10.1525/jm.2011.28.3.325.

Full text
Abstract:
In 1946, just after emigrating from Nazi Germany via the Netherlands and Cuba to the United States, Edward Lowinsky published The Secret Chromatic Art in the Netherlands Motet. He posited a system of chromatic modulations through musica ficta in sixteenth-century Netherlandish polyphony circulated by clandestine heretic societies during the period of religious struggle in the Low Countries. According to Lowinsky, in the second half of the century a small contingent of northern musicians with radical Protestant sympathies wrote pieces that appeared on the surface to set texts and use diatonic melodies condoned by the Church. Beneath that compliant surface lurked secret chromaticism and seditious meanings that remained hidden from the Inquisition. Despite Lowinsky’s obvious interest in odd passages in motets of Clemens non Papa, Lassus, and others, I argue that his history as a Jew in Nazi Germany and then as an exile from that regime compelled his idiosyncratic hearing of sixteenth-century polyphony. A close reading of the text suggests that Lowinsky identified with the composers he wrote about and that he aligned Nazi Germany with the Catholic Inquisition. Beyond its engagement with music theory and cultural history, The Secret Chromatic Art delivers a modern narrative of oppressed minorities, authoritarian regimes, and the artistic triumph of the dispossessed. The Secret Chromatic Art matters today because its themes of displacement and cultural estrangement echo similar issues that Pamela Potter and Lydia Goehr have discerned in the work of other exiled musicians and scholars who migrated from Nazi-controlled Europe to the United States, and whose contributions helped shape our discipline. Moreover, Lowinsky’s theory figured prominently in the debate initiated by Joseph Kerman in the 1960s that pitted American criticism against German positivism, a polemic that is still with us today.
APA, Harvard, Vancouver, ISO, and other styles
41

Prados, John, Sedgwick Tourison, and James E. Parker. "Secret Army, Secret War: Washington's Tragic Spy Operation in North Vietnam." Journal of Military History 60, no. 3 (July 1996): 585. http://dx.doi.org/10.2307/2944562.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Deepe Keever, Beverly Ann. "TOP SECRET." Media History 14, no. 2 (July 22, 2008): 185–204. http://dx.doi.org/10.1080/13688800802176805.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Barnett, Robert. "The Secret Secret: Cinema, Ethnicity and Seventeenth Century Tibetan-Mongolian Relations." Inner Asia 4, no. 2 (2002): 277–346. http://dx.doi.org/10.1163/146481702793647461.

Full text
Abstract:
AbstractThe Secret History of the Potala Palace, a 1989 film about Mongol-Tibetan relations in the seventeenth century, was a milestone in the still tentative development of Tibetan film, with significant Tibetan participation and close attention to Tibetan sources of history. This paper suggests possible reasons for the withdrawal of the film from circulation, and proposes ways of reading film in the context of contested versions of ethnicity.
APA, Harvard, Vancouver, ISO, and other styles
44

Corey, Mary. "Joe Gould's Secret." Journal of American History 87, no. 3 (December 2000): 1157. http://dx.doi.org/10.2307/2675453.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Wieviorka, Olivier, and Philippe Simonnot. "Le secret de l'armistice." Vingtième Siècle. Revue d'histoire, no. 30 (April 1991): 117. http://dx.doi.org/10.2307/3768969.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Lucas, Scott. "The French Secret Services." French History 9, no. 1 (March 1, 1995): 121–22. http://dx.doi.org/10.1093/fh/9.1.121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

DEAN, JODI. "Publicity's Secret." Political Theory 29, no. 5 (October 2001): 624–50. http://dx.doi.org/10.1177/0090591701029005002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Scott, Roger D. "Malalas, The Secret History, and Justinian's Propaganda." Dumbarton Oaks Papers 39 (1985): 99. http://dx.doi.org/10.2307/1291517.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Barlow, Jeffrey G., and Chuck Hansen. "U. S. Nuclear Weapons: The Secret History." Journal of Military History 53, no. 1 (January 1989): 105. http://dx.doi.org/10.2307/1986027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Stout, Mark. "The secret world: a history of intelligence." Historian 82, no. 1 (January 2, 2020): 106–7. http://dx.doi.org/10.1080/00182370.2020.1722532.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography