Works matching DE "CONFIDENTIAL business information"
Results: 222
Blending Tribes: Leadership Challenges in Mergers and Acquisitions.
- Published in:
- SAM Advanced Management Journal (Society for Advancement of Management), 2016, v. 81, n. 4, p. 16
- By:
- Publication type:
- Article
Anonymous Limited-Use-Proof Entity Authentication Protocol.
- Published in:
- Wireless Personal Communications, 2017, v. 96, n. 1, p. 1065, doi. 10.1007/s11277-017-4221-4
- By:
- Publication type:
- Article
OPEN THE BLINDS.
- Published in:
- Marketing Research, 2012, v. 24, n. 2, p. 16
- By:
- Publication type:
- Article
BUT WHO SPEAKS FOR THE CLIENT?
- Published in:
- Marketing Research, 2002, v. 14, n. 1, p. 46
- By:
- Publication type:
- Article
MODELS FOR MANAGING SECRETS.
- Published in:
- Management Science, 1989, v. 35, n. 2, p. 240, doi. 10.1287/mnsc.35.2.240
- By:
- Publication type:
- Article
News and views.
- Published in:
- Powder Metallurgy, 2005, v. 48, n. 1, p. 1, doi. 10.1179/pom.2005.48.1.1
- Publication type:
- Article
INSTYTUCJONALNA OCHRONA TAJEMNIC PRZEDSIĘBIORSTWA W WYBRANYCH KRAJACH. WNIOSKI DLA UNII EUROPEJSKIEJ.
- Published in:
- Economics / Ekonomia, 2013, v. 25, n. 4, p. 103
- By:
- Publication type:
- Article
JAKI SYSTEM BUSINESS INTELLIGENCE WYBRAĆ I ZASTOSOWAĆ? A MOŻE OPEN SOURCE?
- Published in:
- Business Informatics / Informatyka Ekonomiczna, 2012, v. 4, n. 26, p. 20
- By:
- Publication type:
- Article
Contracting on Ambiguous Prospects.
- Published in:
- Economic Journal, 2017, v. 127, n. 606, p. 2241, doi. 10.1111/ecoj.12381
- By:
- Publication type:
- Article
Where Institutional Logics of Corporate Governance Collide: Overstatement of Compliance in a Developing Country, Bangladesh.
- Published in:
- Corporate Governance: An International Review, 2016, v. 24, n. 6, p. 599, doi. 10.1111/corg.12163
- By:
- Publication type:
- Article
Patent-Secret Mix in Complex Product Firms.
- Published in:
- American Law & Economics Review, 2008, v. 10, n. 1, p. 142, doi. 10.1093/aler/ahn007
- By:
- Publication type:
- Article
REK ABET ISTIHBARATI TOPLAMA VE ETIK: BIR ALAN ARASTIRMASI.
- Published in:
- Journal of Faculty of Political Science, 2010, v. 43, p. 67
- By:
- Publication type:
- Article
VANTAGENS COMPETITIVAS COM SOFTWARES LIVRES: o caso de uma instituição de ensino.
- Published in:
- Revista Eletrônica de Ciência Administrativa, 2010, v. 9, n. 1, p. 5, doi. 10.5329/RECADM.2010.0901001
- By:
- Publication type:
- Article
Principles- Versus Rules-Based Output Statistical Disclosure Control In Remote Access Environments.
- Published in:
- IASSIST Quarterly, 2015, v. 39, n. 2, p. 5, doi. 10.29173/iq778
- By:
- Publication type:
- Article
UNPROTECTED AND UNPERSUADED: THE FCC’S FLAWED MERGER REVIEW PROCEDURES.
- Published in:
- Duke Law & Technology Review, 2016, v. 15, n. 1, p. 39
- By:
- Publication type:
- Article
WHO OWNS YOUR FRIENDS?: PHONEDOG v. KRAVITZ AND BUSINESS CLAIMS OF TRADE SECRET IN SOCIAL MEDIA INFORMATION.
- Published in:
- Rutgers Computer & Technology Law Journal, 2013, v. 39, n. 1, p. 30
- By:
- Publication type:
- Article
Cybersecurity: Building Resilience from the Inside Out.
- Published in:
- Chemical Engineering, 2018, v. 125, n. 10, p. 65
- By:
- Publication type:
- Article
Addressing systemic problems with exposure assessments to protect the public's health.
- Published in:
- Environmental Health: A Global Access Science Source, 2023, v. 21, n. 1, p. 1, doi. 10.1186/s12940-022-00917-0
- By:
- Publication type:
- Article
Cyber Kleptomaniacs.
- Published in:
- World Affairs, 2013, v. 176, n. 3, p. 73
- By:
- Publication type:
- Article
The Expert Opinion.
- Published in:
- 2005
- By:
- Publication type:
- Interview
Decision Confidence, Information Usefulness, and Information Seeking Intention in the Presence of Disconfirming Information.
- Published in:
- Informing Science, 2014, v. 17, p. 1, doi. 10.28945/1932
- By:
- Publication type:
- Article
Hide Text within a Video Using Data Encryption Standard (DES) Technology.
- Published in:
- SAR Journal (2619-9955), 2024, v. 7, n. 1, p. 24, doi. 10.18421/SAR71-04
- By:
- Publication type:
- Article
Characteristics of Effective Trade Secrets and Confidential Information Policies: Guidance from Labor Arbitration Cases.
- Published in:
- Labor Law Journal, 2020, v. 71, n. 1, p. 43
- By:
- Publication type:
- Article
Words Mean Everything: The National Labor Relations Act and Employer Social Media Policies.
- Published in:
- Labor Law Journal, 2015, v. 66, n. 3, p. 141
- By:
- Publication type:
- Article
Business Secrets, Access and Rights of the Defence.
- Published in:
- European Competition & Regulatory Law Review, 2019, v. 3, n. 1, p. 48, doi. 10.21552/core/2019/1/9
- By:
- Publication type:
- Article
Optimal ECC Based Hybrid Signcryption for MANET Security.
- Published in:
- International Journal on Intelligent Electronics Systems, 2016, v. 10, n. 1, p. 7, doi. 10.18000/ijies.30149
- By:
- Publication type:
- Article
OUR CYBER THINKING AND PRACTICES.
- Published in:
- Baylor Business Review, 2014, v. 32, n. 2, p. 48
- Publication type:
- Article
ETHICS OF ... CYBER - ESPINAGE.
- Published in:
- Baylor Business Review, 2014, v. 32, n. 2, p. 46
- By:
- Publication type:
- Article
Ensemble Strategy for Insider Threat Detection from User Activity Logs.
- Published in:
- Computers, Materials & Continua, 2020, v. 65, n. 2, p. 1321, doi. 10.32604/cmc.2020.09649
- By:
- Publication type:
- Article
Proyecto de modificación de las Circulares 12/2008 y 7/2008 de la CNMV.
- Published in:
- Revista Técnica Contable, 2011, v. 63, n. 746, p. 127
- Publication type:
- Article
Competitive Intelligence: a Status Report on US Business Practices.
- Published in:
- Journal of Marketing Management, 1992, v. 8, n. 2, p. 117, doi. 10.1080/0267257X.1992.9964184
- By:
- Publication type:
- Article
Mobility momentum remains strong.
- Published in:
- ComputerWorld Hong Kong, 2008, p. 27
- By:
- Publication type:
- Article
Electronic Discovery.
- Published in:
- Mercer Law Review, 2018, v. 69, n. 4, p. 1109
- By:
- Publication type:
- Article
A State-By-State Analysis of Inevitable Disclosure: A Need For Uniformity and a Workable Standard.
- Published in:
- Marquette Intellectual Property Law Review, 2012, v. 16, n. 1, p. 211
- By:
- Publication type:
- Article
BIG VERDICTS, LIMITED DISCOVERY: THE RISING IMPORTANCE OF TRADE SECRETS IN ALABAMA.
- Published in:
- Cumberland Law Review, 2013, v. 44, n. 1, p. 55
- By:
- Publication type:
- Article
STRIKING THE PROPER BALANCE BETWEEN THE PUBLIC'S RIGHT TO ACCESS OFFICIAL GOVERNMENTAL INFORMATION AND THE RIGHT OF PRIVATE ENTITIES TO KEEP INFORMATION PRIVATE: AN EXAMINATION OF OFFICE OF THE GOVERNOR V BARI.
- Published in:
- Widener Law Journal, 2013, v. 22, n. 2, p. 419
- By:
- Publication type:
- Article
Market Intelligence Dissemination Across Functional Boundaries.
- Published in:
- Journal of Marketing Research (JMR), 1996, v. 33, n. 1, p. 47, doi. 10.2307/3152012
- By:
- Publication type:
- Article
DIRECTOR CONFIDENTIALITY.
- Published in:
- Law & Contemporary Problems, 2011, v. 74, n. 1, p. 197
- By:
- Publication type:
- Article
HOW THE NEXT U.S. PRESIDENT CAN CONTAIN CHINA IN CYBERSPACE.
- Published in:
- Journal of International Affairs, 2016, v. 70, n. 1, p. 21
- By:
- Publication type:
- Article
The Drivers of Technology Licensing: AN INDUSTRY COMPARISON.
- Published in:
- California Management Review, 2007, v. 49, n. 4, p. 67, doi. 10.2307/41166406
- By:
- Publication type:
- Article
Protection of Customer Lists in California.
- Published in:
- California Law Review, 1935, v. 23, n. 4, p. 399, doi. 10.2307/3476701
- By:
- Publication type:
- Article
Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK.
- Published in:
- Telecommunication Systems, 2009, v. 40, n. 3/4, p. 91, doi. 10.1007/s11235-008-9131-z
- By:
- Publication type:
- Article
The Perceived Importance of Cybercrime Control among Police Officers: Implications for Combatting Industrial Espionage.
- Published in:
- Sustainability (2071-1050), 2021, v. 13, n. 8, p. 4351, doi. 10.3390/su13084351
- By:
- Publication type:
- Article
A study on Classification of Insider threat using Markov Chain Model.
- Published in:
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 4, p. 1887, doi. 10.3837/tiis.2018.04.027
- By:
- Publication type:
- Article
A Privacy-aware Graph-based Access Control System for the Healthcare Domain.
- Published in:
- KSII Transactions on Internet & Information Systems, 2012, v. 6, n. 10, p. 2708, doi. 10.3837/tiis.2012.10.016
- By:
- Publication type:
- Article
When Trade Secrecy Goes Too Far: Public Health and Safety Should Trump Corporate Profits.
- Published in:
- Vanderbilt Journal of Entertainment & Technology Law, 2018, v. 20, n. 4, p. 1135
- By:
- Publication type:
- Article
Inventory and evaluation of publicly available sources of information on hazards and risks of industrial chemicals.
- Published in:
- Toxicology & Industrial Health, 2019, v. 35, n. 11/12, p. 738, doi. 10.1177/0748233719893198
- By:
- Publication type:
- Article
Business Secrecy Expansion and FOIA.
- Published in:
- UCLA Law Review, 2021, v. 68, n. 2, p. 462
- By:
- Publication type:
- Article
Verbal Disclosure of Proprietary Information.
- Published in:
- Contract Management, 2013, v. 53, n. 3, p. 38
- By:
- Publication type:
- Article
Biosafety Data as Confidential Business Information.
- Published in:
- 2013
- By:
- Publication type:
- Opinion