Home About us Contact | |||
Secret
Kinds of Secret Terms modified by Secret Selected AbstractsTHE SERMON ON MOUNT MORIAH: FAITH AND THE SECRET IN THE GIFT OF DEATHTHE HEYTHROP JOURNAL, Issue 1 2008ADAM KOTSKO This essay is an investigation of three attempts to think faith. I find my starting place in Jacques Derrida's The Gift of Death,1 one of the most important treatments of Christianity in Derrida's later thought, which was increasingly insistent in its engagement with religious questions up until his death in 2004. This reading of The Gift of Death will focus particularly on the question of secrecy and its relationship with faith, leading necessarily to an account of Derrida's reading of two of his primary references in this text: the second essay of Nietzsche's Genealogy of Morals2 and Kierkegaard's Fear and Trembling.3 Rather than simply rendering a judgment on Derrida's reading, I will endeavor to read these texts together, extending (or expanding upon) Derrida's reading while questioning some of the positive formulations he makes in his own name , all the while remaining attentive to the gambles involved in thinking faith. [source] SECRETS TO A SUCCESSFUL DATABASEANZ JOURNAL OF SURGERY, Issue 9 2008Cameron Platell MB BS, FRACS No abstract is available for this article. [source] Low Public Expenditures on Social Welfare: Do East Asian Countries have a Secret?INTERNATIONAL JOURNAL OF SOCIAL WELFARE, Issue 1 2000David Jacobs This paper explores the sources of low public expenditures on social welfare in Japan, Korea, Taiwan, Hong Kong and Singapore. Six factors are analysed based on aggregate data: the public/private mix of welfare programmes, the age structure, the maturity of old-age pension schemes, the population coverage of social security, the relative generosity of social security and the role of enterprises and families as alternative providers of welfare. The evidence allows putting some conventional statements about the virtues of East Asian welfare states into questions. Public expenditures on welfare are bound to rise a lot in Japan, Korea and Taiwan, while the level of protection in Hong Kong and Singapore is well below the standards of Western countries. [source] The Telephone Gambit: Chasing Alexander Graham Bell's Secret , By Seth ShulmanTHE HISTORIAN, Issue 3 2010Mary Ann Hellrigel No abstract is available for this article. [source] Family Secrets and Family Functioning: The Case of Donor AssistanceFAMILY PROCESS, Issue 4 2008RONI BERGER PH.D. The purpose of this study was to examine the relationship between adult offspring's perception of family functioning and of parental use of topic avoidance to maintain secrecy regarding the use of donor assistance to conceive. A cross-sectional design was used to study a convenience sample of 69 young adult donor offspring who completed a demographic questionnaire, a topic avoidance scale relative to each of their rearing parents, and the Beavers Self Report Family Instrument. Findings indicated that participants perceived both parents as avoiding the topic of donor assistance more than other topics, mothers as avoiding all topics less than fathers, and topic avoidance was negatively associated with family functioning. Mothers' general topic avoidance was the strongest predictor of family functioning. Parents' disclosing together was predictive of higher family functioning. Implications for practice and future research are suggested. RESUMEN El propósito de este estudio era examinar la relación entre la percepción que los hijos adultos tienen del funcionamiento familiar y de la práctica, por parte de los padres, de evitar ciertos temas para mantener en secreto el haber recurrido a un donante para concebir. Se utilizó un diseño transversal para estudiar una muestra de conveniencia de 69 adultos jóvenes hijos de donantes que rellenaron un cuestionario demográfico, una escala de evasión del tema sobre sus padres por separado y el Instrumento Familiar Beavers de Autoinformes (Beavers Self Report Family Instrument). Los resultados indicaron que los participantes percibían que sus padres evitaban el tema de la ayuda del donante más que otros temas, que las madres evitaban temas en general menos que los padres, y que la evasión de temas se veía negativamente asociada al funcionamiento familiar. La evasión por parte de las madres de temas en general era el factor pronóstico más fuerte del funcionamiento familiar. El afrontar el tema por parte del padre y la madre juntos era pronóstico de un funcionamiento familiar más alto. Se sugieren implicaciones para futuras prácticas e investigaciones. Palabras clave: secretos familiares, funcionamiento familiar, evasión de tema [source] Currents: Books in BriefGLOBAL BUSINESS AND ORGANIZATIONAL EXCELLENCE, Issue 3 2001LaRoi Lawton The Roots and Future of Management Theory Profit From the Core: Growth Strategy in an Era of Turbulence 90 Days to Launch: Internet Projects on Time and on Budget The Six Sigma Revolution: How General Electric and Others Turned Process into Profits In Good Company Evolve! Succeeding in the Digital Culture of Tomorrow Lessons from the Heart of American Business: A Roadmap for Managers in the 21st Century The Passion Plan at Work: A Step-by-Step Guide to Building a Passion-Driven Organization The Inner Work of Leaders: Leadership as a Habit of Mind Corporate Sin: Leaderless Leadership and Dissonant Workers The HR Scorecard Place to Space: Migrating to Ebusiness Models Building the Integrated Company Protecting Your Company's Intellectual Property: A Practical Guide to Trademarks, Copyrights, Patents, & Trade Secrets Gaming the System: Stop Playing the Organizational Game [source] Telling More: Lies, Secrets, and HistoryHISTORY AND THEORY, Issue 4 2000Luise White This essay argues that secrets and lies are not forms of withholding information but forms by which information is valorized. Lies are constructed: what is to be lied about, what a lie is to consist of, how it is to be told, and whom it is to be told to, all reveal a social imaginary about who thinks what and what constitutes credibility. Secrets are negotiated: continual decisions about whom to tell, how much to tell, and whom not to tell describe social worlds, and the shape and weight of interactions therein. All of this makes lies and secrets extraordinarily rich historical sources. We might not see the truth distorted by a lie or the truth hidden by a secret, but we see the ideas andimaginings by which people disclose what should not be made public, and how they should carry out concealing one narrative with another. Such insights involve a step back from the project of social history, in which an inclusive social narrative is based on experience and individuals' ability to report it with some reliability, and suggests that historians need to look at social imaginings as ways to understand the ideas and concerns about which people lie and with which people construct new narratives that are not true. The study of secrets, however, links the study of social imaginings with the project of social history, as the valorization of information that results in the continual negotiation and renegotiation of secrets shows individuals and publics imagining the experiences labeled as secret because of the imagined power of a specific version of events. [source] The Epistemological Evaluation of Oppositional SecretsHYPATIA, Issue 4 2005CATHERINE HUNDLEBY Although political values guide people who take advice from standpoint epistemolo-gies in deciding whether to reveal secrets used to resist oppression, these decisions can also be understood and evaluated in purely cognitive or epistemological terms. When politica! considerations direct us to preserve a secret, the cognitive value progressively diminishes because the view of the world projected by the secret is increasingly vulnerable. [source] Trade Secrets and Information SharingJOURNAL OF ECONOMICS & MANAGEMENT STRATEGY, Issue 3 2001Thomas Rønde If trade secrets are weakly protected by law, firms risk losing their valuable information when employees are hired by competitors. It may therefore be optimal to limit the number of employees who share the trade secrets even if it reduces the firm's productive efficiency. The benefits of limited information sharing are greatest if the efficiency cost is low and the competition in the market is neither very tough nor very weak. It is shown that it is more profitable to reduce the information sharing by giving the employees different information than by giving some employees more information than others. [source] The Behavioral Foundations of Trade Secrets: Tangibility, Authorship, and LegalityJOURNAL OF EMPIRICAL LEGAL STUDIES, Issue 2 2006Yuval Feldman This article examines whether the nature of information protected by trade secret law affects departing employees' normative judgments of obedience to trade secret law. This examination assesses two main dimensions: tangibility (whether the employee downloaded the confidential information) and authorship (whether the employee developed the confidential information by himself or herself). The data was collected from a nonrandom multi-sourced sample of 260 high-tech employees in Silicon Valley. Tangibility affected almost all the factors that were measured (such as the perceived consensus and participants' own intention to share information), while authorship affected only participants' moral perceptions. Further analysis revealed that the expected social approval of a new employer was the most important mediator of the effect of tangibility on the intention to share trade secrets. [source] Secrets in the eyes of Black Oystercatchers: a new sexing techniqueJOURNAL OF FIELD ORNITHOLOGY, Issue 2 2008Brian M. Guzzetti ABSTRACT Sexing oystercatchers in the field is difficult because males and females have identical plumage and are similar in size. Although Black Oystercatchers (Haematopus bachmani) are sexually dimorphic, using morphology to determine sex requires either capturing both pair members for comparison or using discriminant analyses to assign sex probabilistically based on morphometric traits. All adult Black Oystercatchers have bright yellow eyes, but some of them have dark specks, or eye flecks, in their irides. We hypothesized that this easily observable trait was sex-linked and could be used as a novel diagnostic tool for identifying sex. To test this, we compared data for oystercatchers from genetic molecular markers (CHD-W/CHD-Z and HINT-W/HINT-Z), morphometric analyses, and eye-fleck category (full eye flecks, slight eye flecks, and no eye flecks). Compared to molecular markers, we found that discriminant analyses based on morphological characteristics yielded variable results that were confounded by geographical differences in morphology. However, we found that eye flecks were sex-linked. Using an eye-fleck model where all females have full eye flecks and males have either slight eye flecks or no eye flecks, we correctly assigned the sex of 117 of 125 (94%) oystercatchers. Using discriminant analysis based on morphological characteristics, we correctly assigned the sex of 105 of 119 (88%) birds. Using the eye-fleck technique for sexing Black Oystercatchers may be preferable for some investigators because it is as accurate as discriminant analysis based on morphology and does not require capturing the birds. SINOPSIS El sexado de ostreros en el campo es sumamente difícil dado el caso de que tanto hembras como machos tienen plumaje idéntico y son similares en tamaño. Aunque los ostreros negros (Haematopus bachmani) son sexualmente dimórficos, el utilizar morfometría para determinar su sexo requiere capturar a ambos miembros de la pareja para compararlos, utilizando una análisis discriminativo a modo de asignar un sexo por probabilidad, basado en características morfométricas. Todos los adultos del ostrero negro tienen ojos amarillos y brillantes, pero algunos tienen manchas oscuras en el iris. Tomamos como hipótesis que estas peculiaridades observables estaban ligada al sexo, y que podían ser utilizadas como una herramienta novel de diagnóstico para identificar el sexo en dichas aves. Para poner a pruebas lo mencionado, comparamos datos de ostreros donde se utilizaron marcadores genéticos moleculares (CHD-W/CHD-Z y HINT-W/HINT-Z), análisis morfométrico, y categorías en las manchas en los ojos (manchas marcadas en los ojos, algunas manchitas en los ojos, sin manchas en los ojos). Comparado a marcadores moleculares, encontramos que el análisis discriminativo basado en características morfológicas ofrecía resultados variables asociados a diferencias morfológicas geográficas. Sin embargo, encontramos que las manchas en los ojos estaban ligadas al sexo. Utilizando un modelo de manchas en los ojos, en donde clasificamos como hembras aquellos individuos con manchas pronunciadas en los ojos y a machos con muy pocas manchitas o sin manchitas, le pudimos asignar correctamente el sexo a 117 de 125 (94%) individuos. Utilizando una análisis discriminativo basado en características morfológicas, le asignamos el sexo correctamente a 105 de 119 (88%) individuos. El utilizar la técnica de manchas en los ojos para el sexado de ostreros negros pudiera ser preferible para algunos investigadores porque es más exacto que el análisis discriminativo basado en morfología y porque no requiere que se tenga que capturar a las aves. [source] An Examination of the Factors that Influence Whether Newcomers Protect or Share Secrets of their Former Employers*JOURNAL OF MANAGEMENT STUDIES, Issue 4 2007David R. Hannah abstract This research investigated the factors that influence a decision that is often faced by employees who have made a transition from one organization to another: the decision about whether to protect secrets of their former employer or to share them with their new co-workers. A total of 111 employees from two high-tech companies participated in interviews. Their comments were analysed and, based on both relevant literature and the results of that analysis, a theory of the factors that influence newcomers' protect vs. share decisions was developed. According to that theory, newcomers first decide whether or not information is a trade secret of their former employer by considering (1) whether the information is part of their own knowledge, and (2) whether the information is publicly available, general, and negative (about something that did not work). If newcomers decide the information is a trade secret, they then evaluate (1) the degree to which their obligations are biased towards their former or new employer, and (2) the degree to which they identify more strongly with their former or new employer. Newcomers whose obligations and identifications are biased towards a new employer are more likely to share secrets. If these obligations and identifications are balanced, newcomers may share information in a way that allows them to believe they are fulfilling their responsibilities to both their former and their new employers. [source] Fetal And Neonatal SecretsJOURNAL OF PAEDIATRICS AND CHILD HEALTH, Issue 4 2003P Henschke No abstract is available for this article. [source] Pediatric Secrets, 3rd editionJOURNAL OF PAEDIATRICS AND CHILD HEALTH, Issue 6 2002RL Henry No abstract is available for this article. [source] Secrets and Lies: The Queen's Proctor and Judicial Investigation of Party Controlled NarrativesLAW & SOCIAL INQUIRY, Issue 3 2002Wendie Ellen Schneider Driven by the fear of collusion in the new divorce court, in 1860 Parliament authorized the Queen's Proctor to intervene in divorce suits by rooting out information that the parties left undisclosed. This paper explores the activities of the Queen's Proctor in its first quarter century, revealing both the curious genealogy of community participation in the Queen's Proctor's efforts and the struggle over the definition of collusion. Over time, economic and evidentiary concerns prompted the Queen's Proctor to turn from uncovering collusion to producing evidence of adultery. The Queen's Proctor represents a striking attempt by courts to assess the validity of party-controlled narratives, resulting in surprising practical consequences. Evaluation of narratives quickly devolved into a bright-line test focusing on adultery, with judges following the Queen's Proctor's lead and eschewing discretion. [source] The Nonverbal Advantage: Secrets and Science of Body Language at Work by Carol Kinsey GomanPERSONNEL PSYCHOLOGY, Issue 2 2010Article first published online: 12 MAY 2010 First page of article [source] Executive Secrets: Covert Action and the Presidency , William J. DaughertyPRESIDENTIAL STUDIES QUARTERLY, Issue 4 2006Alan Warburton No abstract is available for this article. [source] Secrets to mastering the WBS in real-world projectsPROJECT MANAGEMENT JOURNAL, Issue 4 2010Greg Indelicato PMP Reviewer No abstract is available for this article. [source] The Best Year of Their Lives: Kennedy, Johnson, and Nixon in 1948: Learning the Secrets of Power , Lance MorrowTHE HISTORIAN, Issue 4 2006James W. Hilty No abstract is available for this article. [source] Dirty Laundry: Narratives, Secrets, and Shame in Obejas's Memory MamboTHE LATIN AMERICANIST, Issue 1 2008Maria Celina Bortolotto First page of article [source] Eroticism, Sensuality and ,Women's Secrets' Among the BagandaIDS BULLETIN, Issue 5 2006Sylvia Tamale First page of article [source] Gendered Agendas: The Secrets Scholars Keep about Yorùbá-Atlantic ReligionGENDER & HISTORY, Issue 3 2003J. Lorand Matory Whereas scholars have often described the material interests served by any given social group's selective narration of history, this article catches scholars in the act of selectively narrating Yorùbá-Atlantic cultural history in the service of their own faraway activist projects. Anthropologist Ruth Landes' re-casting of the Afro-Brazilian Candomblá religion as an instance of primitive matriarchy not only encouraged feminists abroad but also led Brazilian nationalist power-brokers to marginalise the male, and often reputedly homosexual, priests who give the lie to Landes's interpretation. In the service of a longdistance Yorùbá nationalist agenda, sociologist Oyeronke Oyewumi has declared traditional Yorùbá society ,genderless', and found, among both North American feminist scholars and Yorùbá male scholars, allies in concealing the copious evidence of gender and gender inequality in Yorùbá cultural history. What these historical constructions lack in truth value they make up for in their power to mobilise new communities and alliances around the defence of a shared secret. The article addresses how politically tendentious scholarship on gender has inspired new social hierarchies and boundaries through the truths that some high-profile scholars have chosen to silence. [source] Giorgio Agamben and the new biopolitical nomosGEOGRAFISKA ANNALER SERIES B: HUMAN GEOGRAPHY, Issue 4 2006Claudio Minca Abstract In this paper I reflect on the progressive normalization of a series of geographies of exception within Western democracies and, in particular, the relation of these to the new biopolitical power that is progressively affirming itself in our everyday lives , and that appears to be imposing itself as the new, secret, ontology of the political. I do so by engaging with the work of Giorgio Agamben and, specifically, interrogating the spatial architecture that underpins his theory of sovereign power. Starting from Agamben's spatial conceptualizations, I explore his attempt to trace the contours and the secret coordinates of the contemporary biopolitical nomos, a nomos rooted firmly in the crisis and progressive demolition of that which Carl Schmitt described as the ius publicum Europaeum. I note, moreover, how the definitive dissolution of the geographical nomos that had dominated the two centuries preceding the First World War, and the lack of a new, alternative, geographical nomos in the century which followed, can also be grasped by critically rereading some key episodes in the history of European geography; in particular, the contested legacy of the work of Friedrich Ratzel's grand geographical project and the Geopolitik experiment. What I suggest is that to understand the deep nature of the geographies of exception that arm the global war on terror, it is vital that we think in terms of a theory of space in order to try to unveil the Arcanum, the secret enigma of the empty centre around which turn the wheels of a new, macabre, geo-biopolitical machine. [source] The Secret of Leopold AmeryHISTORICAL RESEARCH, Issue 181 2000William D. Rubinstein Leopold Amery (1873-1955) is best-known as a lifelong champion of imperial preference and empire unity, and was an important figure in the Conservative party during the first half of the twentieth century. Yet Amery was also a man with an extraordinary secret, which this article explores. Amery's mother Elisabeth Leitner (née Saphir) was Jewish. Amery went to extraordinary lengths to conceal his Jewish background, which was unknown until recently. Yet Amery might also be described as a ,secret Jew', who frequently used his influence on behalf of Jewish causes. He was the real author of the Balfour Declaration of 1917. Most remarkably and tragically, his eldest son John Amery (1912-1945) was a wartime Nazi who was hanged for treason. [source] Telling More: Lies, Secrets, and HistoryHISTORY AND THEORY, Issue 4 2000Luise White This essay argues that secrets and lies are not forms of withholding information but forms by which information is valorized. Lies are constructed: what is to be lied about, what a lie is to consist of, how it is to be told, and whom it is to be told to, all reveal a social imaginary about who thinks what and what constitutes credibility. Secrets are negotiated: continual decisions about whom to tell, how much to tell, and whom not to tell describe social worlds, and the shape and weight of interactions therein. All of this makes lies and secrets extraordinarily rich historical sources. We might not see the truth distorted by a lie or the truth hidden by a secret, but we see the ideas andimaginings by which people disclose what should not be made public, and how they should carry out concealing one narrative with another. Such insights involve a step back from the project of social history, in which an inclusive social narrative is based on experience and individuals' ability to report it with some reliability, and suggests that historians need to look at social imaginings as ways to understand the ideas and concerns about which people lie and with which people construct new narratives that are not true. The study of secrets, however, links the study of social imaginings with the project of social history, as the valorization of information that results in the continual negotiation and renegotiation of secrets shows individuals and publics imagining the experiences labeled as secret because of the imagined power of a specific version of events. [source] The Epistemological Evaluation of Oppositional SecretsHYPATIA, Issue 4 2005CATHERINE HUNDLEBY Although political values guide people who take advice from standpoint epistemolo-gies in deciding whether to reveal secrets used to resist oppression, these decisions can also be understood and evaluated in purely cognitive or epistemological terms. When politica! considerations direct us to preserve a secret, the cognitive value progressively diminishes because the view of the world projected by the secret is increasingly vulnerable. [source] Listen: testosterone is no longer a secretINTERNATIONAL JOURNAL OF CLINICAL PRACTICE, Issue 6 2010G. Jackson Editor No abstract is available for this article. [source] A novel key management scheme for dynamic multicast communicationsINTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, Issue 1 2009Chin-Chen Chang Abstract Secure multicasting allows the sender to deliver an identical secret to an arbitrary set of recipients through an insecure broadcasting channel, whereas the unintended recipients cannot obtain the secret. A practical approach for securing multicast communications is to apply a session key to encrypt the transmitted data. However, the challenges of secure multicast are to manage the session keys possessed by a dynamic group of recipients and to reduce the overhead of computation and transmission when the membership is changed. In this paper, we propose a new key management scheme for dynamic multicast communication, which is based on privacy homomorphism and Chinese remainder theorem. Our scheme can efficiently and securely deliver an identical message to multiple recipients. In particular, the complexity of the key update process in our scheme is O(1). Copyright © 2008 John Wiley & Sons, Ltd. [source] Symmetric-key block cipher for image and text cryptography,INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY, Issue 3 2005José J. Amador Abstract Public-key cryptography has been widely accepted as the method in which data is encrypted, using algorithms such as the widely known and popularly used RSA algorithm. However, management of the public-key and its storage is an on-going issue. To avoid these problems the symmetric-key approach can be taken, where there is only one key and it must be kept secret. Presented in this paper is a new cipher based on symmetric-key cryptography, called the NASA/Kennedy Cipher (N/KC), and further designed as a block cipher using 128-bit blocks. The minimum key size is set at 128 bits with a maximum allowable of 2048 bits, modulus 2. The main focus of this work is encryption of image data for the purpose of protecting intellectual properties. However, empirical results are presented on N/KC's ability of encrypting and decrypting text data in the form of vectors and documents as well. © 2005 Wiley Periodicals, Inc. Int J Imaging Syst Technol, 15, 178,188, 2005 [source] A heterogeneous-network aided public-key management scheme for mobile ad hoc networksINTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, Issue 1 2007Yuh-Min Tseng A mobile ad hoc network does not require fixed infrastructure to construct connections among nodes. Due to the particular characteristics of mobile ad hoc networks, most existing secure protocols in wired networks do not meet the security requirements for mobile ad hoc networks. Most secure protocols in mobile ad hoc networks, such as secure routing, key agreement and secure group communication protocols, assume that all nodes must have pre-shared a secret, or pre-obtained public-key certificates before joining the network. However, this assumption has a practical weakness for some emergency applications, because some nodes without pre-obtained certificates will be unable to join the network. In this paper, a heterogeneous-network aided public-key management scheme for mobile ad hoc networks is proposed to remedy this weakness. Several heterogeneous networks (such as satellite, unmanned aerial vehicle, or cellular networks) provide wider service areas and ubiquitous connectivity. We adopt these wide-covered heterogeneous networks to design a secure certificate distribution scheme that allows a mobile node without a pre-obtained certificate to instantly get a certificate using the communication channel constructed by these wide-covered heterogeneous networks. Therefore, this scheme enhances the security infrastructure of public key management for mobile ad hoc networks. Copyright © 2006 John Wiley & Sons, Ltd. [source] |