Journal articles on the topic 'Secret relationship'

To see the other types of publications on this topic, follow the link: Secret relationship.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Secret relationship.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ignatochkina, D., and D. Repukhova. "Relationship Banking and Tax Secret." Bulletin of Science and Practice 5, no. 12 (December 15, 2019): 298–304. http://dx.doi.org/10.33619/2414-2948/49/34.

Full text
Abstract:
The authors of this article consider the problem of correlation of banking and tax secrets. The question raised is relevant, as the exact and concretized concepts of banking and tax secrets have not yet been fixed. However, this paper presents regulations that contain the concepts of banking and tax secrets, but it is also noted that they can be traced conflicts, as the fixed norms are different in scope and content, which causes problems with determining the responsibility of subjects of banking and tax secrets for their disclosure. If we talk about the relationship of these secrets, it should be noted that the priority has a tax secret, since credit institutions can be sanctioned for failure to provide the necessary information for the tax authorities. The authors also note that banking and tax secrecy play an important role in protecting the rights and freedoms of citizens protected by the Constitution of the Russian Federation. Based on this, it is concluded that banking and tax secrets belong to professional and official secrets respectively, that is, they will relate to information with limited access. Based on the special legal regime of these secrets, the authors directly affect the types of responsibility for their disclosure. Such liability includes: civil law, within the framework of labor legislation, administrative and criminal. Each responsibility has its own characteristics and problems, so the authors consider the problems of each of them. At the end of their work, the authors come to the conclusion about how necessary and important these two institutions are.
APA, Harvard, Vancouver, ISO, and other styles
2

Luca, Daniela. "Secret of Life, Secret of Death." Romanian Journal of Psychoanalysis 13, no. 2 (December 1, 2020): 73–90. http://dx.doi.org/10.2478/rjp-2020-0017.

Full text
Abstract:
Abstract From his first Freudian studies, but especially in S. Freud’s correspondence with W. Fliess, the term “secret” (geheim, geheimnis) appears frequently, hence its weight and significance in psychic life, and implicitly as a form of intimacy and of confidentiality shared in the analytical relationship. The need and ability to keep a secret, but also the ability to confess, to share a secret, are mainly related to a certain elaboration of the sexual register, pre-oedipal and oedipal, of the elaboration of the traumatic, of the affects of shame, humiliation, guilt, as well as their impact on the psychic life of the subject, how they marked the subject’s existence and relationships. Another essential dimension is the inter- and transgenerational transmission of family “secrets” – often violent, incestuous experiences, such as severe diseases, genetic abnormalities, murders, suicides – transmitted over two, three or more generations, unconsciously. This work aims to reveal the secret’s dimension of life in clinical practice, as well as the deadly dimension of secrets and their vicissitudes in transfer-counter transference.
APA, Harvard, Vancouver, ISO, and other styles
3

Slepian, Michael L., Katharine H. Greenaway, and E. J. Masicampo. "Thinking Through Secrets: Rethinking the Role of Thought Suppression in Secrecy." Personality and Social Psychology Bulletin 46, no. 10 (February 28, 2020): 1411–27. http://dx.doi.org/10.1177/0146167219895017.

Full text
Abstract:
Having secrets on the mind is associated with lower well-being, and a common view of secrets is that people work to suppress and avoid them—but might people actually want to think about their secrets? Four studies examining more than 11,000 real-world secrets found that the answer depends on the importance of the secret: People generally seek to engage with thoughts of significant secrets and seek to suppress thoughts of trivial secrets. Inconsistent with an ironic process account, adopting the strategy to suppress thoughts of a secret was not related to a tendency to think about the secret. Instead, adopting the strategy to engage with thoughts of a secret was related the tendency to think about the secret. Moreover, the temporal focus of one’s thoughts moderated the relationship between mind-wandering to the secret and well-being, with a focus on the past exacerbating a harmful link. These results suggest that people do not universally seek to suppress their secrets; they also seek to engage with them, although not always effectively.
APA, Harvard, Vancouver, ISO, and other styles
4

Jaffé, Mariela E., Maria Douneva, and Elianne A. Albath. "Secretive and close? How sharing secrets may impact perceptions of distance." PLOS ONE 18, no. 4 (April 26, 2023): e0282643. http://dx.doi.org/10.1371/journal.pone.0282643.

Full text
Abstract:
Having secrets is incredibly common. However, secrecy has only recently started to receive more attention in research. What has largely been neglected are the consequences of secret-sharing for the relationship between sharer and receiver; a gap we aim to fill in this project. Previous research has shown that closeness can make secret-sharing more likely. Building on research from the self-disclosure and relationship literature, we experimentally investigate in three studies (N = 705) whether confiding a secret to somebody might in turn increase perceptions of closeness. In addition, we test whether the valence of the secrets moderates the hypothesized effect. While confiding negative secrets might signal a high level of trust and lead to a similar closeness as confiding positive secrets, they might also present a burden to the receiver and lead to a different pattern of closeness. To provide a holistic picture, we build on a variety of methods and investigate three perspectives: Study 1 focused on the receiver and showed that another person sharing secrets (vs. nonconfidential information) decreased the distance in the eyes of the receiver. Study 2 tested how an observer perceives the relationship between two people. Distance was judged to decrease when secrets (vs. nonconfidential information) were shared, however, this difference was not significant. Study 3 tested whether lay theories about sharing secrets predict behavior, and how sharing information may be used to change perceived distance on the receiver’s side. Participants preferred to share neutral compared to secret information and positive compared to negative secrets irrespective of the distance condition. Our results contribute to the understanding of how sharing secrets affects the way individuals think about each other, how close they feel to each other, and how they interact with each other.
APA, Harvard, Vancouver, ISO, and other styles
5

Frijns, Tom, and Catrin Finkenauer. "Longitudinal associations between keeping a secret and psychosocial adjustment in adolescence." International Journal of Behavioral Development 33, no. 2 (January 30, 2009): 145–54. http://dx.doi.org/10.1177/0165025408098020.

Full text
Abstract:
Increasing bodies of evidence suggest that keeping secrets may be detrimental to well-being and adjustment, whereas confiding secrets may alleviate the detriments of secrecy and benefit well-being and adjustment. However, few studies have addressed the consequences of keeping and confiding secrets simultaneously, and even fewer have done so longitudinally. This article reports on a two-wave longitudinal survey study among 278 adolescents (aged 13—18 years) that examined the associations of keeping and confiding a specific secret with psychosocial adjustment. Results confirmed a hypothesized longitudinal contribution of keeping a secret all to oneself to psychosocial problems, including depressive mood, low self-concept clarity, low self-control, loneliness, and poor relationship quality. Furthermore, confiding versus continuing to keep a secret all to oneself was associated with decreased psychosocial problems after six months, whereas starting to keep a secret versus not doing so was associated with increased psychosocial problems. These results suggest that the keeping or confiding of secrets may affect adolescents' psychosocial well-being and adjustment.
APA, Harvard, Vancouver, ISO, and other styles
6

Voloshyn, Yuriy, and Volodymyr Proshchaiev. "INTELLIGENCE SECRET: LEGISLATIVE DEFINITION AND CORRELATION WITH STATE SECRET." Slovo of the National School of Judges of Ukraine, no. 1-2(38-39) (November 21, 2022): 57–68. http://dx.doi.org/10.37566/2707-6849-2022-1-2(38-39)-6.

Full text
Abstract:
Based on the analysis of the Law of Ukraine «On Intelligence» in general and its legal requirements for the new category of «intelligence secret» in particular through controversy with scientists who have already expressed their views in previous publications, the authors once again drew the attention of the scientific community to this crucial legal categories and outlined approaches to clarify its legal content, direction and completeness. The author’s own opinion on the content of the legal category «intelligence secret», its relationship with the state secret, proposals for determining possible ways to establish a legal regime for handling information related to intelligence secrets, as well as proposals for liability for its disclosure. Two significant differences between state and intelligence secrets have been identified. The first difference is in the different areas they cover. If many spheres are defined for state secrets (defense, economics, science and technology, foreign relations, state security and law enforcement), then for intelligence intelligence only one area is the performance of intelligence tasks of Ukraine and the implementation of functions. The second significant difference is the possible consequences if the information is disclosed. In the first definition, it is the possibility of harming the national security of Ukraine, and in the second – the possibility of damage to the functioning of intelligence. It is substantiated that in the Law of Ukraine «On Intelligence» the legislator clearly distinguishes between state and intelligence secrets, without even hinting at the possibility that the latter may contain some part of information that can be classified as a state secret. It is proved that intelligence is not identified with intelligence information. First, they relate to various organizational forms and areas of intelligence. Second, the intelligence obtained is a state secret, while the intelligence secret appears when the former is handled. Third, on the basis of intelligence obtained, the state leadership makes important political decisions in the interests of Ukraine’s national security and defense. On the other hand, intelligence secrecy is concerned solely with the protection of information whose disclosure may harm the functioning of intelligence and access to which is restricted within the intelligence secrecy regime. It is concluded that it is necessary in the future due to scientific developments, primarily fundamental, to determine the reasonable grounds and procedures for classifying information as intelligence, to develop and adopt a number of legislative and departmental regulations on access to such information, maximum secrecy, conditions and declassification procedures, the procedure for providing it to members of the intelligence community and, in certain circumstances, representatives of democratic control by the public and society, as well as establishing responsibility for its disclosure. Key words: national security, intelligence, intelligence activities, state secret, intelligence secret.
APA, Harvard, Vancouver, ISO, and other styles
7

Odovichena, Y. A., and O. Y. Orlovskiy. "A соmmercial secret. How can employer protect his secrets?" Uzhhorod National University Herald. Series: Law 1, no. 80 (January 22, 2024): 312–18. http://dx.doi.org/10.24144/2307-3322.2023.80.1.44.

Full text
Abstract:
The article is devoted to the study of measures taken by the employer to prevent the disclosure of commercial secrets by the employee. Such measures should be characterized by efficiency, simplicity, manageability and be comprehensive. In particular, the procedure for implementing local acts at the enterprise is characterized, which contain an exhaustive list of information that constitutes a commercial secret and which are designed to maximally protect the employer from the “leakage” of information that is commercially valuable. Such acts include: Provisions on commercial secrecy, List of information constituting commercial secrets of the enterprise, Provisions on the permission system for access of enterprise employees and representatives of third-party organizations to information constituting commercial secrets of the enterprise, Instructions for the organization and management of document management at the enterprise, containing commercial secret. Also, the employer can demand from the employee a personal commitment not to disclose commercial secrets. It is necessary to observe the procedure for familiarizing the employee with the commercial secret and with the responsibility in case of its disclosure or use. The article draws attention to the possibility of concluding non-disclosure agreements (NDA) with employees. The main conditions that can be included in such types of contracts are defined, as well as the responsibility for their violation. It has been investigated that the labor legislation does not provide for any special procedure for holding the employee accountable for disclosing a commercial secret. Therefore, it is proposed to provide in the Labor Code of Ukraine the ground for termination of the employment contract “disclosure of the employer’s commercial secret, which became known to the employee in connection with the performance of his labor duties.” The fact of disclosure of a commercial secret should be established by an official investigation. The article also analyzes the legal practice of holding employees accountable for the disclosure of trade secrets and notes the problem of proving a cause-and-effect relationship between the employee’s actions and the damage caused to the employer.
APA, Harvard, Vancouver, ISO, and other styles
8

Syrlybayeva, F. M. "Legal issues of protecting the employer's trade secrets." Bulletin of the Karaganda University. “Law Series” 110, no. 2 (June 24, 2023): 147–54. http://dx.doi.org/10.31489/2023l2/147-154.

Full text
Abstract:
The article defines the measures taken by the employer to protect information constituting a trade secret, the conditions for classifying information as a trade secret. The actions that an employer can take to reduce the internal threat from illegal disclosure of trade secrets are indicated. It is proposed to provide in the employ- ment contract with the head of the organization his obligation to ensure the confidentiality of the information constituting a trade secret, the owner of which is the organization and its counterparties, and responsibility for ensuring the confidentiality of this information. We believe that the condition of the employment contract on non-disclosure of legally protected secrets (state, official, professional or commercial) should be among the mandatory ones in the presence of such types of secrets in the organization and if the employee is admitted to the relevant information in accordance with the procedure established by law. It is also proposed to provide in the Labor Code of the Republic of Kazakhstan a condition on non-disclosure of information constituting a trade secret even after the termination of the employment relationship, as well as the employee's obligation to compensate the employer for damage in case of disclosure of this information. The necessity of developing a set of legal norms is justified, in which it is necessary to determine the limits of the agreements of the parties and the level of compensation for the employee. The author believes that the property interests of the owner of the rights to trade secrets must be protected within the framework of labor legislation, namely, to introduce elements of civil liability, and in the case of disclosure of trade secrets after termination of the employment contract – to bring the employee to civil liability for damages through the court.
APA, Harvard, Vancouver, ISO, and other styles
9

Firdauysa, Nadia, Jyoti Bhatta, Alex J. Bishop, Tanya Finchum, and James Grice. "LIFE AFTER 100: IS GOD THE SECRET TO A SATISFYING AND PURPOSEFUL LIFE?" Innovation in Aging 3, Supplement_1 (November 2019): S524—S525. http://dx.doi.org/10.1093/geroni/igz038.1931.

Full text
Abstract:
Abstract Data from N = 111 centenarians (M = 100.88; SD = 1.48) residing in Oklahoma was used to examine patterns in the relationship between the God oriented vs. non-God oriented longevity secrets and subjective well-being. Observational Oriented Modeling (OOM) was then used to conduct an ordinal analysis using concatenated ordering to produce degree of fitness between data and underlying patterns in life satisfaction and purpose-in-life across three time points. OOM is a data analysis method used to evaluate fitness of proposed patterns to data called PCC. Results indicated that centenarians maintaining a God-oriented longevity secret fit a decreased pattern in life satisfaction (PCC = 25.00, c-value = .09); whereas centenarians not maintaining a God-oriented longevity secret fit the same pattern (PCC = 49.18, c-value = .06). Meanwhile, centenarians having a God-oriented longevity secret fit a decreased pattern of purpose-in-life (PCC = 71.43, c-value =.12); whereas centenarians having a non-God oriented longevity secret fit the same pattern (PCC = 53.45, c-value = .28). In comparison to centenarians who acknowledged something other than God as the secret to their longevity, those who cite God as the reason for longevity tend to proportionately maintain a more satisfying view of life, yet experience a deteriorating sense of purpose over time. Results indicate that longevity secrets reflect divergent patterns in subjective well-being among persons living beyond 100 years. This has implications relative to how geriatric practitioners design interventions, services, or programs to enhance quality-of-life for long-lived adults.
APA, Harvard, Vancouver, ISO, and other styles
10

Sanz, Milagros Cid. "Secrets and Lies." Romanian Journal of Psychoanalysis 13, no. 1 (June 1, 2020): 55–66. http://dx.doi.org/10.2478/rjp-2020-0006.

Full text
Abstract:
AbstractThe article covers diverse approaches of the term secret: individual, group, social, transgenerational and psychoanalytical, with reference to various psychoanalysts having reflecting about this topic. The author pays special attention to importance of secrets in the psychoanalytic relationship. Conscious and unconscious secrets are brought into play in transfer-countertransfer, stressing on the importance of tolerating the secrets without forcing its disclosure. The analyst’s capacity to tolerate the unspoken and wait for the timely moments of intervention can allow the development of the internal space in the analytical process.
APA, Harvard, Vancouver, ISO, and other styles
11

Newman, Amy. "The Secret Relationship Between Philosophy and Religion." International Studies in Philosophy 38, no. 1 (2006): 85–99. http://dx.doi.org/10.5840/intstudphil200638118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Zerbe, Kathryn J. "The Secret Life of Secrets: Deleterious Psychosomatic Effects on Patient and Analyst." Journal of the American Psychoanalytic Association 67, no. 1 (February 2019): 185–214. http://dx.doi.org/10.1177/0003065119826624.

Full text
Abstract:
The impact and complex nature of keeping secrets deserves greater scrutiny within psychoanalysis. While the capacity to keep a secret is a developmental achievement that furthers conscious choice and healthy boundary setting between self and others, an individual’s need for privacy must be distinguished from untoward costs of collusion and concealment. Clinical case material shows that not all secrets are unconscious or multilayered, as assumed in most of the psychoanalytic literature. Nonetheless, in these cases deleterious effects to psyche and soma took root. These patients assumed that their secret was irreparably destructive to an essential object relationship; shame, guilt, narcissistic vulnerability, unconscious identification with an injured party, and developmental deficit were other factors found to undergird this mode of pathogenic dissembling. Two clinical examples also demonstrate that embodied countertransference reactions may herald the revelation of a secret in treatment that had been hidden, but in plain view. Secrets appear to exert their profound psychological and physical effects on patient and analyst by biological mechanisms that are as yet poorly understood but are readily observed in clinical practice. Psychoanalysts who keep in conscious awareness both the adaptive value and the potential costs of maintaining the confidences of others over the course of a career are better positioned to assist their patients and themselves in rendering essential self-care.
APA, Harvard, Vancouver, ISO, and other styles
13

Gladden, Samuel Lyndon. "SPECTACULAR DECEPTIONS: CLOSETS, SECRETS, AND IDENTITY IN WILKIE COLLINS'SPOOR MISS FINCH." Victorian Literature and Culture 33, no. 2 (August 9, 2005): 467–86. http://dx.doi.org/10.1017/s1060150305050941.

Full text
Abstract:
LARGELY OVERLOOKEDin Collins scholarship, the 1872 novelPoor Miss Finch: A Domestic Storydescribes the complicated relationships between a young blind woman, Lucilla Finch, and twin brothers, Oscar and Nugent Dubourg. Lucilla's blindness results in her aversion to dark colors, and as she and Oscar fall in love, he must deploy a series of elaborate deceptions in a desperate attempt to keep from her his own dark secret–that his skin has been turned blue by medication prescribed for his epileptic condition. Following an extraordinary operation, Lucilla's eyesight begins to return, and Oscar's carefully guarded secret of blueness threatens to destroy their relationship. The plot ofPoor Miss Finchexplores the ways in which Oscar hides his blueness from Lucilla as well as the duplicitous function of his twin, Nugent, who stands in for Oscar as Lucilla begins to regain her sight. At every turn,Poor Miss Finchmines issues of identity and investigates the ways in which identity becomes withheld and disclosed–closeted and uncloseted–through a series of spectacular deceptions that enable the keeping of secrets.
APA, Harvard, Vancouver, ISO, and other styles
14

HECKELMAN, JAC C. "Revisiting the Relationship Between Secret Ballots and Turnout." American Politics Quarterly 28, no. 2 (April 2000): 194–215. http://dx.doi.org/10.1177/1532673x00028002003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Rabb, Melinda Alliker. "Swift, Secret History, and War." Eighteenth-Century Life 44, no. 3 (September 1, 2020): 30–50. http://dx.doi.org/10.1215/00982601-8718644.

Full text
Abstract:
“Swift, Secret History, and War” argues that the relationship between Swift’s writing, reading, and his abiding interest in the English Civil Wars produced a distinctive contribution to the discourses that arose after the reestablishment of monarchy, called “secret histories.” These narratives claim to expose clandestine acts, to pull away veils that hide petty motives, and to expose abuses underlying the exercise of power. In Swift’s work, however, the impulse to dig up embarrassing or disillusioning secrets serves yet another purpose; it allows more painful realities to remain buried and thus provides a means of displacing, postponing, and avoiding direct confrontation with the devastation caused by war. The following discussion identifies and analyzes some of the ways in which traumatic conflict—especially within a nation in which neighbor has fought neighbor—requires indirection, delayed response, and the transference of the burden of representation onto succeeding generations. Literature can play a crucial role in the process of displacement when human history has proven (as Gulliver’s Houyhnhnm master observes) “capable of such Enormities, . . . worse than Brutality itself.” Swift’s distinctive deployment of secret history’s strategies allows an ironic historian a mechanism to look directly at and disclose some of the follies and vices of his culture, but also to remain cognizant, at some level, of what remains buried under “the heap” of a traumatic past.
APA, Harvard, Vancouver, ISO, and other styles
16

Pavlushkov, Aleksandr R. "The Russian Orthodox Church and the Secret Chancellery in the Context of Reforms of Peter the Great." Vestnik of Northern (Arctic) Federal University. Series Humanitarian and Social Sciences, no. 5 (October 10, 2020): 37–45. http://dx.doi.org/10.37482/2227-6564-v047.

Full text
Abstract:
Based on various sources, this article attempts to determine the scope and nature of the relationship between the Russian Orthodox Church and the Secret Chancellery during the reforms of Peter I. The chronological framework of the period under study is limited to 1718–1725. It should be noted that the number of works on this topic is rather small. The article dwells on the various aspects and forms of the relationship between the penal body and the Church as a whole. The starting point is the case of Tsarevich Alexei, which exposed the dissatisfaction of the clergy with the reforms of Peter I and initiated the strengthening of punitive policies, involving the tools of the Church. According to the author, the established relationship between the Church and the Secret Chancellery cannot be called sporadic, since there had been a certain unity of mutual interests between the parties. It is emphasized that contradictions had been accumulating between them, related to the violation of the secrecy of confession, lack of legal regulation of official relations, and structural vagueness of the institutions of the Most Holy Synod that had contacts with the Secret Chancellery. Nevertheless, in practice there had been developed a certain procedure for coordinating various issues, which both sides refrained from violating. Further, the author analyses the case of Tsarevich Alexei and the role of the first chief procurators of the Most Holy Synod in the context of the development of the relationship between the Church and the Secret Chancellery. Further, the article indicates the reasons for not only mutual interest, but also the subsequent crisis in their relationship that occurred in 1725. The author concludes that the relationship between the Russian Orthodox Church and the Secret Chancellery was in line with the policy of forming a police state.
APA, Harvard, Vancouver, ISO, and other styles
17

Trub, Leora, and Danielle Magaldi. "Secret powers: Acts of Googling in the therapeutic relationship." Journal of Clinical Psychology 77, no. 4 (January 15, 2021): 968–85. http://dx.doi.org/10.1002/jclp.23107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

GARCÍA PASTOR, IMANOL, FRANCISCO SANCHEZ FUENTE, and JOSE RAMON OTEGI OLASO. "MODELLING A BLOCKCHAIN SOLUTION FOR INTELLECTUAL PROPERTY MANAGEMENT IN DIGITISED INDUSTRIAL ENVIRONMENTS." DYNA 96, no. 6 (November 1, 2021): 576–80. http://dx.doi.org/10.6036/10294.

Full text
Abstract:
In the industry 4.0 vision, the competitiveness of companies is based on innovation, business-to-business collaboration and digitalisation. In such collaborative frameworks, the sharing of trade secrets depends to a greater or lesser extent on the degree of trust between the parties involved in the collaboration. This paper proposes an application model for trade secret protection based on blockchain, using the smart contracts support and tokenization capabilities available in the Ethereum network. The application of the model along the value chain of the collaborative industrial environment promotes the sharing of industrial secrets with the guarantee provided by blockchain technology, increasing trust and added value in the relationship. Keywords: Industry 4.0, blockchain, innovation, intellectual property, knowledge management
APA, Harvard, Vancouver, ISO, and other styles
19

Ganzha, Natal'ya V., and Yekaterina V. Varentsova. "The secrecy of adoption: problems and ways to improve." Vestnik of Kostroma State University, no. 4 (2019): 175–79. http://dx.doi.org/10.34216/1998-0817-2019-25-4-175-179.

Full text
Abstract:
The article deals with the problems of legal regulation of the Institute of secrecy of adoption in the development of information space and medical and genetic aspects. The authors give a generalised description of modern scientific approaches to the relationship of the concepts of family secret, personal secret, secret of adoption from the point of view of various branches of law. The ways of improving the rules on the secrecy of adoption in Russia are suggested.
APA, Harvard, Vancouver, ISO, and other styles
20

Foster, Craig A., Joshua D. Foster, and W. Keith Campbell. "Are Secret Relationships Hot, Then Not? Romantic Secrecy as a Function of Relationship Duration." Journal of Social Psychology 150, no. 6 (October 27, 2010): 668–88. http://dx.doi.org/10.1080/00224540903365547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

RUIZ, ROCIO. "PRINCIPIO DE ÉTICA; CONFIDENCIALIDAD EN LA PROFESIÓN CONTABLE." Pensamiento Republicano 13 (January 31, 2021): 89–99. http://dx.doi.org/10.21017/pen.repub.2021.n13.a77.

Full text
Abstract:
The professional secret is a link in any type of relationship where a contract exists, the objective of the principle of ethics is to force the professional to keep secret the information provided by third parties, since the information that is revealed is important, additionally the principle manages to establish a relationship of trust in the exercise of the assignment between client and professional sustaining a profitable relationship, if a professional violates the principle is exposed to different sanctions, so this investigation will allow to know, to analyze, and to conclude the types of sanctions imposed according to the mentioned infraction.
APA, Harvard, Vancouver, ISO, and other styles
22

Bajer, Michał. "A Soliloquy That’s Overheard or Spied on? Dramatic Techniques of Involuntary Disclosure of Secrets in The Haunted Manor by Jan Chęciński and Stanisław Moniuszko and its European Contexts." Ruch Literacki 58, no. 2 (March 1, 2017): 133–49. http://dx.doi.org/10.1515/ruch-2017-0022.

Full text
Abstract:
Summary The plot of The Haunted Manor hangs on scenes in which the characters confess their secrets, try to figure out the hidden truth and invent fake secrets. This article analyzes the handling of secrets in Jan Chęciński and Stanisław Moniuszko’s famous opera, paying special attention to the problem of eavesdropping and spying. After examining Chęciński and Moniuszko’s use of the neoclassical model of the overheard soliloquy, the article assesses the relationship between the treatment of the secret in The Haunted Manor and the conventions of contemporary drama. The analysis reveals that the preoccupation with secrets not only has a significant impact on the plot and the construction of individual scenes but is also used to reach out to the world of contemporary comedy. In effect, this study rejects the description of The Haunted Manor as an artless celebration of provincial backwardness and shows that its dramatic handling of secrets is as skilful and sophisticated as one would expect from a classic operatic drama.
APA, Harvard, Vancouver, ISO, and other styles
23

Sun, Shaofei, Hongxin Zhang, Xiaotong Cui, Qiang Li, Liang Dong, and Xing Fang. "Analysis of Electromagnetic Information Leakage Based on Cryptographic Integrated Circuits." Entropy 23, no. 11 (November 13, 2021): 1508. http://dx.doi.org/10.3390/e23111508.

Full text
Abstract:
Cryptographic algorithm is the most commonly used method of information security protection for many devices. The secret key of cryptographic algorithm is usually stored in these devices’ registers. In this paper, we propose an electromagnetic information leakage model to investigate the relationship between the electromagnetic leakage signal and the secret key. The registers are considered as electric dipole models to illustrate the source of the electromagnetic leakage. The equivalent circuit of the magnetic field probe is developed to bridge the output voltage and the electromagnetic leakage signal. Combining them, the electromagnetic information leakage model’s function relationship can be established. Besides, an electromagnetic leakage model based on multiple linear regression is proposed to recover the secret key and the model’s effectiveness is evaluated by guess entropy. Near field tests are conducted in an unshielded ordinary indoor environment to investigate the electromagnetic side-channel information leakage. The experiment result shows the correctness of the proposed electromagnetic leakage model and it can be used to recover the secret key of the cryptographic algorithm.
APA, Harvard, Vancouver, ISO, and other styles
24

Pavlushkov, Aleksandr R. "Interaction of the Synod and Its Institutions with the Secret Chancellery in the First Half of the 1720s." Vestnik of Northern (Arctic) Federal University. Series Humanitarian and Social Sciences, no. 6 (December 20, 2021): 14–23. http://dx.doi.org/10.37482/2687-1505-v138.

Full text
Abstract:
This article studies the mechanism of interaction of the Synod, its institutions and bodies of the central church administration with the Secret Chancellery during the first half of the 1720s. The analysis is based on the documents of the Synod containing correspondence with the Secret Chancellery. This study is a continuation of the research on the relationship between the Secret Chancellery and the Russian Orthodox Church, whose resluts had been published earlier. A deeper immersion in the topic provided greater insights into the joint activities of the synodal institutions and Russia’s main penal body at the time, as well as revealed the details of the most important contacts and pertinent problems. Of particular importance is the activity of the Chancellery of the Most Holy Synod, through which official correspondence with the Secret Chancellery and control over the implementation of its decisions as well as defrocking of priests before the start of investigation were carried out. Further, the paper describes the categories of convicts who were sent to the Synod from the Secret Chancellery and looks into the differences in their position. Contrary to the prevailing opinion about the absence of relations between the Synod and the Secret Chancellery, the author concludes that in practice there was a certain mechanism of interaction, which concerned investigations regarding the accused from among the clergy and their commital, as well as granting official requests from both parties, sending ecclesiastical experts, and enforcing sentences of the Secret Chancellery. In addition, facts are considered that testify to extremely complex and contradictory relations between the Synod and the Secret Chancellery. The author concludes that the relationship between these institutions was not systemic, but developed in the context of the state’s general advance on the church and subordination of the latter and the clergy to state interests. The mechanism of interaction between the Synod and the Secret Chancellery was formed in line with this trend as well.
APA, Harvard, Vancouver, ISO, and other styles
25

Morrison, Jago, and Alan Burton. "Secrets, leaks and the novel. Writers, British intelligence and the public sphere after World War Two." Arbeiten aus Anglistik und Amerikanistik 48, no. 1 (June 7, 2023): 71–95. http://dx.doi.org/10.24053/aaa-2023-0004.

Full text
Abstract:
This article makes a pioneering effort to explore the relationship between spy fiction, intelligence and the public sphere in Britain after World War Two. The secret British achievements of code-breaking, atomic science and deception in the World War of 1939–45 were outstanding. Similarly, the British contribution to spy fiction in the twentieth century has been seen as exceptional. However, the complex interconnections between the history and fictions of intelligence in the post-war decades have never been closely examined. This is a period during which the British state aggressively sought to suppress memoirs and histories written by wartime secret warriors. Other writers who chose to disclose aspects of their intelligence work through the idiom of spy fiction, however, met with a rather different response. In this period, we argue therefore, the relatively unpoliced spy story emerged as a tolerated form of leakage for wartime secrets. The public reputation of the British security establishment underwent a serious decline in the post-war years, in the wake of successive scandals and defections. British intelligence made a number of attempts to repair its battered image in this era, for example publicising a key case involving a Soviet double agent working for the West. However, fiction remained a key terrain on which an ongoing battle for the reputation of British intelligence continued to be fought out. From the early 1960s a significant new form began to emerge: the ‘New Realism’ of John le Carré. Widely accepted as an authentic image of the British intelligence ‘circus,’ these stories portrayed the British secret state in a strikingly harsh and revealing light. Working directly in response to le Carré, writers like John Bingham sought to counter with an altogether more positive impression of secret service. Again, the spy novel provided a key platform on which struggles over the public image of intelligence were fought out. In this way the essay draws together the history and fictions of the post-war decades to reveal an intimate correspondence between writers, secret service and the public understanding of intelligence.
APA, Harvard, Vancouver, ISO, and other styles
26

Knyazev, Serhiy. "The genesis of the organization of work with secret documents in Ukraine." Information Security of the Person, Society, State. 2022. № 1–3 (34–36), no. 34-36 (December 12, 2022): 72–80. http://dx.doi.org/10.51369/2707-7276-2022-(1-3)-9.

Full text
Abstract:
The article deals with issues related to the study of historical aspects of the formation of work with secret documents in Ukraine. It was noted that an important component of the effective organization of work with classified documents in the institution is sufficient for theoretical and practical training of individuals working with classified documents. It should include learning the basics of organizing work with classified documents, understanding the relationship between working with classified documents and working with open documents. Which, in turn, is inextricably linked with the general principles of working with documents, that were formed throughout the entire historical period of the emergence and development of writing and business writing in Ukraine. An analysis of various historical periods of our country has been carried out, which most vividly highlight the peculiarities of work with administrative documents for the development of statehood in Ukraine and the formation of work with secret documents. The basis for the emergence of secret documents is considered, which includes: taking into account the information contained in the documents, their importance and possible negative consequences in case of open distribution or use. As well as the gradual introduction of a system of regulatory measures aimed at protecting documents containing important information. Based on the results of the study, a number of important components that significantly influenced the modern organization of work with secret documents in Ukraine were identified, including: the need to systematize the accounting of the use and storage of various categories of secret documents; regulatory and legal regulation of work with secret documents; defining and fixing the range of functional duties of officials authorized to work with secret documents; introduction of a system of regime measures aimed at preserving secret documents. Key words: secret documents, secret information, state secret.
APA, Harvard, Vancouver, ISO, and other styles
27

Terasaki, Shinichiro, and Shin’ya Nagasawa. "The Relationship Between Brand Integrity and Business Continuity – A Case Study of Japanese Long-Standing Company, Shioyoshiken –." Journal of Advanced Computational Intelligence and Intelligent Informatics 16, no. 4 (June 20, 2012): 547–52. http://dx.doi.org/10.20965/jaciii.2012.p0547.

Full text
Abstract:
The number 22,000 represents how many Japanese companies have lasted more than 100 years. This fact attracts the attention of the many researchers who explore the secrets of such business continuity, mainly from the angles of management philosophy, product innovation, and successful business succession. This paper, however, focuses more on brand management for identifying the relationship between brand building and business continuity, employing of the case of Shioyoshiken. Shioyoshiken is renowned for manufacturing sophisticated Japanese sweets for more than 130 years. The Shioyoshiken brand is well appreciated by private customers who emphasize the value of specialized sweets, particularly for Japanese tea parties and weddings. In this case study, we (1) explore Shioyoshiken “rashisa,” which means “identity” in English and (2) identify the secret of Shioyoshiken’s long-lasting brand strength, referring to an interview with Masaaki Takaya, the owner of Shioyoshiken, and deploying analytical frameworks such as 4M, 4P and Kotler’s 3i.
APA, Harvard, Vancouver, ISO, and other styles
28

Hidayat, Anneke Soraya, Gil-Je Lee, Eun-Jun Yoon, and Kee-Young Yoo. "An in-depth analysis of strong t-consistency on secret image sharing." International Journal of Pervasive Computing and Communications 12, no. 1 (April 4, 2016): 107–26. http://dx.doi.org/10.1108/ijpcc-01-2016-0006.

Full text
Abstract:
Purpose The detection of an adversary in secret image sharing has been a problematic side in the reconstruction phase. Some of verifiable secret sharing solutions have been proposed to solve the problem. However, there is some computational limitation in the previous schemes. The purpose of this paper is to analyze the importance of consistency for detecting an adversary in a secure reconstruction phase. Strong t-consistency assures the correctness of reconstructed secret as long as participants P ∈ N and n(P) = t. Consistency is a solution for preventing the participant to be absent and helps the dealer to easily detect the adversary without an additional verification step. Design/methodology/approach This paper focuses on secure reconstruction, and uses two different approaches, namely, single-secret and multi-secret, to experiment the relationship between the given variable (t,m,n) and the adversaries by observing the quality test result, polynomial approach and visualization. Findings The results show that t and m are inversely proportional to the image quality without respect to the polynomial approach. The reconstruction phase is declared as securely conducted when m = 2t − 1, for both single- and multi-secret approaches. Originality/value The application of consistency is a considerable step for securing the secret from an adversary by combining the reconstruction phase and the consistency combination at once, removing the need for additional separate verification steps for decreasing the computational time, especially in secret image sharing.
APA, Harvard, Vancouver, ISO, and other styles
29

Servajean-Hilst, Romaric. "The secret to client-supplier innovation cooperation that lasts." Strategic Direction 33, no. 2 (February 13, 2017): 18–20. http://dx.doi.org/10.1108/sd-11-2016-0154.

Full text
Abstract:
Purpose The purpose of this paper is to provide some keys to understand and manage the dynamic of client-supplier innovation cooperation. Design/methodology/approach The results presented in this paper are based on a mixed methods approach that combines interviews with practitioners, quantitative inquiry on 160 client-supplier innovation cooperations and 18-month ethnography within an Innovation-Purchasing department. Findings At the first stage of a relationship, when trust and familiarity are low, unstructured organization has to be avoided and elaborated partnership privileged. Later in a relationship, the power balance increases, so do trust and familiarity. In case of a power balance in large favor of the client, elaborated partnership presents the best performance in the first phases of the innovation project, and the unstructured organization allows better performance in the phases around market launch. If the power balance is favorable to the supplier, the exclusive partnership organization gives the best results for the relationship. Later, when trust and familiarity attain the highest levels, and when the power is balanced within the couple, elaborated partnership is best suited from design to industrialization phases. In upstream phases, project-type organizations can be substituted to exclusive partnership: both allow the relationship to reach the highest scores. Originality/value The paper offers levers for managing innovation cooperation at macro and micro levels, taking into account the impact of the client-supplier relationship.
APA, Harvard, Vancouver, ISO, and other styles
30

Wang (王旭), Xu. "An Interpretative View of the Origin of the Early Chinese Revolution from the Perspective of Secret Societies: Retrospect and Reflections from the History of Social Thought, Part II." Rural China 19, no. 2 (September 5, 2022): 210–31. http://dx.doi.org/10.1163/22136746-12341287.

Full text
Abstract:
Abstract The development of the Chinese revolutionary movement in the early twentieth century absorbed cultural resources from traditional secret societies and associations. The White Lotus, the Tiandihui, the Gelaohui, the Triad, and the various secret societies that had emerged in the Taiping and the Boxer rebellions were all incorporated into the discourse system of revolutionary history. The secret societies’ slogans of “overthrow the Qing and restore the Ming” and “rob the rich to help the poor” merged with the revolutionaries’ platform of “drive out the Manchus” and “relief for people’s livelihood,” and finally advanced the success of the Xinhai Revolution and was turned into a coherent historical narrative. After the founding of the Republic of China, Sun Yat-sen and Song Jiaoren carefully assessed the function of secret societies and distinguished them from modern political parties. On the other hand, leaders of the Communist Party, such as Mao Zedong, Qu Qiubai, Yun Daiying, and Chen Duxiu, emphasized the ideological transformation of secret societies and the suitable role they could play in the revolution, thus showing a dynamic strategy of allying with these organizations. The history of the relationship between the Chinese revolution and secret societies reflects the changing characteristics and logic of the underclass of Chinese society.
APA, Harvard, Vancouver, ISO, and other styles
31

Burgis-Kasthala, Michelle. "Researching secret spaces: A reflexive account on negotiating risk and academic integrity." Leiden Journal of International Law 33, no. 2 (January 10, 2020): 269–87. http://dx.doi.org/10.1017/s0922156519000748.

Full text
Abstract:
AbstractThis article uses the case study of the Commission for International Justice and Accountability (CIJA) and its work on Syria as a way to reflect on the challenges international lawyers face in conducting research in relation to secret, highly constrained spaces. In particular, the article engages with debates within anthropology on the nature of para-ethnographic research as a way to think about research relationships between international legal scholars and practitioners as conducive of collaboration, (inter)dependency and dialogue. Yet this type of research, especially without the grounding of legal texts, raises questions about the legal researcher’s integrity and author(ity). Thus, the article’s core concern is to explore the inter-relationship between a variety of risks that can occur for both scholars and research subjects operating in secret spaces.
APA, Harvard, Vancouver, ISO, and other styles
32

Cora, Łukasz. "Tajemnica adwokacka w polskim procesie karnym – w kierunku attorney-client privilege?" Acta Iuridica Resoviensia 37, no. 2 (2022): 66–76. http://dx.doi.org/10.15584/actaires.2022.2.5.

Full text
Abstract:
The article refers to the issue of attorney-client privilege in Polish criminal proceedings. The author critically evaluates the current solution based on the dichotomy of defence secret and advocacy secret, pointing to basic normative and axiological problems connected with weakening of confidential attorney-client relationship based on mutual trust. In the following part, he refers to the attorney-client privilege, which is, in his opinion, much more guaranteeing having in particular in mind the special relationship between the advocate and the client. The whole argument ends with conclusions in which the author points out the disproportionate nature of the existing solutions regarding the possibility of waiving attorney-client privilege and questioning an advocate as a witness.
APA, Harvard, Vancouver, ISO, and other styles
33

Boyd, Carl, and Bradley F. Smith. "The Ultra-Magic Deals and the Most Secret Relationship, 1940-1946." Journal of Military History 57, no. 2 (April 1993): 347. http://dx.doi.org/10.2307/2944079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Kakabadse, Andrew, Nada K. Kakabadse, and Ruth Barratt. "Chairman and chief executive officer (CEO): that sacred and secret relationship." Journal of Management Development 25, no. 2 (February 2006): 134–50. http://dx.doi.org/10.1108/02621710610645126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Kinsella, Helen M. "Sex as the secret: counterinsurgency in Afghanistan." International Theory 11, no. 1 (December 18, 2018): 26–47. http://dx.doi.org/10.1017/s1752971918000210.

Full text
Abstract:
AbstractI explore the construction of women as the secret for the ‘successful’ prosecution of war in Afghanistan. To do so, I take up the mobilization of gender in the US counterinsurgency doctrine as deployed in Afghanistan. I draw on the 2006 Counterinsurgency Field Manual, human rights and humanitarian reports, and scholarly works to identify and analyze this mobilization, paying attention to the colonial histories upon which COIN explicitly and implicitly relies. By critically integrating these sources and the paradigmatic moments that exemplify COIN, I demonstrate the constitutive relationship of gender and COIN. The valence of the secret – of women as concealing, revealing, being, and bearing the secret – is still a lesser explored element in the analysis of the gendering of COIN and of its ‘military orientalism’. Even as scholars have powerfully shown how, in the case of Afghanistan and elsewhere, the veil functions as an overdetermined and ‘multilayered signifier’ in its own right, symbolizing the ‘tension between disclosure and concealment that defines the dominant conception of the secret’, less subject to detailed analysis in case of Afghanistan is the ways in which Afghan women are constituted through COIN in polysemous relation to the notion of the secret.
APA, Harvard, Vancouver, ISO, and other styles
36

Amidon, Debra M. "Dialogue with Customers: Secret to Innovation Strategy." International Journal of Innovation Management 01, no. 01 (March 1997): 73–87. http://dx.doi.org/10.1142/s136391969700005x.

Full text
Abstract:
Enterprises are discovering a rededication to customers in ways rarely practised other than by the entrepreneurial firm. However, quality and restructuring methodologies have returned executives to their own raison d'etre by positioning customers at the heart of business survival. At the same time, cross-boundary alliances are demanding new partnering techniques with all stakeholders, including customers. New initiatives are commonplace, but are generally without an understanding that something is fundamentally different between customer satisfaction and the success of your customers. This article introduces the concepts in ways that are easily practised. Simply stated, treat your customers as sources of knowledge, not someone to whom you solely deliver products and services. By practising value-system (rather than value-chain) strategies, companies can take advantage of the business opportunities afforded by a collaborative economy. Similarly, by defining Strategic Business Network (SBN's) rather than Strategic Business Units (SBU's), companies can leverage all available knowledge sources. Most importantly, a symbiotic relationship with consumers, customers or clients can help a company envision products and services for unarticulated needs and unserved markets. Companies which are practising new ways of interfacing with customers are realising significant business results. A profile of customer innovation at Steelcase North America provides an illustration of this new partnering relationship.
APA, Harvard, Vancouver, ISO, and other styles
37

Zhang, Mingliang, Xiangyang Luo, Pei Zhang, Hao Li, Yi Zhang, and Lingling Li. "High-Capacity Robust Behavioral Steganography Method Based on Timestamp Modulation across Social Internet of Things." Security and Communication Networks 2021 (December 31, 2021): 1–16. http://dx.doi.org/10.1155/2021/6351144.

Full text
Abstract:
Social Internet of Things (SIoT) is an emerging field that combines IoT and Internet, which can provide many novel and convenient application scenarios but still faces challenges in data privacy protection. In this paper, we propose a robust behavioral steganography method with high embedding capacity across social networks based on timestamp modulation. Firstly, the IoT devices on the sending end modulate the secret message to be embedded into a timestamp by using the common property on social networks. Secondly, the accounts of multiple social networks are used as the vertices, and the timestamp mapping relationship generated by the interaction behaviors between them is used as the edges to construct a directed secret message graph across social networks. Then, the frequency of interaction behaviors generated by users of mainstream social networks is analyzed; the corresponding timestamps and social networks are used to implement interaction behaviors based on the secret message graph and the frequency of interaction behaviors. Next, we analyze the frequency of interaction behaviors generated by users in mainstream social networks, implement the interaction behaviors according to the secret message graph and the frequency of interaction behaviors in the corresponding timestamps and social networks, and combine the redundant mapping control to complete the embedding of secret message. Finally, the receiver constructs the timestamp mapping relationship through the shared account, key, and other parameters to achieve the extraction of secret message. The algorithm is robust and does not have the problem that existing multimedia-based steganography methods are difficult to extract the embedded messages completely. Compared with existing graph theory-based social network steganography methods, using timestamps and behaviors frequencies to hide message in multiple social networks increases the cost of detecting covert communication and improves concealment of steganography. At the same time, the algorithm uses a directed secret message graph to increase the number of bits carried by each behavior and improves the embedding capacity. A large number of tests have been conducted on mainstream social networks such as Facebook, Twitter, and Weibo. The results show that the proposed method successfully distributes secret message to multiple social networks and achieves complete extraction of embedded message at the receiving end. The embedding capacity is increased by 1.98–4.89 times compared with the existing methods SSN, NGTASS, and SGSIR.
APA, Harvard, Vancouver, ISO, and other styles
38

Romaneț, Gabriela. "The Secret, A Hidden-Found Process." Romanian Journal of Psychoanalysis 13, no. 1 (June 1, 2020): 117–34. http://dx.doi.org/10.2478/rjp-2020-0009.

Full text
Abstract:
AbstractFollowing the secret’s customs, encountering it in the myriad manifestations of psychic life and relational domino effect, the current work separates the secret from the act of secretiveness and from trauma, with which the former often confused. The fact that it is intrinsically linked to truth, as it is hidden information waiting to be found, defines the secret as a process involved in working with information-about-self and the self: it is a joy to be hidden and a disaster not to be discovered. This hidden – found process that accompanies us our whole life is transformed according to the biological and psychological stages one must go through. Thus, the secret is interpreted differently, passing through successive stages of development. From the archaic game of “hide-and-seek”, through the primitive scene of “peeping through the keyhole” and discovering the secret of one’s own genitals, continuing with the type of secret offered by a relationship of friendship in latency, reaching the desecretisation and de-sacralisation of adolescence, the secret is an “act of secrecy” that requires an interior architecture as well as borders between the internal and external universe. Otherwise, the “act of secrecy” fails and turns into secretiveness, a failure of the hidden - found process, because either nothing can be hidden (as in paranoid mechanisms) or everything must be hidden (as in trauma mechanisms).
APA, Harvard, Vancouver, ISO, and other styles
39

Yahya, Wahyudin. "Prophet Muhammad SAW Trading Street; The Secret to Success in Trading." Jurnal Ilmiah Al-Tsarwah 6, no. 1 (September 25, 2023): 33–43. http://dx.doi.org/10.30863/al-tsarwah.v6i1.5318.

Full text
Abstract:
Islam encourages humans to produce and engage in all forms of economic activity, even Islamblesses this worldly act and gives it added value as worship to Allah and jihad in His way. All thepeople around the world who lived in that era knew that the Prophet Muhammad was an honestand just trader. Prophet Muhammad always showed responsibility and honesty to everyone. Hisreputationasatrue,honesttraderwaswellknownfromanearlyage.Therearetwoaspectsofthe trade route carried out by the Prophet Muhammad and become learning material for allpeople. The Hablumminallah aspect is a form of horizontal relationship between humans andAllah SWT as a form of surrender and solely because Allah SWT is related to worship, piety, trust,remembrance, gratitude in trading. The second aspect is the Hablumminannas aspect as a form ofhorizontal relationship between fellow humans related to establishing good relationships betweenemployees, customers and the community. The purpose of this paper is to find out the concept oftradingcarriedoutbytheProphetMuhammadSAWandtheimportanceofapplyingtheconceptof trading as practiced by the Prophet Muhammad SAW. This paper uses a literature study,besidesthatitalsousesaninterpretationmethodtoexamineversesrelatedtotrading.Afterthis has been done by referring to the Qur'an and as-Sunnah, the literature study and interpretationmethods carried out show that it is so important and so profitable to carry out a trading businesslikethatoftheProphetMuhammad.Apartfromgainingworldlybenefits,thenwewillalsoreceivebenefitsinthe hereafter.
APA, Harvard, Vancouver, ISO, and other styles
40

Staberg, Jakob. "Irmas injektioner." Tidskrift för litteraturvetenskap 43, no. 3-4 (January 1, 2013): 91–105. http://dx.doi.org/10.54797/tfl.v43i3-4.10810.

Full text
Abstract:
Irma’s Injections. Psychiatric Power and Female Resistance in Patriarchal Wienna 1900 Die Traumdeutung (1900) contains the first dream that Sigmund Freud devoted a full analysis to, using the new method of dream interpretation. In the psychoanalytic tradition it is known as the dream of Irma’s injections. In this article I propose a reading of the dream as a vignette from the turn of the century medical environment characterized by a patriarchal order, that is expressed through the relationship between a female patient and male physicians. Freud presents the dream as containing a secret, which has given rise to a variety of interpretations. He thus encouraged the notion that there is an intrinsic meaning hidden beneath the signifier, a primary and definitive meaning that is hidden beneath what is written and so doubles it in secret. I argue that it is only when we abstain from a hermeneutic analysis of the dream, that this dream record of the relationship between doctor and patient can tell us something about the origin of psychoanalysis in contemporary patriarchy. The interpretative framework is the male social network, which in the dream is permeated by desire and depicted in the form of rivalry, male social ties and libidinal investment. The future investment in sexuality by medical science, psychiatry and psychoanalysis appears in the dream through the cluster of men grouped around Irma whose body adopts phantasmatic forms. The female patient’s resistance to psychiatric and medical power thereby becomes a crucial component of psychoanalytic theory and method, initially formulated as a penetration of secrets.
APA, Harvard, Vancouver, ISO, and other styles
41

Kruglyakov, Sergey V. "Realization of the Socio-Legal Function by Appointed Advocate in Criminal and Civil Cases Involving State Secrets." Общество: политика, экономика, право, no. 2 (February 21, 2024): 94–103. http://dx.doi.org/10.24158/pep.2024.2.10.

Full text
Abstract:
The article delves into the realization of the social and legal function of the appointed advocate in criminal and civil proceedings in cases involving state secrets, as well as problematic issues and liability that may occur in case of its divulgence. The relevance of the research topic is that in Russia there is an increase in the number of convictions under Article 283 of the Criminal Code of the Russian Federation – disclosure of state secrets. In addition, the article discusses theoretical issues, the relationship between attorney-client privilege and state secrets, and provides examples from judicial practice. From a certain angle, the author is convinced that it is necessary to investigate the issue of the advocate’s activity on appointment in criminal and civil cases, in which there is a state secret, in order to further develop recommendations for advocates. The formal legal method, the method of comparative analysis, synthesis, the inductive method, generalization and systematization of scientific sources on the research problem, comparative and predictive methods were used.
APA, Harvard, Vancouver, ISO, and other styles
42

Csizner, Zoltán. "The Definition of Covert Intelligence and the Examination of Its Efficiency." Magyar Rendészet 22, no. 3 (December 5, 2022): 19–32. http://dx.doi.org/10.32577/mr.2022.3.1.

Full text
Abstract:
The exploration of the dreaded secrets of others, the collection of secret information and intelligence have been present in human communities since ancient times. Acquiring knowledge protected from unauthorised access has, over time, become a monopoly of a society organised into a state, and its implementation has been constrained by strict legislation. However, in addition to legitimacy, an equally important feature of covert intelligence is efficiency, which shows the relationship between the resources expended and the results achieved.How can their components be defined in an abstract way, can general criteria be named, and how can the results be measured and compared?The study seeks to answer these questions, which is a key part of research examining the relationship between the effectiveness and legitimacy of covert intelligence.It is also essential to present a complex and intricate system that helps to understand the regulation of covert intelligence and the organisations responsible for its implementation.
APA, Harvard, Vancouver, ISO, and other styles
43

Widerski, Piotr. "Protection of trade secrets in polish and european legislation." ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 22, no. 2 (July 25, 2018): 58–68. http://dx.doi.org/10.5604/01.3001.0012.5316.

Full text
Abstract:
Trade secrets are valuable business assets to all companies on the market irrespective of their size and sector. Empirical evidence prompts clear dependency between innovation and trade secret protection (Ec.europa.eu, 2013). Trade secrets represent the results of R&D investments, innovation and creativity. They are often located as the decisive element of economic advantage in business relationship. The lack of sufficient legal protection of secrets reduces confidence of business creators, researchers and innovators. A current state of protection in the EU has proven to be inadequate to create a satisfactory level of entrepreneurship. Directive 2016/943 endorses a minimum standard requirement for the EU legislation but the Member States may introduce to their own legal systems more far-reaching protection against unlawful acquisition, use or disclosure of trade secrets. Trade secrets play an important role in protecting the exchange of know-how between businesses, especially SMEs, and research institutions both within and across the borders of the internal market, in the context of research, development, and innovation. Trade secrets are one of the most commonly used forms of protection of intellectual creation and innovative know-how by businesses, yet at the same time, they are not sufficiently protected by the existing European Union legal framework.
APA, Harvard, Vancouver, ISO, and other styles
44

Bi, Xinliang, Xiaoyuan Yang, Chao Wang, and Jia Liu. "High-Capacity Image Steganography Algorithm Based on Image Style Transfer." Security and Communication Networks 2021 (September 28, 2021): 1–14. http://dx.doi.org/10.1155/2021/4179340.

Full text
Abstract:
Steganography is a technique for publicly transmitting secret information through a cover. Most of the existing steganography algorithms are based on modifying the cover image, generating a stego image that is very similar to the cover image but has different pixel values, or establishing a mapping relationship between the stego image and the secret message. Attackers will discover the existence of secret communications from these modifications or differences. In order to solve this problem, we propose a steganography algorithm ISTNet based on image style transfer, which can convert a cover image into another stego image with a completely different style. We have improved the decoder so that the secret image features can be fused with style features in a variety of sizes to improve the accuracy of secret image extraction. The algorithm has the functions of image steganography and image style transfer at the same time, and the images it generates are both stego images and stylized images. Attackers will pay more attention to the style transfer side of the algorithm, but it is difficult to find the steganography side. Experiments show that our algorithm effectively increases the steganography capacity from 0.06 bpp to 8 bpp, and the generated stylized images are not significantly different from the stylized images on the Internet.
APA, Harvard, Vancouver, ISO, and other styles
45

Derrida, Jacques, and Michal Ben-Naftali. "Abraham's Melancholy." Oxford Literary Review 39, no. 2 (December 2017): 153–88. http://dx.doi.org/10.3366/olr.2017.0220.

Full text
Abstract:
This interview with Michal Ben-Naftali from March 2004 is one of Derrida's last. It begins with the question of the relationship between love, law, and justice and then moves on to discuss everything from the secret, hospitality, friendship, sacrifice, pardon and psychoanalysis to the relationship between deconstruction and melancholy.
APA, Harvard, Vancouver, ISO, and other styles
46

Satan, Ali, and Meral Balcı. "The Turkish Province from an English Diplomat’s Viewpoint 70 Years Ago." European Journal of Social Sciences Education and Research 9, no. 1 (January 21, 2017): 7. http://dx.doi.org/10.26417/ejser.v9i1.p7-13.

Full text
Abstract:
In 1947, a British diplomat conducted a visit to the places travelled rarely by local and foreign travelers, The Black Sea Coast between Samsun and Giresun in the North, the Malatya-Erzincan train line in the South, the Sivas-Erzurum train route in the West, Erzincan-Şebinkarahisar- Giresun in the East, and reported what he saw to London. In secret report, there provided military, political, ethnographic and historical information. In rapidly changing life conditions in the world, this secret report, which was written seventy years ago, set us on a historical journey. In the year, which the secret report was written, Turkey preferred being part of Western bloc in newly established bipolar international system and British diplomats were trying to understand how Britain and the Soviet Union were looked at in the regions they visited. In the secret report, there were also striking observations regarding the activities of the newly formed opposition party (Democratic Party) in Anatolia, the distance between the Turkish elites and the Anatolian villagers, and the military-civilian relationship in Anatolia.
APA, Harvard, Vancouver, ISO, and other styles
47

Nurjaya, Nurjaya. "BUDAYA SEKOLAH ISLAM MULTIKULTURAL DAN PERILAKU KEBERAGAMAAN SISWA DI SD ISLAM AL-IKHLAS CILANDAK JAKARTA SELATAN." Tarbawi: Jurnal Keilmuan Manajemen Pendidikan 4, no. 02 (December 18, 2018): 213. http://dx.doi.org/10.32678/tarbawi.v4i02.1232.

Full text
Abstract:
This study aims to determine the contents of multicultural schools with the religious behavior of students at SD Islam Al-Ikhlas Cilandak, South Jakarta. Data processing methods are performed using statistics to obtain data, research variables and values ​​that include data on scores, medians, modes, standard deviations, and frequency distributions. Then for the purposes of the research hypothesis are inferential statistics with simple and regression techniques. From the research conducted, it can be concluded that: First, there is a positive and significant relationship between school culture and religious behavior, as evidenced by the assets of secret coefficient (ry1) of 0.962. Second, there is a positive and significant relationship between multicultural attitudes and student religious behavior, as evidenced by the assets of secret coefficient (ry1) of 0.969. Third, there is a positive and significant relationship between school culture and multicultural attitudes together with religious behavior, as evidenced by money (ry12) of 0.973 and the Fcount test of significance of 1099,684. Keywords. School Culture, Multicultural, Religious Sciences
APA, Harvard, Vancouver, ISO, and other styles
48

Rodríguez-Sánchez, Alma Maria, and Maria Vera Perea. "The secret of organisation success." International Journal of Emergency Services 4, no. 1 (July 13, 2015): 27–36. http://dx.doi.org/10.1108/ijes-09-2014-0018.

Full text
Abstract:
Purpose – The concept of the “resilient organisation” has gained popularity as a concept that might aid organizations survive and thrive in difficult or volatile economic times. Knowing which factors may contribute to building organizational and team resilience is one of the questions that still remain unsolved. The purpose of this paper is to examine and review different conceptualisations of this emergent topic in the management literature, taking into account the common features of resilience capacity in organizations and teams. Design/methodology/approach – To examine the literature on resilience, the authors will focus on team resilience. The authors depart from the psychological-behavioral approach to study resilience and instead take a multilevel perspective (i.e. taking into account organizational and team factors). Findings – From a psychological-behavioral point of view the authors posit that there is a lack of research on which factors build team resilience. This review clarifies and relates independent and isolated studies on resilience taking into account the resources both at team and organizational level (i.e. collective efficacy, transformational leadership, teamwork, organizational practices) that build team resilience capacity. Research limitations/implications – Taking into account this review, future studies should analyze empirically the relationship between these factors that build up team resilience. Practical implications – With this review the authors try to provide guidance as to which aspects of the organization both research and practitioners should focus on. Originality/value – In sum, this literature review examines organizational and team factors that may build team resilience from a psychological-behavioral perspective, taking into account the multilevel view.
APA, Harvard, Vancouver, ISO, and other styles
49

Teuber, Samuel, and Bernhard Beckert. "An Information-Flow Perspective on Algorithmic Fairness." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 14 (March 24, 2024): 15337–45. http://dx.doi.org/10.1609/aaai.v38i14.29458.

Full text
Abstract:
This work presents insights gained by investigating the relationship between algorithmic fairness and the concept of secure information flow. The problem of enforcing secure information flow is well-studied in the context of information security: If secret information may "flow" through an algorithm or program in such a way that it can influence the program’s output, then that is considered insecure information flow as attackers could potentially observe (parts of) the secret. There is a strong correspondence between secure information flow and algorithmic fairness: if protected attributes such as race, gender, or age are treated as secret program inputs, then secure information flow means that these "secret" attributes cannot influence the result of a program. While most research in algorithmic fairness evaluation concentrates on studying the impact of algorithms (often treating the algorithm as a black-box), the concepts derived from information flow can be used both for the analysis of disparate treatment as well as disparate impact w.r.t. a structural causal model. In this paper, we examine the relationship between quantitative as well as qualitative information-flow properties and fairness. Moreover, based on this duality, we derive a new quantitative notion of fairness called fairness spread, which can be easily analyzed using quantitative information flow and which strongly relates to counterfactual fairness. We demonstrate that off-the-shelf tools for information-flow properties can be used in order to formally analyze a program's algorithmic fairness properties, including the new notion of fairness spread as well as established notions such as demographic parity.
APA, Harvard, Vancouver, ISO, and other styles
50

Devonshire, Peter. "The remedial response to bribes and secret commissions in a fiduciary relationship." Northern Ireland Legal Quarterly 65, no. 1 (February 12, 2019): 23–37. http://dx.doi.org/10.53386/nilq.v65i1.199.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography