-
1
-
-
0039604680
-
Information asymmetry, R & D and insider gains
-
Aboody, D., & Lev, B. (2000). Information asymmetry, R & D and insider gains. Journal of Finance, 55(6), 2747-2767.
-
(2000)
Journal of Finance
, vol.55
, Issue.6
, pp. 2747-2767
-
-
Aboody, D.1
Lev, B.2
-
3
-
-
0032695088
-
Dangerous liaisons: Trust, distrust, and information technology in American work organizations
-
Baba, M.L. (1999). Dangerous liaisons: Trust, distrust, and information technology in American work organizations. Human Organization, 58(3), 331-346.
-
(1999)
Human Organization
, vol.58
, Issue.3
, pp. 331-346
-
-
Baba, M.L.1
-
4
-
-
0002260667
-
Bibliographic classification theory and text linguistics: Aboutncss analysis, intertextuality, and the cognitive act of classifying documents
-
Beghtol, C. (1986). Bibliographic classification theory and text linguistics: Aboutncss analysis, intertextuality, and the cognitive act of classifying documents. Journal of Documentation, 42(2), 84-113.
-
(1986)
Journal of Documentation
, vol.42
, Issue.2
, pp. 84-113
-
-
Beghtol, C.1
-
5
-
-
53349144801
-
'Facets' as interdisciplinary undiscovered public knowledge: S.R. Ranganathan in India and L. Guttman in Israel
-
Beghtol, C. (1995). 'Facets' as interdisciplinary undiscovered public knowledge: S.R. Ranganathan in India and L. Guttman in Israel. Journal of Documentation, 51(3), 194-224.
-
(1995)
Journal of Documentation
, vol.51
, Issue.3
, pp. 194-224
-
-
Beghtol, C.1
-
6
-
-
0012811413
-
-
New Brunswick, NJ: Rutgers University Press
-
Bellman, B.L. (1984). The language of secrecy. New Brunswick, NJ: Rutgers University Press.
-
(1984)
The Language of Secrecy
-
-
Bellman, B.L.1
-
8
-
-
0033482257
-
Market transparency: Who wins and who loses?
-
Bloomfield, R., & O'Hara, M. (1999). Market transparency: Who wins and who loses? Review of Financial Studies, 12(1), 5-35.
-
(1999)
Review of Financial Studies
, vol.12
, Issue.1
, pp. 5-35
-
-
Bloomfield, R.1
O'Hara, M.2
-
10
-
-
0020304239
-
Beyond topicality: A two-stage view of relevance and the retrieval process
-
Boyce, B. (1982). Beyond topicality: A two-stage view of relevance and the retrieval process. Information Processing and Management, 18, 105-109.
-
(1982)
Information Processing and Management
, vol.18
, pp. 105-109
-
-
Boyce, B.1
-
11
-
-
0010024543
-
On secrecy and the control of knowledge: Taos Pueblo
-
S. Tefft (Ed.), New York: Human Sciences Press
-
Brandt, E. (1980). On secrecy and the control of knowledge: Taos Pueblo. In S. Tefft (Ed.), Secrecy (pp. 351). New York: Human Sciences Press.
-
(1980)
Secrecy
, pp. 351
-
-
Brandt, E.1
-
14
-
-
0002101493
-
How shall a thing be called?
-
Brown, R. (1958). How shall a thing be called? Psychological Review, 65, 14-21.
-
(1958)
Psychological Review
, vol.65
, pp. 14-21
-
-
Brown, R.1
-
15
-
-
0011037464
-
Public disclosure and the structure of private information
-
Bushman, R.M. (1991). Public disclosure and the structure of private information. Journal of Accounting Research, 29(2), 261-276.
-
(1991)
Journal of Accounting Research
, vol.29
, Issue.2
, pp. 261-276
-
-
Bushman, R.M.1
-
16
-
-
21844493501
-
Timing the disclosure of information: Management's view of earnings announcements
-
Chen, C.R., & Mohan, N.J. (1994). Timing the disclosure of information: Management's view of earnings announcements. Financial Management, 23(3), 63-69.
-
(1994)
Financial Management
, vol.23
, Issue.3
, pp. 63-69
-
-
Chen, C.R.1
Mohan, N.J.2
-
17
-
-
38149148017
-
Conflicting interests in information disclosure and shortterm orientation of firms
-
Chen, Y. (1994). Conflicting interests in information disclosure and shortterm orientation of firms. International Journal of Industrial Organization, 12(2), 211-225.
-
(1994)
International Journal of Industrial Organization
, vol.12
, Issue.2
, pp. 211-225
-
-
Chen, Y.1
-
19
-
-
84860082339
-
-
Retrieved December 2
-
Congressional Research Service. Retrieved December 2, 2003, from http://www.fas.org/irp/crs/rl31845.pdf
-
(2003)
-
-
-
22
-
-
0033418948
-
The end of secrecy: U.S. national security and the imperative for openness
-
Doyle, K. (1999). The end of secrecy: U.S. national security and the imperative for openness. World Policy Journal, 16(1), 34-51.
-
(1999)
World Policy Journal
, vol.16
, Issue.1
, pp. 34-51
-
-
Doyle, K.1
-
23
-
-
13844259681
-
Information security: A technical or human Domain?
-
May. Paper presented at the Toronto, Canada
-
Drake, P., & Clarke, S. C. (2001, May). Information security: A technical or human Domain? Paper presented at the Information Resources Management Association, Toronto, Canada.
-
(2001)
Information Resources Management Association
-
-
Drake, P.1
Clarke, S.C.2
-
25
-
-
0038871206
-
Security classification for documents
-
Eloff, J.H.P., Holbein, R., & Teufel, S. (1996). Security classification for documents. Computers and Security, 15(1), 55-71.
-
(1996)
Computers and Security
, vol.15
, Issue.1
, pp. 55-71
-
-
Eloff, J.H.P.1
Holbein, R.2
Teufel, S.3
-
26
-
-
0001986928
-
Content analysis, specification and control
-
Fairthorne, R.A. (1969). Content analysis, specification and control. ARIST, 4, 73-109.
-
(1969)
ARIST
, vol.4
, pp. 73-109
-
-
Fairthorne, R.A.1
-
27
-
-
13844289612
-
Former Anderson executive to testify
-
April 10
-
Farrell, G. (2002, April 10). Former Anderson executive to testify. USA Today, p. B1.
-
(2002)
USA Today
-
-
Farrell, G.1
-
28
-
-
0030555635
-
Secrecy, trust, and dangerous leisure: Generating group cohesion in voluntary organizations
-
Fine, G.A., & Holyfield, L. (1996). Secrecy, trust, and dangerous leisure: Generating group cohesion in voluntary organizations. Social Psychology Quarterly, 59(1), 22-38.
-
(1996)
Social Psychology Quarterly
, vol.59
, Issue.1
, pp. 22-38
-
-
Fine, G.A.1
Holyfield, L.2
-
29
-
-
0027015012
-
Using ethnography to build a working system: Rethinking basic design assumptions
-
November. Paper presented at the Baltimore, MD
-
Forsythe, D.E. (1992, November). Using ethnography to build a working system: Rethinking basic design assumptions. Paper presented at the 16th Annual Symposium on Computer Applications in Medical Care, Baltimore, MD.
-
(1992)
16th Annual Symposium on Computer Applications in Medical Care
-
-
Forsythe, D.E.1
-
30
-
-
0030549329
-
The strategic timing of corporate disclosures
-
Gennotte, G., & Trueman, B. (1996). The strategic timing of corporate disclosures. Review of Financial Studies, 9(2), 665-690.
-
(1996)
Review of Financial Studies
, vol.9
, Issue.2
, pp. 665-690
-
-
Gennotte, G.1
Trueman, B.2
-
32
-
-
0029449040
-
Genetic privacy
-
Gostin, L.O. (1995). Genetic privacy. The Journal of Law, Medicine, & Ethics, 23(4), 320-330.
-
(1995)
The Journal of Law, Medicine, & Ethics
, vol.23
, Issue.4
, pp. 320-330
-
-
Gostin, L.O.1
-
33
-
-
85065630779
-
The promises of monsters: A regenerative polities for inappropriated others
-
C.N.P. Treichler & L. Grossberg (Eds.), New York: Routledge
-
Haraway, D. (1992). The promises of monsters: A regenerative polities for inappropriated others. In C.N.P. Treichler & L. Grossberg (Eds.), Cultural studies now and in the future (pp. 295-335). New York: Routledge.
-
(1992)
Cultural Studies Now and in the Future
, pp. 295-335
-
-
Haraway, D.1
-
34
-
-
13844304016
-
Improving network-level security through real-time monitoring and intrusion detection
-
H.F.A.M.K. Tipton (Ed.), Boca Raton, FL: Auerbach Publications
-
Hare, C. (2001). Improving network-level security through real-time monitoring and intrusion detection. In H.F.A.M.K. Tipton (Ed.), Information security management handbook (4th ed., Vol. 2, pp. 569-595). Boca Raton, FL: Auerbach Publications.
-
(2001)
Information Security Management Handbook (4th Ed.)
, vol.2
, pp. 569-595
-
-
Hare, C.1
-
35
-
-
25044452594
-
Officials have known SUV tire suspicions for decades
-
August 2
-
Healy, J.R., & Nathan, S. (2000, August 2). Officials have known SUV tire suspicions for decades. USA Today, p. B1.
-
(2000)
USA Today
-
-
Healy, J.R.1
Nathan, S.2
-
36
-
-
84860076704
-
Management takes notice
-
Retrieved September 30, 2001
-
Hulme, G.V. (2001). Management takes notice. Information Week. Retrieved September 30, 2001, from http://www.informationweek.com/story/IWK20010831S0014
-
(2001)
Information Week
-
-
Hulme, G.V.1
-
37
-
-
78651074773
-
Enron case could be largest corporate forensics investigation
-
February 19
-
Iwata, E. (2002, February 19). Enron case could be largest corporate forensics investigation. USA Today, p. B1.
-
(2002)
USA Today
-
-
Iwata, E.1
-
38
-
-
0007239427
-
Classification and categorization: Drawing the line
-
October. Paper presented at the Washington, DC
-
Jacob, E.K. (1991, October). Classification and categorization: Drawing the line. Paper presented at the 2nd ASIS SIG/CR Classification Research Workshop, Washington, DC.
-
(1991)
2nd ASIS SIG/CR Classification Research Workshop
-
-
Jacob, E.K.1
-
39
-
-
0009340593
-
-
Washington, DC: Joint Security Commission
-
Joint Security Commission. (1994). Redefining security. Washington, DC: Joint Security Commission.
-
(1994)
Redefining Security
-
-
-
41
-
-
84986085537
-
More on myth, magic, and metaphor: Cultural insights into the management of information technology in organizations
-
Kaarst-Brown, M.L., and Robey, D. (1999). More on myth, magic, and metaphor: Cultural insights into the management of information technology in organizations. Information, Technology and People, 12(2).
-
(1999)
Information, Technology and People
, vol.12
, Issue.2
-
-
Kaarst-Brown, M.L.1
Robey, D.2
-
42
-
-
84930563007
-
Sodot: Secret-sharing as a social form among Israeli children
-
Katriel, T. (1991). Sodot: Secret-sharing as a social form among Israeli children. Research on Languages and Social Interaction, 24, 141-157.
-
(1991)
Research on Languages and Social Interaction
, vol.24
, pp. 141-157
-
-
Katriel, T.1
-
43
-
-
0031593256
-
Pre-announcement and event period private information
-
Kim, O., & Verrecchia, R.E. (1997). Pre-announcement and event period private information. Journal of Accounting and Economics, 24(3), 395-419.
-
(1997)
Journal of Accounting and Economics
, vol.24
, Issue.3
, pp. 395-419
-
-
Kim, O.1
Verrecchia, R.E.2
-
44
-
-
0030900973
-
Information as regulation: The effect of community right to know laws on toxic emissions
-
Konar, S., & Cohen, M.A. (1997). Information as regulation: The effect of community right to know laws on toxic emissions. Journal of Environmental Economics and Management, 32(1), 109-124.
-
(1997)
Journal of Environmental Economics and Management
, vol.32
, Issue.1
, pp. 109-124
-
-
Konar, S.1
Cohen, M.A.2
-
45
-
-
0001364716
-
The importance of factors that are not document attributes in the organization of personal documents
-
Kwasnik, B.H. (1991). The importance of factors that are not document attributes in the organization of personal documents. Journal of Documentation, 47(4), 389-398.
-
(1991)
Journal of Documentation
, vol.47
, Issue.4
, pp. 389-398
-
-
Kwasnik, B.H.1
-
46
-
-
0033449090
-
The role of classification in knowledge representation and discovery
-
Kwasnik, B.H. (1999). The role of classification in knowledge representation and discovery. Library Trends, 48(1), 22-47.
-
(1999)
Library Trends
, vol.48
, Issue.1
, pp. 22-47
-
-
Kwasnik, B.H.1
-
47
-
-
0038537796
-
Bizango: A voodoo secret society in Haiti
-
S. Tefft (Ed.), New York: Human Sciences Press
-
Laguerre, M.S. (1980). Bizango: A voodoo secret society in Haiti. In S. Tefft (Ed.), Secrecy (pp. 351). New York: Human Sciences Press.
-
(1980)
Secrecy
, pp. 351
-
-
Laguerre, M.S.1
-
48
-
-
0031928404
-
Secrecy, anonymity, and deception in donor insemination: A genetic, psycho-social and ethical critique
-
Landau, R. (1998). Secrecy, anonymity, and deception in donor insemination: A genetic, psycho-social and ethical critique. Social Work in Health Care, 28(1), 75-89.
-
(1998)
Social Work in Health Care
, vol.28
, Issue.1
, pp. 75-89
-
-
Landau, R.1
-
49
-
-
0031511147
-
Disclosure of information in regulatory proceedings
-
Lewis, T.R., & Poitevin, M. (1997). Disclosure of information in regulatory proceedings. Journal of Law, Economics, and Organizations, 13(1), 50-73.
-
(1997)
Journal of Law, Economics, and Organizations
, vol.13
, Issue.1
, pp. 50-73
-
-
Lewis, T.R.1
Poitevin, M.2
-
52
-
-
84937292702
-
Offshore secrecy centers and the necessary role of states: Bucking the trend
-
Maingot, A.P. (1995). Offshore secrecy centers and the necessary role of states: Bucking the trend. Journal of Interamerican Studies and World Affairs, 37(4), 1-24.
-
(1995)
Journal of Interamerican Studies and World Affairs
, vol.37
, Issue.4
, pp. 1-24
-
-
Maingot, A.P.1
-
53
-
-
0007072396
-
-
Stanford, CA: Stanford University Press
-
March, J. G., Schulz, M., & Zhou, X. (2000). The dynamics of rules. Stanford, CA: Stanford University Press.
-
(2000)
The Dynamics of Rules
-
-
March, J.G.1
Schulz, M.2
Zhou, X.3
-
55
-
-
0018057167
-
Natural categories: Well defined or fuzzy sets?
-
McCloskey, M.E., & Glucksburg, S. (1978). Natural categories: Well defined or fuzzy sets? Memory and Cognition, 6, 462-472.
-
(1978)
Memory and Cognition
, vol.6
, pp. 462-472
-
-
McCloskey, M.E.1
Glucksburg, S.2
-
56
-
-
22644449475
-
Enculturation into secrecy among junior high school girls
-
Metten, D. (1999). Enculturation into secrecy among junior high school girls. Journal of Contemporary Ethnography, 28(2), 107-137.
-
(1999)
Journal of Contemporary Ethnography
, vol.28
, Issue.2
, pp. 107-137
-
-
Metten, D.1
-
57
-
-
0001943068
-
Categorization of natural objects
-
Mervis, C.B., & Rosch, E. (1981), Categorization of natural objects. Annual Review of Psychology, 32, 89-115.
-
(1981)
Annual Review of Psychology
, vol.32
, pp. 89-115
-
-
Mervis, C.B.1
Rosch, E.2
-
58
-
-
0034335611
-
Intimate exchanges: Using computers to elicit self disclosure from consumers
-
Moon, Y. (2000). Intimate exchanges: Using computers to elicit self disclosure from consumers. Journal of Consumer Research, 26(4), 23-39.
-
(2000)
Journal of Consumer Research
, vol.26
, Issue.4
, pp. 23-39
-
-
Moon, Y.1
-
59
-
-
13844304017
-
Enterprise security architecture
-
H.F.A.M.K. Tipton (Ed.), Boca Raton, PL: Auerbach Publications
-
Murray, W.H. (2000). Enterprise security architecture. In H.F.A.M.K. Tipton (Ed.), Information security management handbook (4th ed., Vol. 1, pp. 215-230). Boca Raton, PL: Auerbach Publications.
-
(2000)
Information Security Management Handbook (4th Ed.)
, vol.1
, pp. 215-230
-
-
Murray, W.H.1
-
60
-
-
13844278550
-
House panel investigates leaks at FDA
-
June 10
-
O'Donnell, J. (2002, June 10), House panel investigates leaks at FDA. USA Today, p. B1.
-
(2002)
USA Today
-
-
O'Donnell, J.1
-
61
-
-
0003208695
-
Integrated information environment or matrix of control? The contradictory implications of information technology
-
Orlikowski, W.J. (1991). Integrated information environment or matrix of control? The contradictory implications of information technology. Accounting Management and Information Technology, 1(1), 9-42.
-
(1991)
Accounting Management and Information Technology
, vol.1
, Issue.1
, pp. 9-42
-
-
Orlikowski, W.J.1
-
62
-
-
0033196205
-
Acquisition and discretionary disclosure of private information and its implications for firms' productive activities
-
Pae, S. (1999). Acquisition and discretionary disclosure of private information and its implications for firms' productive activities. Journal of Accounting Research, 37(2), 465-474.
-
(1999)
Journal of Accounting Research
, vol.37
, Issue.2
, pp. 465-474
-
-
Pae, S.1
-
63
-
-
84929228330
-
Telling the truth (up to a point): Radio communication among Maine lobstermen
-
Palmer, C.T. (1990). Telling the truth (up to a point): Radio communication among Maine lobstermen. Human Organization, 49(2), 157-163.
-
(1990)
Human Organization
, vol.49
, Issue.2
, pp. 157-163
-
-
Palmer, C.T.1
-
64
-
-
13844294705
-
Classification of information to protect it from loss
-
Parker, D.B. (1996). Classification of information to protect it from loss. Information Systems Security, 5(2), 9-15.
-
(1996)
Information Systems Security
, vol.5
, Issue.2
, pp. 9-15
-
-
Parker, D.B.1
-
65
-
-
13844278548
-
Information classification
-
Peltier, T.R. (1998). Information classification. Information Systems Security, 7(3), 31-43.
-
(1998)
Information Systems Security
, vol.7
, Issue.3
, pp. 31-43
-
-
Peltier, T.R.1
-
67
-
-
13844278549
-
-
Colorado Springs, CO: PoliVec Inc.
-
PoliVec. (2002). Security policy development process. Colorado Springs, CO: PoliVec Inc.
-
(2002)
Security Policy Development Process
-
-
-
69
-
-
0031231907
-
The impact of secrecy and denial in adoption: Practice and treatment issues
-
Rosenberg, K.F., & Groze, V. (1997). The impact of secrecy and denial in adoption: Practice and treatment issues. Families in Society, 78(5), 522-530.
-
(1997)
Families in Society
, vol.78
, Issue.5
, pp. 522-530
-
-
Rosenberg, K.F.1
Groze, V.2
-
71
-
-
13844286369
-
The management of secrecy: The Ku Klux Klan's successful secret
-
S. Tefft (Ed.), New York: Human Sciences
-
Schaefer, R.T. (1980). The management of secrecy: The Ku Klux Klan's successful secret. In S. Tefft (Ed.), Secrecy (pp. 161-177). New York: Human Sciences.
-
(1980)
Secrecy
, pp. 161-177
-
-
Schaefer, R.T.1
-
72
-
-
85140101909
-
The symbolic value of computerized information systems
-
P. Gagliardi (Ed.), New York: Aldine de Gruyter
-
Scholz, C. (1990). The symbolic value of computerized information systems. In P. Gagliardi (Ed.), Symbols and artifacts: Views of the corporate landscape (pp. 233-254). New York: Aldine de Gruyter.
-
(1990)
Symbols and Artifacts: Views of the Corporate Landscape
, pp. 233-254
-
-
Scholz, C.1
-
73
-
-
0037164945
-
A fall from grace
-
December 23
-
Sheler, J.L., & Glasser, J. (2002, December 23). A fall from grace. US News and World Report, 133(24), 19.
-
(2002)
US News and World Report
, vol.133
, Issue.24
, pp. 19
-
-
Sheler, J.L.1
Glasser, J.2
-
75
-
-
0004206023
-
-
(K.H. Wolff, Trans.). New York: The Free Press. (Original work published 1912)
-
Simmel, G. (1950). The sociology of Georg Simmel (K.H. Wolff, Trans.). New York: The Free Press. (Original work published 1912)
-
(1950)
The Sociology of Georg Simmel
-
-
Simmel, G.1
-
76
-
-
0032281861
-
Grounded classification: Grounded theory and faceted classification
-
Star, S.L. (1998). Grounded classification: Grounded theory and faceted classification. Library Trends, 47(2), 218-232.
-
(1998)
Library Trends
, vol.47
, Issue.2
, pp. 218-232
-
-
Star, S.L.1
-
77
-
-
84860078408
-
-
Associated Press. Retrieved September 5, 2002
-
Study: Most support government web action. (2002). Associated Press. Retrieved September 5, 2002, from http://www.ap.org
-
(2002)
Study: Most Support Government Web Action
-
-
-
79
-
-
0040832934
-
Information disclosure and voluntary contributions to public goods
-
Teoh, S.H. (1997). Information disclosure and voluntary contributions to public goods. RAND Journal of Economics, 28(3), 385-406.
-
(1997)
RAND Journal of Economics
, vol.28
, Issue.3
, pp. 385-406
-
-
Teoh, S.H.1
-
84
-
-
13844289610
-
Merrill-Lynch fires two bankers
-
September 19
-
Valdmanis, T. (2002, September 19). Merrill-Lynch fires two bankers. USA Today, p. B1.
-
(2002)
USA Today
-
-
Valdmanis, T.1
-
85
-
-
84952414272
-
Relevance assignment in discourse comprehension
-
Van Dijk, T.A. (1979). Relevance assignment in discourse comprehension. Discourse Processes, 2, 113-126.
-
(1979)
Discourse Processes
, vol.2
, pp. 113-126
-
-
Van Dijk, T.A.1
-
86
-
-
84993906406
-
Privacy and secrecy: A conceptual comparison
-
Warren, C., & Laslett, B. (1977). Privacy and secrecy: A conceptual comparison. Journal of Social Issues, 33(3), 43-51.
-
(1977)
Journal of Social Issues
, vol.33
, Issue.3
, pp. 43-51
-
-
Warren, C.1
Laslett, B.2
-
88
-
-
0033240774
-
Secret transmission: A relative intimacy hypothesis
-
Yovetich, N.A., & Drigotas, S.M. (1999). Secret transmission: A relative intimacy hypothesis. Personality and Social Psychology Bulletin, 25(9), 1135-1146.
-
(1999)
Personality and Social Psychology Bulletin
, vol.25
, Issue.9
, pp. 1135-1146
-
-
Yovetich, N.A.1
Drigotas, S.M.2
|