• Title/Summary/Keyword: Hiding

Search Result 543, Processing Time 0.021 seconds

Relationship between Team Cohesion and Knowledge Hiding : Moderating Effects of Ethical Leadership (팀 응집력이 지식은폐에 미치는 영향 : 윤리적 리더십의 조절효과)

  • Kang, Sora;Han, Su Jin
    • Journal of Information Technology Applications and Management
    • /
    • v.28 no.3
    • /
    • pp.31-48
    • /
    • 2021
  • Knowledge is a key resource for organizations to gain and maintain competitive advantage. Therefore, it is important for organizations to motivate employees to share knowledge with each other in order to achieve optimal performance of knowledge resources. Despite the efforts of organizations to share knowledge, knowledge hiding is still prevalent among employees. In this paper, we want to analyze the factors that may cause more general and pervasive knowledge-hiding behavior in organizations through empirical analysis. The results of this study show that, first, the relationship between team cohesion and knowledge hiding has been verified differently depending on the sub-behavior of knowledge hiding : playing dumb, evasive hiding, and rationalized hiding. Team cohesion has been shown to significantly reduce the playing dumb and evasive hiding. On the other hand, it was shown that team cohesion did not have a significant causal relationship with rationalized hiding. Second, the moderating effect of ethical leadership has been statistically significant in terms of team cohesion and relationships with playing dumb and evasive hiding. In other words, the higher the ethical leadership, the stronger the negative relationship between team cohesion and knowledge hiding. Finally, the theoretical and practical implications of this paper and future research directions are discussed.

The relationship between knowledge hiding and knowledge sharing : Through determinants of knowledge hiding and knowledge sharing (지식은폐와 지식공유의 영향요인과 관계에 관한 연구)

  • Shin, GaHee;Kwag, Sunhwa
    • Knowledge Management Research
    • /
    • v.18 no.2
    • /
    • pp.129-157
    • /
    • 2017
  • Knowledge is important to both individuals and organizations. Individuals can have the opportunity to have bargaining power within their organisations by having knowledge of know-how and ideas. Having ample knowledge of the organization can bring about advantages in securing competitive advantage. Organization wants to encourage employees to share knowledge. Despite the efforts to enhance knowledge sharing, often the effort failed. Employees are unwilling to share their knowledge or hide their knowledge. The purpose of this study is to clarify the relationship between knowledge hiding and knowledge sharing based on exploring the influence factors of knowledge hiding and knowledge sharing. As a result, the influence factors of knowledge hiding and knowledge sharing were different. The influences of knowledge hiding influenced knowledge hiding only and did not affect knowledge sharing. This implies that knowledge hiding and knowledge sharing do not exist on a single line but exist independently of each other, such as 'Herzberg's two-factor theory'. This study suggests that knowledge hiding is a field of interest as well as knowledge sharing. In practice, it is suggested that the concept of promoting knowledge sharing is not a way to reduce knowledge hiding, so the two concepts should be managed separately.

A Steganographic Data Hiding Method in Timestamps by Bit Correction Technique for Anti-Forensics

  • Cho, Gyu-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.8
    • /
    • pp.75-84
    • /
    • 2018
  • In this research, a bit correction technique of data hiding method in timestamp of MFT entry in NTFS file system is proposed. This method is proposed in two ways, depending on the number of bytes of data to hide. A basic data hiding method using a bit correction technique to solve the problems of the conventional 2-byte technique is proposed. In order to increase the capacity of the data, a 3-byte data hiding method using an extended bit correction technique is proposed. The data hiding method in the timestamps is based on the fact that is not revealed in the Windows explorer window and the command prompt window even if any data is hidden in the timestamp area of less than one second. It is shown that the validity of the proposed method through the experimental two cases of the basic data hiding method by the bit correction method and the 3-byte data hiding method by the extended bit correction method.

Empirical study of the intention of knowledge hiding and knowledge transfer -A comparative analysis of front-line workers and office workers in a public enterprise- (지식은폐의도와 지식전이의도의 영향요인에 관한 실증분석 -공기업 현장근로자와 사무실근로자의 비교분석-)

  • Kim, Nam Yeol;Jeon, Hyeon Gyu;Kim, Min Yong
    • Knowledge Management Research
    • /
    • v.18 no.3
    • /
    • pp.37-62
    • /
    • 2017
  • Most of the managers know that knowledge sharing has to be precede to create knowledge which has competitive advantage of organizations. Until now the study on knowledge management placed emphasis on knowledge creation and knowledge sharing but there is few study on knowledge hiding. This study investigates the factors implicate on knowledge hiding intention and knowledge transfer intention of front-line workers and office workers and the implication on job performance of knowledge hiding intention and knowledge transfer intention. We collected sample data from 100 front-line workers and 250 office workers and verified hypotheses using Multiple Linear Regression. The result described that factors affect active and passive knowledge hiding intentions and factors affect knowledge hiding intentions of front-line workers and office workers are different.

An Efficient Latency Hiding method using accumulation buffer (누적 버퍼를 활용한 효율적인 Latency Hiding기법)

  • Lee, Min-Woo;Han, Tack-Don
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.07a
    • /
    • pp.297-300
    • /
    • 2012
  • 현재 cache의 성능 향상을 위한 많은 기법들이 제안되고 있으며, Latency Hiding 기법 역시 cache의 효율적인 사용을 위해 많은 연구가 진행 되어 왔다. write buffer를 사용한 write Latency hiding기법이나 multi threading을 사용한 Latency Hiding 방법 등 여러 기법들이 연구되어 왔으며, 지금도 Latency hiding을 위한 많은 연구들이 지속적으로 진행되고 있다. 본 논문 역시 효율적인 Latency Hiding을 위한 누적 버퍼를 제안한다. 본 논문은 누적 버퍼의 활용도를 조사하여 얼마나 효율적으로 Latency를 은폐했는지, 또 버퍼를 사용함으로써 얻는 다른 이점에 대해 집중적으로 연구하였다.

  • PDF

High Capacity Information Hiding Method Based on Pixel-value Adjustment with Modulus Operation

  • Li, Teng;Zhang, Yu;Wang, Sha;Sun, Jun-jie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.4
    • /
    • pp.1521-1537
    • /
    • 2021
  • Through information hiding technique, secret message can be hidden in pictures. Stego-image quality and hiding capacity are two important metrics for information hiding. To enhance these metrics, many schemes were proposed by scholars in recent years. Some of them are effective and successful, but there is still a room for further improvement. A high capacity information hiding scheme (PAMO, Pixel-value Adjustment with Modulus Operation Algorithm) is introduced in this paper. PAMO scheme uses pixel value adjustment with modulus operation to hide confidential data in cover-image. PAMO scheme and some referenced schemes are implemented in Python and experiments are carried out to evaluate their performance. In the experiments, PAMO scheme shows better performance than other methods do. When secret message length is less than 72000 bits, the highest hiding capacity of PAMO can reach 7 bits per pixel, at the same time the PSNR of stego-images is greater than 30 dB.

The Method to Estimate Quality Degradation from Information Hiding in JPEG Compression Environment (JPEG 압축 환경의 정보은닉에서 영상 질 저하 예측방법)

  • Choi, Yong-Soo;Kim, Hyoung-Joong;Lee, Dal-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.551-555
    • /
    • 2008
  • In these days, compressed file is useful in internet environment and has many advantages. So a lot of data hiding algorithms works on JPEG compressed file. Of course they know basic rules of transformation and quantization and they utilize those rules to implement their programming. But most of them evaluate the affection of data hiding after data modification. We propose how to predict the affection of data modification in course of data hiding process. Through some kind of experiments, several valuable facts are revealed which used in data hiding in compressed domain such as JPEG. These facts will improve existing data hiding algorithms (F3, F4 and F5 which including Matrix Encoding)[1],[5],[6].

  • PDF

Histogram-based Reversible Data Hiding Based on Pixel Differences with Prediction and Sorting

  • Chang, Ya-Fen;Tai, Wei-Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3100-3116
    • /
    • 2012
  • Reversible data hiding enables the embedding of messages in a host image without any loss of host content, which is proposed for image authentication that if the watermarked image is deemed authentic, we can revert it to the exact copy of the original image before the embedding occurred. In this paper, we present an improved histogram-based reversible data hiding scheme based on prediction and sorting. A rhombus prediction is employed to explore the prediction for histogram-based embedding. Sorting the prediction has a good influence on increasing the embedding capacity. Characteristics of the pixel difference are used to achieve large hiding capacity while keeping low distortion. The proposed scheme exploits a two-stage embedding strategy to solve the problem about communicating peak points. We also present a histogram shifting technique to prevent overflow and underflow. Performance comparisons with other existing reversible data hiding schemes are provided to demonstrate the superiority of the proposed scheme.

A novel, reversible, Chinese text information hiding scheme based on lookalike traditional and simplified Chinese characters

  • Feng, Bin;Wang, Zhi-Hui;Wang, Duo;Chang, Ching-Yun;Li, Ming-Chu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.269-281
    • /
    • 2014
  • Compared to hiding information into digital image, hiding information into digital text file requires less storage space and smaller bandwidth for data transmission, and it has obvious universality and extensiveness. However, text files have low redundancy, so it is more difficult to hide information in text files. To overcome this difficulty, Wang et al. proposed a reversible information hiding scheme using left-right and up-down representations of Chinese characters, but, when the scheme is implemented, it does not provide good visual steganographic effectiveness, and the embedding and extracting processes are too complicated to be done with reasonable effort and cost. We observed that a lot of traditional and simplified Chinese characters look somewhat the same (also called lookalike), so we utilize this feature to propose a novel information hiding scheme for hiding secret data in lookalike Chinese characters. Comparing to Wang et al.'s scheme, the proposed scheme simplifies the embedding and extracting procedures significantly and improves the effectiveness of visual steganographic images. The experimental results demonstrated the advantages of our proposed scheme.

A Data Hiding Scheme Based on Turtle-shell for AMBTC Compressed Images

  • Lee, Chin-Feng;Chang, Chin-Chen;Li, Guan-Long
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2554-2575
    • /
    • 2020
  • Data hiding technology hides secret information into the carrier, so that when the carrier is transmitted over network, it will not attract any malicious attention. Using data compression, it is possible to reduce the data size into a small compressed code, which can effectively reduce the time when transmitting compressed code on the network. In this paper, the main objective is to effectively combine these two technologies. We designed a data hiding scheme based on two techniques which are turtle-shell information hiding scheme and absolute moment block truncation coding. The experimental results showed that the proposed scheme provided higher embedding capacity and better image quality than other hiding schemes which were based on absolute moment block truncation coding.