نتایج جستجو برای: tacit collusion

تعداد نتایج: 5968  

2004
Yeon-Koo Che Jinwoo Kim

A contract with multiple agents may be susceptible to collusion. We show that agents’ collusion can be prevented at no cost in a large class of circumstances with risk neutral agents — virtually all circumstances with uncorrelated types and a broad set of circumstances with correlated types. In those circumstances, an optimal outcome in the absence of collusion can be made collusion proof, in a...

2014
Aniol Llorente-Saguer Ro’i Zultan

The theoretical literature on collusion in auctions suggests that the first-price mechanism can deter the formation of bidding rings. In equilibrium, collusive negotiations are either successful or are avoided altogether, hence such analysis neglects the effects of failed collusion attempts. In such contingencies, information revealed in the negotiation process is likely to affect the bidding b...

2008
Jo Seldeslachts Tomaso Duso Enrico Pennings

Though there is a body of theoretical literature on research joint venture (RJV) participation facilitating collusion, empirical tests are rare. Even more so, there are few empirical tests on the general theme of collusion. This note tries to fill this gap by assuming a correspondence between the stability of research joint ventures and collusion. By using data from the US National Cooperation ...

2003
H. Vicky Zhao Min Wu Z. Jane Wang K. J. Ray Liu

Digital fingerprinting is a technology for tracing the distribution of multimedia content and protecting them from unauthorized redistribution. Collusion attack is a cost effective attack against digital fingerprinting where several copies with the same content but different fingerprints are combined to remove the original fingerprints. In this paper, we consider average attack and several nonl...

Journal: :IACR Cryptology ePrint Archive 2016
Yuqiao Deng Ge Song

Inner product encryption (IPE) is a new cryptographic primitive initially proposed by Abdalla et al. in 2015. IPE can be classified into public-key IPE and secret-key IPE. The currently proposed PK-IPE schemes can-not resist the following collusion attack: an invalid user that holds no private key can ”buy” a combined key generated from multiple collusion adversaries, and the user can use this ...

Journal: :J. Knowledge Management 2008
Ragna Seidler-de Alwis Evi Hartmann

Purpose – The purpose of this paper is to examine the use of tacit knowledge within innovative organizations. It addresses what organizations can do to promote knowledge sharing in order to improve successful innovation. Compared to available research material on explicit knowledge, the use of tacit knowledge within companies is relatively unexplored. The use of tacit knowledge is assessed with...

Journal: :Philosophia Scientae 2013

2009
Xia Zhou Alessandra Sala Haitao Zheng

Dynamic spectrum auction is an effective solution to manage spectrum across many small networks. As the number of participants grows, collusion poses a serious threat to auction performance. Small groups of colluding bidders can make use of the interference constraints to manipulate auction outcomes, leading to unfair spectrum distribution and significant loss in auction revenue. Prior designs,...

This paper discovers the necessary variables need for creating models for tacit knowledge acquisition, especially in medical care services. The case studied here, was knowledge of diagnosing and time of delivery in twin pregnancy with nuchal translucency screening. This paper covers the empirical work undertaken on semi-structured interview based on thematic analysis. With regard of theoretical...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید