نتایج جستجو برای: tacit collusion
تعداد نتایج: 5968 فیلتر نتایج به سال:
A contract with multiple agents may be susceptible to collusion. We show that agents’ collusion can be prevented at no cost in a large class of circumstances with risk neutral agents — virtually all circumstances with uncorrelated types and a broad set of circumstances with correlated types. In those circumstances, an optimal outcome in the absence of collusion can be made collusion proof, in a...
The theoretical literature on collusion in auctions suggests that the first-price mechanism can deter the formation of bidding rings. In equilibrium, collusive negotiations are either successful or are avoided altogether, hence such analysis neglects the effects of failed collusion attempts. In such contingencies, information revealed in the negotiation process is likely to affect the bidding b...
Though there is a body of theoretical literature on research joint venture (RJV) participation facilitating collusion, empirical tests are rare. Even more so, there are few empirical tests on the general theme of collusion. This note tries to fill this gap by assuming a correspondence between the stability of research joint ventures and collusion. By using data from the US National Cooperation ...
Digital fingerprinting is a technology for tracing the distribution of multimedia content and protecting them from unauthorized redistribution. Collusion attack is a cost effective attack against digital fingerprinting where several copies with the same content but different fingerprints are combined to remove the original fingerprints. In this paper, we consider average attack and several nonl...
Inner product encryption (IPE) is a new cryptographic primitive initially proposed by Abdalla et al. in 2015. IPE can be classified into public-key IPE and secret-key IPE. The currently proposed PK-IPE schemes can-not resist the following collusion attack: an invalid user that holds no private key can ”buy” a combined key generated from multiple collusion adversaries, and the user can use this ...
Purpose – The purpose of this paper is to examine the use of tacit knowledge within innovative organizations. It addresses what organizations can do to promote knowledge sharing in order to improve successful innovation. Compared to available research material on explicit knowledge, the use of tacit knowledge within companies is relatively unexplored. The use of tacit knowledge is assessed with...
Dynamic spectrum auction is an effective solution to manage spectrum across many small networks. As the number of participants grows, collusion poses a serious threat to auction performance. Small groups of colluding bidders can make use of the interference constraints to manipulate auction outcomes, leading to unfair spectrum distribution and significant loss in auction revenue. Prior designs,...
This paper discovers the necessary variables need for creating models for tacit knowledge acquisition, especially in medical care services. The case studied here, was knowledge of diagnosing and time of delivery in twin pregnancy with nuchal translucency screening. This paper covers the empirical work undertaken on semi-structured interview based on thematic analysis. With regard of theoretical...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید