Search Results

There are 62704 results for: content related to: The Secrecy Heuristic: Inferring Quality from Secrecy in Foreign Policy Contexts


    Personnel Psychology

    Volume 63, Issue 4, Winter 2010, Pages: 965–996, PETER BAMBERGER and ELENA BELOGOLOVSKY

    Version of Record online : 2 NOV 2010, DOI: 10.1111/j.1744-6570.2010.01194.x

  2. The Financial Secrecy Index: Shedding New Light on the Geography of Secrecy

    Economic Geography

    Volume 91, Issue 3, July 2015, Pages: 281–303, Alex Cobham, Petr Janský and Markus Meinzer

    Version of Record online : 9 MAY 2015, DOI: 10.1111/ecge.12094

  3. When do central banks prefer to intervene secretly?

    International Journal of Finance & Economics

    Volume 14, Issue 4, October 2009, Pages: 378–393, Montserrat Ferré and Carolina Manzano

    Version of Record online : 5 JUN 2008, DOI: 10.1002/ijfe.375

  4. Leakage-probability-constrained secrecy capacity of a fading channel

    Security and Communication Networks

    Volume 5, Issue 6, June 2012, Pages: 583–593, Zhi Chen, Dapeng Wu, Pingyi Fan and Khaled Ben Letaief

    Version of Record online : 2 AUG 2011, DOI: 10.1002/sec.353

  5. Children's Disclosure and Secrecy: Links to Maternal Parenting Characteristics and Children's Coping Skills

    Social Development

    Volume 20, Issue 3, August 2011, Pages: 624–643, Alisa N. Almas, Joan E. Grusec and Jennifer L. Tackett

    Version of Record online : 25 JAN 2011, DOI: 10.1111/j.1467-9507.2010.00602.x

  6. Do Perceptions of Ballot Secrecy Influence Turnout? Results from a Field Experiment

    American Journal of Political Science

    Volume 57, Issue 3, July 2013, Pages: 537–551, Alan S. Gerber , Gregory A. Huber , David Doherty , Conor M. Dowling  and Seth J. Hill 

    Version of Record online : 18 APR 2013, DOI: 10.1111/ajps.12019

  7. Relational Implications of Secrecy and Concealment in Parent–Adolescent Relationships

    What Can Parents Do?: New Insights into the Role of Parents in Adolescent Problem Behavior

    Catrin Finkenauer, Rutger C. M. E. Engels, Kaska E. Kubacka, Pages: 43–64, 2008

    Published Online : 7 MAR 2008, DOI: 10.1002/9780470774113.ch2

  8. Do Firms Use Time-Vested Stock-Based Pay to Keep Research and Development Investments Secret?

    Journal of Accounting Research

    Volume 49, Issue 4, September 2011, Pages: 861–894, DAVID H. ERKENS

    Version of Record online : 1 JUN 2011, DOI: 10.1111/j.1475-679X.2011.00418.x

  9. A Boom with Review: How Retrospective Oversight Increases the Foreign Policy Ability of Democracies

    American Journal of Political Science

    Volume 56, Issue 3, July 2012, Pages: 671–689, Michael Colaresi

    Version of Record online : 21 FEB 2012, DOI: 10.1111/j.1540-5907.2011.00567.x

  10. A pilot study examining perceived rejection and secrecy in relation to illicit drug use and associated stigma

    Drug and Alcohol Review

    Volume 31, Issue 4, June 2012, Pages: 573–579, JOSEPH J. PALAMAR

    Version of Record online : 19 DEC 2011, DOI: 10.1111/j.1465-3362.2011.00406.x

  11. On the ergodic secrecy capacity and secrecy outage probability of the MIMOME Rayleigh wiretap channel

    Transactions on Emerging Telecommunications Technologies

    Andre Saito Guerreiro, Gustavo Fraidenraich and Richard Demo Souza

    Version of Record online : 12 FEB 2015, DOI: 10.1002/ett.2924

  12. You have full text access to this OnlineOpen article
    Relay selection for secrecy connectivity in random wireless networks

    Wireless Communications and Mobile Computing

    Bai Juan, Xiaofeng Tao, Jin Xu, Xuefei Zhang and Qin Zhang

    Version of Record online : 19 JUL 2016, DOI: 10.1002/wcm.2681


    The Sociological Quarterly

    Volume 50, Issue 1, Winter 2009, Pages: 145–171, Wei Hong and John P. Walsh

    Version of Record online : 8 JAN 2009, DOI: 10.1111/j.1533-8525.2008.01136.x

  14. Silence and secrets in Domenico Fetti's Portrait of a Man with a Sheet of Music

    Renaissance Studies

    Volume 27, Issue 2, April 2013, Pages: 270–290, SEAN ROBERTS

    Version of Record online : 24 FEB 2012, DOI: 10.1111/j.1477-4658.2012.00808.x

  15. Secrecy versus patenting

    The RAND Journal of Economics

    Volume 38, Issue 1, March 2007, Pages: 22–42, Klaus Kultti, Tuomas Takalo and Juuso Toikka

    Version of Record online : 28 JUN 2008, DOI: 10.1111/j.1756-2171.2007.tb00042.x

  16. Secrecy performance of MIMO Nakagami-m wiretap channels with optimal TAS and different antenna schemes

    Transactions on Emerging Telecommunications Technologies

    Volume 27, Issue 6, June 2016, Pages: 828–841, Daniel Benevides da Costa, Nuwan Suresh Ferdinand, Ugo Silva Dias, Rafael Timóteo de Sousa Jr. and Matti Latva-aho

    Version of Record online : 21 FEB 2016, DOI: 10.1002/ett.3029

  17. Cooperative beamforming of full-duplex relays for improving physical layer security

    International Journal of Communication Systems

    Jong-Ho Lee

    Version of Record online : 5 JUN 2015, DOI: 10.1002/dac.2992

  18. Institutional shrinkage: The deviant case of Swiss banking secrecy

    Regulation & Governance

    Volume 6, Issue 2, June 2012, Pages: 242–259, Simon Steinlin and Christine Trampusch

    Version of Record online : 22 FEB 2012, DOI: 10.1111/j.1748-5991.2012.01128.x

  19. “The world is a forest of symbols”: Italian Freemasonry and the practice of discretion

    American Ethnologist

    Volume 39, Issue 2, May 2012, Pages: 425–438, Lilith Mahmud

    Version of Record online : 8 MAY 2012, DOI: 10.1111/j.1548-1425.2012.01373.x


    Economic Inquiry

    Volume 35, Issue 1, January 1997, Pages: 59–69, LEIF DANZIGER and ELIAKIM KATZ

    Version of Record online : 28 SEP 2007, DOI: 10.1111/j.1465-7295.1997.tb01894.x