Results for 'government secrecy'

977 found
Order:
  1.  75
    Government Secrecy, the Ethics of Wikileaks, and the Fifth Estate.Edward H. Spence - 2012 - International Review of Information Ethics 17:07.
    This paper aims to systematically explore and provide answers to the following key questions: When is government secrecy justified? In a conflict between government secrecy and the public's right to be informed on matters of public interest, which ought to take priority? Is Julian Assange a journalist and what justifies his role as a journalist? Even if Julian Assange is a journalist of the new media, was he justified in disseminating classified information to the public? Who (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  29
    Civil Disobedience in Global Perspective: Decency and Dissent Over Borders, Inequities, and Government Secrecy.Michael Allen - 2017 - Dordrecht: Springer Verlag.
    This book explores a hitherto unexamined possibility of justifiable disobedience opened up by John Rawls’ Law of Peoples. This is the possibility of disobedience justified by appeal to standards of decency that are shared by peoples who do not otherwise share commitments to the same principles of justice, and whose societies are organized according to very different basic social institutions. Justified by appeal to shared decency standards, disobedience by diverse state and non-state actors indeed challenge injustices in the international system (...)
  3.  60
    Secrecy in science: Exploring university, industry, and government relationships.Amy C. Crumpton - 1999 - Science and Engineering Ethics 5 (3):417-426.
  4. Secrecy, transparency and government whistleblowing.William H. Harwood - 2017 - Philosophy and Social Criticism 43 (2):164-186.
    In the first part of the 21st century, the complicated relationship between transparency and security reached a boiling point with revelations of extra-judicial CIA activities, near universal NSA monitoring and unprecedented whistleblowing – and prosecution of whistleblowers under the Espionage Act. This article examines the dual necessities of security and transparency for any democracy, and the manner in which whistleblowers radically saddle this Janus-faced relationship. Then I will move to contemporary examples of whistleblowing, showing how and why some prove more (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5.  30
    Corporate secrecy: the final barrier to corporate governance.Robert Chambers - 2006 - International Journal of Business Governance and Ethics 2 (1):43-53.
  6.  55
    Secrecy and Autonomy in Lewis Carroll.Susan Sherer - 1996 - Philosophy and Literature 20 (1):1-19.
    In lieu of an abstract, here is a brief excerpt of the content:Secrecy and Autonomy in Lewis CarrollSusan ShererVictorian novels quiver with morbid secrets and threatening discoveries. Unseen rooms, concealed doors, hidden boxes, masked faces, buried letters, all appear (and disappear) with striking regularity in the fiction of Victorian England. So many of these secret spaces contain children, and especially little girls, little girls in hidden spaces. The young Jane Eyre sits behind a curtain in the hidden window seat, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  7. Secrecy in Three Acts.Peter Galison - 2010 - Social Research: An International Quarterly 77 (2):941-974.
    In June 1979, Congress passed the Espionage Act, the first act of the three secrecy-defining statutes that have shaped so much of the last hundred years of modern American secrecy doctrine. Together with two other statutes that followed in later decades-the Atomic Energy Acts of 1946 and 1954, and the Patriot Act of 2001-these three Acts picked out inflection points in the great ratcheting process that has expanded secrecy from the protection of troop positions and recruitment stations (...)
     
    Export citation  
     
    Bookmark   3 citations  
  8.  61
    Logics of Political Secrecy.Eva Horn - 2011 - Theory, Culture and Society 28 (7-8):103-122.
    In the modern age, the political secret has acquired a bad reputation. With modern democracy’s ideal of transparency, political secrecy is identified with political crime or corruption. The article argues that this repression of secrecy in modern democracies falls short of a substantial understanding of the structure and workings of political secrecy. By outlining a genealogy of political secrecy, it elucidates the logic as well as the blind spots of a current culture of secrecy. It (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  9.  15
    (1 other version)Liberty, Secrecy, and the Right of Assessment.Daniele Santoro & Manohar Kumar - 2024 - Law and Philosophy 44 (1).
    In this article we argue that governmental practices of secrecy threaten the epistemic dimension of rights. We defend the view that possessing a right entitles its holder to the largest extent of available knowledge of the circumstances that may impede the enjoyment of that right. We call this the ‘epistemic entitlement’ of rights. Such an entitlement holds in ideal conditions once full transparency is assumed. However, under non-ideal conditions secrecy is a fact that should be accounted for. We (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10.  94
    Corporate Governance and the Responsibility of the Board of Directors for Strategic Financial Reporting.James C. Gaa - 2009 - Journal of Business Ethics 90 (S2):179 - 197.
    One of the fundamental principles of good corporate governance is transparency, i.e., the disclosure of private information to external stakeholders, so that they may make judgments and decisions relating to the corporation. Equally important, but less discussed, is the competing value that corporations need to protect legitimate secrets. Corporations thus need a communication strategy for dealing with external stakeholders which addresses the conflict between disclosure and secrecy. This article focuses on an important element of that communication strategy in the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  11. Secrecy in consequentialism: A defence of esoteric morality.Katarzyna de Lazari-Radek & Peter Singer - 2010 - Ratio 23 (1):34-58.
    Sidgwick's defence of esoteric morality has been heavily criticized, for example in Bernard Williams's condemnation of it as 'Government House utilitarianism.' It is also at odds with the idea of morality defended by Kant, Rawls, Bernard Gert, Brad Hooker, and T.M. Scanlon. Yet it does seem to be an implication of consequentialism that it is sometimes right to do in secret what it would not be right to do openly, or to advocate publicly. We defend Sidgwick on this issue, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   23 citations  
  12.  40
    Secrecy or Silence with Her Finger on Her Mouth”: Jeremy Bentham’s Other Model of Visibility and Power.Kristen R. Collins - 2022 - Political Theory 50 (4):596-620.
    To challenge the Foucauldian legacy of Jeremy Bentham’s panopticon prison, scholars often highlight Bentham’s later writings on the democratic power of public opinion. In doing so, they reaffirm Bentham’s reputation as a unreserved proponent of transparency. To recover the limits of Bentham’s embrace of publicity, I examine the model of visibility exemplified by his designs for the Sotimion, a residence for unmarried, pregnant women. The Sotimion draws our attention to Bentham’s appreciation for concealment as a method of preventing individual and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13. Nuclear waste, secrecy and the mass media.Len Ackland, Karen Dorn Steele & JoAnn M. Valenti - 1998 - Science and Engineering Ethics 4 (2):181-190.
    Invited media scholars and journalists examine the general issue of nuclear waste, risk and the sicentific promises that were made, but not kept, about safe disposal. The mass media uncovered and reported on nuclear waste problems at Rocky Flats in Colorado and Hanford in Washington. Two environmental journalists review efforts to expose problems at these sites, how secrecy hampered reporting, and the effects of media coverage on nearby residents. An environmental communications scholar evaluates media coverage, the role of the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  14.  97
    The Economic Inefficiency of Secrecy: Pension Fund Investors’ Corporate Transparency Concerns.Tessa Hebb - 2006 - Journal of Business Ethics 63 (4):385-405.
    In the wake of recent corporate scandals, this paper traces the growing power of pension funds to provide managerial oversight of the firms they hold in their investment portfolios. Increasingly pension funds are exercising their legitimate rights as owners to raise the corporate governance standards of the firms they invest in. Within corporate governance generally, pension funds are shifting their attention away from managerial accountability and toward measures that increase transparency in firm-level decision-making. Pension funds use transparency to ensure that (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   10 citations  
  15.  26
    States of secrecy: an introduction.Koen Vermeir & Dániel Margócsy - 2012 - British Journal for the History of Science 45 (2):153-164.
    This introductory article provides an overview of the historiography of scientific secrecy from J.D. Bernal and Robert Merton to this day. It reviews how historians and sociologists of science have explored the role of secrets in commercial and government-sponsored scientific research through the ages. Whether focusing on the medieval, early modern or modern periods, much of this historiography has conceptualized scientific secrets as valuable intellectual property that helps entrepreneurs and autocratic governments gain economic or military advantage over competitors. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  16. Logically Private Laws: Legislative Secrecy in "The War on Terror".Duncan Macintosh - 2019 - In Claire Oakes Finkelstein & Michael Skerker, Sovereignty and the New Executive Authority. Oxford University Press. pp. 225-251.
    Wittgenstein taught us that there could not be a logically private language— a language on the proper speaking of which it was logically impossible for there to be more than one expert. For then there would be no difference between this person thinking she was using the language correctly and her actually using it correctly. The distinction requires the logical possibility of someone other than her being expert enough to criticize or corroborate her usage, someone able to constitute or hold (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  53
    Markets in votes: Alienability, strict secrecy, and political clientelism.Nicolás Maloberti - 2019 - Politics, Philosophy and Economics 18 (2):193-215.
    Standard rationales for the illegality of markets in votes are based on concerns over the undue influence of wealth and the erosion of civic responsibility that would result from the commodification of votes. I present an alternative rationale based on how the mere alienability of votes alters the strategic setting faced by political actors. The inalienability of votes ensure the strict secrecy of voting, that is, the inability of voters to communicate credibly to others the content of their votes. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18. Nsa Management Directive #424: Secrecy and Privacy in the Aftermath of Edward Snowden.George R. Lucas - 2014 - Ethics and International Affairs 28 (1):29-38.
    Whatever else one might say concerning the legality, morality, and prudence of his actions, Edward Snowden, the former U.S. National Security Agency contractor, is right about the notion of publicity and informed consent, which together constitute the hallmark of democratic public policy. In order to be morally justifiable, any strategy or policy involving the body politic must be one to which it would voluntarily assent when fully informed about it. This, in essence, was Snowden's argument for leaking, in June 2013, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  19.  66
    Fallout from Government-Sponsored Radiation Research.Carol Mason Spicer - 1994 - Kennedy Institute of Ethics Journal 4 (2):147-154.
    In lieu of an abstract, here is a brief excerpt of the content:Fallout from Government-Sponsored Radiation ResearchCarol Mason Spicer (bio)On December 28, 1993, Energy Secretary Hazel R. O'Leary publicly appealed to both the executive and legislative branches of the United States Government to consider compensation for individuals who were harmed by their exposure to ionizing radiation while enrolled in government-sponsored studies conducted between 1940 and the early 1970s.1 The call for compensation was issued three weeks after Secretary (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  20.  38
    The concept of governance in dual-use research.Alex Dubov - 2014 - Medicine, Health Care and Philosophy 17 (3):447-457.
    The rapid advance of life science within the context of increased international concern over the potential misuse of findings has resulted in the lack of agreement on the issues of responsibility, control and collaboration. This progress of knowledge outpaces the efforts of creating moral and legal guidelines for the detection and minimization of the risks in the research process. There is a need to identify and address normative aspects of dual-use research. This paper focuses on the issues of safety and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  21. Speaking Truth to Power. A Theory of Whistleblowing.Daniele Santoro & Manohar Kumar - 2018 - Cham: Springer. Edited by Manohar Kumar.
    Whistleblowing is the public disclosure of information with the purpose of revealing wrongdoings and abuses of power that harm the public interest. This book presents a comprehensive theory of whistleblowing: it defines the concept, reconstructs its origins, discusses it within the current ethical debate, and elaborates a justification of unauthorized disclosures. Its normative proposal is based on three criteria of permissibility: the communicative constraints, the intent, and the public interest conditions. The book distinguishes between two forms of whistleblowing, civic and (...)
  22. A Two Level Account of Executive Authority.Michael Skerker - 2019 - In Claire Oakes Finkelstein & Michael Skerker, Sovereignty and the New Executive Authority. Oxford University Press.
    The suite of secretive national security programs initiated in the US since 9/11 has created debate not only about the merits of targeted killing, torture, secret detention, cyberwar, global signals intercepts, and data-mining, but about the very secrecy in which these programs were conceived, debated by government officials, and implemented. Law must be revealed to those who are expected to comply with its demands. Law is a mere pretext for coercion if the laws permitting the government to (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. Executive Prerogative and Disobedient Disclosure of Government Secrets.Michael Allen - 2017 - In Civil Disobedience in Global Perspective: Decency and Dissent Over Borders, Inequities, and Government Secrecy. Dordrecht: Springer Verlag.
    No categories
     
    Export citation  
     
    Bookmark  
  24. Mill and the secret ballot: Beyond coercion and corruption.Annabelle Lever - 2007 - Utilitas 19 (3):354-378.
    In Considerations on Representative Government, John Stuart Mill concedes that secrecy in voting is often justified but, nonetheless, maintains that it should be the exception rather than the rule. This paper critically examines Mill’s arguments. It shows that Mill’s idea of voting depends on a sharp public/private distinction which is difficult to square with democratic ideas about the different powers and responsibilities of voters and their representatives, or with legitimate differences of belief and interest amongst voters themselves. Hence, (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark   19 citations  
  25.  64
    Brother secret, sister silence: Sibling conspiracies against managerial integrity. [REVIEW]William De Maria - 2006 - Journal of Business Ethics 65 (3):219-234.
    I offer a new cartography of ethical resistance. I argue that there is an uncharted interaction between managerial secrecy and organizational silence, which may exponentially increase the incidence of corruption in ways not yet understood. Current methods used to raise levels of moral conduct in business and government practice appear blind to this powerful duo. Extensive literature reviews of secrecy and silence scholarships form the background for an early stage conceptual layout of the co-production of secrecy (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  26.  23
    The Abdication of Philosophy.Volker Gerhardt - 1996 - Idealistic Studies 26 (2):175-188.
    The basis for the secrecy is equally apparent, being furnished by Kant a bit later: it could, he suggests, damage the repute of governments to take counsel in foreign affairs from their “subjects.” As a consequence, what can only be publicly executed ought to be agreed on previously in strict secrecy. The state may thus only “tacitly... summon its citizens” to “publicly discuss the general maxims of warfare and peacemaking”. Quite superfluously, a few lines later Kant expressly concedes (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  27.  2
    An enduring tension: balancing national security and our access to information.Emily Berman (ed.) - 2014 - New York: International Debate Education Association.
    Perhaps nothing has become more evident in the months and years since 9/11 than the tension that exists between the publics access to information and concerns about protecting national security. This tension raises fundamental questions regarding how and to what extent national security secrecy is consistent with American notions of democracy; how institutions governing determinations about secrecy and disclosure should be designed; and the proper role of Congress, the courts, the public, and the media when it comes to (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  28.  25
    Canadian securities regulation and foreign blocking legislation.Andrew Gray & Graeme Hamilton - 2010 - International Journal of Business Governance and Ethics 5 (1/2):87.
    Knowing who benefits financially from a securities trade is necessary for the detection, prosecution and deterrence of illegal securities trading. Foreign jurisdictions with banking or securities secrecy laws are frequently used as a platform for illegal activity to frustrate law enforcement. This paper considers the extent to which Canadian law gives effect to so-called foreign blocking legislation. We conclude that while Canadian law does not generally give effect to foreign blocking legislation, it imposes only limited requirements on market intermediaries (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  18
    Disclosure Conflicts: Crude Oil Trains, Fracking Chemicals, and the Politics of Transparency.Guy Schaffer & Abby Kinchy - 2018 - Science, Technology, and Human Values 43 (6):1011-1038.
    Many governments and corporations have embraced information disclosure as an alternative to conventional environmental and public health regulation. Public policy research on transparency has examined the effects of particular disclosure policies, but there is limited research on how the construction of disclosure policies relates to social movements, or how transparency and ignorance are related. As a first step toward filling this theoretical gap, this study seeks to conceptualize disclosure conflicts, the social processes through which secrecy is challenged, defended, and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  30.  17
    Killing Times: The Temporal Technology of the Death Penalty.David Wills - 2019 - Fordham University Press.
    Killing Times begins with the deceptively simple observation—made by Jacques Derrida in his seminars on the topic—that the death penalty mechanically interrupts mortal time by preempting the typical mortal experience of not knowing at what precise moment we will die. Through a broader examination of what constitutes mortal temporality, David Wills proposes that the so-called machinery of death summoned by the death penalty works by exploiting, or perverting, the machinery of time that is already attached to human existence. Time, Wills (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  18
    Tajna polityka – próba uzasadnienia.Dorota Mokrosińska - 2020 - Civitas. Studia Z Filozofii Polityki 20:141-160.
    The author raises the question of whether secret uses of power by democratic states can form a legitimate exercise of democratic authority. On the face of it, the answer seems negative. First, it is commonplace to think that in a democracy, political decisions are legitimate only if they are authorized by citizens. From this perspective, secret uses of power seem to lack democratic authority because, one argues, people cannot authorize what they are denied knowledge about. Second, the exercise of democratic (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  14
    Toward a Post-Critical Public Sphere in Germany and the United States.Russell A. Berman - 2022 - Telos: Critical Theory of the Contemporary 2022 (200):67-89.
    ExcerptThe modern understanding of the public sphere is inseparable from criticism: the public is the space in which criticism can be articulated most effectively. The critical public emerged historically as a platform for individuals to call into question the decisions of state authority, especially when those decisions were taken outside the public view, as was typical for the premodern state—although the penchant for secrecy in government certainly lives on today. The public sphere stretches across multiple fields: individual discussion, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  16
    The Law and Ethics of Data Sharing in Health Sciences.Marcelo Corrales Compagnucci, Timo Minssen, Mark Fenwick, Mateo Aboy & Kathleen Liddell (eds.) - 2024 - Springer Nature Singapore.
    Data sharing – broadly defined as the exchange of health-related data among multiple controllers and processors – has gained increased relevance in the health sciences over recent years as the need and demand for collaboration has increased. This includes data obtained through healthcare provisions, clinical trials, observational studies, public health surveillance programs, and other data collection methods. The practice of data sharing presents several notable challenges, however. Compliance with a complex and dynamic regulatory framework is essential, with the General Data (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  56
    Speaking Truth to Conspiracy: Partisanship and Trust.Russell Muirhead & Nancy L. Rosenblum - 2016 - Critical Review: A Journal of Politics and Society 28 (1):63-88.
    ABSTRACTWhat we call the “partisan connection”—the bridge parties build between the people and the formal polity—entails sympathizing with citizens’ suspicions and fears. However, loosening the partisan connection and “speaking truth to conspiracy” is sometimes a moral and political imperative when conspiracy charges come from party leaders’ constituents and fellow partisans. We consider epistemological challenges that make it difficult to assess whether conspiracy claims are warranted, and we consider political challenges to assessing the validity of conspiracy claims that are posed by (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  35.  36
    The “black box” at work.Ifeoma Ajunwa - 2020 - Big Data and Society 7 (2).
    An oversized reliance on big data-driven algorithmic decision-making systems, coupled with a lack of critical inquiry regarding such systems, combine to create the paradoxical “black box” at work. The “black box” simultaneously demands a higher level of transparency from the worker in regard to data collection, while shrouding the decision-making in secrecy, making employer decisions even more opaque to the worker. To access employment, the worker is commanded to divulge highly personal information, and when hired, must submit further still (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  36. Making Drones to Kill Civilians: Is it Ethical?Edmund F. Byrne - 2018 - Journal of Business Ethics 147 (1):81-93.
    A drone industry has emerged in the US, initially funded almost exclusively for military applications. There are now also other uses both governmental and commercial. Many military drones are still being made, however, especially for surveillance and targeted killings. Regarding the latter, this essay calls into question their legality and morality. It recognizes that the issues are complex and controversial, but less so as to the killing of non-combatant civilians. The government using drones for targeted killings maintains secrecy (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  37.  12
    The effectiveness of Voluntarily Produced Transparency Reports.Christopher Parsons - 2019 - Business and Society 58 (1):103-131.
    This article analyzes the relative effectiveness and limitations of companies’ voluntarily produced transparency reports in promoting change in firm and government behavior. Such reports are published by telecommunications companies and disclose how often and on what grounds government agencies compel customer data from these companies. These reports expose corporate behaviors while lifting the veil of governmental secrecy surrounding these kinds of compulsions. Fung, Graham, and Weil’s “targeted transparency” model is used to evaluate the extent to which these (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  38.  19
    The Force of Law? Transparency of Scientific Advice in Times of Covid-19.Neus Vidal Marti - 2022 - Jus Cogens 4 (3):237-262.
    Freedom of Information Acts (FOIA) are valuable legal tools to access information held by public authorities but during the first wave of the Covid-19 pandemic time frames to reply to requests were de jure or de facto suspended in many countries. However, the lack of effective legal tools to achieve transparency was not automatically paired with governmental secrecy. This research paper analyses which are the factors that prompted some governments to move from secrecy to transparency while the essential (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39.  64
    African philosophy, culture, and traditional medicine.M. Akin Makinde - 1988 - Athens, Ohio: Ohio University Center for International Studies.
    For over two centuries, Western scholars have discussed African philosophy and culture, often in disparaging, condescending terms, and always from an alien European perspective. Many Africans now share this perspective, having been trained in the western, empirical tradition. Makinde argues that, particularly in view of the costs and failings of western style culture, Africans must now mold their own modern culture by blending useful western practices with valuable indigenous African elements. Specifically, Makinde demonstrates the potential for the development of African (...)
    Direct download  
     
    Export citation  
     
    Bookmark   4 citations  
  40.  40
    Examining embedded apparatuses of AI in Facebook and TikTok.Justin Grandinetti - forthcoming - AI and Society:1-14.
    In popular discussions, the nuances of AI are often abridged as “the algorithm”, as the specific arrangements of machine learning, deep learning and automated decision-making on social media platforms are typically shrouded in proprietary secrecy punctuated by press releases and transparency initiatives. What is clear, however, is that AI embedded on social media functions to recommend content, personalize ads, aggregate news stories, and moderate problematic material. It is also increasingly apparent that individuals are concerned with the uses, implications, and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  41.  12
    Brother Secret, Sister Silence: Sibling Conspiracies Against Managerial Integrity.William Maria - 2006 - Journal of Business Ethics 65 (3):219-234.
    I offer a new cartography of ethical resistance. I argue that there is an uncharted interaction between managerial secrecy and organizational silence, which may exponentially increase the incidence of corruption in ways not yet understood. Current methods used to raise levels of moral conduct in business and government practice appear blind to this powerful duo. Extensive literature reviews of secrecy and silence scholarships form the background for an early stage conceptual layout of the co-production of secrecy (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  42.  23
    Radio waves, memories, and the politics of everyday life in socialist Romania: The case of Radio Free Europe.Ruxandra Petrinca - 2019 - Centaurus 61 (3):178-199.
    During the communist era, Radio Free Europe (RFE) was Romania's favorite radio station. This paper analyzes the role of RFE in everyday life in the strictly controlled Romanian communist state by looking at the broadcasts of RFE's Romanian Department, their audience, and their impact. Drawing largely on the RFE archives at the Vera and Donald Blinken Open Society Archives (OSA) and the former secret police files at the National Council for the Study of the Securitate Archives (CNSAS), it investigates how (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43. US military and covert action and global justice.Sagar Sanyal - 2009 - International Journal of Applied Philosophy 23 (2):213-234.
    US military intervention and covert action is a significant contributor to global injustice. Discussion of this contributor to global injustice is relatively common in social justice movements. Yet it has been ignored by the global justice literature in political philosophy. This paper aims to fill this gap by introducing the topic into the global justice debate. While the global justice debate has focused on inter-national and supra-national institutions, I argue that an adequate analysis of US military and covert action must (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  44.  28
    Draft for Understanding the Historical Background of Changes in the Ideological Language and Communication of Secret Services in 20th Century’s Hungary.Bela Revesz - 2020 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 33 (3):855-898.
    Words can mean different things to different people. This can be problematic, mainly for those working together in a bureaucratic institution, such as the secret service. Shared, certified, explicit and codified definitions offer a counter to subjective, solitary and/or culturally dominant definitions. It’s true that codified secrecy terms for secret services can be seen to involve a number of political, cultural, subcultural “languages”, but if words come from unclassified or declassified files, memorandums and/or records, one needs a deep understanding (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  15
    Democracy, Technocracy, and the Secret State of Medicines Control: Expert and Nonexpert Perspectives.Julie Sheppard & John Abraham - 1997 - Science, Technology and Human Values 22 (2):139-167.
    This article explores the social frameworks guiding expert and nonexpert perspectives on medicines safety in the U.K. Scientific experts from the Committee on the Safety of Medicines and the Medicines Commission were interviewed, and three nonexpertgroups, including patients and health professionals, were studied by the administration of questionnaires and focused group discussions. The research examined to what extent these groups subscribed to technocratic or democratic approaches to medicines regula tion and how this might be related to values toward technological risk. (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  46.  67
    Combining efficiency and concerns about integrity when using human biobanks.Mats G. Hansson - 2004 - Studies in History and Philosophy of Science Part C: Studies in History and Philosophy of Biological and Biomedical Sciences 37 (3):520-532.
    In the debate about human bio-sampling the interests of patients and other sample donors are believed to stand against the interests of scientists and of their freedom of research. Scientists want efficient access to and use of human biological samples. Patients and other donors of blood or tissue materials want protection of their integrity. This dichotomy is reflected in the Swedish law on biobanks, which came into effect 1 January 2003. In this article I argue that if the basic interest (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  47.  48
    Protecting Animals versus the Pursuit of Knowledge: The Evolution of the British Animal Research Policy Process.Dan Lyons - 2011 - Society and Animals 19 (4):356-367.
    Animal research in the United Kingdom is regulated by the Animals Act 1986, which requires a government minister to weigh the expected suffering of animals against the expected benefits of a proposed animal research project—the “cost-benefit assessment”—before licensing the project. Research into the implementation of this legislation has been severely constrained by statutory confidentiality. This paper overcomes this hindrance by describing a critical case study based on unprecedented primary data: pig-to-primate organ transplantation conducted between 1995 and 2000. It reveals (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  48.  56
    Gordon R. Mitchell. Strategic Deception: Rhetoric, Science, and Politics in Missile Defense Advocacy. xx + 390 + [9] pp., illus., fig., bibl., index.East Lansing: Michigan State University Press, 2000. $55. [REVIEW]Alex Roland - 2002 - Isis 93 (1):159-160.
    Gordon Mitchell mixes scholarship and polemics in a deliberate attempt to intevene “in present‐day missile defense controversies” . His book operates on three levels. First, he presents three case studies of recent missile defense activities in which the United States government has misled the American public. The failed promise of President Reagan's Strategic Defense Initiative, or “Star Wars,” has lured countless industry representatives and government officials into rigging tests, falsifying results, and withholding information. The government used (...) and intimidation, trying to suppress the assertion of MIT professor Ted Postol that claims for the Patriot missile's success rate in the Gulf War vastly exceeded the evidence. Similar techniques were employed in the mid 1990s to discredit a study done by Postol and other colleagues suggesting that the government's proposed Theater High Altitude Air Defense might violate the Anti‐Ballistic Missile Treaty. Mitchell relies primarily on secondary sources to document these accounts; readers familiar with the issues will find little that is new in his treatment.The second level at which his book operates is more original. He subjects statements by government officials to rhetorical analysis. He hopes, thereby, both to reveal the misinformation and to create something of a taxonomy of dissimulation. He notes, for example, that President Reagan's rhetoric in proposing strategic defense was to equate it with disarmament. Volume 7 of the so‐called Fletcher report on ballistic missile defense revealed the system's vulnerability to countermeasures; the volume was withheld from publication. The Rumsfeld report, which purported to establish that rogue states posed a ballistic‐missile threat to the United States, was used instead to validate the claim that existing missile defense technology could work. When Ted Postol succeeded in demonstrating that a government‐sponsored rebuttal of the study he coauthored on THAAD was fatally flawed, the head of Ballistic Missile Defense, who sponsored the study, chose to represent the difference as a “healthy scholarly debate.” When the government is on the rhetorical offensive, it polarizes debate: to oppose Star Wars was to oppose disarmament. When the government is on the rhetorical defensive, it obfuscates: refutation of evidence is simply scholarly disagreement. In the end, Mitchell's exploration of rhetorical techniques provides some illuminating insights, though it does not seem to add up to a model that one might apply in other cases. Nor is it clear that these rhetorical strategies are anything more than ad hoc responses to the politics of the issue at hand.On the third level, epistemology, the inherent conflict between scholarship and polemics becomes manifest. Though Mitchell promises to focus on “the interpretation of controversy” , in practice he places “strategic deception at the center of attention” . He is less interested in locating “the stages of the dispute” than in demonstrating that the critics were right and the government was lying. Even his title, Strategic Deception, confuses his focus. This term usually refers to counterintelligence designed to deceive the enemy, not polemics designed to persuade the public. Most of the deceit he describes is ad hoc and banal; only the special claims of secrecy and national security distinguish it from the practices of other government agencies and programs. One can see most of them, for example, in the controversy surrounding the creation of energy policy within the current Bush administration.Those who do not know the details of his case studies will find this a useful, if somewhat wordy and redundant, introduction. Those who want to understand how government officials and contractors cross over the line from rhetorical flourish to abuse of power and blatant misrepresentation will be disappointed. The value that might have been added to this familiar material by a scholarly analysis is compromised by the polemics. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  49. Implanting a Discipline: The Academic Trajectory of Nuclear Engineering in the USA and UK.Sean F. Johnston - 2009 - Minerva 47 (1):51-73.
    The nuclear engineer emerged as a new form of recognised technical professional between 1940 and the early 1960s as nuclear fission, the chain reaction and their applications were explored. The institutionalization of nuclear engineering—channelled into new national laboratories and corporate design offices during the decade after the war, and hurried into academic venues thereafter—proved unusually dependent on government definition and support. This paper contrasts the distinct histories of the new discipline in the USA and UK (and, more briefly, Canada). (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  50. Immigration and the Right to Health Care.Manning Rita - 2014 - In Wanda Teays, John-Stewart Gordon & Alison Dundes Renteln, Global Bioethics and Human Rights: Contemporary Issues. Lanham: Rowman & Littlefield. pp. 131-147.
    There are now over 1.1 million people overseen by Immigration and Customs Enforcement (ICE), with about 33,000 detained in jails and federal detention centers around the country at any particular time. The average detention time is two months, but some are detained for much longer periods. Since its inception, one hundred and twenty one deaths and countless cases of medical neglect have occurred. Given its secrecy, and lack of accountability and oversight, it is not clear how many of these (...)
    No categories
     
    Export citation  
     
    Bookmark  
1 — 50 / 977