Search results
1 – 10 of over 1000Since the early years of the Cold War, two countervailing trends have been present in the treatment of officially held information in the United States. On the one hand, as the…
Abstract
Since the early years of the Cold War, two countervailing trends have been present in the treatment of officially held information in the United States. On the one hand, as the foundations of U.S. information policy were being set after World War II, wartime practices were remade and made permanent in a crisis atmosphere, with the establishment of a classification system (essentially the same one used to this day) by executive order, as well, as the passage of the Atomic Energy Act in 1946 and the National Security Act in 1947. However, even as the practice of official secrecy took root, the United States took the lead in formalizing standards of openness by statute, beginning with the 1946 passage of the Administrative Procedures Act and culminating in the passage (and 1974 strengthening) of the Freedom of Information Act. This article traces the development of U.S. information policy since World War II and describes the impact of official secrecy on decision making and democratic practice more generally.
Details
Keywords
This chapter presents an investigation of the sex abuse scandal within the Catholic Church through the lens of stigmatization for the purpose of elaborating the theory, making it…
Abstract
This chapter presents an investigation of the sex abuse scandal within the Catholic Church through the lens of stigmatization for the purpose of elaborating the theory, making it more widely applicable across multiples levels of analysis. Much like individuals, organizations must engage in information management in order to conceal discrediting information that would blemish their reputation. Given the number of people who comprise an organization, such secrecy relies on teamwork in order to contain damaging information. Based on an analysis of investigative journalist accounts of the scandal between 1985 and 2014, I present a typology representing the system of organizational secrecy developed by the Catholic Church. While organizations like the church have more structural resources at their disposal to ensure information control is maintained, their size and the varying levels of commitment to secrecy on the part of individual members of the team ultimately work against them.
Details
Keywords
Edward J. Lawler and Lena Hipp
This chapter applies social exchange theory to corruption. If two parties exhibit corrupt behaviors, secrecy becomes a new joint good, making the two parties more dependent on…
Abstract
This chapter applies social exchange theory to corruption. If two parties exhibit corrupt behaviors, secrecy becomes a new joint good, making the two parties more dependent on each other (an increase in total power). Since no external enforcement mechanisms are available in illicit exchanges, the initial reciprocal exchange pattern shifts toward negotiated or productive forms of exchange. Such forms of exchange, however, tend to leave traces, either because the amount of traded resources increases or the contingencies between the behaviors become more visible to the outside. Using the larger network structure, in which corrupt exchanges are embedded, to deal with the problem of detection also is Janus-faced. Adding more ties to the exchange increases either the competition between several potential exchanges partners (exclusively connected network) or the risk of nonreciprocity and whistle blowing (positively connected network). By showing that illicit relations are inherently unstable, we specify some of the scope conditions of social exchange theory.
Government secrecy is often portrayed as antithetical to transparency1 as well as an affront to the general right to know, citizen participation, administrative oversight, and…
Abstract
Government secrecy is often portrayed as antithetical to transparency1 as well as an affront to the general right to know, citizen participation, administrative oversight, and democracy itself.2 Furthermore, government secrecy is connected to “much broader questions regarding the structure and performance of democratic systems” (Galnoor, 1977, p. 278), and in instances, is “more dangerous to democracy than the practices they conceal” (Fulbright, 1971).3 This condition has led to what Arthur Schlesinger, Jr. (1987) describes as a secrecy state, whichhas extended the secrecy system far beyond its legitimate bounds. In doing so, the target is far less to prevent the disclosure of information to enemy governments than to prevent the disclosure of information to the American Congress, press and people. For governments have discovered that secrecy is a source of power and an efficient way of covering up the embarrassments, blunders, follies and crimes of the ruling regime. (p. 5)
It is genuinely accepted that the withholding of sensitive information by the federal government, be it relating to intelligence, military or foreign policy matters, will…
Abstract
It is genuinely accepted that the withholding of sensitive information by the federal government, be it relating to intelligence, military or foreign policy matters, will invariably serve to preclude or minimize damage to our nation's well-being. However, often overlooked is the impact that official secrecy has upon the decision-making process employed by national leaders. This overview examines the harm that official government secrecy can inflict upon our U.S. national security, through the corrupting influence it has on national policy decisions. Using the Constitutional Convention of 1787 as an apt lesson, this overview goes on to examine the impact that official secrecy had on many of the post-9/11 decisions made by U.S. national leaders.
Details
Keywords
This conceptual chapter explores communicating with transparency and secrecy in public affairs activities in Norway. The tension between transparency and secrecy is particularly…
Abstract
This conceptual chapter explores communicating with transparency and secrecy in public affairs activities in Norway. The tension between transparency and secrecy is particularly interesting with regard to the question of impact of strategic communication on political policymaking processes. As a theoretical framework, we use a double lens to hold the concepts of both transparency and secrets in focus. First, we draw on Fung’s (2013) principles of democratic transparency: availability, proportionality, accessibility and actionability. Second, we use Horn’s (2011) three logics of political secrecy: arcanum, mysterium and secretum. By integrating Fung’s principles of openness and Horn’s logics of secrecy, we construct a model for analysis of a few public affairs activities and practices. Empirical examples of PR agencies’ communicative activities support our model, in addition to interviews with three executives in agencies. The empirical examples illustrate that communication activities rely on top-down controlled information diffusion in PR agencies’ communication activities, such as podcasts and web pages. They use information to develop group identities and to develop stronger relationships to their clients and customers. The social dimension of information in our examples suggests that the agencies are discrete, operate in the background and are careful about revealing their competence and privileged insights.
Details
Keywords
Brian Rappert, Richard Moyes and A.N. Other
In acknowledgment of the demands of studying state secrecy, this chapter asks how novel possibilities for knowing can be fashioned. It does so in relation to the place of secrecy…
Abstract
In acknowledgment of the demands of studying state secrecy, this chapter asks how novel possibilities for knowing can be fashioned. It does so in relation to the place of secrecy within international diplomatic and security negotiations associated with humanitarian disarmament. A conversational account is given regarding how “cluster bombs” become subject to a major international ban in 2008. Tensions, uncertainties, and contradictions associated with knowing and conveying matters that cannot be wholly known or conveyed are worked through. With these moves, a form of writing is sought that sensitizes readers to how absences figure within debates about social problems and the study of those debates, as well as how ignorance born out of secrecy helps secure an understanding of the world. Uncertainties, no-go areas, and blind spots are looked to as analytical and practical resources.
Details
Keywords
This chapter argues that the psychological theories of Sigmund Freud provide a useful methodology for the study of government secrecy. The chapter makes two specific points…
Abstract
This chapter argues that the psychological theories of Sigmund Freud provide a useful methodology for the study of government secrecy. The chapter makes two specific points. First, Freud viewed the human mind as a highly complex censoring device, which systematically censors certain types of information that embarrasses the patient, while it makes available without impediment more innocuous types of information that flatter the patient's image. It is argued that governmental bureaucracies work like this too, as they systematically censor information that is embarrassing to the state and state officials, while they make available information that flatters the state. Secondly, Freud's theories provide insight into how researchers can cut through systematic censorship and gain access to hidden information. Specifically, Freud shows that patients periodically slip and release censored information to the psychoanalyst. Similarly, state officials too will slip and will accidentally release information to historical researchers who study public policies.
Details
Keywords
Vincenzo Denicolò and Luigi Alberto Franzoni
In this paper we look at patents as alternative to trade secrets. We disentangle the disclosure motive for patent protection from the traditional reward motive by adjusting the…
Abstract
In this paper we look at patents as alternative to trade secrets. We disentangle the disclosure motive for patent protection from the traditional reward motive by adjusting the level of patent protection so as to make the innovator just indifferent between patenting and keeping the innovation secret. Thus, we keep the reward (expected profits) to the innovator fixed and focus on ex post efficiency. When duplication is not feasible and secrecy only entails the risk of public disclosure (a leakage), patents and secrets are perfect substitutes. Yet, a distinctive features of trade secret protection is that it allows for independent creation. The duplicative efforts to reproduce a concealed innovation make patents and secrets imperfect substitutes. If such duplicative efforts are actually exerted under secrecy, patents provide the pre-specified incentive to innovate at least social cost. If, however, the threat of duplication induces the innovator to preemptively license her trade secret, and such licensing agreements allow the innovator to appropriate all the saved duplication costs, then secrets can reward innovative activity more efficiently than patents. Thus, the issue of whether patents are socially preferable to secrets boils down to an assessment of the prevalence and the efficiency of trade secret licensing. The available empirical evidence suggests that licensing of trade secret information is limited and so hints at the superiority of patents.
Volume 19, Research in Social Problems and Public Policy begins with David N. Gibbs’ chapter, “Sigmund Freud as a theorist of government secrecy.” Drawing on Freud's psychological…
Abstract
Volume 19, Research in Social Problems and Public Policy begins with David N. Gibbs’ chapter, “Sigmund Freud as a theorist of government secrecy.” Drawing on Freud's psychological theories from his works Civilization and its Discontents and A General Introduction to Psychoanalysis, Gibbs observes:one of Freud's most important insights is his view of the human mind as a highly complex censoring mechanism, which systematically censors certain types of information, while it leaves uncensored other types of information.