{"title":"Humor and Surveillance - “That’s Not Funny” (Or Is It?): For Professor Serge Gutwirth on his Retirement","authors":"Gary T. Marx","doi":"10.55917/2377-6188.1083","DOIUrl":"https://doi.org/10.55917/2377-6188.1083","url":null,"abstract":"","PeriodicalId":115408,"journal":{"name":"Secrecy and Society","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135618363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Carceral Data: The Limits of Transparency-as-Accountability in Prison Risk Data","authors":"Becka Hudson, Tomas Percival","doi":"10.55917/2377-6188.1074","DOIUrl":"https://doi.org/10.55917/2377-6188.1074","url":null,"abstract":"Prison data collection is a labyrinthine infrastructure. This article engages with debates around the political potentials and limitations of transparency as a form of “accountability,” specifically as it relates to carceral management and data gathering. We examine the use of OASys, a widely used risk assessment tool in the British prison system, in order to demonstrate how transparency operates as a means of legitimating prison data collection and ensuing penal management. Prisoner options to resist their file, or “data double,” in this context are considered and the decisive role of OASys as an immediately operationalized technical structure is outlined. We demonstrate that the political and managerial logics that underpin OASys heavily shape and structurally limit the terrain on which any individual might challenge their carceral administration. Ultimately, we argue that, in this context, transparency itself forecloses broader notions of radical and systemic change by inviting individuals into the creation of their own data double, and thus the legitimation of their own penal management and the forms of procedural justice offered by the prison estate. Finally, implications from this case for broader debates about transparency-as-accountability are explored.","PeriodicalId":115408,"journal":{"name":"Secrecy and Society","volume":"294 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132243017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technologies and Time Tempers: How Things Mediate a State’s (Cyber Vulnerability) Disclosure Practices","authors":"C. Stevens","doi":"10.55917/2377-6188.1072","DOIUrl":"https://doi.org/10.55917/2377-6188.1072","url":null,"abstract":"State secrecy and disclosure practices are often treated as processes of intentional and strategic human agency, and as forms of political time management (Bok 1982; Horn 2011). Through a critical analysis of the United States government’s disclosure practices in the context of their discourse around the cybersecurity “Vulnerabilities Equities Process” (VEP), this paper will present a two-fold argument against these conventional treatments of secrecy and disclosure. While government secrecy and disclosure can certainly be understood as a form of (agential) timing, orientation and control (Hom 2018), this paper will also show how government secrecy practices are emergent at the point of relations with the structuring (but not over-determining) temporalities of various technologies. More than just the procedural containment of information, in which time and technologies feature as passive substrates, the paper will instead help scholars explore the ways that technologies and their times actively mediate the production of secrecy, disclosure and knowledge. By shifting beyond linear conceptions of cause-and effect, the paper will therefore theorize the understudied but important temporal dynamics of disclosure, thereby allowing for richer conceptualizations of the role of digital technologies in contemporary secrecy practices.","PeriodicalId":115408,"journal":{"name":"Secrecy and Society","volume":"294 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115229281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction to the Special Issue on Secrecy and Technologies","authors":"C. Stevens, S. Forsythe","doi":"10.55917/2377-6188.1081","DOIUrl":"https://doi.org/10.55917/2377-6188.1081","url":null,"abstract":"Many scholars have treated the inscrutability of technologies, secrecy, and other unknowns as moral and ethical challenges that can be resolved through transparency and openness. This paper, and the special issue it introduces, instead wants to explore how we can understand the productive, strategic but also emancipatory potential of secrecy and ignorance in the development of security and technologies. This paper argues that rather than just being mediums or passive substrates, technologies are making a difference to how secrecy, disclosure, and transparency work. This special issue will show how technologies and time mediate secrecy and disclosure, and vice versa. This article will therefore draw out the ways that themes of time, infrastructure, methodologies, and maintenance demonstrate the productive as well as negative dialectics of secrecy.","PeriodicalId":115408,"journal":{"name":"Secrecy and Society","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132264475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Stevens, Elspeth Van Veeren, B. Rappert, O. Thomas
{"title":"Being Curious with Secrecy","authors":"C. Stevens, Elspeth Van Veeren, B. Rappert, O. Thomas","doi":"10.55917/2377-6188.1078","DOIUrl":"https://doi.org/10.55917/2377-6188.1078","url":null,"abstract":"This article contributes to ongoing attempts to broaden out theorizations of secrecy from an intentional and willful act of concealment to a cultural and structural process. We do so by fostering a conversation between secrecy and curiosity. This conversation is enabled through a review of central themes in secrecy studies and curiosity studies, but also through an examination of a collaboration between the science center “We the Curious” and a network of academic researchers. In doing so, this article makes a case for the benefits of paying more attention to curiosity as a means of facilitating a multifaceted understanding of secrecy, and for the benefits of creative and participatory research to foster the (re)theorization of secrecy.","PeriodicalId":115408,"journal":{"name":"Secrecy and Society","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125533598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Daunting Encounters: La Hague’s Infrastructures of Secrecy","authors":"A. Villette","doi":"10.55917/2377-6188.1076","DOIUrl":"https://doi.org/10.55917/2377-6188.1076","url":null,"abstract":"","PeriodicalId":115408,"journal":{"name":"Secrecy and Society","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123644130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review, Democracy and Fake News: Information Manipulation and Post-Truth Politics","authors":"Peter Krapp","doi":"10.55917/2377-6188.1071","DOIUrl":"https://doi.org/10.55917/2377-6188.1071","url":null,"abstract":"","PeriodicalId":115408,"journal":{"name":"Secrecy and Society","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126395636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review, Dark Mirror: Edward Snowden and the American Surveillance State, by Barton Gellman","authors":"P. McDermott","doi":"10.55917/2377-6188.1080","DOIUrl":"https://doi.org/10.55917/2377-6188.1080","url":null,"abstract":"","PeriodicalId":115408,"journal":{"name":"Secrecy and Society","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132513949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"(Not) Accessing the Castle: Grappling with Secrecy in Research on Security Practices","authors":"L. P. Muller, Natalie Welfens","doi":"10.55917/2377-6188.1073","DOIUrl":"https://doi.org/10.55917/2377-6188.1073","url":null,"abstract":"This article discusses how to deal with secrecy and limited access in ethnographically inspired research of security fields. Drawing inspiration from recent debates about secrecy in Critical Security Research and from Franz Kafka’s The Castle, we propose to treat access limitations and the secrecy we encounter as methodological tools that provide insights into social relations and power structures of security fields. We develop the argument in two steps. First, we argue for a more fine-grained taxonomy of secrecy, that allows to distinguish between mystery, concealment and the relational dimension of secrecy. Second, we apply the taxonomy to our respective fieldwork experiences in the fields of cybersecurity and refugee governance, to show how attending to different forms of secrecy produces empirical insights into the fields of study. Setting out how to work with rather than against secrecy, the article contributes to methodological debates in Critical Security Studies and Secrecy Studies, and ultimately to further cross-fertilize these fields.","PeriodicalId":115408,"journal":{"name":"Secrecy and Society","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132294486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Teaching Trade Secret Management with Threshold Concepts","authors":"Haakon Thue Lie, L. Hokstad, Donald W. O'Connell","doi":"10.31979/2377-6188.2021.020205","DOIUrl":"https://doi.org/10.31979/2377-6188.2021.020205","url":null,"abstract":"Trade secret management (TSM) is an emerging field of research. Teaching trade secret management requires the inclusion of several challenging topics, such as how firms use secrets in open innovation and collaboration. The threshold concepts framework is an educational lens well suited for teaching subjects such as TSM that are transformative and troublesome. We identify four such areas in trade secret management and discuss how threshold concepts can be a useful framework for teaching. We then present an outline of a curriculum suited for master’s programs and training of intellectual property (IP) managers. Our main contribution is to fields of management and educational sciences, as well as those of innovation studies and jurisprudence.","PeriodicalId":115408,"journal":{"name":"Secrecy and Society","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121908341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}