Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies

San Jose State University

Secrecy

Publication Year

Articles 1 - 6 of 6

Full-Text Articles in Social and Behavioral Sciences

(Not) Accessing The Castle: Grappling With Secrecy In Research On Security Practices, Lilly P. Muller, Natalie Welfens Aug 2023

(Not) Accessing The Castle: Grappling With Secrecy In Research On Security Practices, Lilly P. Muller, Natalie Welfens

Secrecy and Society

This article discusses how to deal with secrecy and limited access in ethnographically inspired research of security fields. Drawing inspiration from recent debates about secrecy in Critical Security Research and from Franz Kafka’s The Castle, we propose to treat access limitations and the secrecy we encounter as methodological tools that provide insights into social relations and power structures of security fields. We develop the argument in two steps. First, we argue for a more fine-grained taxonomy of secrecy, that allows to distinguish between mystery, concealment and the relational dimension of secrecy. Second, we apply the taxonomy to our respective …


Technologies And Time Tempers: How Things Mediate A State’S (Cyber Vulnerability) Disclosure Practices, Clare Stevens Aug 2023

Technologies And Time Tempers: How Things Mediate A State’S (Cyber Vulnerability) Disclosure Practices, Clare Stevens

Secrecy and Society

State secrecy and disclosure practices are often treated as processes of intentional and strategic human agency, and as forms of political time management (Bok 1982; Horn 2011). Through a critical analysis of the United States government’s disclosure practices in the context of their discourse around the cybersecurity “Vulnerabilities Equities Process” (VEP), this paper will present a two-fold argument against these conventional treatments of secrecy and disclosure. While government secrecy and disclosure can certainly be understood as a form of (agential) timing, orientation and control (Hom 2018), this paper will also show how government secrecy practices are emergent at the point …


Carceral Data: The Limits Of Transparency-As-Accountability In Prison Risk Data, Becka Hudson, Tomas Percival Aug 2023

Carceral Data: The Limits Of Transparency-As-Accountability In Prison Risk Data, Becka Hudson, Tomas Percival

Secrecy and Society

Prison data collection is a labyrinthine infrastructure. This article engages with debates around the political potentials and limitations of transparency as a form of “accountability,” specifically as it relates to carceral management and data gathering. We examine the use of OASys, a widely used risk assessment tool in the British prison system, in order to demonstrate how transparency operates as a means of legitimating prison data collection and ensuing penal management. Prisoner options to resist their file, or “data double,” in this context are considered and the decisive role of OASys as an immediately operationalized technical structure is outlined. We …


Introduction To The Special Issue On Secrecy And Technologies, Clare Stevens, Sam Forsythe Aug 2023

Introduction To The Special Issue On Secrecy And Technologies, Clare Stevens, Sam Forsythe

Secrecy and Society

Many scholars have treated the inscrutability of technologies, secrecy, and other unknowns as moral and ethical challenges that can be resolved through transparency and openness. This paper, and the special issue it introduces, instead wants to explore how we can understand the productive, strategic but also emancipatory potential of secrecy and ignorance in the development of security and technologies. This paper argues that rather than just being mediums or passive substrates, technologies are making a difference to how secrecy, disclosure, and transparency work. This special issue will show how technologies and time mediate secrecy and disclosure, and vice versa. This …


“Pick A Card, Any Card”: Learning To Deceive And Conceal – With Care, Brian Rappert Jan 2021

“Pick A Card, Any Card”: Learning To Deceive And Conceal – With Care, Brian Rappert

Secrecy and Society

Because of the asymmetries in knowledge regarding the underlying hidden mechanisms as well as because of the importance of intentional deception, entertainment magic is often presented as an exercise in power, manipulation, and control. This article challenges such portrayals and through doing so common presumptions about how secrets are kept. It does so through recounting the experiences of the author as a beginner learning a craft. Regard for the choices and tensions associated with the accomplishment of mutually recognized deception in entertainment magic are marshalled to consider how it involves ‘reciprocal action’ between the audience and the performer. Attending to …


Teaching Trade Secret Management With Threshold Concepts, Haakon Thue Lie, Leif Martin Hokstad, Donal O'Connell Jan 2021

Teaching Trade Secret Management With Threshold Concepts, Haakon Thue Lie, Leif Martin Hokstad, Donal O'Connell

Secrecy and Society

Trade secret management (TSM is an emerging field of research. Teaching trade secret management requires the inclusion of several challenging topics, such as how firms use secrets in open innovation and collaboration. The threshold concepts framework is an educational lens well suited for teaching subjects such as TSM that are transformative and troublesome. We identify four such areas in trade secret management and discuss how threshold concepts can be a useful framework for teaching. We then present an outline of a curriculum suited for master’s programs and training of intellectual property (IP) managers. Our main contribution is to fields of …