Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Social and Behavioral Sciences

(Not) Accessing The Castle: Grappling With Secrecy In Research On Security Practices, Lilly P. Muller, Natalie Welfens Aug 2023

(Not) Accessing The Castle: Grappling With Secrecy In Research On Security Practices, Lilly P. Muller, Natalie Welfens

Secrecy and Society

This article discusses how to deal with secrecy and limited access in ethnographically inspired research of security fields. Drawing inspiration from recent debates about secrecy in Critical Security Research and from Franz Kafka’s The Castle, we propose to treat access limitations and the secrecy we encounter as methodological tools that provide insights into social relations and power structures of security fields. We develop the argument in two steps. First, we argue for a more fine-grained taxonomy of secrecy, that allows to distinguish between mystery, concealment and the relational dimension of secrecy. Second, we apply the taxonomy to our respective …


Technologies And Time Tempers: How Things Mediate A State’S (Cyber Vulnerability) Disclosure Practices, Clare Stevens Aug 2023

Technologies And Time Tempers: How Things Mediate A State’S (Cyber Vulnerability) Disclosure Practices, Clare Stevens

Secrecy and Society

State secrecy and disclosure practices are often treated as processes of intentional and strategic human agency, and as forms of political time management (Bok 1982; Horn 2011). Through a critical analysis of the United States government’s disclosure practices in the context of their discourse around the cybersecurity “Vulnerabilities Equities Process” (VEP), this paper will present a two-fold argument against these conventional treatments of secrecy and disclosure. While government secrecy and disclosure can certainly be understood as a form of (agential) timing, orientation and control (Hom 2018), this paper will also show how government secrecy practices are emergent at the point …


Carceral Data: The Limits Of Transparency-As-Accountability In Prison Risk Data, Becka Hudson, Tomas Percival Aug 2023

Carceral Data: The Limits Of Transparency-As-Accountability In Prison Risk Data, Becka Hudson, Tomas Percival

Secrecy and Society

Prison data collection is a labyrinthine infrastructure. This article engages with debates around the political potentials and limitations of transparency as a form of “accountability,” specifically as it relates to carceral management and data gathering. We examine the use of OASys, a widely used risk assessment tool in the British prison system, in order to demonstrate how transparency operates as a means of legitimating prison data collection and ensuing penal management. Prisoner options to resist their file, or “data double,” in this context are considered and the decisive role of OASys as an immediately operationalized technical structure is outlined. We …


Introduction To The Special Issue On Secrecy And Technologies, Clare Stevens, Sam Forsythe Aug 2023

Introduction To The Special Issue On Secrecy And Technologies, Clare Stevens, Sam Forsythe

Secrecy and Society

Many scholars have treated the inscrutability of technologies, secrecy, and other unknowns as moral and ethical challenges that can be resolved through transparency and openness. This paper, and the special issue it introduces, instead wants to explore how we can understand the productive, strategic but also emancipatory potential of secrecy and ignorance in the development of security and technologies. This paper argues that rather than just being mediums or passive substrates, technologies are making a difference to how secrecy, disclosure, and transparency work. This special issue will show how technologies and time mediate secrecy and disclosure, and vice versa. This …


“Pick A Card, Any Card”: Learning To Deceive And Conceal – With Care, Brian Rappert Jan 2021

“Pick A Card, Any Card”: Learning To Deceive And Conceal – With Care, Brian Rappert

Secrecy and Society

Because of the asymmetries in knowledge regarding the underlying hidden mechanisms as well as because of the importance of intentional deception, entertainment magic is often presented as an exercise in power, manipulation, and control. This article challenges such portrayals and through doing so common presumptions about how secrets are kept. It does so through recounting the experiences of the author as a beginner learning a craft. Regard for the choices and tensions associated with the accomplishment of mutually recognized deception in entertainment magic are marshalled to consider how it involves ‘reciprocal action’ between the audience and the performer. Attending to …


Teaching Trade Secret Management With Threshold Concepts, Haakon Thue Lie, Leif Martin Hokstad, Donal O'Connell Jan 2021

Teaching Trade Secret Management With Threshold Concepts, Haakon Thue Lie, Leif Martin Hokstad, Donal O'Connell

Secrecy and Society

Trade secret management (TSM is an emerging field of research. Teaching trade secret management requires the inclusion of several challenging topics, such as how firms use secrets in open innovation and collaboration. The threshold concepts framework is an educational lens well suited for teaching subjects such as TSM that are transformative and troublesome. We identify four such areas in trade secret management and discuss how threshold concepts can be a useful framework for teaching. We then present an outline of a curriculum suited for master’s programs and training of intellectual property (IP) managers. Our main contribution is to fields of …


The Accumulation Of Wear On Footwear Pattern Analysis, Sarah Pawloski May 2019

The Accumulation Of Wear On Footwear Pattern Analysis, Sarah Pawloski

Themis: Research Journal of Justice Studies and Forensic Science

Wear is defined as the erosion of a shoe’s outsole or the loss of tread pattern, and it happens gradually over time with use. After a shoeprint is collected from a crime scene, it is questioned whether an individualization can be made if an exemplar is created after additional use of the shoe. The shoes of ten volunteers at San Jose State University were analyzed over a period of 40-45 days. Wear and Randomly Acquired Characteristics (RACs) were analyzed over time to determine if there were any observable changes or additions to the already present wear. It was hypothesized that …


Novice Ideas: Handwriting Comparisons Conducted By An Untrained Individual, Maia Lister May 2019

Novice Ideas: Handwriting Comparisons Conducted By An Untrained Individual, Maia Lister

Themis: Research Journal of Justice Studies and Forensic Science

Forensic analysis of questioned documents includes chemical analyses of paper and ink as well as handwriting comparisons. Several elements affect handwriting analyses, including the presence of discriminatory factors that can individualize a handwriting sample and whether the handwriting has been disguised. Five handwriting samples were gathered from six individuals comprising of one reference, three natural unknowns, and one disguised sample per person. A novice conducted analyses on every collected sample and conducted comparisons of the reference sample to the unknown and disguised samples in an attempt to correctly source the unknown and disguised samples. The novice showed a high level …


Troping The Enemy: Metaphor, Culture, And The Big Data Black Boxes Of National Security, Robert Albro Sep 2018

Troping The Enemy: Metaphor, Culture, And The Big Data Black Boxes Of National Security, Robert Albro

Secrecy and Society

This article considers how cultural understanding is being brought into the work of the Intelligence Advanced Research Projects Activity (IARPA), through an analysis of its Metaphor program. It examines the type of social science underwriting this program, unpacks implications of the agency’s conception of metaphor for understanding so-called cultures of interest, and compares IARPA’s to competing accounts of how metaphor works to create cultural meaning. The article highlights some risks posed by key deficits in the Intelligence Community's (IC) approach to culture, which relies on the cognitive linguistic theories of George Lakoff and colleagues. It also explores the problem of …


An In-Depth Look Into Cybercrime, Brandon Mcdaniel May 2018

An In-Depth Look Into Cybercrime, Brandon Mcdaniel

Themis: Research Journal of Justice Studies and Forensic Science

Cybercrime is an increasing area of study in the field of criminology. With the advancement of technology and the growing use of social media, people are connected all over the world more than they have ever been before. It is not the invention of new crimes but technology has allowed old crimes to be committed through a new medium. This paper explores the realm of cyberspace and how old crimes are being committed in new ways by different countries and people.


An Exploratory Study Of Online Information Regarding Colony Collapse Disorder, Meredith K. Boehm May 2012

An Exploratory Study Of Online Information Regarding Colony Collapse Disorder, Meredith K. Boehm

School of Information Student Research Journal

The cause or causes of Colony Collapse Disorder (CCD) are uncertain. CCD defines specific characteristics of the nationwide deaths of honey bee colonies in the last decade. Adult bees often disappear from the hive and die, leaving the colony weak and vulnerable to disease. Environmental scientists and agriculturalists have developed many different theories about CCD and its origins. The different theories create challenges regarding the effective dissemination of information about CCD to the different realms of public information seekers. There is a need for an exploration of the online communication of CCD information using federal environmental agency web resources. CCD …