Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Social and Behavioral Sciences

Technologies And Time Tempers: How Things Mediate A State’S (Cyber Vulnerability) Disclosure Practices, Clare Stevens Aug 2023

Technologies And Time Tempers: How Things Mediate A State’S (Cyber Vulnerability) Disclosure Practices, Clare Stevens

Secrecy and Society

State secrecy and disclosure practices are often treated as processes of intentional and strategic human agency, and as forms of political time management (Bok 1982; Horn 2011). Through a critical analysis of the United States government’s disclosure practices in the context of their discourse around the cybersecurity “Vulnerabilities Equities Process” (VEP), this paper will present a two-fold argument against these conventional treatments of secrecy and disclosure. While government secrecy and disclosure can certainly be understood as a form of (agential) timing, orientation and control (Hom 2018), this paper will also show how government secrecy practices are emergent at the point …


Matthew Potolsky’S The National Security Sublime: On The Aesthetics Of Government Secrecy, Nolan Higdon Jan 2021

Matthew Potolsky’S The National Security Sublime: On The Aesthetics Of Government Secrecy, Nolan Higdon

Secrecy and Society

Matthew Potolsky’s brilliantly woven The National Security Sublime: On the Aesthetics of Government Secrecy offers a powerful and engaging discussion of national security and government secrecy. His findings concerning the influence artists have on citizens’ perception of national security is a major contribution to the field. It highlights Americans false sense of awareness regarding government secrecy, that in itself enables government secrecy. Potolsky has made a massive contribution to the study of government secrecy that is sure to spark future research concerning the intersection of national security and aesthetics.


Today’S Fake News Is Tomorrow’S Fake History: How Us History Textbooks Mirror Corporate News Media Narratives, Nolan Higdon, Mickey Huff, Jen Lyons Jan 2021

Today’S Fake News Is Tomorrow’S Fake History: How Us History Textbooks Mirror Corporate News Media Narratives, Nolan Higdon, Mickey Huff, Jen Lyons

Secrecy and Society

The main thrust of this study is to assess how the systematic biases found in mass media journalism affect the writing of history textbooks. There has been little attention paid to how the dissemination of select news information regarding the recent past, particularly from the 1990s through the War on Terror, influences the ways in which US history is taught in schools. This study employs a critical-historical lens with a media ecology framework to compare Project Censored’s annual list of censored and under-reported stories to the leading and most adopted high school and college US history textbooks. The findings reveal …


Revealing Challenges Of Teaching Secrecy, Jack Z. Bratich, Craig R. Scott Jan 2021

Revealing Challenges Of Teaching Secrecy, Jack Z. Bratich, Craig R. Scott

Secrecy and Society

All teaching has something to do with transmission of hidden knowledge, secrecy, and revelation. But the teaching of secrecy itself faces particular challenges. Drawing on the authors’ experiences teaching secrecy-themed seminars to first-year university students, this paper pinpoints four such challenges: how to determine the range of phenomena to cover in a short course, how to prevent excessive interpretation of secrets, how to encourage students to take a fun topic with seriousness, and how to engage students in their own practices of secrecy. In laying out these challenges, we aim to contribute to a secrecy literacy: a needed competency so …


The Rhetorical Algorithm: Wikileaks And The Elliptical Secrets Of Donald J. Trump, Atilla Hallsby Feb 2018

The Rhetorical Algorithm: Wikileaks And The Elliptical Secrets Of Donald J. Trump, Atilla Hallsby

Secrecy and Society

Algorithms were a generative force behind many of the leaks and secrets that dominated the 2016 election season. Taking the form of the identity-anonymizing Tor software that protected the identity of leakers, mathematical protocols occupied a prominent place in the secrets generated during the presidential campaign. This essay suggests that the rhetorical trope of ellipsis offers an equally crucial, algorithmic formula for explaining the public production of these secrets and leaks. It then describes the 2016 DNC leak and Donald Trump’s “I love Wikileaks” moment using the trope of ellipsis, which marks a discursive omission or gap in official executive …