Results for 'secrecy'

35 found
Order:
  1. Secrecy and conspiracy.Matthew R. X. Dentith & Martin Orr - 2017 - Episteme 15 (4):433-450.
    In the literature on conspiracy theories, the least contentious part of the academic discourse would appear to be what we mean by a “conspiracy”: a secretive plot between two or more people toward some end. Yet what, exactly, is the connection between something being a conspiracy and it being secret? Is it possible to conspire without also engaging in secretive behavior? To dissect the role of secrecy in con- spiracies – and thus contribute to the larger debate on the (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  2. Is the secrecy of the parametric configuration of slot machines rationally justified? The exposure of the mathematical facts of games of chance as an ethical obligation.Catalin Barboianu - 2014 - Journal of Gambling Issues 29 (DOI: 10.4309/jgi.2014.29.6):1-23.
    Slot machines gained a high popularity despite a specific element that could limit their appeal: non-transparency with respect to mathematical parameters. The PAR sheets, exposing the parameters of the design of slot machines and probabilities associated with the winning combinations are kept secret by game producers, and the lack of data regarding the configuration of a machine prevents people from computing probabilities and other mathematical indicators. In this article, I argue that there is no rational justification for this secrecy (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  3. Logically Private Laws: Legislative Secrecy in "The War on Terror".Duncan Macintosh - 2019 - In Claire Oakes Finkelstein & Michael Skerker (eds.), Sovereignty and the New Executive Authority. Oxford University Press. pp. 225-251.
    Wittgenstein taught us that there could not be a logically private language— a language on the proper speaking of which it was logically impossible for there to be more than one expert. For then there would be no difference between this person thinking she was using the language correctly and her actually using it correctly. The distinction requires the logical possibility of someone other than her being expert enough to criticize or corroborate her usage, someone able to constitute or hold (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Steiris, Georgios. 2024. "Bessarion on the Value of Oral Teaching and the Rule of Secrecy" Philosophies 9, no. 3: 81.Georgios Steiris - 2024 - Philosophies 9 (3):1-13.
    Cardinal Bessarion (1408–1472), in the second chapter of the first book of his influential work In calumniatorem Platonis, attempted to reply to Georgios Trapezuntios’ (1396–1474) criticism against Plato in the Comparatio Philosophorum Platonis et Aristotelis. Bessarion investigates why the Athenian philosopher maintained, in several dialogues, that the sacred truths should not be communicated to the general public and argued in favor of the value of oral transmission of knowledge, largely based on his theory about the cognitive processes. Recently, Fr. Bessarion (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Silence and secrecy in children sexual abuse: a public health approach.Carlos Alberto Rosas Jiménez - 2020 - Fioretti 1 (4):1-3.
    When talking about sexual abuse of children we can understand culture as one of the leading determinants of child health. As a public health problem, sexual abuse has different causes, from which we can distinguish the silence and secrecy that is kept by third parties. In every single abuse there is a person or people that are present at the moment of the abuse, or without being present know that the abuse is in progress, or even help in any (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Democracy Beyond Disclosure: Secrecy, Transparency, and the Logic of Self-Government.Jonathan Richard Bruno - 2017 - Dissertation, Harvard University
    "Transparency" is the constant refrain of democratic politics, a promised aid to accountability and integrity in public life. Secrecy is stigmatized as a work of corruption, tolerable by a compromise of democratic principles. My dissertation challenges both ideas. It argues that secrecy and transparency are best understood as complementary, not contradictory, practices. And it develops a normative account of liberal democratic politics in which duties of transparency coexist with permissions to act behind closed doors. The project begins with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. A Two Level Account of Executive Authority.Michael Skerker - 2019 - In Claire Oakes Finkelstein & Michael Skerker (eds.), Sovereignty and the New Executive Authority. Oxford University Press.
    The suite of secretive national security programs initiated in the US since 9/11 has created debate not only about the merits of targeted killing, torture, secret detention, cyberwar, global signals intercepts, and data-mining, but about the very secrecy in which these programs were conceived, debated by government officials, and implemented. Law must be revealed to those who are expected to comply with its demands. Law is a mere pretext for coercion if the laws permitting the government to coerce people (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Mill and the secret ballot: Beyond coercion and corruption.Annabelle Lever - 2007 - Utilitas 19 (3):354-378.
    In Considerations on Representative Government, John Stuart Mill concedes that secrecy in voting is often justified but, nonetheless, maintains that it should be the exception rather than the rule. This paper critically examines Mill’s arguments. It shows that Mill’s idea of voting depends on a sharp public/private distinction which is difficult to square with democratic ideas about the different powers and responsibilities of voters and their representatives, or with legitimate differences of belief and interest amongst voters themselves. Hence, it (...)
    Download  
     
    Export citation  
     
    Bookmark   17 citations  
  9. Privacy.Edmund Byrne - 1997 - In Byrne Edmund (ed.), Encyclopedia of Applied Ethics. Academic Press. pp. 649-659.
    Privacy involves a zone of inaccessibility in a particular context. In social discourse it pertains to activities that are not public, the latter being by definition knowable by outsiders. The public domain so called is the opposite of secrecy and somewhat less so of confidentiality. The private sphere is respected in law and morality, now in terms of a right to privacy. In law some violations of privacy are torts. Philosophers tend to associate privacy with personhood. Professional relationships are (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  10. Segregated specialists and nuclear culture.Sean F. Johnston - manuscript
    Communities of nuclear workers have evolved in distinctive contexts. During the Manhattan Project the UK, USA and Canada collectively developed the first reactors, isotope separation plants and atomic bombs and, in the process, nurtured distinct cadres of specialist workers. Their later workplaces were often inherited from wartime facilities, or built anew at isolated locations. For a decade, nuclear specialists were segregated and cossetted to gestate practical expertise. At Oak Ridge Tennessee, for example, the informal ‘Clinch College of Nuclear Knowledge’ aimed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Unveiling the Vote.Philip Pettit & Geoffrey Brennan - 1990 - British Journal of Political Science 20 (3):311-333.
    The case for secrecy in voting depends on the assumption that voters reliably vote for the political outcomes they want to prevail. No such assumption is valid. Accordingly, voting procedures should be designed to provide maximal incentive for voters to vote responsibly. Secret voting fails this test because citizens are protected from public scrutiny. Under open voting, citizens are publicly answerable for their electoral choices and will be encouraged thereby to vote in a discursively defensible manner. The possibility of (...)
    Download  
     
    Export citation  
     
    Bookmark   19 citations  
  12. Pulcinella secrets.Emilio Mordini - 2011 - Bioethics 25 (9):ii-iii.
    Pulcinella is one of the most ancient comic characters of the Commedia dell’Arte.1 He is the stereotypical lazy servant, insolent and chauvinist, sometimes stupid, sometimes clever, always penniless, and absolutely unable to keep any secret. In a typical Commedia dell’Arte plot, the master reveals a secret to Pulcinella, who is under oath never to disclose it. Needless to say, after swearing that he will never divulge it, Pulcinella soon acts in a very different way, telling the secret to everybody he (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Hollow Hunt for Harms.Jacob Stegenga - 2016 - Perspectives on Science 24 (5):481-504.
    Harms of medical interventions are systematically underestimated in clinical research. Numerous factors—conceptual, methodological, and social—contribute to this underestimation. I articulate the depth of such underestimation by describing these factors at the various stages of clinical research. Before any evidence is gathered, the ways harms are operationalized in clinical research contributes to their underestimation. Medical interventions are first tested in phase 1 ‘first in human’ trials, but evidence from these trials is rarely published, despite the fact that such trials provide the (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  14. The Ages: Who is Younger, Who is Older.Victor Mota - manuscript
    Youthness and Aging, Time elapsed and relapsed memory, between lollenyness and secrecy about our desires, in front of openess and the back of the Ego.
    Download  
     
    Export citation  
     
    Bookmark  
  15. (1 other version)How Entropy Explains the Emergence of Consciousness: The Entropic Theory.Peter C. Lugten - 2024 - Journal of Neurobehavioral Sciences 11 (1):10-18.
    Background: Emergentism as an ontology of consciousness leaves unanswered the question as to its mechanism. Aim: I aim to solve the Body-Mind problem by explaining how conscious organisms emerged on an evolutionary basis at various times in accordance with an accepted scientific principle, through a mechanism that cannot be understood, in principle. Proposal: The reason for this cloak of secrecy is found in a seeming contradiction in the behaviour of information with respect to the first two laws of thermodynamics. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Assessing Randomness in Case Assignment: The Case Study of the Brazilian Supreme Court.Julio Michael Stern, Diego Marcondes & Claudia Peixoto - 2019 - Law, Probability and Risk 18 (2/3):97-114.
    Sortition, i.e. random appointment for public duty, has been employed by societies throughout the years as a firewall designated to prevent illegitimate interference between parties in a legal case and agents of the legal system. In judicial systems of modern western countries, random procedures are mainly employed to select the jury, the court and/or the judge in charge of judging a legal case. Therefore, these random procedures play an important role in the course of a case, and should comply with (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  17. Making Drones to Kill Civilians: Is it Ethical?Edmund F. Byrne - 2018 - Journal of Business Ethics 147 (1):81-93.
    A drone industry has emerged in the US, initially funded almost exclusively for military applications. There are now also other uses both governmental and commercial. Many military drones are still being made, however, especially for surveillance and targeted killings. Regarding the latter, this essay calls into question their legality and morality. It recognizes that the issues are complex and controversial, but less so as to the killing of non-combatant civilians. The government using drones for targeted killings maintains secrecy and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  18. Utility, publicity, and manipulation.Adrian M. S. Piper - 1978 - Ethics 88 (3):189-206.
    In our dealings with young children, we often get them to do or think things by arranging their environments in certain ways; by dissembling, simplifying, or ambiguating the facts in answer to their queries; by carefully selecting the states of affairs, behavior of others, and utterances to which they shall be privy. We rightly justify these practices by pointing out a child's malleability, and the necessity of paying close attention to formative influences during its years of growth. This filtering of (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  19. Esotericism Ancient and Modern.Michael L. Frazer - 2006 - Political Theory 34 (1):33-61.
    Leo Strauss presents at least two distinct accounts of the idea that the authors in the political-philosophical canon have often masked their true teachings. A weaker account of esotericism, dependent on the contingent fact of presecution, is attributed to the moderns, while a stronger account, stemming from a necessary conflict between philosophy and society, is attributed to the ancients. Although most interpreters agree that Strauss here sides with the ancients, this view fails to consider the possibility that Strauss's writings on (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  20. Copyright or copyleft?: An analysis of property regimes for software development.Paul B. de Laat - 2005 - Research Policy 34 (10):1511-1532.
    Two property regimes for software development may be distinguished. Within corporations, on the one hand, a Private Regime obtains which excludes all outsiders from access to a firm's software assets. It is shown how the protective instruments of secrecy and both copyright and patent have been strengthened considerably during the last two decades. On the other, a Public Regime among hackers may be distinguished, initiated by individuals, organizations or firms, in which source code is freely exchanged. It is argued (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  21. Information institutions and the political accountability in Bangladesh.Md Mahmudul Hoque - 2018 - International Journal of Scientific and Engineering Research 2 (9):1586-1596.
    Accountability of the elected leaders is one of the key factors in a representative democracy. Bangladesh restored a democratic ruling system in 1991 but has struggled to create an effective institutional mechanism to hold the political leaders before the citizens. Information has often been called the oxygen of democracy because of its power to bring accountability through transparency and public disclosure. With the boom of news media organisations and the emergence of the movement for the right to and freedom of (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  22. The use of software tools and autonomous bots against vandalism: eroding Wikipedia’s moral order?Paul B. de Laat - 2015 - Ethics and Information Technology 17 (3):175-188.
    English - language Wikipedia is constantly being plagued by vandalistic contributions on a massive scale. In order to fight them its volunteer contributors deploy an array of software tools and autonomous bots. After an analysis of their functioning and the ‘ coactivity ’ in use between humans and bots, this research ‘ discloses ’ the moral issues that emerge from the combined patrolling by humans and bots. Administrators provide the stronger tools only to trusted users, thereby creating a new hierarchical (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. Secret Law Revisited.Benjamin L. S. Nelson - 2019 - Ratio Juris 32 (4):473-486.
    What follows is an attempt to do some conceptual housekeeping around the notion of secret law as provided by Christopher Kutz (2013). First I consider low-salience (or merely obscure) law, suggesting that it fails to capture the legal and moral facts that are at stake in the case which Kutz used to motivate it. Then I outline a theoretical contrast between mere obscurity and secrecy, in contrast to the 'neutral' account of secrecy provided by Sissela Bok (1989). The (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. Privacy, Transparency, and Accountability in the NSA’s Bulk Metadata Program.Alan Rubel - 2015 - In Adam D. Moore (ed.), Privacy, Security and Accountability: Ethics, Law and Policy. New York: Rowman & Littlefield International. pp. 183-202.
    Disputes at the intersection of national security, surveillance, civil liberties, and transparency are nothing new, but they have become a particularly prominent part of public discourse in the years since the attacks on the World Trade Center in September 2001. This is in part due to the dramatic nature of those attacks, in part based on significant legal developments after the attacks (classifying persons as “enemy combatants” outside the scope of traditional Geneva protections, legal memos by White House counsel providing (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  25. (1 other version)US military and covert action and global justice.Sagar Sanyal - 2009 - International Journal of Applied Philosophy 23 (2):213-234.
    US military intervention and covert action is a significant contributor to global injustice. Discussion of this contributor to global injustice is relatively common in social justice movements. Yet it has been ignored by the global justice literature in political philosophy. This paper aims to fill this gap by introducing the topic into the global justice debate. While the global justice debate has focused on inter-national and supra-national institutions, I argue that an adequate analysis of US military and covert action must (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Security and the shaping of identity for nuclear specialists.Sean F. Johnston - 2011 - History and Technology 27 (2):123-153.
    Atomic energy developed from 1940 as a subject shrouded in secrecy. Identified successively as a crucial element in military strategy, national status and export aspirations, the research and development of atomic piles (nuclear chain-reactors) were nurtured at isolated installations. Like monastic orders, new national laboratories managed their specialist workers in occupational environments that were simultaneously cosseted and constrained, defining regional variants of a new state-managed discipline: reactor technology. This paper discusses the significance of security in defining the new subject (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  27. Creating a Canadian profession: the nuclear engineer, c. 1940-1968.Sean F. Johnston - 2009 - Canadian Journal of History 44 (3):435-466.
    Canada, as one of the three Allied nations collaborating on atomic energy development during the Second World War, had an early start in applying its new knowledge and defining a new profession. Owing to postwar secrecy and distinct national aims for the field, nuclear engineering was shaped uniquely by the Canadian context. Alone among the postwar powers, Canadian exploration of atomic energy eschewed military applications; the occupation emerged within a governmental monopoly; the intellectual content of the discipline was influenced (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28. Response to Amihud Gilead.Iddo Landau - 2007 - Philosophy and Literature 31 (1):158-161.
    In lieu of an abstract, here is a brief excerpt of the content:Iddo Landau responds:I believe that there is much to learn from Gilead's arguments, and that his paper adds to the understanding of the themes presented in the original discussion. However, in the end I do not think that the claims I made are rebuffed.Gilead should be commended for expanding the discussion of the Mandarin thought experiment (henceforth: Mandarin) from the existentialist context, to which it was limited in my (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Neuroscience v. privacy? : a democratic perspective.Annabelle Lever - 2012 - In Sarah Richmond, Geraint Rees & Sarah J. L. Edwards (eds.), I know what you're thinking: brain imaging and mental privacy. Oxford: Oxford University Press. pp. 205.
    Recent developments in neuroscience create new opportunities for understanding the human brain. The power to do good, however, is also the power to harm, so scientific advances inevitably foster as many dystopian fears as utopian hopes. For instance, neuroscience lends itself to the fear that people will be forced to reveal thoughts and feelings which they would not have chosen to reveal, and of which they may be unaware. It also lends itself to the worry that people will be encouraged (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30. Reflections on the Reversibility of Nuclear Energy Technologies.Jan Peter Bergen - 2017 - Dissertation, Delft University of Technology
    The development of nuclear energy technologies in the second half of the 20th century came with great hopes of rebuilding nations recovering from the devasta-tion of the Second World War or recently released from colonial rule. In coun-tries like France, India, the USA, Canada, Russia, and the United Kingdom, nuclear energy became the symbol of development towards a modern and technologically advanced future. However, after more than six decades of experi-ence with nuclear energy production, and in the aftermath of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. “The Risk of Being Uninformed” - A paper on the character and implications of risk in the context of economically motivated crime.John Sliter - 2011 - Journal of Financial Crime 12 (1). Translated by John Sliter.
    Paper was presented at the 29th Annual Symposium on Economic Crime in Cambridge, England. -/- Regardless of our concern for privacy, real-time criminal activity information is being disseminated throughout cyberspace by the private sector. This information is growing very quickly while being archived for search and retrieval on a long term basis. This is inevitable and could not, nor should not, be stopped. -/- Law enforcement and government policy makers should consider the risk of sharing with the risk of not (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. The Writer as an Acrobat: Deleuze and Guattari on the Relation between Philosophy and Literature (and How Kierkegaard Moves in-between).Daphne Giofkou - 2015 - Transnational Literature 7 (2).
    Throughout his work, Deleuze not only draws on literature in order to address philosophical problems but he seeks to map out the ‘mobile relations’ between philosophy and literature. After an initial overview, I will focus on A Thousand Plateaus (1980), a book co-authored with Guattari, and in particular, on plateaus “1874: Three Novellas or ‘What happened?’” and “1730: Becoming-intense, becoming-animal, becoming-imperceptible…” In doing so, I aim to explore: (a) how the relation between literature and philosophy is refracted in Novellas Plateau (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. The Phenomenon of Witchcraft in Utugwang Cosmology.Oti Friday Achu & Onah Gregory Ajima - 2019 - International Journal of Scientific and Engineering Research 10 (7).
    The Utugwang society is of a type which places a greater value on human life and communal belonging which is indicative of the name they bear Utugwang, which literally translated means – “Let’s come together”. However, this coming together has not been without blemish as the believe in witchcraft by the Utugwang people like many other African communities has hindered the growth and progress of the community. This paper is an attempt to investigate the phenomenon of witchcraft which essentially is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Secrets vs. Lies: Is There A Moral Asymmetry?Mahon James - 2018 - In Eliot Michaelson & Andreas Stokke (eds.), Lying: Language, Knowledge, Ethics, and Politics. Oxford: Oxford University Press. pp. 161-182.
    In this chapter I argue that the traditional interpretation of the commonly accepted moral asymmetry between secrets and lies is incorrect. On the standard interpretation of the commonly accepted view, lies are prima facie or pro tango morally wrong, whereas secrets are morally permissible. I argue that, when secrets are distinguished from mere acts of reticence and non-acknowledgement, as well as from acts of deception, so that they are defined as acts of not sharing believed-information while believing that the believed-information (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Is „esoteric morality“ an oxymoron?Aleksandar Dobrijević - 2021 - In Nenad Cekić (ed.), Етика и истина у доба кризе. Belgrade: University of Belgrade - Faculty of Philosophy. pp. 59-66.
    The paper discusses the basic objections to the concept of „esoteric morality“ as a form of paternalism and elitism. The idea of „esoteric morality“, which originated with the Victorian utilitarian Henry Sidgwick, still has its supporters and opponents. While opponents point out that „esoteric morality“ violates the conceptual tie between morality and publicity, its proponents view it as a necessary part or implication of consequentialism.
    Download  
     
    Export citation  
     
    Bookmark