Staying with the secret: The public sphere in platform society

T Beyes - Theory, Culture & Society, 2022 - journals.sagepub.com
Investigating the structural transformation of the public sphere should reckon with the secret
and its modes of organization. The expansion of secrecy effected by the infrastructures …

[BOG][B] State secrecy and security: Refiguring the covert imaginary

W Walters - 2021 - taylorfrancis.com
In State Secrecy and Security: Refiguring the Covert Imaginary, William Walters calls for
secrecy to be given a more central place in critical security studies and elevated to become …

Cybersecurity and the politics of knowledge production: towards a reflexive practice

F Cristiano, X Kurowska, T Stevens, LM Hurel… - Journal of Cyber …, 2023 - Taylor & Francis
How does a reflexive scholarly practice matter for producing useful cybersecurity knowledge
and policy? We argue that staking relevance without engaging in reflexivity diminishes the …

Secrecy in intimate relationships: Rethinking transparency and deceit in monogamies and non-monogamies

C Klesse, J van Hooff - The Sociological Review, 2024 - journals.sagepub.com
This article foregrounds the role of secrets in creating, maintaining and disrupting intimacy.
We extend sociological theorising on secrecy by demonstrating the operative role of secrets …

Secrecy in Europe

B Rittberger, KH Goetz - West European Politics, 2018 - Taylor & Francis
This article introduces a collection of papers devoted to the study of secrecy in European
politics across a range of EU and national settings and policy domains. Academic interest in …

Cyber intelligence and international security: breaking the legal and diplomatic silence?

D Broeders - Intelligence and National Security, 2024 - Taylor & Francis
In cyberspace intelligence agencies, rather than militaries, are the most prominent security
actors. However, many cyber operations conducted by intelligence agencies are not …

Synthetic friends

H Kempt - Synthetic Friends: A Philosophy of Human-Machine …, 2022 - Springer
This chapter presents the core argument and the proposal for both the negative conditions
for synthetic friends as well as some constructive elements. If a social machine fulfills the …

[BOG][B] The national security sublime: On the aesthetics of government secrecy

M Potolsky - 2019 - taylorfrancis.com
Why do recent depictions of government secrecy and surveillance so often use images
suggesting massive size and scale: gigantic warehouses, remote black sites, numberless …

Second order secrecy and Europe's legality mosaics

D Curtin - Secrecy in European Politics, 2020 - taylorfrancis.com
In today's information society the citizen is ever more visible to government and to private
companies while paradoxically government itself becomes ever more secret. This …

Big Data and security policies: Serving security, protecting freedom

D Broeders, E Hirsch Ballin - WRR Policy Brief, 2017 - papers.ssrn.com
Big Data analytics in national security, law enforcement and the fight against fraud can reap
great benefits for states, citizens and society but require extra safeguards to protect citizens' …