Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Staying with the secret: The public sphere in platform society
T Beyes - Theory, Culture & Society, 2022 - journals.sagepub.com
Investigating the structural transformation of the public sphere should reckon with the secret
and its modes of organization. The expansion of secrecy effected by the infrastructures …
and its modes of organization. The expansion of secrecy effected by the infrastructures …
[BOG][B] State secrecy and security: Refiguring the covert imaginary
W Walters - 2021 - taylorfrancis.com
In State Secrecy and Security: Refiguring the Covert Imaginary, William Walters calls for
secrecy to be given a more central place in critical security studies and elevated to become …
secrecy to be given a more central place in critical security studies and elevated to become …
Cybersecurity and the politics of knowledge production: towards a reflexive practice
How does a reflexive scholarly practice matter for producing useful cybersecurity knowledge
and policy? We argue that staking relevance without engaging in reflexivity diminishes the …
and policy? We argue that staking relevance without engaging in reflexivity diminishes the …
Secrecy in intimate relationships: Rethinking transparency and deceit in monogamies and non-monogamies
This article foregrounds the role of secrets in creating, maintaining and disrupting intimacy.
We extend sociological theorising on secrecy by demonstrating the operative role of secrets …
We extend sociological theorising on secrecy by demonstrating the operative role of secrets …
Secrecy in Europe
This article introduces a collection of papers devoted to the study of secrecy in European
politics across a range of EU and national settings and policy domains. Academic interest in …
politics across a range of EU and national settings and policy domains. Academic interest in …
Cyber intelligence and international security: breaking the legal and diplomatic silence?
D Broeders - Intelligence and National Security, 2024 - Taylor & Francis
In cyberspace intelligence agencies, rather than militaries, are the most prominent security
actors. However, many cyber operations conducted by intelligence agencies are not …
actors. However, many cyber operations conducted by intelligence agencies are not …
Synthetic friends
H Kempt - Synthetic Friends: A Philosophy of Human-Machine …, 2022 - Springer
This chapter presents the core argument and the proposal for both the negative conditions
for synthetic friends as well as some constructive elements. If a social machine fulfills the …
for synthetic friends as well as some constructive elements. If a social machine fulfills the …
[BOG][B] The national security sublime: On the aesthetics of government secrecy
M Potolsky - 2019 - taylorfrancis.com
Why do recent depictions of government secrecy and surveillance so often use images
suggesting massive size and scale: gigantic warehouses, remote black sites, numberless …
suggesting massive size and scale: gigantic warehouses, remote black sites, numberless …
Second order secrecy and Europe's legality mosaics
D Curtin - Secrecy in European Politics, 2020 - taylorfrancis.com
In today's information society the citizen is ever more visible to government and to private
companies while paradoxically government itself becomes ever more secret. This …
companies while paradoxically government itself becomes ever more secret. This …
Big Data and security policies: Serving security, protecting freedom
D Broeders, E Hirsch Ballin - WRR Policy Brief, 2017 - papers.ssrn.com
Big Data analytics in national security, law enforcement and the fight against fraud can reap
great benefits for states, citizens and society but require extra safeguards to protect citizens' …
great benefits for states, citizens and society but require extra safeguards to protect citizens' …