In: Public integrity, 2021, p. 13
This article explores how risk rationales affect and alter national security secrecy. While the transformation of defense and security policy has been widely discussed by security theorists, transparency scholars have not yet considered the notion of risk in their conceptualizations of national security secrecy. This article draws on security studies literature to outline the divergences...
|
Thèse de doctorat : Università della Svizzera italiana, 2021 ; 2021COM010.
Social norms as concepts of legitimate and appropriate action are basic elements of social coordination and essentially “communication phenomena” (Rimal & Lapinski, 2015, Lapinski & Rimal, 2005). They are negotiated, shaped, understood, learned, and maintained through communication, with mediated public discourses as central forums for the communication and negotiation of norms. Despite...
|
Thèse de doctorat : Università della Svizzera italiana, 2019 ; 2019COM004.
The objective of this research is to illustrate the complexity and fluidity of the relationship between secrecy and transparency by considering the multiple rationales that serve to justify secrecy. The conceptual contribution of this thesis lies at two levels: (1) the reconceptualization of national security secrecy from realism to risk management and (2) the implications of such...
|
Thèse de doctorat : Università della Svizzera italiana, 2019 ; 2019INFO011.
The ubiquity of digital sensors embedded in today's mobile and wearable devices (e.g., smartphones, wearable cameras, wristbands) has made technology more intertwined with our life. Among many other things, this allows us to seamlessly log our daily experiences in increasing numbers and quality, a process known as ``lifelogging''. This practice produces a great amount of pictures and videos...
|
In: Science and Engineering Ethics, 2014, vol. 20, no. 3, p. 639-658
|
In: Journal of Network and Systems Management, 2008, vol. 16, no. 4, p. 455-459
|
In: International Journal on Software Tools for Technology Transfer, 2005, vol. 7, no. 3, p. 233-247
|
In: Journal of Network and Systems Management, 2011, vol. 19, no. 1, p. 130-136
|
In: International Journal of Primatology, 2012, vol. 33, no. 4, p. 905-921
|
In: Formal Aspects of Computing, 2007, vol. 19, no. 1, p. 63-91
|