Necessary but Illegitimate: On Democracy's Secrets
نویسندگان
چکیده
Abstract Transparency has become the constant refrain of democratic politics. However, executive branch officials consistently seek to insulate their activities from public scrutiny. A recurrent rationale presents secrecy as a necessary measure called for in circumstances which basic interests state are at stake. The purpose this paper is normatively assess appeals necessity governance. fleshes out two ways argument been framed. It argues that an appeal fails confer political and/or legal authority on state's resort because escapes normative codification both moral and domain (“necessity knows no law”). Drawing distinction between legitimacy vindication, it argues, however, even though resorting acts beyond its authority, action may be vindicated.
منابع مشابه
System based education in medical sciences: necessary but forgotten.
This article has no abstract.
متن کاملPolicy Capacity Is Necessary but Not Sufficient; Comment on “Health Reform Requires Policy Capacity”
Policy capacity focuses on the managerial and organizational abilities to inform policy decisions with sound research and analysis, and facilitate policy implementation with operational efficiency. It stems from a view of the policy process that is rational and positivistic, in which optimal policy choices can be identified, selected, and implemented with objectivity. By itself, however, policy...
متن کاملPolicy Capacity for Health Reform: Necessary but Insufficient; Comment on “Health Reform Requires Policy Capacity”
Forest and colleagues have persuasively made the case that policy capacity is a fundamental prerequisite to health reform. They offer a comprehensive life-cycle definition of policy capacity and stress that it involves much more than problem identification and option development. I would like to offer a Canadian perspective. If we define health reform as re-orienting the health system from acut...
متن کاملPresent but Unreachable: Reducing Persistentlatent Secrets in HotSpot JVM
Applications that manage sensitive secrets, including cryptographic keys, are typically engineered to overwrite the secrets in memory once they’re no longer necessary, offering an important defense against forensic attacks against the computer. In a modern garbagecollected memory system, however, live objects will be copied and compacted into new memory pages, with the user program being unable...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Review of Politics
سال: 2022
ISSN: ['0034-6705', '1748-6858']
DOI: https://doi.org/10.1017/s0034670522000936