Necessary but Illegitimate: On Democracy's Secrets

نویسندگان

چکیده

Abstract Transparency has become the constant refrain of democratic politics. However, executive branch officials consistently seek to insulate their activities from public scrutiny. A recurrent rationale presents secrecy as a necessary measure called for in circumstances which basic interests state are at stake. The purpose this paper is normatively assess appeals necessity governance. fleshes out two ways argument been framed. It argues that an appeal fails confer political and/or legal authority on state's resort because escapes normative codification both moral and domain (“necessity knows no law”). Drawing distinction between legitimacy vindication, it argues, however, even though resorting acts beyond its authority, action may be vindicated.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Policy Capacity Is Necessary but Not Sufficient; Comment on “Health Reform Requires Policy Capacity”

Policy capacity focuses on the managerial and organizational abilities to inform policy decisions with sound research and analysis, and facilitate policy implementation with operational efficiency. It stems from a view of the policy process that is rational and positivistic, in which optimal policy choices can be identified, selected, and implemented with objectivity. By itself, however, policy...

متن کامل

Policy Capacity for Health Reform: Necessary but Insufficient; Comment on “Health Reform Requires Policy Capacity”

Forest and colleagues have persuasively made the case that policy capacity is a fundamental prerequisite to health reform. They offer a comprehensive life-cycle definition of policy capacity and stress that it involves much more than problem identification and option development. I would like to offer a Canadian perspective. If we define health reform as re-orienting the health system from acut...

متن کامل

Present but Unreachable: Reducing Persistentlatent Secrets in HotSpot JVM

Applications that manage sensitive secrets, including cryptographic keys, are typically engineered to overwrite the secrets in memory once they’re no longer necessary, offering an important defense against forensic attacks against the computer. In a modern garbagecollected memory system, however, live objects will be copied and compacted into new memory pages, with the user program being unable...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Review of Politics

سال: 2022

ISSN: ['0034-6705', '1748-6858']

DOI: https://doi.org/10.1017/s0034670522000936