Product Code Database
Example Keywords: games -strategy $65-194
   » » Wiki: Secrecy
Tag Wiki 'Secrecy'.
Tag

Secrecy is the practice of hiding information from certain individuals or groups who do not have the "need to know", perhaps while sharing it with other individuals. That which is kept hidden is known as the secret.

Secrecy is often controversial, depending on the content or nature of the secret, the group or people keeping the secret, and the motivation for secrecy. Secrecy by government entities is often decried as excessive or in promotion of poor operation; excessive revelation of information on individuals can conflict with virtues of and . It is often contrasted with social transparency.

Secrecy can exist in a number of different ways: encoding or (where mathematical and technical strategies are used to hide messages), true secrecy (where restrictions are put upon those who take part of the message, such as through government security classification) and , where secrets are hidden in plain sight behind complex idiosyncratic language () or .

Another classification proposed by in 1948 reads that there are three systems of secrecy within communication:

  1. Concealment systems, including such methods as invisible ink, concealing a message in a harmless text in a fake covering cryptogram, or other methods in which the existence of the message is concealed from the enemy.
  2. Privacy systems, for example, , is a special equipment required to recover the message.
  3. "True" secrecy systems where the meaning of the message is concealed by the cypher, code, etc. Although, its existence is not hidden. The enemy is assumed to have any special equipment necessary to intercept and record the transmitted signal.


Sociology
conceal the location of their or from . Squirrels bury nuts, hiding them, and they try to remember their locations later.

attempt to consciously conceal aspects of themselves from others due to , or from of violence, rejection, harassment, loss of , or loss of . Humans may also attempt to conceal aspects of their own self which they are not capable of incorporating psychologically into their being. sometimes maintain "", obliging family members never to discuss disagreeable issues concerning the family with outsiders or sometimes even within the family. Many "family secrets" are maintained by using a mutually agreed-upon construct (an official family story) when speaking with outside members. Agreement to maintain the secret is often coerced through "shaming" and reference to family . The information may even be something as trivial as a . Secrets are sometimes kept to provide the pleasure of surprise. This includes keeping secret about a surprise party, not telling spoilers of a story, and avoiding exposure of a magic trick.

Keeping one’s secret– is important in many aspects of .

In secret sharing is one way for people to establish traditional relations with other people. A commonly used narrative that describes this kind of behavior is 's short story "The Secret Sharer".


Government
often attempt to conceal information from other governments and the public. These state secrets can include designs, military plans, tactics, and secrets obtained illicitly from others ("intelligence"). Most nations have some form of Official Secrets Act (the in the U.S.) and classify material according to the level of protection needed (hence the term "classified information"). An individual needs a security clearance for access and other protection methods, such as keeping documents in a , are stipulated.

Few people dispute the desirability of keeping Critical Nuclear Weapon Design Information secret, but many believe government secrecy to be excessive and too often employed for political purposes. Many countries have laws that attempt to limit government secrecy, such as the U.S. Freedom of Information Act and . Government officials sometimes information they are supposed to keep secret. ( For a recent (2005) example, see .)

Secrecy in elections is a growing issue, particularly secrecy of vote counts on computerized vote counting machines. While voting, citizens are acting in a unique sovereign or "owner" capacity (instead of being a subject of the laws, as is true outside of elections) in selecting their government servants. It is argued that secrecy is impermissible as against the public in the area of elections where the government gets all of its power and taxing authority. In any event, permissible secrecy varies significantly with the context involved.


Corporations
Organizations, ranging from multi-national for profit to nonprofit , keep secrets for competitive advantage, to meet legal requirements, or, in some cases, to conceal nefarious behavior. New products under development, unique manufacturing techniques, or simply lists of customers are types of information protected by laws.

Research on corporate secrecy has studied the factors supporting secret organizations. In particular, scholars in economics and management have paid attention to the way firms participating in cartels work together to maintain secrecy and conceal their activities from antitrust authorities. The diversity of the participants (in terms of age and size of the firms) influences their ability to coordinate to avoid being detected.

The system encourages inventors to publish information in exchange for a limited time on its use, though patent applications are initially secret. use secrecy as a way to attract members by creating a sense of importance.

Shell companies may be used to launder money from criminal activity, to finance terrorism, or to evade taxes. Registers of beneficial ownership aim at fighting corporate secrecy in that sense.

Other laws require organizations to keep certain information secret, such as (HIPAA in the U.S.), or that are under preparation (to limit ). Europe has particularly strict laws about privacy.


Computing
Preservation of secrets is one of the goals of information security. Techniques used include physical security and . The latter depends on the secrecy of cryptographic keys. Many believe that security technology can be more effective if it itself is not kept secret.
(1991). 9780309043885 .

Information hiding is a design principle in much software engineering. It is considered easier to verify software reliability if one can be sure that different parts of the program can only access (and therefore depend on) a known limited amount of information.


Military
Military secrecy is the concealing of information about martial affairs that is purposely not made available to the general public and hence to any enemy, in order to gain an advantage or to not reveal a weakness, to avoid , or to help in efforts. Most military secrets are tactical in nature, such as the strengths and weaknesses of , , training methods, plans, and the number and location of specific weapons. Some secrets involve information in broader areas, such as secure communications, , intelligence operations, and cooperation with third parties.

US Government rights in regard to military secrecy were uphold in the of United States v. Reynolds, decided by the Supreme Court in 1953.US Supreme Court, United States v. Reynolds, 345 U.S. 1 (1953), decided 8 March 1953, accessed 5 April 2023


Views
Excessive secrecy is often cited as a source of much human conflict. One may have to in order to hold a secret, which might lead to repercussions. The alternative, declining to answer when asked something, may suggest the answer and may therefore not always be suitable for keeping a secret. Also, the other may insist that one answer the question.

Nearly 2500 years ago, wrote: 'Do nothing secretly; for Time sees and hears all things, and discloses all.'. Gautama Siddhartha said: "Three things cannot long stay hidden: the , the and the .".


See also

:Also available as: Preview.


Further reading


External links

Page 1 of 1
1
Page 1 of 1
1

Account

Social:
Pages:  ..   .. 
Items:  .. 

Navigation

General: Atom Feed Atom Feed  .. 
Help:  ..   .. 
Category:  ..   .. 
Media:  ..   .. 
Posts:  ..   ..   .. 

Statistics

Page:  .. 
Summary:  .. 
1 Tags
10/10 Page Rank
5 Page Refs
2s Time