This article presents improvements for the dimension of ‘Attraction to Public Policy-making’ within the Public Service Motivation measurement scale. The literature concerning the theory behind this and a large number of empirical studies point out the shortcomings of this dimension with regard to both the contents and the methodology employed. This article deals in depth with the aspect of ‘Att…
This article explores the relationship between the United Kingdom's doctrine of ministerial responsibility and bureaucratic efforts to control four contemporary crises. Evidence emerges from a series of interviews with experienced crisis managers, which draws attention to the way in which this convention: (1) tacitly conditioned the thinking and behaviour of bureaucratic crisis actors through t…
This paper explores the issue of joined-up governance by considering child protection failures, firstly, the case of Victoria Climbié who was killed by her guardians despite being known as an at risk child by various public agencies. The seeming inability of the child protection system to prevent Victoria Climbié's death resulted in a public inquiry under the chairmanship of Lord Laming. The La…
The relationship between local government and public participation is a problematic one. Taking the UK as an example, it is evident that, despite 40 years of experimentation with public participation initiatives, there has been little impact on local policy processes. While a range of plausible explanations can be found for this state of affairs, no overarching theoretical framework is availabl…
For as long as rulers have ruled, they have tried to monopolize and control information. The institution of secrecy is as old as the state. But as new media for communication have appeared, it has become more difficult to control the flow of information, just as the rise of democracy as an ideal has made it harder to justify the institution of secrecy. The articles that follow consider the recu…
The promise to keep "secrets of state," once demanded and given, becomes virtually part of one's core identity. In the national security apparatus, one's pride and self-respect is founded in particular in the fact that one has been trusted to keep secrets in general and trusted with these particular secrets. I suggest that there are psycho-social aspects of promises made under these circumstanc…
When government officials can look you in the eye and invoke the Federal Freedom of Information Act, they know full well that they have donned a cloak of invisibility. They are saying, in effect, "You can't touch me," and they are calculating that you will get the message and go away. Worse yet, they are putting a premium on "access" journalism—they are elevating the importance of access, of au…
If Americans had to select a single symbol of their country's military might, they would do well to choose the fighter jet-a carefully constructed instrument of destruction, simultaneously powerful and nimble, stealthy and loud. This essay begins with a hunch-that if American culture illuminates the social significance of a fighter jet, then learning a little about jet propulsion might reveal s…
Many people assume that the topic of this paper -- namely, what the media does to ensure that knowledge is limited in a democracy -- is almost an obsolete topic, because with the internet and the proliferation of multiple other sources, it is really no longer the case that we are forced to rely upon a very small and homogenous set of sources. There's no denying that, theoretically at least, we …
As a nation, we seem to be of two minds about secrecy. We know that government secrecy is incompatible with democratic decision-making in obvious ways. Yet there is a near-universal consensus that some measure of secrecy is justified and necessary to protect authorized national security activities. Reconciling these conflicting interests is an ongoing challenge. In recent years, a large and gro…
The papers in this section are all devoted to arguments for and against limits on knowledge in a democracy. They are all taken up, in one way or another, with questions of privacy; of the transparency (or lack of it) of powerful institutions and consequential decision procedures; of the costs and demands of national security; and so on—questions that are very much at the heart of this volume an…
Over the last decade, many of the legal disputes that have arisen in the context of national security have concerned information - the withholding of it, the suppression of it, the collection of it, or the safeguarding of it. Frequently, these disputes have involved an argument known as the "mosaic" theory. The theory is straightforward: Seemingly insignificant information may become significan…
In civil libertarian discourse, the inverse relationship between government secrecy and privacy is well recognized and widely acknowledged - so widely, in fact, that it can come to seem as though we might regain sufficient privacy simply by cabining official secrecy. But regimes of secrecy that insulate private-sector data processing practices also contribute materially to the decline of privac…
On the question before us - are there conditions that call for limiting knowledge in a democracy? - principles of unfettered scientific inquiry and of a free press were more than a half-century ago challenged by the restrictive "need-to-know" policies of the security state. Today we continue the hard intellectual work initiated by our predecessors faced with the unprecedented destructive power …
Surveillance serves as the eyes of public health. It has provided the foundation for planning, intervention, and disease prevention and has been critical for epidemiology research into patterns of morbidity and mortality for a wide variety of disease and conditions. Registries have been essential for tracking individuals and their conditions over time. Surveillance has also served to trigger th…
Who deserves to know what? What are the mechanisms for limiting knowledge in the United States today? When does the public have a right to know? The concern about what should be deemed confidential weaces through all four papers in this section. The overdeveloped world celebrates the rule of new social media, which allows for more speech by more people while also making them more vulnerable to …
In June 1979, Congress passed the Espionage Act, the first act of the three secrecy-defining statutes that have shaped so much of the last hundred years of modern American secrecy doctrine. Together with two other statutes that followed in later decades-the Atomic Energy Acts of 1946 and 1954, and the Patriot Act of 2001-these three Acts picked out inflection points in the great ratcheting proc…
Transparency isn't the answer to everything, but one lesson I've learned in more than 20 years as an investigative reporter is that it is one critical step in keeping the public a key part of our democratic system and ensuring checks and balances in government. This is a principle shared not only by gadfly journalists themselves, but also by some government officials on the other side of the fi…
The four phases of Internet regulation are the "open Internet" period, from the network's birth through about 2000; "access denied," through about 2005; "access controlled," through the present day (2010); and "access contested," the phase into which we are entering.
We can't know everything; in fact, compared to the vast expanses of our ignorance, we can't really know very much. So the problem of "limiting knowledge" is not just one of the conflict between efforts to make knowledge available and efforts to keep knowledge locked up. There is also the often-invisible problem of how we decide what it is we are going to try to know, and what, as a consequence,…