Views
Graph
Explorer
Focus
Down
Load 1 level
Load 2 levels
Load 3 levels
Load 4 levels
Load all levels
All
Dagre
Focus
Down
Load 1 level
Load 2 levels
Load 3 levels
Load 4 level
Load all levels
All
Tree
SpaceTree
Focus
Expanding
Load 1 level
Load 2 levels
Load 3 levels
Down
All
Down
Radial
Focus
Expanding
Load 1 level
Load 2 levels
Load 3 levels
Down
All
Down
Box
Focus
Expanding
Down
Up
All
Down
Page ✓
Article
Outline
Document
Down
All
Canvas
Time
Timeline
Calendar
Request email digest
Past 24 hours
Past 2 days
Past 3 days
Past week
Add
Add page
Add comment
Add citation
Edit
Edit page
Delete page
Share
Link
Bookmark
Embed
Social media
Login
Member login
Register now for a free account
🔎
Determining the boundary/threshold?
Klausimas
1
#85956
Immediately related elements
How this works
-
WikiLeaks »
WikiLeaks
WikiLeaks☜Exploring the issues arising from the publication in November and December 2010 by WikiLeaks and five international newspapers of a mass of confidential diplomatic cables between the US State Department and its embassies around the world. Co-curators are welcome to add to, and help refine, the map.☜F1CEB7
▲
Transparency and Secrecy in Government »
Transparency and Secrecy in Government
Transparency and Secrecy in Government☜Several governments have launched ambitious Internet projects (data.gov, data.gov.uk) to expose their data. At the same time, organizations such as Wikileaks also use Internet to fight the excessive secrecy with which governments tend to protect their sensitive data. How do these two trends combine?☜FFB597
▲
Secrecy is warranted in some but not all circumstances »
Secrecy is warranted in some but not all circumstances
Secrecy is warranted in some but not all circumstances☜☜59C6EF
■
Determining the boundary/threshold?
Determining the boundary/threshold?☜☜FFB597
●
Criteria to apply in determining the boundary/threshold of secrecy? »
Criteria to apply in determining the boundary/threshold of secrecy?
Criteria to apply in determining the boundary/threshold of secrecy?☜☜FFB597
●
What checks and balances can be applied to the process? »
What checks and balances can be applied to the process?
What checks and balances can be applied to the process?☜What checks and balances can be applied to the process of determining the boundary/threshold of secrecy?☜FFB597
●
Who determines the boundary/threshold of secrecy? »
Who determines the boundary/threshold of secrecy?
Who determines the boundary/threshold of secrecy?☜☜FFB597
●
Can be no clear boundary—but far away from the impulse of authority »
Can be no clear boundary—but far away from the impulse of authority
Can be no clear boundary—but far away from the impulse of authority☜There can be no clear line marking what needs to be kept secret (or never uttered) from what does not, but it should be drawn far from where most authorities put it – at least in a world where authorities are imperfect.☜59C6EF
Heading
Summary
Click the button to enter task scheduling information
Open
Details
Enter task details
Message text
Select assignee(s)
Due date (click calendar)
RadDatePicker
RadDatePicker
Open the calendar popup.
Calendar
Title and navigation
Title and navigation
<<
<
November 2024
>
<<
November 2024
S
M
T
W
T
F
S
44
27
28
29
30
31
1
2
45
3
4
5
6
7
8
9
46
10
11
12
13
14
15
16
47
17
18
19
20
21
22
23
48
24
25
26
27
28
29
30
49
1
2
3
4
5
6
7
Reminder
No reminder
1 day before due
2 days before due
3 days before due
1 week before due
Ready to post
Copy to text
Enter
Cancel
Task assignment(s) have been emailed and cannot now be altered
Lock
Cancel
Save
Comment graphing options
Choose comments:
Comment only
Whole thread
All comments
Choose location:
To a new map
To this map
New map options
Select map ontology
Options
Standard (default) ontology
College debate ontology
Hypothesis ontology
Influence diagram ontology
Story ontology
Graph to private map
Cancel
Proceed
+Komentarai (
0
)
- Komentarai
Komentuoti
Newest first
Oldest first
Show threads
+Citavimą (
1
)
- Citavimą
Pridėti citatą
List by:
Citerank
Map
Link
[1]
Cituoja:
Peter Singer
Cituojamas:
David Price
8:12 PM 20 December 2010 GMT
Citerank:
(5)
86713
WikiLeaks documents may point to potential war crimes by US forces
Documents released by WIkiLeaks might form the basis for prosecuting war crimes committed by US forces against Afghan civilians.
9
59C6EF
,
86724
WikiLeaks documents put individuals at risk by revealing identities
Although Wikileaks says it has withheld 15,000 documents on the Afghan war in order to remove names and other means of identifying individuals who might be placed at risk, the Times of London revealed that in some cases sufficient identifying details were in the documents already released.
11
98CE71
,
86727
Full openness would make it easier for terrorists to commit atrocities
In a world in which terrorists have committed atrocities and threaten to commit more, to seek complete government transparency is utopian. Sometimes it is possible to do good only in secret.
11
98CE71
,
86728
In general a more transparent government is likely to be a better one
10
9FDEF6
,
86729
Sometimes it is possible to do good only in secret
11
98CE71
URL:
http://www.project-syndicate.org/commentary/singer65/English
Ištrauka -
How Much Transparency is Too Much?
+About
- About
Redagavo:
David Price
NodeID:
#85956
Node type:
Issue
Įvedimo data (GMT):
12/14/2010 9:13:00 PM
Paskutinės redakcijos data (GMT laikas):
12/14/2010 9:13:00 PM
Show other editors
Įeinančios sąsajos:
0
Išeinančios sąsajos:
0
Vidutinis vertinimas:
0
by
0
vartotojai
x
Select file to upload