2016
DOI: 10.1080/09636412.2017.1243921
|View full text |Cite
|
Sign up to set email alerts
|

Covert Communication: The Intelligibility and Credibility of Signaling in Secret

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
29
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 92 publications
(29 citation statements)
references
References 0 publications
0
29
0
Order By: Relevance
“…Political scientists have tended to treat secrecy, and the consequences of ‘unsecrecy’, in a manner that reflects the objectivist approach described above: information is either secret or it is not, and the exposure of information intended to be kept secret is an inevitable failure from which accountability would naturally emerge. However, with scholars now recognising the nuances of secrecy and different means and levels of exposure, this binary is breaking down (Carson, 2016, 2018; Carson and Yarhi-Milo, 2017; Cormac and Aldrich, 2018). Austin Carson elicits two ways in which secrecy has been depicted.…”
Section: Success Failure and Secrecy: An Intersubjective Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…Political scientists have tended to treat secrecy, and the consequences of ‘unsecrecy’, in a manner that reflects the objectivist approach described above: information is either secret or it is not, and the exposure of information intended to be kept secret is an inevitable failure from which accountability would naturally emerge. However, with scholars now recognising the nuances of secrecy and different means and levels of exposure, this binary is breaking down (Carson, 2016, 2018; Carson and Yarhi-Milo, 2017; Cormac and Aldrich, 2018). Austin Carson elicits two ways in which secrecy has been depicted.…”
Section: Success Failure and Secrecy: An Intersubjective Approachmentioning
confidence: 99%
“…See Hood, 2002, 2016); second, how governing elites use message management to evade culpability in a foreign policy crisis (Cormac and Daddow, 2018), and third, the politics at work in narrative contestations over foreign policy issues (see Oppermann and Spencer, 2018). A key novelty and wider significance of our article is that we develop our theoretical framework by plugging the policy evaluation literature more tightly into research from the field of intelligence studies into secrecy in the exercise of state power (Carson, 2016, 2018; Carson and Yarhi-Milo, 2017; Cormac and Aldrich, 2018). We use this to inform growing interest in ‘hidden agendas’ and their effects on politics and policy-making (McConnell, 2018: 1747–1749).…”
Section: Introductionmentioning
confidence: 99%
“…The presence of redundancy [36] in some of the representations of digital media (used as carrier or cover) is the targeted areas of data hiding in steganography. It attracted the attention of many researchers and developers, who decided to generate newer techniques of availing and sustaining covert communication [37]. During the communication stage, any unauthenticated people may only notice the transmission of a seemingly unimportant image.…”
Section: Modern Steganographymentioning
confidence: 99%
“…This represents an expansion of Goffman's 1959 "frontstage" and "backstage" framework. For a discussion of secret, or "backstage," signals seeCarson 2016 andCarson andYarhi-Milo 2017. 18. As long as the signal is highly visible to at least one public, domestic or foreign, we consider it to be frontstage.19.…”
mentioning
confidence: 99%
“… 17. This represents an expansion of Goffman's 1959 “frontstage” and “backstage” framework. For a discussion of secret, or “backstage,” signals see Carson 2016 and Carson and Yarhi-Milo 2017. …”
mentioning
confidence: 99%