Search results for "secrecy"
showing 10 items of 22 documents
Michelin : du culte du secret à la transparence?
2015
Transparency the ultimate virtue of society, the guarantee of truth (?), between right and duty, is often expressed in opposition to secret or even lie. Organizations are faced with and often trapped between these extremes. The Michelin Corporation that will serve as the basis for our analysis is often presented as the Corporation of secrecy. As a real myth in our collective consciousness, it illustrates the dual relationship between transparency and secrecy, which appeared to have been successful given its longevity and ranking among the largest French leading companies in terms of CSR. From the materiality of objects and spaces to intangible rhetoric, the Group comprehensive communication…
Zasięg korporacyjnego upoważnienia aplikanta do zastępstwa
2023
Upoważnienie aplikanta do zastępstwa funkcjonuje od dawna. Jako że ma charakter tylko albo aż upoważnienia korporacyjnego, stąd też na tym tle jest ono różnie postrzegane. Do tego dochodzą dylematy w zakresie pełnienia przez profesjonalnego pełnomocnika funkcji kuratora, a także kwestia udzielenia upoważnienia do zastępstwa dla aplikanta czy nawet substytucji procesowej dla innego profesjonalnego pełnomocnika w osobie adwokata lub radcy prawnego. Wielość wątków z uwagi na szerokie spektrum aktywności aplikanta, co wiązać należy z odbywaną przez niego aplikacją adwokacką albo radcowską, pociąga za sobą konieczność umiejscowienia go w szeroko rozumianym wymiarze sprawiedliwości jako osoby qua…
Not Worth the Net Worth? The Democratic Dilemmas of Privileged Access to Information
2017
In this article, we discuss the democratic conditions for parliamentary oversight in EU foreign affairs. Our point of departure is two Interinstitutional Agreements (IIAs) between the Council and the European Parliament (EP), which provide the latter with access to sensitive documents. To shed light on this issue, we ask to what extent these contribute to the democratic accountability in EU foreign policy? It is argued that the IIAs have strengthened the EP’s role in EU foreign affairs by giving it access to information to which it was previously denied. This does not mean, however, that this increase in power equals a strengthening of the EP as a democratic accountability forum. First of a…
Managing skunkworks to achieve ambidexterity: The Robinson Crusoe effect
2021
Abstract Literature on ambidexterity emphasizes the need for both exploration and exploitation. Large firms usually choose to implement structural ambidexterity to separate both activities. We here focus on an extreme case of such structural partitioning implemented as a secret skunkworks project in a large French automotive company. A qualitative survey using both primary and secondary data shows that the major basic and initial characteristics of a skunkworks (i.e. secrecy, urgency, and autonomy) created favorable conditions for the technological exploration. However, exploitation failed due to precisely those same characteristics coupled with the fact that the project did not respond to …
Don't Tell Us: The Demand for Secretive Behaviour
2009
The matter studied here is how, and with what implications, people may decide that they do not want to be let into secrets that concern them. They could get the information at no cost but they refuse to know. The reasoning is framed in terms of principals and agents, with the principals assumed not to want to know the agents' secrets. For convenience, the context chosen for the exposition is mainly that of voters as principals and the government or the office-holders as agents. After some exploration of the motivations underlying the attitude of the principals, the paper focuses on the case when neither total secrecy nor total disclosure prevails. The demand for partial secrecy is analysed …
Secure and efficient data storage in unattended wireless sensor networks
2009
©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/NTMS.2009.5384753 Providing forward and backward secrecy is still a big challenge in Unattended Wireless Sensor Networks (UWSNs), though some storage schemes have been proposed. Additionally, high storage requirement needs efficient storage techniques. In this paper, we propose a novel homomorphic…
A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs
2010
Unattended Wireless Sensor Networks (UWSNs) operated in hostile environments face a risk on data security due to the absence of real-time communication between sensors and sinks, which imposes sensors to accumulate data till the next visit of a mobile sink to off-load the data. Thus, how to ensure forward secrecy, backward secrecy and reliability of the accumulated data is a great challenge. For example, if a sensor is compromised, pre-compromise data accumulated in the sensor is exposed to access. In addition, by holding key secrecy of the compromised sensor, attackers also can learn post-compromise data in the sensor. Furthermore, in practical UWSNs, once sensors stop working for accident…
Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments
2020
Rapid growth of Internet of Things (IoT) devices dealing with sensitive data has led to the emergence of new access control technologies in order to maintain this data safe from unauthorized use. In particular, a dynamic IoT environment, characterized by a high signaling overhead caused by subscribers' mobility, presents a significant concern to ensure secure data distribution to legitimate subscribers. Hence, for such dynamic environments, group key management (GKM) represents the fundamental mechanism for managing the dissemination of keys for access control and secure data distribution. However, existing access control schemes based on GKM and dedicated to IoT are mainly based on ce…
Practicing Ballot Secrecy: Postal Voting and the Witness Requirement at the 2019 Finnish Elections
2021
Electoral rights belong to the core of citizenship in democratic nation-states. Voting, then, represents an actualization of the relationship between the citizen and the political community. For citizens living outside the country in which they are eligible to vote, voting signifies a rare institutional connection to the country of origin. The aim of this article is to explore the introduction of the postal vote, a new form of voting for external voters at Finnish elections, from the grassroots perspective. The study focuses on how a central policy concern, safeguarding ballot secrecy, was resolved in the policy implementation by the witness requirement, and how the individual voters subseq…
Practicing Ballot Secrecy : Postal Voting and the Witness Requirement at the 2019 Finnish Elections
2021
Electoral rights belong to the core of citizenship in democratic nation-states. Voting, then, represents an actualization of the relationship between the citizen and the political community. For citizens living outside the country in which they are eligible to vote, voting signifies a rare institutional connection to the country of origin. The aim of this article is to explore the introduction of the postal vote, a new form of voting for external voters at Finnish elections, from the grassroots perspective. The study focuses on how a central policy concern, safeguarding ballot secrecy, was resolved in the policy implementation by the witness requirement, and how the individual voters subseq…