We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
Online ordering will be unavailable from 17:00 GMT on Friday, April 25 until 17:00 GMT on Sunday, April 27 due to maintenance. We apologise for the inconvenience.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure [email protected]
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
This chapter looks at the evidence of Pepys’s diary manuscript and at the implications of Pepys’s decision to write in shorthand. These are dimensions usually missing from discussion of this key source, for the nature of Pepys’s shorthand is generally not well understood by commentators. Pepys used Thomas Shelton’s shorthand system, known as ‘tachygraphy’. The chapter begins by explaining how this system worked and how it shaped Pepys’s prose style. With illustrations from Pepys’s manuscript, it uses his description of the Great Fire and Charles II’s coronation to show how his pages differ from what is in print. It then explores the escalating methods of disguise that he developed for sexual passages and the implications of this. Finally, it considers what his manuscript tells us about his intentions in writing, especially about his sense of who might read his diary.
Chapter 4 follows different groups of conspirators, with differing agendas, who began to find one another and come together. One group was composed of soldiers who felt that they had been passed over for promotions due to racism. Another small group that was disgruntled by a combination of low wages and racism came together in the shop of a master tailor. And a third group was composed of white professionals who were driven by republican ideas they gleaned from studying the French Revolution. For these groups to come together, there needed to be a delicate balance of maintaining secrecy while also growing the plot and preparing to reveal it publicly. This chapter demonstrates that it was the bonds of relation, and a conviction that they could take care of one another and administer society better than the state, that kept people committed to the plan as they worked through this dangerous moment of expanding the conspiracy. Seen from this perspective, their struggle constituted a definition of the political in which care, concern, rest, and the belief that the people were the seat of sovereignty were foundational to being radicalized.
Chapter 6 focuses on the men who were caught in the act of trying to start the intended rebellion. They were all free people of African descent, yet some among them also invited enslaved people to join the rebellion. Thus, relations between enslaved and free people are at the center of this chapter. The ways in which these people talked about freedom and bondage with one another presents a picture in which it is impossible to say that the conspiracy was definitively anti- or pro-slavery. There were some men who took abolition of slavery quite seriously, and there were others who had no interest in the matter whatsoever. Those who fit the latter group were connected to a shadowy group of elite white men who had been planning their own rebellion. Evidence of these white men’s participation in a conspiracy showed up frequently during a significant number of different men’s interrogations. The High Court chose to ignore or dismiss all such claims, clearing the way for them to transform the collective insurgencies of 1798 into a so-called Pardo conspiracy, free from confusion, free from uneven relations, and unconnected to the aims of elite white men.
Following a brief historical overview of the birth of the organised movement, Chapter 1 introduces literary figures and texts promoted by antivivisection periodicals such as the Zoophilist, the Home Chronicler, and the Animals Guardian. Adopting a literary-critical approach offers a fresh perspective on the movement’s association pamphlets and periodicals which have, thus far, largely been examined as historical documents. Poems, stories, and ‘humane words’ from notable writers were sourced and deployed to shape a common antivivisectionist identity, articulate the movement’s ideology, and mobilise activists. Analysis of antivivisection poems by Christina Rossetti, Robert Browning, Alfred Tennyson, and Robert Buchanan is complemented by attention to the framing and reception of these works in antivivisection publications and the wider press.
The proviso to Canon 113 of 1603 was not a substantive enactment of the seal of confession, but rather was intended to ensure that the canon did not conflict with a continuing canonical duty not to disclose sins revealed in confession. The 1947 Canon Law report proposed two draft canons, one regulating which priests could hear confessions, and one enacting the seal substantively. In response to criticism of these drafts, Archbishop Fisher proposed what became paragraphs 1–3 of Canon B 29. Attempts to restrict hearing of confessions to certain categories of priests were eventually abandoned in favour of what became paragraph 4. The draft canon embodying the seal was replaced by a draft Clause based on the proviso, but Government lawyers indicated that it would not receive royal assent. Instead, the proviso was left in place. An act of Convocation based on it was also passed to signal the Church’s continued espousal of the seal as a doctrinal principle. The Convocations eventually agreed to delete the proposed new Clause, while a canon explicitly retaining the proviso when the rest of the 1603 code was repealed received royal assent. That no priest would in practice break the seal, even if instructed to do so by a judge, was almost universally accepted.
Adolescents’ ability to access health care depends on sharing accurate information about concerns, needs, and conditions. Parents and other adults serve as both resources and gatekeepers in adolescents’ ability to access and manage care. Understanding information sharing between adolescents and parents, adolescents and providers, and parents and providers is thus critical. This chapter distinguishes between adolescents’ routine and self-disclosure of information. The former refers to sharing information required for the partner to perform their role. The latter refers to voluntarily sharing more information than required. Because the roles of parent and provider are distinct relative to the adolescent, disclosure decisions can conflict. These differences are discussed in the context of communication privacy management theory and the literature on legitimacy of authority. A framework for understanding information sharing processes is developed that considers stage of care, type of care, stigma/privacy associated with the condition, and the age of the adolescent.
This chapter examines the role of self-disclosure and secrecy in adolescent–parent relationships from a social perspective, highlighting their importance in monitoring and regulating relationship quality and closeness. Although adolescent–parent relationships share characteristics with other close relationships, they also differ. Both these similarities and differences have implications for the dynamics of self-disclosure and secrecy. A distinction is made between intimate self-disclosure and routine disclosure – the daily details of life – both of which play a critical role in these dynamics. The chapter conceptualizes the adolescent–parent relationship, examines the nature of self-disclosure and secrecy, and explores their interrelations within adolescent–parent relationships. It also considers the variability of self-disclosure as influenced by social norms and cultural background. The chapter concludes with a discussion of future research directions, particularly in the context of evolving communication technologies, and their implications for understanding the dynamics of self-disclosure and secrecy between adolescents and their parents.
This chapter focuses on adolescents’ use of strategies to conceal information about their whereabouts, behaviors, and activities from parents. The chapter describes the concealing strategies assessed by researchers, adolescents’ relative use of strategies, and adolescents’ reasons for concealing information from parents. Concealment strategies range from partial disclosure to secrecy to lying. Most adolescents use partial and passive concealment strategies (e.g. omitting details) more often than active concealment strategies (e.g. lying). Adolescents conceal activities they believe to be personal and to avoid punishment. The chapter also summarizes research on potential implications of concealment for both the parent–adolescent relationship and the adolescent’s adjustment. Research evidence links the use of concealing strategies with poorer quality parent–adolescent relationships and with poorer behavioral and psychological adjustment. Recommended future directions include integrating research on concealment with the literatures on self-disclosure, lying, and secrecy outside the parent–child relationship, and further tests of the hypothesized benefits of concealment.
This chapter reviews research on disclosure and secrecy in Turkish adolescents’ relationships with their parents in comparison with research from other cultures. Research on the topics, targets, and justifications of, and demographic differences in adolescent disclosure to and secrecy from their parents show that adolescents across cultures are more similar than different in managing their privacy with their parents. With development, adolescents construct their private and communal self, through selecting the topics to disclose, to whom to disclose, and the extent of disclosure. Disclosure and secrecy are similarly associated with parenting behaviors and well-being across cultures. Variations, however, stem from socioeconomic differences of families. Future research may consider going beyond broad categorizations of cultures (e.g. individualism and collectivism) and focus on the extent of convergence between the worldviews of adolescents and parents, which is likely to determine the scope and the frequency of sharing information with parents.
Delve into the ideal resource for theory and research on parental monitoring and adolescents' disclosure to and concealment from parents. This handbook presents ground-breaking research exploring how adolescents respond to parents' attempts to control and manage their activities and feelings. The chapters highlight how adolescents' responses are as important for their mental health and behavior as parents' attempts to regulate them. Examining responsive, intrusive, and invasive parenting behaviors, the volume addresses modern challenges like monitoring in the digital age and medical decision-making. It covers cutting-edge research on diverse cultures and groups including Latinx, Turkish, Chinese, LGBTQ+, and chronically ill youth. The internationally recognized contributors offer insights from different theoretical perspectives and describe novel methodological approaches, focusing on variations across different developmental stages, contexts, and cultures.
In contrast to a view of secrecy as a tool of statecraft, where the game of ‘covering/uncovering’ dominates as the central way of interpreting secrecy’s power, we set out ‘secrecy games’ as an approach for understanding secrecy’s power and influence. To do so, we offer a set of three games to illustrate the more varied ways that secrecy operates and draw attention to the ways in which non-state actors use secrecy and shape its effects. In particular, we offer an analysis of: (1) the secrecy games of tunnelling in the Israeli–Palestinian conflict and the role of mobility as part of secrecy; (2) the secrecy game of camouflage and how stowaways blend in to facilitate access to global shipping routes; and (3) the secrecy game of maze-running and maze-making within urban warfare. Drawing these together, we show how secrecy involves a wider set of actors, practices, and associated knowledge-(un)making strategies than currently understood within International Relations. In turn, this expanded understanding of secrecy helps to make sense of the more complex ways in which secrecy is presented, used, resisted, and transformed – including and especially as a force that limits sovereign power – and, therefore, as central to what shapes global politics.
Conventional wisdom holds that open, collaborative, and transparent organizations are innovative. But some of the most radical innovations—satellites, lithium-iodine batteries, the internet—were conceived by small, secretive teams in national security agencies. Are these organizations more innovative because of their secrecy, or in spite of it? We study a principal–agent model of public-sector innovation. We give research teams a secret option and a public option during the initial testing and prototyping phase. Secrecy helps advance high-risk, high-reward projects through the early phase via a cost-passing mechanism. In open institutions, managers will not approve pilot research into high-risk, high-reward ideas for fear of political costs. Researchers exploit secrecy to conduct pilot research at a higher personal cost to generate evidence that their project is viable and win their manager's approval. Contrary to standard principal–agent findings, we show that researchers may exploit secrecy even if their preferences are perfectly aligned with their manager's, and that managers do not monitor researchers even if monitoring is costless and perfect. We illustrate our theory with two cases from the early Cold War: the CIA's attempt to master mind control (MKULTRA) and the origins of the reconnaissance satellite (CORONA). We contribute to the political application of principal–agent theory and studies of national security innovation, emerging technologies, democratic oversight, the Sino–American technology debate, and great power competition.
This chapter grows out of the strain of queer theory that revolves around questions of time. Many thinkers make sense of queer subjects by exploring their complex relationships to the past, present, and future as well as what time signifies in this context. Taking seriously the critical linkage between queerness and temporality, I consider how queer bodies make us aware of time – whether through temporal refusal, embrace, or displacement. I argue that contemporary novelists Mia McKenzie and Robert Jones, Jr., use queer characters to reorient narrative understandings of time and present new possible relationships to time. McKenzie’s The Summer We Got Free (2013) and Jones’s The Prophets (2021) both attend to the past to write Black queer life, and, in doing so, these authors provide meditations on time and the writing of history. Beginning with a consideration of the larger historical context of Black queer writing from the end of the twentieth century, the chapter highlights the narrative questioning of the temporal placement and meaning of the Black queer body and draws a connection between the narrative construction and conceptions of temporality that disrupt prevalent ways of thinking about time. In these texts, time emerges as a queer formation.
As Christianity continued to transition from school churches to the monepiscopate, the role of hiddenness and openness in Christian teaching become an increasingly contested issue. Three writings associated with the so-called Hippolytan school – the Traditio apostolica, the Commentarium in Canticum Canticorum, and De Christo et antichristo – shed light on the tensions between hiddenness and secrecy in baptismal instruction.
This article traces the spread of a norm of confidentiality within elite political culture during the Warring States, Qin, and Western Han periods. Instead of an emphasis on secrecy within military and administrative contexts, it explores discussions of “leaking” (xie 泄/洩 or lou 漏) and characterizations of “confidentiality” (zhou 周 and mi 密) in idealized representations of political action. While Warring States texts drew upon a medical language of qi circulation to fashion a model of a perfectly leakproof ruler, by Western Han attention had shifted from rulers to officials. This valorization of official confidentiality was connected to institutional developments, especially proscriptions against leaking from privileged spaces at the imperial court, visible in sources from the late Western Han. In this final period there arose a celebrated norm of circumspection, shared by rulers and officials alike, that in theory would allow all parties to evade disaster.
This chapter describes the role of economists during Honecker’s consumer-oriented Unity of Social and Economic Policy. Drawing on the example of Erwin Rohde (1927–2010), professor of public finance at Humboldt University, it illustrates the professional practices of university economists including functionary positions, teaching reforms, and research efforts subject to revised plans and institutional control. The chapter argues that this organization resulted in an increasing turn inward that was inherent in the epistemic regime of East German economists and deprived them of a critical role in social discourse. To a large extent, the ongoing reforms had the ideological function of creating political stability through future promises, while the actual strategic activities that were incompatible with this ideology were covered by a veil of secrecy. This is illustrated with the example of the so-called area for commercial coordination.
Almost all technology is dual use to some degree: it has both civilian and military applications. This feature creates a dilemma for cooperation. States can design arms control institutions to curtail costly competition over some military technology. But they also do not want to limit valuable civilian uses. How does the dual use nature of technology shape the prospects for cooperation? We argue that the duality of technology presents a challenge not by its very existence but rather through the ways it alters information constraints on the design of arms control institutions. We characterize variation in technology along two dual use dimensions: (1) the ease of distinguishing military from civilian uses; and (2) the degree of integration within military enterprises and the civilian economy. Distinguishability drives the level of monitoring needed to detect violations. When a weapon is indistinguishable from its civilian counterpart, states must improve detection though intelligence collection or intrusive inspections. Integration sharpens the costs of disclosing information to another state. For highly integrated technology, demonstrating compliance could expose information about other capabilities, increasing the security risks from espionage. Together, these dimensions generate expectations about the specific information problems states face as they try to devise agreements over various technologies. We introduce a new qualitative data set to assess both variables and their impact on cooperation across all modern armament technologies. The findings lend strong support for the theory. Efforts to control emerging technologies should consider how variation in the dual use attributes shapes this tension between detection and disclosure.
This chapter explores the cultural significance of the optical telegraph in Ireland. Following the institution of the Chappe télégraphe in revolutionary France, this long-distance communications technology was widely innovated and subsequently adopted by numerous governments including, briefly, the British administration at Dublin Castle. The chapter begins by discussing the promotion, in the Belfast Northern Star, of the telegraph designed by the ‘improving’ Ascendancy landlord, Richard Lovell Edgeworth. It then considers the politics of telegraphic discourse in Ireland in the years leading up to the Rebellion of 1798, with a particular focus on the associations between telegraphy and the United Irish press. Finally, it suggests some points of affinity between Maria Edgeworth’s tale ‘The White Pigeon’ (1800) and her father’s telegraph. In its connection with competing ideas of Irish nationality, security, and surveillance, I argue, the telegraph offers valuable insights into the relations between literature and technology in late eighteenth-century Ireland.
Cryptology of the long eighteenth century became an explicit discipline of secrecy. Theorized in pedagogical texts that reached wide audiences, multimodal methods of secret writing during the period in England promoted algorithmic literacy, introducing reading practices like discernment, separation, recombination, and pattern recognition. In composition, secret writing manipulated materials and inspired new technologies in instrumentation, computation, word processing, and storage. Cryptology also revealed the visual habits of print and the observational consequences of increasing standardization in writing, challenging the relationship between print and script. Secret writing served not only military strategists and politicians; it gained popularity with everyday readers as a pleasurable cognitive activity for personal improvement and as an alternative way of thinking about secrecy and literacy.