The Secrecy Heuristic: Inferring Quality from Secrecy in Foreign Policy Contexts
نویسندگان
چکیده
Three experiments demonstrate that in the context of U.S. foreign policy decision making, people infer informational quality from secrecy. In Experiment 1, people weighed secret information more heavily than public information when making recommendations about foreign political candidates. In Experiment 2, people judged information presented in documents ostensibly produced by the Department of State and the National Security Council as being of relatively higher quality when those documents were secret rather than public. Finally, in Experiment 3, people judged a National Security Council document as being of higher quality when presented as a secret document rather than a public document and evaluated others’ decisions more favorably when those decisions were based on secret information. Discussion centers on the mediators, moderators, and broader implications of this secrecy heuristic in foreign policy contexts.
منابع مشابه
Achievable Secrecy Rate Regions of State Dependent Causal Cognitive Interference Channel
In this paper, the secrecy problem in the state dependent causal cognitive interference channel is studied. The channel state is non-causally known at the cognitive encoder. The message of the cognitive encoder must be kept secret from the primary receiver. We use a coding scheme which is a combination of compress-and-forward strategy with Marton coding, Gel’fand-Pinsker coding and Wyner’s wire...
متن کاملOn The Secrecy of the Cognitive Interference Channel with Channel State
In this paper the secrecy problem in the cognitive state-dependent interference channel is considered. In this scenario we have a primary and a cognitive transmitter-receiver pairs. The cognitive transmitter has the message of the primary sender as side information. In addition, the state of the channel is known at the cognitive encoder. Hence, the cognitive encoder uses this side information t...
متن کاملSecrecy of Communications in Data Transmission by Impulses with Unknown Moments of Appearance and Disappearance
We carried out a comparative analysis of the algorithms for detecting a rectangular impulse against Gaussian white noise under either authorized or unauthorized access to the transmitted data. We presupposed that for data transmission the binary communication system is used and that the useful information in the data is whether the signal is present or absent. The case is that unauthorized acce...
متن کاملPerformance Study of Untrusted Relay Network Utilizing Cooperative Jammer
Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...
متن کاملSecrecy and Deception in Anti-Terrorism Resource Allocation and Policy Implication
In this paper, we develop a game-theoretic model for whether and what a defender should disclose about her resource allocation in the homeland-security context. Our model allows us to explore whether the defender should disclose correct information about her defensive resource allocation (truthful disclosure), incorrect information (deception), or no information (secrecy). In the case where onl...
متن کامل