Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Transparency (behavior)
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Operating in such a way that it is easy for others to see what actions are performed}} As an ethic that spans [[science]], [[engineering]], [[transparency (market)|business]], and the [[humanities]], '''transparency''' is operating in such a way that it is easy for others to see what actions are performed. Transparency implies [[openness]], communication, and [[accountability]]. Transparency is practiced in companies, organizations, administrations, and communities.<ref>{{cite web|title=Opening government: A guide to best practice in transparency, accountability and civic engagement across the public sector|url=http://www.transparency-initiative.org/wp-content/uploads/2011/07/Opening-Government3.pdf|website=Transparency Initiative|publisher=Transparency & Accountability Initiative|access-date=September 11, 2015|url-status=dead|archive-url=https://web.archive.org/web/20170218030712/http://www.transparency-initiative.org/wp-content/uploads/2011/07/Opening-Government3.pdf|archive-date=February 18, 2017}}</ref> For example, in a business relation, fees are clarified at the outset by a transparent agent, so there are no surprises later. This is opposed to keeping this information hidden which is "non-transparent". A practical example of transparency is also when a cashier makes changes after a point of sale; they offer a transaction record of the items purchased (e.g., a receipt) as well as counting out the customer's change. In [[information security]], '''transparency''' means keeping the arcane, underlying mechanisms hidden so as not to obstruct intended function—an almost opposite sense. It principally refers to security mechanisms that are intentionally undetectable or hidden from view. Examples include hiding utilities and tools which the user does not need to know in order to do their job, like keeping the remote re-authentication operations of [[Challenge-Handshake Authentication Protocol]] hidden from the user.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)