Show simple item record

Inviting outsiders in: Choosing access to bureaucratic *implementation.

dc.contributor.authorMoffitt, Susan L.
dc.contributor.advisorHall, Richard L.
dc.contributor.advisorLin, Ann Chih
dc.date.accessioned2016-08-30T15:56:32Z
dc.date.available2016-08-30T15:56:32Z
dc.date.issued2005
dc.identifier.urihttp://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:3192730
dc.identifier.urihttps://hdl.handle.net/2027.42/125451
dc.description.abstractBureaucrats seek to influence the policies they implement, and they do so through both secrecy and access. Secrecy offers bureaucrats room to use their privileged knowledge to steer policy implementation within an agency's jurisdiction. By gathering and distributing knowledge through access, bureaucrats can use knowledge as a regulatory tool to extend influence beyond the boundaries of bureaucratic hierarchy. Access offers bureaucrats a means of gathering technical knowledge to apply to policy implementation, a means of getting knowledge out of the agency and into other implementers' hands, and a means of gathering and distributing knowledge about other implementers and their secrets. Bureaucratic choices for secrecy and access depend on the tasks they implement. Routine tasks, those that occur within an agency's jurisdiction, allow bureaucratic implementers to develop privileged knowledge conducive to influence through secrecy. Bureaucrats are more likely to seek access for intricate tasks: such tasks rely on multiple implementers in multiple organizational units beyond the boundaries of specified hierarchical authority and stretch the sufficiency of bureaucratic technical knowledge. Access works on two levels. On one level, it operates as a regulatory tool: gathering and distributing knowledge to extend influence beyond hierarchical authority. On another level, it consists of particular institutional arrangements that set the terms for how bureaucratic implementers will engage with other implementers. This work explores this latter sort of access through public advisory committees in the context of the National Center for Education Statistics and the Food and Drug Administration. This research finds that when bureaucratic implementers enjoy authority over the terms of access---over the terms of public committees' agendas---they structure that access to focus on intricate tasks. Those same bureaucratic implementers seek secrecy for routine tasks. Variation, thus, occurs at the task level rather than at the agency level. When agencies lack authority over the structure of access, they are not only poorly situated to use access to expand regulatory influence through knowledge, but such access also threatens bureaucratic influence: it interferes with the official secrets that accompany bureaucratic routines. Agencies want access for complex tasks, but they want access they can shape.
dc.format.extent257 p.
dc.languageEnglish
dc.language.isoEN
dc.subjectAccess
dc.subjectBureaucratic
dc.subjectChoosing
dc.subjectImplementation
dc.subjectInviting
dc.subjectKnowledge
dc.subjectOutsiders
dc.subjectSecrecy
dc.titleInviting outsiders in: Choosing access to bureaucratic *implementation.
dc.typeThesis
dc.description.thesisdegreenamePhDen_US
dc.description.thesisdegreedisciplinePolitical science
dc.description.thesisdegreedisciplineSocial Sciences
dc.description.thesisdegreegrantorUniversity of Michigan, Horace H. Rackham School of Graduate Studies
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/125451/2/3192730.pdf
dc.owningcollnameDissertations and Theses (Ph.D. and Master's)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.