{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T06:29:53Z","timestamp":1775716193440,"version":"3.50.1"},"reference-count":60,"publisher":"Emerald","issue":"6","license":[{"start":{"date-parts":[[2020,6,19]],"date-time":"2020-06-19T00:00:00Z","timestamp":1592524800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JD"],"published-print":{"date-parts":[[2020,6,19]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to introduce the concept of Dark Knowledge, an epistemology that acknowledges both alternative knowledge and ways of knowing which are cognizant of the moral and ethical positioning of each.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>This is a conceptual paper that uses existing relevant literature to develop the work. The paper uses a four-stage literature search process and draws upon a range of disciplines, including philosophy, computer science and information management, to underpin the evolution of the concept.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>As a conceptual paper, no empirical findings are presented. Instead, the paper presents an embryonic model of Dark Knowledge and identifies a number of characteristics, which may be used to explore the concept in more detail.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Research limitations\/implications<\/jats:title><jats:p>There is a clear need to develop a body of empirical work, adding to the theoretical perspectives presented in this paper. It is anticipated that this paper will provide one of the cornerstones for future studies in this area.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>The paper makes an original contribution to the study of information behaviours, practices and epistemology.<\/jats:p><\/jats:sec>","DOI":"10.1108\/jd-12-2019-0234","type":"journal-article","created":{"date-parts":[[2020,6,23]],"date-time":"2020-06-23T09:17:21Z","timestamp":1592903841000},"page":"1341-1358","source":"Crossref","is-referenced-by-count":18,"title":["Hidden and forbidden: conceptualising Dark Knowledge"],"prefix":"10.1108","volume":"76","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1239-5612","authenticated-orcid":false,"given":"Simon","family":"Burnett","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7835-8374","authenticated-orcid":false,"given":"Annemaree","family":"Lloyd","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"55","key":"key2020092114361238800_ref001","first-page":"1041","article-title":"Theory of workarounds","volume":"34","year":"2014","journal-title":"Communications of the Association for Information Systems"},{"key":"key2020092114361238800_ref002","first-page":"3438","article-title":"Bayesian Dark Knowledge","volume-title":"Advances in Neural Information Processing Systems","year":"2015"},{"key":"key2020092114361238800_ref003","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.drugpo.2015.11.008","article-title":"Concepts of illicit drug quality among darknet market users: purity, embodied experience, craft and chemical knowledge","volume":"35","year":"2016","journal-title":"International Journal of Drug Policy"},{"issue":"1","key":"key2020092114361238800_ref004","first-page":"168","article-title":"Conspiracy theories as stigmatized knowledge","volume":"249","year":"2015","journal-title":"Diogenes"},{"key":"key2020092114361238800_ref005","volume-title":"Dictionary of Satanism","year":"2015"},{"key":"key2020092114361238800_ref006","volume-title":"Steps to an Ecology of Mind: Collected Essays in Anthropology, Psychiatry, Evolution, and Epistemology","year":"1972"},{"key":"key2020092114361238800_ref007","first-page":"1","article-title":"Dark knowledge and graph grammars in automated software design","volume-title":"International Conference on Software Language Engineering in Indianapolis, IN, USA","year":"2013"},{"key":"key2020092114361238800_ref008","volume-title":"Secret History: The Story of Cryptology","year":"2013"},{"issue":"4","key":"key2020092114361238800_ref009","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1145\/129852.129859","article-title":"Design maintenance systems","volume":"35","year":"1992","journal-title":"Communications of the ACM"},{"key":"key2020092114361238800_ref010","volume-title":"The Social Construction of Reality: A Treatise in the Sociology of Knowledge","year":"1991"},{"issue":"2","key":"key2020092114361238800_ref011","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1080\/14681360400200198","article-title":"Participatory practices at work","volume":"12","year":"2004","journal-title":"Pedagogy, Culture and Society"},{"issue":"6","key":"key2020092114361238800_ref012","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.1177\/017084069501600605","article-title":"Knowledge, knowledge work and organizations: an overview and interpretation","volume":"16","year":"1995","journal-title":"Organization Studies"},{"issue":"6","key":"key2020092114361238800_ref013","doi-asserted-by":"crossref","first-page":"1213","DOI":"10.1111\/j.1365-2648.2011.05613.x","article-title":"What information counts at the moment of practice? Information practices of renal nurses","volume":"67","year":"2011","journal-title":"Journal of Advanced Nursing"},{"key":"key2020092114361238800_ref014","article-title":"The road not taken: locating desire lines across information landscapes","volume-title":"Information Research","year":"2019"},{"issue":"3","key":"key2020092114361238800_ref015","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1002\/(SICI)1097-4571(199603)47:3<193::AID-ASI3>3.0.CO;2-T","article-title":"The impoverished life\u2010world of outsiders","volume":"47","year":"1996","journal-title":"Journal of the American Society for Information Science"},{"issue":"8","key":"key2020092114361238800_ref016","doi-asserted-by":"crossref","first-page":"1347","DOI":"10.1002\/asi.20838","article-title":"Uncovering the dark web: a case study of Jihad on the web","volume":"59","year":"2008","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"key2020092114361238800_ref017","volume-title":"Dark Web: Exploring and Data Mining the Dark Side of the Web","year":"2011"},{"issue":"19","key":"key2020092114361238800_ref018","first-page":"103","article-title":"The ethics of using medical data from Nazi experiments","year":"1990","journal-title":"Journal of Halacha and Contemporary Society"},{"issue":"3","key":"key2020092114361238800_ref019","first-page":"323","article-title":"Strategies for dealing with human information needs: information or communication?","volume":"20","year":"1976","journal-title":"Journal of Broadcasting and Electronic Media"},{"key":"key2020092114361238800_ref020","article-title":"Lost: Syrian refugees and the information gap","year":"2013"},{"key":"key2020092114361238800_ref021","unstructured":"Dyrendal, A. (2014), \u201cHidden knowledge, hidden powers: esotericism and conspiracy culture\u201d, in Asprem, E. and Granholm, K. (Eds), Contemporary Esotericism, Routledge, Milton Park, pp. 210-235."},{"issue":"1","key":"key2020092114361238800_ref022","first-page":"380","article-title":"The underground economy: components","volume":"28","year":"2019","journal-title":"Annals of the University of Oradea, Economic Science Series"},{"key":"key2020092114361238800_ref023","volume-title":"The Order of Things","year":"2005"},{"key":"key2020092114361238800_ref024","volume-title":"Discipline and Punish: The Birth of the Prison","year":"2012"},{"key":"key2020092114361238800_ref025","volume-title":"The Ecological Approach to Visual Perception","year":"1979"},{"key":"key2020092114361238800_ref026","first-page":"23","volume-title":"The Dark Side of Organizational Behavior","year":"2004"},{"key":"key2020092114361238800_ref027","volume-title":"Esotericism and the Academy: Rejected Knowledge in Western Culture","year":"2012"},{"issue":"83","key":"key2020092114361238800_ref028","first-page":"354","article-title":"Virtuous human hacking: the ethics of social engineering in penetration-testing","year":"2019","journal-title":"Computers and Security"},{"key":"key2020092114361238800_ref029","unstructured":"Hinton, G., Vinyals, O. and Dean, J. (2015), \u201cDistilling the knowledge in a neural network\u201d, Stat, 1050, pp. 1-9."},{"issue":"8","key":"key2020092114361238800_ref030","doi-asserted-by":"crossref","first-page":"2824","DOI":"10.1177\/1461444817733134","article-title":"Privacy, censorship, data breaches and Internet freedom: the drivers of support and opposition to Dark Web technologies","volume":"20","year":"2018","journal-title":"New Media and Society"},{"issue":"4","key":"key2020092114361238800_ref031","first-page":"423","article-title":"Knowledge in the dark: scientific challenges and ways forward","year":"2019","journal-title":"FACETS"},{"issue":"2","key":"key2020092114361238800_ref032","doi-asserted-by":"crossref","first-page":"197","DOI":"10.5840\/monist19967927","article-title":"Forbidden knowledge and science as professional activity","volume":"79","year":"1996","journal-title":"The Monist"},{"issue":"8","key":"key2020092114361238800_ref033","doi-asserted-by":"crossref","first-page":"1131","DOI":"10.1002\/asi.20585","article-title":"Information and higher things in life: addressing the pleasurable and the profound in information science","volume":"58","year":"2007","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"5711","key":"key2020092114361238800_ref034","doi-asserted-by":"crossref","first-page":"854","DOI":"10.1126\/science.1107576","article-title":"Forbidden knowledge","volume":"307","year":"2005","journal-title":"Science"},{"issue":"3","key":"key2020092114361238800_ref035","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1111\/j.1573-7861.2011.01259.x","article-title":"Forbidden knowledge: public controversy and the production of nonknowledge","volume":"26","year":"2011","journal-title":"Sociological Forum"},{"issue":"2","key":"key2020092114361238800_ref036","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1177\/0170840613515402","article-title":"Theorizing and researching the dark side of organization","volume":"35","year":"2014","journal-title":"Organization Studies"},{"key":"key2020092114361238800_ref037","volume-title":"Hidden Knowledge: Organized Labor in the Information Age","year":"2003"},{"issue":"5","key":"key2020092114361238800_ref038","doi-asserted-by":"crossref","first-page":"570","DOI":"10.1108\/00220410610688723","article-title":"Information literacy landscapes: an emerging picture","volume":"62","year":"2006","journal-title":"Journal of Documentation"},{"key":"key2020092114361238800_ref060","article-title":"Information literacy landscapes: information literacy in education, workplace and everyday contexts","year":"2010"},{"issue":"2","key":"key2020092114361238800_ref039","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.lisr.2013.10.006","article-title":"Following the red thread of information in information literacy research: recovering local knowledge through interview to the double","volume":"36","year":"2014","journal-title":"Library and Information Science Research"},{"issue":"1","key":"key2020092114361238800_ref040","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1108\/JD-03-2016-0032","article-title":"Researching fractured (information) landscapes: implications for library and information science researchers undertaking research with refugees and forced migration studies","volume":"73","year":"2017","journal-title":"Journal of Documentation"},{"key":"key2020092114361238800_ref041","unstructured":"Lyell, L. (1996), \u201cChemical and biological weapons: the poor man's bomb\u201d, available at: https:\/\/fas.org\/irp\/threat\/an253stc.htm (accessed 4 April 2020)."},{"issue":"5","key":"key2020092114361238800_ref042","doi-asserted-by":"crossref","first-page":"1104","DOI":"10.1108\/JD-10-2017-0142","article-title":"Exploring the everyday life information needs and the socio-cultural adaptation barriers of Syrian refugees in Scotland","volume":"74","year":"2018","journal-title":"Journal of Documentation"},{"key":"key2020092114361238800_ref043","volume-title":"Dark Money: The Hidden History of the Billionaires behind the Rise of the Radical Right","year":"2017"},{"key":"key2020092114361238800_ref044","volume-title":"The Tacit Dimension","year":"1966"},{"key":"key2020092114361238800_ref045","volume-title":"The Anarchist Cookbook","year":"1971"},{"key":"key2020092114361238800_ref046","volume-title":"Implicit Learning and Tacit Knowledge: An Essay on the Cognitive Unconscious","year":"1995"},{"issue":"2","key":"key2020092114361238800_ref047","doi-asserted-by":"crossref","first-page":"264","DOI":"10.5840\/monist199679214","article-title":"Frankensteinian knowledge?","volume":"79","year":"1996","journal-title":"The Monist"},{"key":"key2020092114361238800_ref048","volume-title":"Forbidden Knowledge: From Prometheus to Pornography","year":"1996"},{"key":"key2020092114361238800_ref049","volume-title":"The Shipman Inquiry","year":"2004"},{"key":"key2020092114361238800_ref050","unstructured":"Smith, David Livingstone (2018) \u201cDark knowledge?\u201d, available at: https:\/\/www.philosophytalk.org\/blog\/dark-knowledge (accessed 12 October 2019)."},{"key":"key2020092114361238800_ref051","unstructured":"Stadtwald, M. (2016), \u201cGandalf and guardini: a fresh look at the theology of J.R.R. Tolkein's the lord of the rings\u201d, available at: https:\/\/digitalcommons.augustana.edu\/celebrationoflearning\/2016\/presentations\/13 (accessed 18 January 2020)."},{"issue":"2","key":"key2020092114361238800_ref052","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1080\/21670811.2017.1360143","article-title":"Defining \u2018fake news\u2019: a typology of scholarly definitions","volume":"6","year":"2018","journal-title":"Digital journalism"},{"key":"key2020092114361238800_ref053","volume-title":"Western Esotericism: A Brief History of Secret Knowledge","year":"2016"},{"key":"key2020092114361238800_ref054","article-title":"Meet the renegades of the intellectual dark web","year":"2018"},{"key":"key2020092114361238800_ref055","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1007\/BF00384525","article-title":"The ethics of insider trading","volume":"8","year":"1989","journal-title":"Journal of Business Ethics"},{"key":"key2020092114361238800_ref056","volume-title":"Spycraft Secrets: An Espionage A-Z","year":"2016"},{"key":"key2020092114361238800_ref057","unstructured":"Wood, D.M. (2007), \u201cBeyond the panopticon? Foucault and surveillance studies\u201d, in Elden, S. (Ed.), Space, Knowledge and Power: Foucault and Geography, Routledge, Milton Park, pp. 245-263."},{"issue":"4","key":"key2020092114361238800_ref058","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1002\/asi.20508","article-title":"Conceptual approaches for defining data, information, and knowledge","volume":"58","year":"2007","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"key2020092114361238800_ref059","volume-title":"The Knowledge-Creating Company","year":"1995"}],"container-title":["Journal of Documentation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JD-12-2019-0234\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JD-12-2019-0234\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:35:37Z","timestamp":1753396537000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jd\/article\/76\/6\/1341-1358\/205035"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,19]]},"references-count":60,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,6,19]]}},"alternative-id":["10.1108\/JD-12-2019-0234"],"URL":"https:\/\/doi.org\/10.1108\/jd-12-2019-0234","relation":{},"ISSN":["0022-0418"],"issn-type":[{"value":"0022-0418","type":"print"}],"subject":[],"published":{"date-parts":[[2020,6,19]]}}}