首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 33 毫秒
1.
The founding fathers of the United States recognized that freely available information and an educated citizenry were essential to the functioning of a representative democracy. But almost as soon as the ink dried on the Constitution, political forces moved, and have continued to move, to restrict the flow of information from the government to the public, as well as among members of the public. This article examines whether information availability has become a victim of the war on terrorism – whether the nation has entered a time in which legal and policy initiatives are creating information gulags – secreting government information and restricting communications among members of the public, including the academic community. This article explores how policy is shaping the information relationship among the government, the public, academia, and the media and whether new models may be appropriate and more beneficial to society. In doing so, we examine in depth not only public access to government information but also the emerging and vital issue of government restrictions on scholarly exchange, as most recently presented by the legal dispute between the Institute of Electrical and Electronic Engineers (IEEE) and the Office of Foreign Asset Control (OFAC), Department of Treasury, and subsequently the litigation brought by the Association of American University Presses (AAUP).  相似文献   

2.
Somewhere in the vicinity of 80 percent of all governmental information has some “geographic” element, and the vast majority is called “geospatial” because of the nature of describing spatial phenomena of the earth. Geospatial information has been increasing steadily in popularity and use since the advent of geographic information systems in the 1960s. From the early 1990s until the present, research libraries have seen an increase in the availability of geospatial information, and they have also seen a substantial change in the services provided to support the needs of clients seeking that information. However, recent events have altered the “access landscape.” September 11, 2001, and subsequent events, caused many policy shifts to take place as to how, or whether, access to governmental geospatial information should be granted. This paper explores those policy developments with the goal of prognosticating on the future of access to governmental geospatial information.  相似文献   

3.
In modern society, we see the struggle to balance the proper functioning of government with the interests and rights of the people to access government information playing out all around us. This paper explores the relationship between liberty and security implicated by government surveillance and citizen-initiated efforts to cast the gaze back at the government (so-called “reciprocal surveillance”). In particular, this paper explores how a neorepublican conception of political liberty, defined as the absence of the possibility of domination, can inform future information policy research in this area. The paper concludes that, to be fully non-dominating, government must respect and provide effective institutional and legal mechanisms for their citizenry to effectuate self-government and command noninterference. Establishing liberal access rights to information about government conduct and mechanisms that ensure that citizens can effectively command noninterference are justified on the grounds that they reduce the possibility of arbitrary, and actual, interference with the right of the people govern themselves.  相似文献   

4.
Government agencies are directed to communicate objective and scientific information to the public, but studies show that political ideology may play a role in how much information governments provide. In this paper I argue that the ideology of a head administrator, and its alignment with agency mission, can restrict the kinds of information that government agencies provide, which may or may not amount to a type of regulatory capture. This impact may also be moderated by the specific media in which the communication takes place. I explore this theory via a case study of the United States Environmental Protection Agency online communication over a period of 32 months, during the years of 2013–2014, under the Democratic Administrator Gina McCarthy, and 2017–2018, under the Republican Administrator Scott Pruitt, via topical terms and document analyses of Twitter posts and web news releases. The information—topics, policies and issues—remain largely consistent across administrations and media channels, but notable distinctions are observed that point to the political ideologies of administrators in office, including a restriction of relevant scientific information on climate change during the misaligned administrator. Moreover, results show differences across media types which may reflect speed and popularity affordances of Twitter compared to website communication. I conclude by discussing the importance of policies to protect against ideological partisanship, and how social media may be better used as tools in government information policy and online communication.  相似文献   

5.
An attempt is made in this paper to gain an understanding of the current and potential impact of the new information and communication technologies (ICTs) on the Small Island Sates of the Caribbean, in particular those populations living in rural communities. The introduction briefly examines the impact of ICTs on society and calls for alternative channels for government to serve rural communities through the use of Multi-Community Access Centres (MCACs) or information kiosks available at libraries, police stations, tourist information centres and post offices, as an e-governance initiative in the creation of “smart communities” and as a grassroots effort. No analysis of ICTs on government's functions would be complete if we did not address the growing debate on the digital divide. In this paper a section is devoted to this and it summarily addresses the growing divide between the developed and the developing world and the potential of these islands to leap–frog barriers to information flows and access. The heart of the paper examines the impact of the Internet on small island economies and the growing use of the Internet in key sectors of each economy. Since this paper is about governments’ use of ICTs to transfer business transactions onto the Internet to service their populace, some discussion is undertaken and considers ways in which innovation has impacted on governments’ services and the early attempts by some Caribbean administrations to implement e-governance. E-Voices illustrates how certain government measures affect some vulnerable groups in society and ways in which they can broker power to participate in the process. Some key policy directions are proposed for Caribbean states and other developing countries to pursue.  相似文献   

6.
Access to government records is increasingly shifting to a nether world-governed neither by the FOIA and the Privacy Act, nor by an executive order on classification. Instead, new categories of records, labeled “sensitive but unclassified,” “for official use only,” or “critical infrastructure information,” are being created in a variety of agencies, and are governed by agency regulations. Statutory authority is found in a number of separate laws, such as the Homeland Security Act and the Aviation and Transportation Security Act. These categories can be assigned by agency officials, contractors, or those in the private sector who originated the records; many records categorized this way are not subject to appeal or review by agencies or the courts, or to any automatic “declassification” process that has applied to documents withheld under the FOIA or subject to classification. Trends toward increased secrecy at all levels of government have become sufficiently alarming that individuals across the political spectrum have begun to speak out, and members of the access community (e.g., newspaper editors and public interest groups) have formed coalitions to focus debate on the need to rethink the balance of access with privacy and records protection, and to lobby actively for reinstatement of principles of access that have governed records policy for the past 35 years.  相似文献   

7.
This article examines how information service providers, particularly libraries, may assist effectively in meeting the information needs of immigrants. In order to understand information practices of immigrants and cater to their needs, a holistic approach is advocated that encompasses a closer examination of theories and principles of social inclusion and social capital in addition to information seeking behavior. Only through this holistic overview can one apprehend the role that information plays in the world of immigrants at various stages of their integration into their adopted society. The issues raised have implications for frontline information providers as well as for policy makers interested in programs, policies, and funding priorities concerning information provision and access strategies that enable social inclusion of newcomers and longer established immigrants into the social fabric of Canada.  相似文献   

8.
The changes in the global information landscape, as epitomized by the reaction of governments to the 9/11 attacks, resulted in legislation, policy, and the formation of agencies that have affected many issues related to information and its use. This article examines the recent multiplicity of challenges that affect citizens' control and use of information. In the name of the war on terror, greater national security, and globalization trends, information laws, and policies often go further than is necessary and impact on the information rights of citizens. In this article, we advocate for bringing together what are at times disparate information issues under one label, namely, “information rights” (which include privacy, freedom of expression, access, etc.). Information rights are apprehended from a user-centered perspective (i.e., users as citizens, not just consumers). They cover many different aspects of the information life cycle and the roles and responsibilities of individuals and communities. Such an approach provides an alternative way of framing current information issues as they relate to national security policies and civil liberties in the broader sense.  相似文献   

9.
Information policy research is a critical tool in the arsenal of library and information science researchers. As developments occur in information access, use, technology, and management, information policies require more attention and research. The article describes the nature of government information policy and policy research, characteristics of policy research, and examples of research methods and approaches that can be used. The differences between textbook-based policy research and how policy research might be implemented in action are also discussed, as are the inter-connectedness of information policies and ways to describe impacts of information policies. The article recommends that researchers and professionals give greater education, training, and professional association attention to using policy research on a day-to-day basis.  相似文献   

10.
Libraries have always been places where individuals feel free to explore new ideas and seek out information in the pursuit of creative and intellectual growth. Fear of exposure or surveillance could threaten an individual's inclination to search for and access information. Understandably then, privacy is understood to be a core professional responsibility of librarians. This study builds on a national report and a qualitative study, completed in the United States, which explored librarians' attitudes on privacy. Adding a Canadian voice to the literature, this study examines survey results from academic librarians in Canada on their perceptions and attitudes related to library practices and online privacy behaviors. Overall, Canadian academic librarians believe that protecting patron privacy and educating patrons about issues related to online privacy is important. However, many Canadian academic librarians doubt that libraries are doing all they can to protect patron privacy. Academic librarians stand to gain knowledge and understanding of peer attitudes toward online privacy, as well as how patron privacy is being advocated for and protected on university campuses across Canada. The results will guide future library policies and programming aimed at creating an environment where privacy rights are protected and patrons can make informed choices about their online actions.  相似文献   

11.
In the era of big data, data creates new added value by collecting, analyzing, and transforming the thoughts and actions of economic members and creating insights that can predict the future. This means that in the near future, data-driven decisions based on data, rather than subjectivity or experience, will be the driving force behind society.However, since valuable and useful data is bound to be generated from personal information, how to safely utilize personal information is becoming an important topic in the big data era. To protect personal information in this environment, data services and database providers have increased their focus on the implementation of de-identification, a technique that can protect personal information while maintaining the usefulness of the data. Moreover, many countries have introduced new policies and laws focusing on the de-identification of personal information.Accordingly, this paper compares and analyzes how the European Union, the United States, Japan, and South Korea have recently adopted the concept of de-identification in their own personal information protection laws, and presents common trends and implications. As a comparative framework, each country's conceptual classification system related to de-identification, legal treatment, data controller obligations, and de-identification procedures was included.This study identifies the shifts made in each country's regulatory system following the introduction of the concept of de-identification. These include a shift from a binary approach to an approach that considers the identifiability spectrum, from a belief in anonymization to regulation from a risk management perspective, and from a focus on de-identification methods, to responsibility for follow-up management.This study contributes to the establishment of specialized knowledge of de-identification practices by empirically examining the current status of de-identification information-related legal systems adopted by major countries/regions. Also, the study proved the actualization of theory by confirming that the de-identification policy approach from the perspective of risk management is actually applied to the laws of each country. In addition, the attempt to present a framework for systematic comparison of de-identification systems by country provides a new perspective that can trace the trend of future de-identification system changes on a consistent basis. In addition, this study brings the gradual expansion of data policy research by expanding the research on de-identified information, which has been studied mainly in Europe and the United States, to case studies in Japan and South Korea.  相似文献   

12.
Obtaining consumer data has become an essential practice of Web proprietors. This is because, compared with ‘brick and mortar’ retail stores, it is much more difficult for Web proprietors to build one-on-one or face-to-face relationships with customers. The collection of personal information online boosts customized services for consumers, but at the same time it increases concerns about privacy infringement. Using a content analysis of the most visited Web sites in Korea and the United States, this study compares the amount and breadth of information requested by Web proprietors and examines the relationship between the information requests and privacy policies of Web sites. This study found that Korea-based Web sites present stronger privacy policies than do US-based Web sites. Ironically, they also request a greater amount and variety of information from consumers than do US-based Web sites during registration processes. When narrowing the focus to US sites only, this study also revealed that the stronger the privacy policies presented by US Web sites, the more information the US Web sites request from consumers.  相似文献   

13.
国外图书馆弱势群体服务制度略探   总被引:1,自引:0,他引:1  
郝建南 《图书馆》2011,(4):89-92
随着时代的发展,许多国家(特别是发达国家)和国际组织制定了政策法规,以保障信息弱势群体自由获取信息的权利。本文概述了国际图联和联合国教科文组织、美国、澳大利亚以及其他部分国家关于图书馆弱势群体服务的相关政策法规,以为相关政策法规不完善的国家提供参考。  相似文献   

14.
This paper examines how Constitutional principles, specifically the doctrines of Federalism and the separation of powers, relate to E-government policies and practices. Federalism and the separation of powers are essential elements of the Constitution and instrumental parts of the foundation of the government of the United States. This paper suggests that the move toward E-government, emphasizing the simplification of access to and the horizontal and vertical integration of government information and services, must be considered with regard to the doctrines of Federalism and the separation of powers. Finally, this paper offers recommendations of ways in which E-government can be implemented to minimize potential Constitutional problems by suggesting concepts that should be a part of all Federal E-government laws, guidelines, and policies.  相似文献   

15.
This article provides an overview and summary of selected issues related to the development of universal service to networked information resources and services in a global networked environment. Complex issues have yet to be addressed regarding basic concerns such as defining the term “universal service” as it suggests a range of meanings and uses given different societal contexts. The model for universal service being developed in the United States offers some lessons and concerns for other nations attempting to promote universal service as a national policy. The article concludes with a number of recommendations that address selected policy issues related to universal service in a global networked environment.  相似文献   

16.
This paper assesses the ways in which local actors are reconfiguring public access to broadband through the unlicensed spectrum. The process of adoption and configuration of public Wi-Fi networks in Austin, Texas, is the focus of our case study. Austin is one of the most “unwired” cities in the United States and increasingly known as a world-class industrial center in wireless. The development of strategic visions about public Wi-Fi services among user groups and local startups provided a fertile ground for diverse partnerships among nonprofit groups, broadband providers, wireless ISPs, and the city government. We also found that the popularity of the venue-sponsored or free-to-end-user model of access is supported by different providers that see their interests represented in the growth of public wireless broadband. However, the prevailing model of public Wi-Fi has a strong commercial bias. This, combined with the historical socioeconomic divides in the city, has resulted in an uneven geography of public Wi-Fi networks.  相似文献   

17.
18.
Chinese leaders have attempted to alleviate international anxiety about its rise to global prominence describing its development as a ‘peaceful rise’ or ‘peaceful development’. Most recently, Chinese leaders have begun deploying a new term, the ‘New Style of Great Power Relations’ (新型大国关系). The purpose of this study is to examine the treatment of the ‘New Style of Great Power Relations’ as a political slogan within the Chinese media as a means to shape a geopolitical worldview among Chinese citizens and international actors. Researchers identified 541 articles from 25 different Chinese media sources selected to represent varying levels of government influence and editorial perspectives. This study found the concept primarily intended to engage the United States by stressing cooperative aspects of U.S.–China relations, but also challenges specific U.S. actions. Those U.S. policies challenged within the Chinese media are portrayed as inconsistent with the ‘new style’ concept’s principles. This forms a ‘rhetorical trap’, as it were for the United States, in that the framing of the discourse implicates U.S. intentions and policies as disingenuous unless the United States changes its policy stances. The essay examines the implications of the discourse for understanding Chinese political communication.  相似文献   

19.
This paper examines the difficulties encountered by Biowatch, a South African civil society environmental organization, in its attempts to obtain access to government information in respect of genetically engineered plants. After establishing the context of South Africa's access to information regime, including a brief discussion of several of its weaknesses, the paper engages in an extended account of the Biowatch case as an exemplar of some of the more pronounced challenges to the effective implementation of the country's access to information legislation. The elaboration of the case is based on interviews conducted with the Director of Biowatch and counsel from the Legal Resources Centre that aided Biowatch, as well as various internal and court documents provided by Biowatch and its lawyers.  相似文献   

20.
当代中国农民的信息获取机会——结构分析及其局限   总被引:3,自引:2,他引:1  
本文以已有研究揭示的农村居民信息劣势以及现有理论对这一劣势的解释局限为背景,试图通过对我国农民信息获取机会的跨历史时期(历时性)和跨领域考察,发展现有信息不平等理论。按照结构分析的思路,本文以相关历史研究成果、统计资料和政策文本为依据,考察了新中国成立以来,农民信息获取机会的变化及其与已知的结构性因素的关联,显示了已知结构性因素无法解释的变化和差异。研究发现,现有理论可以解释城乡在可比指标上的差距,但很难解释农村不同信息设施/服务/资源间的内部差异及时间序列上的变异;要理解这些差异,需要把国家及其构建的权力关系和市场架构作为影响农民信息获取机会的核心因素。本研究根据这一发现并借鉴O'Connar的新国家理论重新阐释了我国农民的信息劣势。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号