首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 25 毫秒
1.
Access to government records is increasingly shifting to a nether world-governed neither by the FOIA and the Privacy Act, nor by an executive order on classification. Instead, new categories of records, labeled “sensitive but unclassified,” “for official use only,” or “critical infrastructure information,” are being created in a variety of agencies, and are governed by agency regulations. Statutory authority is found in a number of separate laws, such as the Homeland Security Act and the Aviation and Transportation Security Act. These categories can be assigned by agency officials, contractors, or those in the private sector who originated the records; many records categorized this way are not subject to appeal or review by agencies or the courts, or to any automatic “declassification” process that has applied to documents withheld under the FOIA or subject to classification. Trends toward increased secrecy at all levels of government have become sufficiently alarming that individuals across the political spectrum have begun to speak out, and members of the access community (e.g., newspaper editors and public interest groups) have formed coalitions to focus debate on the need to rethink the balance of access with privacy and records protection, and to lobby actively for reinstatement of principles of access that have governed records policy for the past 35 years.  相似文献   

2.
Somewhere in the vicinity of 80 percent of all governmental information has some “geographic” element, and the vast majority is called “geospatial” because of the nature of describing spatial phenomena of the earth. Geospatial information has been increasing steadily in popularity and use since the advent of geographic information systems in the 1960s. From the early 1990s until the present, research libraries have seen an increase in the availability of geospatial information, and they have also seen a substantial change in the services provided to support the needs of clients seeking that information. However, recent events have altered the “access landscape.” September 11, 2001, and subsequent events, caused many policy shifts to take place as to how, or whether, access to governmental geospatial information should be granted. This paper explores those policy developments with the goal of prognosticating on the future of access to governmental geospatial information.  相似文献   

3.
The changes in the global information landscape, as epitomized by the reaction of governments to the 9/11 attacks, resulted in legislation, policy, and the formation of agencies that have affected many issues related to information and its use. This article examines the recent multiplicity of challenges that affect citizens' control and use of information. In the name of the war on terror, greater national security, and globalization trends, information laws, and policies often go further than is necessary and impact on the information rights of citizens. In this article, we advocate for bringing together what are at times disparate information issues under one label, namely, “information rights” (which include privacy, freedom of expression, access, etc.). Information rights are apprehended from a user-centered perspective (i.e., users as citizens, not just consumers). They cover many different aspects of the information life cycle and the roles and responsibilities of individuals and communities. Such an approach provides an alternative way of framing current information issues as they relate to national security policies and civil liberties in the broader sense.  相似文献   

4.
Although considerable attention has been focused on information users in recent years, little phenomenographic research into the word “information” has been conducted, perhaps because cursory consideration may suggest that work of this type is less useful than explorations of areas such as information-seeking. The lack of an established methodological framework discourages inquiry and, if understandings of the term are unique to each individual, there seems little scope to develop even broad principles for practice. Nevertheless, phenomenographic research helps professionals to learn how far users’ attitudes to the term “information” are consistent with their own and can reduce confusion between information providers and their clientele. Despite the absence of an accepted framework, several individual techniques are available. Ultimately, the research findings may prove highly instructive. They may, for example, influence the use of the word “information” by professionals when they interact with clients, whilst also offering insights into information behavior and information worlds.  相似文献   

5.
As security and safety requirements were not considered during the creation of networks, there is a growing number of threats for individuals, enterprises, government agencies and organizations. This paper reviews these threats and the difficulties of dealing with them now. The Internet, as a consequence, is hardly adequate for processing sensitive information, because it can be protected neither by technology nor by law. In this situation, future “information societies” will be more risk-oriented than today: individual rights will be less significant and traditional legal instruments will need to be adapted to different sets of values.  相似文献   

6.
Design-based research for LIS   总被引:2,自引:0,他引:2  
Design-based research is a methodology emerging from the field of education that may hold potential for research in library and information science (LIS). Based upon the assumption that learning is situated in a real-world context, design-based research combines research, design, and practice into one process. It results in usable products that are supported by a theoretical framework. While definitional and methodological issues do exist, the method holds some promise for research into “user-centered” information systems and services. In the field of LIS, design-based research might contribute to our understanding of how people find, choose, understand, and use information in context. The method is also of interest to professionals concerned with “evidence-based practice.” This article will first explain and describe the method as it has been used in the allied field of education. Issues related to definition and methodology will be explored, as well as some of the solutions that have been proposed. The method will then be related to LIS, using the bonded design work of Large, Nesset, Beheshti, and Bowler [Large, A., Nesset, V., Beheshti, J., & Bowler, L. (2006a). Bonded design: a methodology for designing with children. In S. Kurniawan & P. Saphiris (Eds.), Advances in Universal Web Design and Evaluation: Research, Trends and Opportunities. London: Idea Group., Large, A., Nesset, V., Beheshti, J., & Bowler, L. (2006b). “Bonded design”: a novel approach to intergenerational information technology design. Library and Information Science Research, 28, 64–82] as a case study to demonstrate the applicability of design-based research to LIS inquiry.  相似文献   

7.
Emergency Management Agencies (EMAs) in the U.S. operate at federal, state, and local levels, each with a common purpose “to prepare for, prevent, respond to, recover from, and mitigate the effects of incidents” (Homeland Security, 2008). As Homeland Security (2008) explains, local EMAs (LEMAs) lay the groundwork for prevention and other activities, coordinating with nearby LEMAs and local entities, including private and non-governmental organizations. LEMAs have been studied little; most research on online LEMAs and State Emergency Management Agencies (SEMAs) has been limited to website content, providing an incomplete picture of how they provide online service to the public. Bertot & Jager argue that functionality, usability, and accessibility are critical elements in evaluating e-government, noting that if users cannot get to or find the content, the content becomes irrelevant. This study contributes to addressing this gap by evaluating Alabama LEMA websites, based on a combination of content rubrics used in prior EMA studies and usability heuristics, factors that can affect user trust, and thus a site's usefulness. It also looks at how Alabama LEMAs are using social networking on their websites.  相似文献   

8.
Federal open records laws, executive orders on national security classification, and similar policy instruments in the states require that most records at government agencies be available to the public upon request—subject to exemptions which may entail review. Traditionally, this review has been accomplished by redaction (purging) of hardcopy. Resource limitations and increases in the number of requests demand a rethinking of the process. Offices are experimenting with optical scanning, onscreen purging, and online dissemination. Statutory and common law trends may soon require disclosure of database reports in electronic form, when so requested, rather than printouts. The dissemination of manipulable data of commercial value requires a rationale broader than the “citizenship rights” that justified the Freedom of Information Act. Online publication of agency-controlled records also demands careful planning of information systems and public networks. The issues discussed in this article are central to the establishment of an adequate policy for electronic freedom of information.  相似文献   

9.
Technology has transformed the way people live. Current day information seekers are empowered with multiple choices of information sources and libraries no longer remain the primary centre for information seekers. With diminishing time and geographical barriers the world has become a global village and information seekers are stressed with time constraints. It is the duty of library and information professionals to address these tech-savvy library users' needs and align their services to satisfy them.Recently, the author of this paper conducted a research study on the “Impact of technology on quality of services in technical and management libraries in Karnataka” sponsored by the Department of Scientific and Industrial Research (DSIR), Government of India, New Delhi. The study was approved in 2005 and the final report was submitted to the government in 2007. This paper carries some of the results of this research study conducted by the author in Karnataka state in Southern India.  相似文献   

10.
《数字图书馆安全管理指南》解读   总被引:1,自引:0,他引:1  
对数字图书馆安全及信息安全的概念进行辨析,指出数字图书馆安全本质上就是一个信息安全问题.通过对国内外数字图书馆安全问题的研究以及对信息安全相关标准体系的详细考察,并通过对ISO 15408、ISO13335、ISO 27000、GB 17859和GB 20269等信息安全领域几个重要的国际国内标准进行介绍,对<数字图书馆安全管理指南)的参考标准与指导思想进行说明,对指南的具体内容进行解读.图5.参考文献36.  相似文献   

11.
The paper deals with theoretical and practical challenges of the information society in the 21st century. In the first part an overview of past and current activities in the field of information ethics at UNESCO is provided (Virtual Forum, Second International Congress on Information Ethics, Observatory on the information Society). The second part presents a historical interpretation of the development of modern information society with the emerging networked world society with its characteristics of interactivity and decentralization. The diversity of moral norms and traditions within this global medium gives rise to the question concerning an Internet-morality as a challenge to ethical thinking. The third part deals with the question of our identity within the framework of a digital ontology. The concepts of “net” and “information” are analysed. A future information ethics is based on a digital ontology. Living in the information age is considered from the point of view of both an ethical imperative and the art of living.  相似文献   

12.
An attempt is made in this paper to gain an understanding of the current and potential impact of the new information and communication technologies (ICTs) on the Small Island Sates of the Caribbean, in particular those populations living in rural communities. The introduction briefly examines the impact of ICTs on society and calls for alternative channels for government to serve rural communities through the use of Multi-Community Access Centres (MCACs) or information kiosks available at libraries, police stations, tourist information centres and post offices, as an e-governance initiative in the creation of “smart communities” and as a grassroots effort. No analysis of ICTs on government's functions would be complete if we did not address the growing debate on the digital divide. In this paper a section is devoted to this and it summarily addresses the growing divide between the developed and the developing world and the potential of these islands to leap–frog barriers to information flows and access. The heart of the paper examines the impact of the Internet on small island economies and the growing use of the Internet in key sectors of each economy. Since this paper is about governments’ use of ICTs to transfer business transactions onto the Internet to service their populace, some discussion is undertaken and considers ways in which innovation has impacted on governments’ services and the early attempts by some Caribbean administrations to implement e-governance. E-Voices illustrates how certain government measures affect some vulnerable groups in society and ways in which they can broker power to participate in the process. Some key policy directions are proposed for Caribbean states and other developing countries to pursue.  相似文献   

13.
Large scale statewide library cooperation using information technology and wide area networks dates back to the early 1980s with efforts such as the Florida Center for Library Automation and, more recently, the LOUIS Project in Louisiana (see JAL January 1994) and OhioLink (see JAL September 1995). Early efforts were usually focused on the implementation of library information management systems and the provision of shared access to locally held collections, and they often still are. In the 1990s, though, we are witnessing a shift in statewide cooperative use of networks to provide principally access to bibliographic and full-text resources not held locally and usually provided by commercial vendors for use by libraries. As the case studies in this column illustrate the development of funding sources, the technical implementations and support, and the management organization differ from state to state. They reflect, though, the incremental shift in the information landscape towards “electronic libraries”. I choose the word incremental intentionally to reflect that this change has not (at least so far) been anywhere near as rapid or revolutionary as many expected. Nevertheless, what has happened in about 15 years is quite dramatic. It portends a different kind of academic library.—CBL, University of Maryland, College Park.  相似文献   

14.
According to a detailed analysis of modern global trends, the approaches to teaching cryptography and computer security are becoming more practical and actively draw on information from global networks and code-design methods. Security system architects must have deep expertise in programming methods, especially cryptographic algorithm programming procedures, and rapidly navigate in vast amounts of information in global networks using system-analysis methods.  相似文献   

15.
16.
A new model of information sharing practices in academic communities is based on Latour's circulatory system of scientific facts, and some elements of Foster's non-linear model of information-seeking behavior. The main proposition of this model is that information-sharing practices and context simultaneously shape each other. The proposed model supports Foster's conceptualization of information practices as non-linear processes, but its emphasis on the interdependence between context and information practices provides a more effective means to capture complex negotiations involved in information-sharing practices. The proposition is that the major reason for nonlinearity in information practices is a continuous shifting of actors' interests, pressures, and concerns. Capturing these dynamic relations becomes possible through this model. The model also offers a way to generate a number of research questions and hypotheses, and as such it could be a useful tool for empirical studies on information sharing in academic communities.  相似文献   

17.
毕琳 《图书情报工作》2012,56(5):143-144
对《数字图书馆信息安全管理》一书的主要内容进行评价,认为该书在深入对比分析一系列国际信息安全管理标准和规范的基础上,将在企业和政府机构广泛应用的ISO27000系列标准引入到数字图书馆信息安全管理领域,并从理论和实践上构建数字图书馆信息安全管理的理论体系和实践防范体系,对于认识和推动数字图书馆信息安全的研究与实践具有重要的指导意义。
  相似文献   

18.
在介绍云安全的基础上,结合图书馆网络信息系统特点,探讨了将云安全应用于图书馆网络系统安全的必要条件,并分析了应用云安全后给图书馆工作及服务带来的影响和优势。  相似文献   

19.
This is the first guest column for “Managing Technology”. We hope it typifies the central theme of challenges to managers presented by information technology and the lessons we may share from their application. This essay is of signal interest, appearing as it does at a watershed in library automation. We may expect a wholesale shift in the next several years from single machine integrated systems to distributed computing technologies and a client/server model. The five “lessons learned” in the Oklahoma State experience will be broadly applicable in the next wave of library automation.—C.B.L.  相似文献   

20.
Government secrecy has a long history in the American federal experience. Several kinds of government secrecy policy are reviewed here, beginning with their origins, or “policy depths,” and extending to their most recent expressions or “dimensions.” It is a rich history which, in this brief overview, is explored only in terms of its highlights, but offers, nonetheless, a roadmap for pursuing research in this area. It concludes with the observation that, in a democracy, representatives of the citizenry, whether elected or appointed, may momentarily cloak their decisionmaking and their policies in secrecy for the good of the nation—to protect it from enemies and to assure its survival. Those representatives must remember that the secrecy they impose is only momentary and that the shrouded decisions and policies they make, once made known to the citizenry, must be acceptable to them. The citizenry, in turn, accept such secrecy only in limited instances and on a momentary basis in order to have the confidence that their representatives are making decisions and policies acceptable to them. A government failing to honor these arrangements may well be regarded as one “not worth the cost of preservation.”  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号