Knowledge

Information policy

Source πŸ“

227:. Various officials from all over the world have expressed an interest in forcing social networks to install and utilize monitoring systems to determine if users are illegally obtaining copyrighted material. For example, if implemented, these filters could prevent the illegal sharing of music over social networking platforms. The convergence of search engines and social networks could make this process even easier. Search engines such as Google, Yahoo, and Bing have begun to merge with social media platforms to link Internet searches to your social networking sites such as Facebook. This poses an even greater threat to users since their Internet searches can be monitored via their social networks. 103:(Daniel Bell, The Coming of Post-Industrial Society, 1973, p. 37). While all societies have been to some extent based on information, information societies are almost wholly dependent on computerized information. As Marc Uri Porat, the first researcher to use the term "information policy", wrote: "The foundation of the information economy, our new central fact, is the computer. Its ability to manipulate and process information represents a profound departure from our modest human abilities". The computer's combination with telecommunications, he continued, posed "the policy problems of the future". (Marc Uri Porat, The Information Economy, 1976, p. 205.) 116:
information goes through beginning with its creation, through its collection, organization, dissemination, and finally to its destruction. On the other hand, in the context of public administration, information policy is the means by which government employees, institutions, and information systems adapt themselves to an environment in rapid fluctuation and use information for decision-making (e.g., Andersen and Dawes, 1991; also see Bozeman and Bretschneider, 1986, and Stevens and McGowan, 1985). One can see how these two contexts offer varying scopes for the phrase β€œ information policy.”
112:
establishes the conditions β€œunder which all other decision making, public discourse, and political activity occur.” The growing awareness in the importance of information policy has sparked an interest in various groups to further study and analyze its magnitude. The most common audience for information policy analysis includes undergraduate and graduate students, scholars, policymakers, policy analysts, as well as those members of the public who have taken an interest in understanding the effects of the laws and regulations involving information.
344:
communication-based relationships specifically regarding the internet. These relations will need to be slowly and consistently established in order to truly unify any kind of information policy and decision-making. If information policy can be established and guided on a semi-national level, the degree of communication and cooperation throughout the world will increase dramatically. As information policy continues to shape many aspects of society, these international relations will become vital (Harpham, 2011).
267:
the public, protecting the privacy and confidentiality of personal and sensitive information, and making informed decisions on which information should be disseminated and how to distribute it effectively, among others. Although the government plays an active role in information policy, the analysis of information policy should not only include the formal decision making processes by government entities, but also the formal and informal decisions of both the private and public sector of governance.
258:(DNS) ensure computers and devices can correctly connect to the Internet and can communicate effectively globally. If regulation of these crucial elements of the Internet such as TCP/IP and DNS were governed by disparate principles, the Internet would no longer exist as it does today. Networks, computers, and peripherals would not be able to communicate and have the same accessibility if these foundational elements varied. 202:
Also, issues that information tends to be influenced by organization's culture that result in complexity of information flow. Moreover, the concern about valuing information is discussed by Orna, the fact that value of information is dependent on the user, and it can't be measured by price. Considering that information is an asset or intellectual capital that becomes valuable when it is used in productive ways.
25: 211:
need for expansion into new markets due to competition and technological advances that have created a threat of new entrants into various segments of the value chain. As a result, previously disparate technologies interact with one other synergistically to deliver information in new and unique ways and allow for inventive solutions to be developed.
243:
broad component of Internet governance, additionally, there are more narrow elements to the definition that are often overlooked. Internet governance also encompasses the regulation of Internet infrastructure and the processes, systems, and institutions that regulate the fundamental systems that determine the capabilities of the Internet.
127:, law, and public policy. Thus, its scope may differ when each of these disciplines analyses or uses it. The information sciences may be more concerned with technical advances and how this impacts information policy, while from a law perspective, issues such as privacy rights and intellectual property may be of greatest focus. 348:
that, marginal costs are relatively low (MacInnes, 2011). As an increase from the information services, information can be paralleled to that of manufacturing several years ago (UCLA, 2009). The digitalization of information allows businesses to make better justified business decisions (MacInnes, 2011).
275:
A persistent debate concerning the government role in information policy is the separation of security and freedom of information. Legislation such as the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USAPATRIOT or USAPA) Act of 2001 is
246:
Architecture is the foundation of the Internet. The fundamental goal of the Internet architecture is to essentially create a network of networks by interconnecting various computer network systems globally. Protocols such as TCP/IP as well as other network protocols serve as the rules and conventions
210:
Convergence essentially combines all forms of media, telecommunications, broadcasting, and computing by the use of a single technology: digital computers. It integrates diverse technological systems in the hopes of improving performance of similar tasks. Convergence is thought to be the result of the
201:
There are some issues around organizational information policies, which are the interaction between human beings and technology for using information, the issue to proceed information policy itself, whether top-down or middle-up-down, is the best way to approach information policy in an organization.
331:
In regard to the future of information policy, it should be flexible and changing to different circumstances as the ability to access, store, and share information grows. Galvin suggests that information policy might include setting a boundary to the uncertainty in this field. As information policy
266:
Like with any policy, there needs to be an agent to govern and regulate it. With information policy in a broader sense, the government has several roles and responsibilities. Some examples include providing accurate information, producing and maintaining information that meets the specific needs of
111:
Information policy became a prominent field of study during the latter half of the 20th century as the shift from an industrial to an information society transpired. It has since then evolved from being seen as relatively unimportant to having a much more overarching strategic significance since it
214:
Nearly every innovative trend in the social industry involves adding data or layers of connectivity. Social networking sites have begun interacting with e-mail functionalities, search engines have begun integrating Internet searches with Facebook data, Twitter along with various other social media
242:
Internet governance has both narrow and broad definitions, thus, making it a complex concept to understand. When most people think of Internet governance, they think of the regulations of the content and conduct that are communicated and acted on through the Internet. Although this is certainly a
102:
Information policy is the central problem for information societies. As nations make the transition from industrialism to post-industrialism, information issues become increasingly critical. According to sociologist Daniel Bell, "what counts now is not raw muscle power or energy but information"
347:
Information policy is playing a greater role in the economy leading to the production of goods and services, as well as selling them directly to consumers (UCLA, 2009). The cost of information varies from a tangible good in that initial costs of the first unit are large and fixed; however, after
306:
Classification: The tool demonstrates a wide range of issues and subjects on information policy. It helps research to understand the breadth of the subject. The published materials are reasonably well documented and described. It is also good for start-up literature review and research purposes.
290:
The USAPA was passed in October 2001, not long after 9/11 and without much contention from congress. Civil liberties advocates argue that the changes made to the standing surveillance laws were done in an abrupt manner and without consideration to basic rights as outlined in the US constitution,
167:
The types of information policy can be separated into two different categories. It can be discussed in the short-term focus exclusively on information science. It can also have a much broader context in relation to different subjects and be within a larger time period, for example dating back to
135:
The earliest sight of information policy was present around the mid-1900s. The stages to begin evolving from an industrial society to an information society sparked several other transformations. The common industrial technologies were beginning to be replaced by informational meta-technologies.
115:
Although information policy generally has a broader definition and encapsulates a multitude of components, its scope and impact can vary depending on the context. For example, in the context of an information lifecycle, information policy refers to the laws and policies that deal with the stages
310:
Identification of policy issues and options: This tool relies on inputs for information; for example, interviews and questionnaires targeting policy makers and other stakeholders. It is a commonly used in the studies of on-the-job policy makers in government or industry (Moore and Steele, 1991;
171:
The obvious reason for the need of information policy deals with the legal issues that can be associated with the advancement of technology. More precisely,β€”the digitization of the cultural content made the cost of the copy decreasing to nearly zero and increased the illegal exchange of files,
314:
Reductionism: The reductionist approach control factors to reduce ambiguity. The factors include constraining data collection, analysis and interpretation within the framework of a specific discipline. It helps researchers to notice how a specific factor relates to the overall environment.
139:
By the 1970s, the concept of national information policy was created to protect the data and information that was used in creating public policies. The earliest adopters of information policy included the United States, Australia, as well as several European countries who all recognized the
693:
Orna Elizabeth, Information Policies, yesterday, today and tomorrow, Journal of Information Science, 34 (4) 2008, pp 547–565, apud N.Moore and J steel, Information- Intensive Britain. British Library R & D report No. 6038 (The Policy Studies Institute/ British Library Board, London,
512:
Orna Elizabeth, Information Policies, yesterday, today and tomorrow, Journal of Information Science, 34 (4) 2008, pp 547-565, apud N. Moore and J. Steel, Information-Intensive Britain. British Library R & D report No. 6038 (The Policy Studies Institute/British Library Board, London,
332:
becomes a larger and more important topic, it will also become a greater subject to governmental regulation in regards to the future of technology as well. It will also include the studies of these subjects: information science, communications, library science, and technology studies.
343:
In order to achieve this national organization, it will be important to focus not only on a domestic level but also nationally. Making domestic agencies cooperate internationally (and vice versa) though, will not be overly successful. A single nation can take the lead in establishing
339:
nationally and in organization, influence people for paying attention to the socio aspect and socio-technical system, for securing preservation of digital content, bringing out information product, also respecting all users and making thinking time respectable.
234:. In order for a synergy such as this one to take place, regulatory convergence would need to be considered. Regulatory convergence is the merging of previously disparate industry-based laws and regulations into a single legal and regulatory framework. 99:, access management, and regulating how the dissemination of public information occurs. Certain categories of information are of particular importance for information policy. These include news information, health information, and census information. 700:
Weingarten, F.W. (1989) Federal Information Policy Development: The Congressional perspective. In C. McClure, P. Hernon and H. Relyea (eds), United States Government Information Policies: views and Perspectives (Ablex, Norwood,
401:
Weingarten, F.W. (1989) Federal Information Policy Development: The Congressional perspective. In C. McClure, P. Hernon and H. Relyea (eds), United States Government Information Policies: views and Perspectives (Ablex, Norwood,
218:
In 2012 a prominent issue arose that deals with the convergence of social media with copyright infringement monitoring systems. The growing interest in this topic can be largely attributed to the recent anti-piracy bills: the
176:
technologies, or off line (copy of hard disks). As a result, there are many grey areas between what users can and cannot do, and this creates the need for some sort of regulation. Today, this has led to the creation of SOPA
143:
Elizabeth Orna contributed to a paper on information policies by providing a brief history of the development of ideas surrounding national and organizational information policies, from the beginning when the
322:
Process-oriented research and cases studies: It provides detailed contextual analyses of particular events. It helps researcher to experience the policy process in semi-real situation and study its outcome.
254:) coordinate the various systems within the Internet on a global level to help preserve the operational stability of the Internet. For example, coordination of IP addresses and managing the 247:
by which computers can communicate with each other. Thus, TCP/IP is often viewed as the most important institution of Internet governance. It serves as the backbone to network connectivity.
91:
issues concerned with the use of information for democratization and commercialization of social life. These issues include, inter alia, digital environment, such as the digital divide,
136:
Organizations began changing their form, several new architectures of knowledge developed, and most importantly, the information economy replaced industrial and agricultural economies.
671:
Galvin, T.J. (1994). Rights in Conflict: public policy in an information age. In: New Worlds in Information and Documentation : Proceedings of the 46th FID Conference and Congress
645:
Galvin, T.J. (1994). Rights in Conflict: public policy in an information age. In: New Worlds in Information and Documentation : Proceedings of the 46th FID Conference and Congress
80:
is the set of all public laws, regulations and policies that encourage, discourage, or regulate the creation, use, storage, access, and communication and dissemination of
184:
1. for avoiding risks (financial losses from incomplete and uncoordinated exploitation of information, wasted time, failures of innovation, and reputation loss);
181:). Information policy will mark the boundaries needed to evaluate certain issues dealing with the creation, processing, exchange, access, and use of information. 668:
Cowhey, P. (1990). The International Telecommunications Regime: the Political Roots of Regimes for High Technology. International Organization, 44(2), 169-199.
215:
platforms have started to play a prominent role in the emergency management framework (mitigation, preparedness, response, and recovery) among several others.
84:. It thus encompasses any other decision-making practice with society-wide constitutive efforts that involve the flow of information and how it is processed. 292: 230:
The issue of converging social networks with piracy monitoring systems becomes controversial when it comes to protecting personal data and abiding by
469: 286:
Foreign Intelligence Surveillance Act (FISA) authorizes the government to carry out electronic surveillance against any person, including Americans.
697:
Rowlands, I. (1996). Understanding Information Policy : Concepts, Frameworks, and Research Tools, Journal of Information Science, 22(1) 13-25
357: 660: 434: 155:
In the 20th century, to cope with the privacy problems of databases, information policy evolved further safeguards. In the US, the federal
687:
Mason, Marilyn Gell. (1983). The federal role in library and information services. White Plains, N.Y.: Knowledge Industry Publishers Inc.
674:
Harpham, Bruce. "Net neutrality in the United States and the future of information policy." Faculty of Information Quarterly. 1.1 (2011).
450:
Mason, Marilyn Gell. (1983). The federal role in library and information services. White Plains, N.Y.: Knowledge Industry Publishers Inc.
276:
an example of security taking precedence over civil liberties. The USAPA affected several surveillance and privacy laws to include:
187:
2. for positive benefits, including negotiation and openness among those responsible for different aspects of information management
335:
The information policies will earn more advantages for national and organizational, such as getting the best from development of
372: 280:
Wire Tapping (Title III) which requires there be probable cause for real-time interception of voice and data communication.
690:
Nelson, R. (1995). Why Should Managers be Thinking About Technology Policy? Strategic Management Journal, 16(8), 581-588.
665:
Browne, M. (1997) The Field of Information Policy: 1. Fundamental Concepts, Journal of Information Science 23(4) 261-275
608:
Browne, M. (1997) The Field of Information Policy: 1. Fundamental Concepts, Journal of Information Science 23(4) 261-275
303:
The five broad methodological strands that Rowlands (1996) identified are current tools for information policy study:
283:
Electronic Communications Privacy Act(ECPA) regulates government access to email and other electronic communications.
64: 677:
Heim, Kathleen M. (1986) "National Information Policy and a Mandate for Oversight by the Information Professions."
499:
Heim, Kathleen M. (1986) "National Information Policy and a Mandate for Oversight by the Information Professions."
684:
Hill, M. W. (1995) Information Policies: premonitions and prospects. Journal of Information Science 21(4) 273-282.
459:
Hill, M. W. (1995) Information Policies: premonitions and prospects. Journal of Information Science 21(4) 273-282.
35: 476: 661:
https://web.archive.org/web/20120130072524/http://jip.vmhost.psu.edu/ojs/index.php/jip/article/view/19/14
173: 42: 704:
Bozeman and Bretschneider, (1986) Public and Private Information Systems by Bruce Rocheleau 2006.
431: 159:
provides individuals the right to inspect and correct personal information in federal datafiles.
721: 382: 220: 178: 731: 367: 92: 726: 120: 96: 95:, economic regulations, freedom of expression, confidentiality or privacy of information, 87:
There are several fundamental issues that comprise information policy. Most prominent are
8: 156: 377: 255: 119:
Information policy is in fact, a combination of several varying disciplines including
707:
John M. Stevens, Robert P. McGowan, (1985) Information systems and public management
659:
Braman, S. (2011). Defining information policy. Journal of Information Policy 1-5.
430:
Braman, S. (2011). Defining information policy. Journal of Information Policy 1-5.
438: 625: 41:
The references used may be made clearer with a different or consistent style of
250:
Organizations such as the Internet Corporation for Assigned Names and Numbers (
224: 145: 46: 152:
to present day. The history of information policy is reflected in this chart.
715: 316: 88: 231: 193:
4. ability to initiate change to take advantage of changing environments
149: 81: 319:. It helps in reducing uncertainties for a topic that is under studies. 190:
3. productive use of IT in supporting staff in their use of information
362: 124: 336: 295:
rights which protects against unreasonable search and seizure.
432:
http://jip.vmhost.psu.edu/ojs/index.php/jip/article/view/19/14
315:
Forecasting and scenario-building: The commonly used model is
140:
importance for a more standardized governance of information.
251: 168:
Roman civilization, the Bill of Rights, or the Constitution.
565: 563: 270: 426: 424: 422: 420: 418: 416: 414: 412: 410: 408: 577: 575: 560: 544: 542: 405: 713: 572: 539: 523: 521: 519: 148:Ministry of Information was established in the 358:Cyber Intelligence Sharing and Protection Act 298: 516: 65:Learn how and when to remove this message 620: 618: 616: 614: 162: 714: 237: 475:. Pantherfile.uwm.edu. Archived from 373:Foreign Intelligence Surveillance Act 16:Set of laws that regulate information 611: 18: 527:(Garcia-Murillo and MacInnes, 2002) 470:"University of Wisconsin-Milwaukee" 261: 13: 271:Security vs freedom of information 14: 743: 311:McIntosh, 1990; Rowlands, 1997). 172:online, via sharing web site or 23: 639: 602: 593: 584: 551: 679:Government Publications Review 530: 506: 501:Government Publications Review 493: 462: 453: 444: 395: 205: 1: 652: 326: 7: 351: 106: 10: 748: 299:Research methods and tools 130: 196: 388: 383:Stop Online Piracy Act 221:Stop Online Piracy Act 179:Stop Online Piracy Act 368:Executive Order 12333 93:intellectual property 163:Types and importance 97:information security 238:Internet governance 121:information science 569:Solum, 2008, p. 50 437:2012-01-30 at the 378:Social informatics 256:Domain Name System 78:Information policy 626:"USA PATRIOT Act" 599:(Solum, 2008, 48) 590:(Solum, 2008, 67) 581:(Solum, 2008, 68) 548:(Reisinger, 2012) 75: 74: 67: 739: 646: 643: 637: 636: 634: 632: 622: 609: 606: 600: 597: 591: 588: 582: 579: 570: 567: 558: 555: 549: 546: 537: 536:(Stanchak, 2010) 534: 528: 525: 514: 510: 504: 497: 491: 490: 488: 487: 481: 474: 466: 460: 457: 451: 448: 442: 428: 403: 399: 293:fourth amendment 262:Government roles 70: 63: 59: 56: 50: 27: 26: 19: 747: 746: 742: 741: 740: 738: 737: 736: 712: 711: 710: 655: 650: 649: 644: 640: 630: 628: 624: 623: 612: 607: 603: 598: 594: 589: 585: 580: 573: 568: 561: 556: 552: 547: 540: 535: 531: 526: 517: 511: 507: 498: 494: 485: 483: 479: 472: 468: 467: 463: 458: 454: 449: 445: 439:Wayback Machine 429: 406: 400: 396: 391: 354: 329: 317:STEEP framework 301: 273: 264: 240: 208: 199: 165: 150:First World War 133: 109: 71: 60: 54: 51: 40: 34:has an unclear 28: 24: 17: 12: 11: 5: 745: 735: 734: 729: 724: 709: 708: 705: 702: 698: 695: 691: 688: 685: 682: 675: 672: 669: 666: 663: 656: 654: 651: 648: 647: 638: 610: 601: 592: 583: 571: 559: 550: 538: 529: 515: 505: 492: 461: 452: 443: 404: 393: 392: 390: 387: 386: 385: 380: 375: 370: 365: 360: 353: 350: 328: 325: 300: 297: 288: 287: 284: 281: 272: 269: 263: 260: 239: 236: 225:PROTECT IP Act 207: 204: 198: 195: 164: 161: 146:United Kingdom 132: 129: 108: 105: 73: 72: 36:citation style 31: 29: 22: 15: 9: 6: 4: 3: 2: 744: 733: 730: 728: 725: 723: 722:Public policy 720: 719: 717: 706: 703: 699: 696: 692: 689: 686: 683: 680: 676: 673: 670: 667: 664: 662: 658: 657: 642: 627: 621: 619: 617: 615: 605: 596: 587: 578: 576: 566: 564: 557:(Houck, 2012) 554: 545: 543: 533: 524: 522: 520: 509: 502: 496: 482:on 2022-01-23 478: 471: 465: 456: 447: 440: 436: 433: 427: 425: 423: 421: 419: 417: 415: 413: 411: 409: 398: 394: 384: 381: 379: 376: 374: 371: 369: 366: 364: 361: 359: 356: 355: 349: 345: 341: 338: 333: 324: 320: 318: 312: 308: 304: 296: 294: 291:specifically 285: 282: 279: 278: 277: 268: 259: 257: 253: 248: 244: 235: 233: 228: 226: 222: 216: 212: 203: 194: 191: 188: 185: 182: 180: 175: 169: 160: 158: 153: 151: 147: 141: 137: 128: 126: 122: 117: 113: 104: 100: 98: 94: 90: 89:public policy 85: 83: 79: 69: 66: 58: 48: 44: 38: 37: 32:This article 30: 21: 20: 732:Law by issue 678: 641: 629:. Retrieved 604: 595: 586: 553: 532: 508: 500: 495: 484:. Retrieved 477:the original 464: 455: 446: 397: 346: 342: 334: 330: 321: 313: 309: 305: 302: 289: 274: 265: 249: 245: 241: 232:privacy laws 229: 217: 213: 209: 200: 192: 189: 186: 183: 170: 166: 154: 142: 138: 134: 118: 114: 110: 101: 86: 77: 76: 61: 52: 33: 727:Information 206:Convergence 157:Privacy Act 82:information 716:Categories 653:References 486:2018-04-22 363:Cyberspace 327:The future 55:April 2013 47:footnoting 681:13:21-37. 631:April 29, 503:13:21-37. 125:economics 435:Archived 352:See also 223:and the 107:Overview 43:citation 337:Web 2.0 131:History 694:1991). 513:1991). 197:Issues 480:(PDF) 473:(PDF) 389:Notes 252:ICANN 633:2012 402:NJ). 45:and 701:NJ) 174:P2P 718:: 613:^ 574:^ 562:^ 541:^ 518:^ 407:^ 123:, 635:. 489:. 441:. 177:( 68:) 62:( 57:) 53:( 49:. 39:.

Index

citation style
citation
footnoting
Learn how and when to remove this message
information
public policy
intellectual property
information security
information science
economics
United Kingdom
First World War
Privacy Act
P2P
Stop Online Piracy Act
Stop Online Piracy Act
PROTECT IP Act
privacy laws
ICANN
Domain Name System
fourth amendment
STEEP framework
Web 2.0
Cyber Intelligence Sharing and Protection Act
Cyberspace
Executive Order 12333
Foreign Intelligence Surveillance Act
Social informatics
Stop Online Piracy Act

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑