According to Weingarten (1989) affirm that Information policy as ‘the set of all public laws, regulations, and policies that encourage, discourage, or regulate the creation, use, storage, and communication of information’. It shows that, policy have can influences other elements and those elements also can influenced the development of policy.
Based on the Weingarten definition it reveals that information policy can be found in any field as long it related with laws, and regulation of information use, storage and communication. While, on Jaeger (2007) article entitle Information policy, information access and democratic participation: The national and international implications of the Bush administration’s information politic, Information policy been defined as the combination of laws, regulations, rules, and guidelines that steer the creation, management, and use of information, greatly shapes the roles of information in society. Information policy includes a range of issues related to freedom of information, privacy, secrecy, security, i...
... middle of paper ...
... of public policy. A change in policy about information exchange on the Internet has effect well beyond just information policy, raising issues of technology, governance, commerce, and education, among others. As information policy establishes many of the practical parameters of the information society, the study of information policy has become essential to understanding the broad roles of information in contemporary society. The author also suggested that further study on information policy should be adapted and explore to more understand the linkage of information policy to information access. This is because the purpose and the goal of individual, organization, nation and international towards information used and access are the major influences of the reshaping of information policy in the nation, to reshaping the society behavior towards information seeking.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- The effects of new digital technologies and their policy implications result in a complex issue that is always evolving. “Change of State: Information, Policy, and Power” by Sandra Braman presents a breakdown of policy development for the constant evolution of the technological world and how it affects the state and society. She theorizes that the ‘information state’ is in the process of replacing the welfare state, to the detriment of the citizen and the democratic process. Braman “looks at the ways in which governments are deliberate, explicit, and consistent in their use of information policy to exercise power, exploring not only such familiar topics as intellectual property rights and pr... [tags: policy and power, digital technologies]
580 words (1.7 pages)
- Information Security Policy BY Jianing Wu 300365997 Background for the Information Security Policy The information technology has been developing at an incredible speed from the 20th century, which has been recognised and widely used in people’s diary life now- people’s personal profile details on the social media, payment details and even businesses using the information technology to make, transfer and analysis their annual income reports. However, as the information technology is becoming an important role in our lives, how to protect the valuable information from being abused has become the topic that people concern more about right now.... [tags: Security, Access control, Information security]
853 words (2.4 pages)
- ... System-specific policies provide managerial guidance and access control lists related to certain software or systems used by the company. The intensity and depth of an organization's security policy depends heavily on the nature of their business. A large company compared to a small company would require a different approach to their security policy. Also, the type of information that the company deals with determines the security program. For example, if Company A is a dog grooming business and Company B is a financial services and investment company, they would have extremely different information to protect.... [tags: employees, protect, training]
890 words (2.5 pages)
- Selling an Information Security Policy Network attacks are continuing to rise. It is critical for the organization to have an effective Information Security Policy in order to reduce the chances of becoming a victim. In 2013, experts saw network attacks up to 50 Gbps, which resulted in an average cost of $32,469 per day to businesses. The average number of days to recover was 32 days, which brought costs up to $1,035,769 per attack. Thus far, 2014 network attacks have shattered 2013’s record with attacks averaging 200-400 Gbps in intensity.... [tags: selling security, netwrk attack, crime]
910 words (2.6 pages)
- Consumers today operate in increasingly complex markets, challenged by growing amounts of information and an expanding choice of products. Making sound choices and protecting consumer interests require a wide range of skills and knowledge. Consumer information is critical in this regard, it can be termed as the process by which we develop and enhance skills and knowledge to make well informed and reasonable choices that take societal values and objectives into account. This can help develop critical thinking and raise awareness, thereby enabling consumers to become more pro-active.... [tags: complex markets, customers, choices]
1805 words (5.2 pages)
- Database auditing is considered as a contemporary article on database due to a vital role on the database security (Abraham, etal .,2002). There are many different of motivations that make one very excited to do this work , Nevertheless there are millions of database transactions that being executed among different of hosts all-round the organization sites. There are many question arise such as How to do some statistical analysis on database, also How to reveal out the crimes that the database is vulnerable to.... [tags: database auditing, contemporary article]
1204 words (3.4 pages)
- Methodology The data and information gathered for this policy analysis was collected from two main sources, Montana’s Office of Public Instruction’s website, and Helena school district staff interviews. The data reviewed came from OPI’s GEMS data center. Perception interviews were conducted via e-mail, and were filled out by a Helena school districts, high school administrator, data collector, and curriculum instructor. I also choose to review Helena’s ACT test results, and found a comprehensive analysis of the scores in an article posted in the Helena Independent Record (local newspaper).... [tags: High school, Graduation, College]
1015 words (2.9 pages)
- The Global Security Policy Webster characterizes "policy" as a "high-level overall plan embracing the general goals and acceptable procedures". It is, for the most part recognized that an organization 's information security policy should be the foundation of its information security program. Particularly in case of global organizations, the necessity for sensible policies and the issues intrinsic in their creation them are exceptionally critical. This paper acts as a dialog of probably the most widespread data security strategy-related matters that are familiar to global organizations and offer some approaches to dealing with them.... [tags: Security, Information security, Computer security]
1215 words (3.5 pages)
1203 words (3.4 pages)
- Policy issues - Geographic Information Policy issues and availability of Geographic Information Geographical Information is a computer-based tool for mapping and analyzing things that exist and events that happen on earth. The major components of a GI are: a user interface; system/database management capabilities; database creation/data entry capacity; spatial data manipulation and analysis packages; and display/product generation functions. GIS technology integrates, via the Internet, common database operations such as query and statistical analysis with the unique visualization and geographic analysis benefits offered by maps.... [tags: science]
804 words (2.3 pages)