Public Administration in an Information Age

Public Administration in an Information Age PDF Author: I. Th. M. Snellen
Publisher: IOS Press
ISBN: 9789051993950
Category : Computers
Languages : en
Pages : 606

Get Book

Book Description
This book is a joint effort of researchers who have been involved in research-projects and programmes that have been trying to chart and reflect upon the implications of Information and Communication Technologies (ICTs) for Public Administration (Tilburg/Rotterdam, Kassel, Irvine, Nottingham/Glasgow). Since the fifties, computers had largely facilitated and the transformation of the minimal 'Night-Watch-state' into the modern 'Welfare-state', through their contribution to their effectivity, productivity and efficiency. In most Handbooks of Public Administration, computers are seen as neutral instruments and, most of the time, the role of computer technologies in the transformation of public administration is completely neglected. This 'deafening silence' is a great contrast with the way ICT's are actually changing public administration. The faster the developments in a field of study are, the more difficult it is to let the theories, related to that field of study, mature. In such circumstances, most statements will remain provisial and context-dependent. 25 years of research in Irvine (California) and Kassel (Germany) and more than 10 years of research in Tilburg/Rotterdam (The Netherlands) and about seven years of research in Glasgow/Nottingham (the United Kingdom) nonetheless enables the presentation of a modest image of public administration as it is entering the information age. Researchers in each of these groups have, nevertheless, not stopped trying to phrase theories about the implications of informatization for public administration with a more or less larges scope, that are robust in different contexts and over longer periods of time. These results and theories, covering a broad set of elements of the body of knowledge of public administration, are presented in this volume. As the authors try to demonstrate in this book, informatization developments in public administration do not only challenge the existing body of knowledge of the public administration discipline, but they are also opening up new perspectives and paradigms for the study of public administration.

Public Administration in an Information Age

Public Administration in an Information Age PDF Author: I. Th. M. Snellen
Publisher: IOS Press
ISBN: 9789051993950
Category : Computers
Languages : en
Pages : 606

Get Book

Book Description
This book is a joint effort of researchers who have been involved in research-projects and programmes that have been trying to chart and reflect upon the implications of Information and Communication Technologies (ICTs) for Public Administration (Tilburg/Rotterdam, Kassel, Irvine, Nottingham/Glasgow). Since the fifties, computers had largely facilitated and the transformation of the minimal 'Night-Watch-state' into the modern 'Welfare-state', through their contribution to their effectivity, productivity and efficiency. In most Handbooks of Public Administration, computers are seen as neutral instruments and, most of the time, the role of computer technologies in the transformation of public administration is completely neglected. This 'deafening silence' is a great contrast with the way ICT's are actually changing public administration. The faster the developments in a field of study are, the more difficult it is to let the theories, related to that field of study, mature. In such circumstances, most statements will remain provisial and context-dependent. 25 years of research in Irvine (California) and Kassel (Germany) and more than 10 years of research in Tilburg/Rotterdam (The Netherlands) and about seven years of research in Glasgow/Nottingham (the United Kingdom) nonetheless enables the presentation of a modest image of public administration as it is entering the information age. Researchers in each of these groups have, nevertheless, not stopped trying to phrase theories about the implications of informatization for public administration with a more or less larges scope, that are robust in different contexts and over longer periods of time. These results and theories, covering a broad set of elements of the body of knowledge of public administration, are presented in this volume. As the authors try to demonstrate in this book, informatization developments in public administration do not only challenge the existing body of knowledge of the public administration discipline, but they are also opening up new perspectives and paradigms for the study of public administration.

Structuring the Information Age

Structuring the Information Age PDF Author: JoAnne Yates
Publisher: JHU Press
ISBN: 9780801880865
Category : Business & Economics
Languages : en
Pages : 380

Get Book

Book Description
Structuring the Information Age provides insight into the largely unexplored evolution of information processing in the commercial sector and the underrated influence of corporate users in shaping the history of modern technology. JoAnne Yates examines how life insurance firms—where good record-keeping and repeated use of massive amounts of data were crucial—adopted and shaped information processing technology through most of the twentieth century. The book analyzes this process beginning with tabulating technology, the most immediate predecessor of the computer, and continuing through the 1970s with early computers. Yates elaborates two major themes: the reciprocal influence of information technology and its use, and the influence of past practices on the adoption and use of new technologies. In the 1950s, insurance industry leaders recognized that computers would enable them to integrate processes previously handled separately, but they also understood that they would have to change their ways of working profoundly to achieve this integration. When it came to choosing equipment and applications, most companies ultimately preferred a gradual, incremental migration to an immediate and radical transformation. In tracing this process, Yates shows that IBM's successful transition from tabulators to computers in part reflected that vendor's ability to provide large customers such as insurance companies with the necessary products to allow gradual change. In addition, this detailed industry case study helps explain information technology's so-called productivity paradox, showing that firms took roughly two decades to achieve the initial computerization and process integration that the industry set as objectives in the 1950s.

Privacy in the Information Age

Privacy in the Information Age PDF Author: Fred H. Cate
Publisher: Brookings Institution Press
ISBN: 0815791348
Category : Computers
Languages : en
Pages : 261

Get Book

Book Description
Electronic information networks offer extraordinary advantages to business, government, and individuals in terms of power, capacity, speed, accessibility, and cost. But these same capabilities present substantial privacy issues. With an unprecedented amount of data available in digital format--which is easier and less expensive to access, manipulate, and store--others know more about you than ever before. Consider this: data routinely collected about you includes your health, credit, marital, educational, and employment histories; the times and telephone numbers of every call you make and receive; the magazines you subscribe to and the books your borrow from the library; your cash withdrawals; your purchases by credit card or check; your electronic mail and telephone messages; where you go on the World Wide Web. The ramifications of such a readily accessible storehouse of information are astonishing. Governments have responded to these new challenges to personal privacy in a wide variety of ways. At one extreme, the European Union in 1995 enacted sweeping regulation to protect personal information; at the other extreme, privacy law in the United States and many other countries is fragmented, inconsistent, and offers little protection for privacy on the internet and other electronic networks. For all the passion that surrounds discussions about privacy, and the recent attention devoted to electronic privacy, surprisingly little consensus exists about what privacy means, what values are served--or compromised--by extending further legal protection to privacy, what values are affected by existing and proposed measures designed to protect privacy, and what principles should undergird a sensitive balancing of those values. In this book, Fred Cate addresses these critical issues in the context of computerized information. He provides an overview of the technologies that are provoking the current privacy debate and discusses the range of legal issues that these technologies raise. He examines the central elements that make up the definition of privacy and the values served, and liabilities incurred, by each of those components. Separate chapters address the regulation of privacy in Europe and the United States. The final chapter identifies four sets of principles for protecting information privacy. The principles recognize the significance of individual and collective nongovernmental action, the limited role for privacy laws and government enforcement of those laws, and the ultimate goal of establishing multinational principles for protecting information privacy. Privacy in the Information Age involves questions that cut across the fields of business, communications, economics, and law. Cate examines the debate in provocative, jargon-free, detail.

Cryptography's Role in Securing the Information Society

Cryptography's Role in Securing the Information Society PDF Author: National Research Council
Publisher: National Academies Press
ISBN: 0309175801
Category : Computers
Languages : en
Pages : 720

Get Book

Book Description
For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and citizens in their private lives. The more information that is transmitted in computer-readable form, the more vulnerable we become to automated spying. It's been estimated that some 10 billion words of computer-readable data can be searched for as little as $1. Rival companies can glean proprietary secrets . . . anti-U.S. terrorists can research targets . . . network hackers can do anything from charging purchases on someone else's credit card to accessing military installations. With patience and persistence, numerous pieces of data can be assembled into a revealing mosaic. Cryptography's Role in Securing the Information Society addresses the urgent need for a strong national policy on cryptography that promotes and encourages the widespread use of this powerful tool for protecting of the information interests of individuals, businesses, and the nation as a whole, while respecting legitimate national needs of law enforcement and intelligence for national security and foreign policy purposes. This book presents a comprehensive examination of cryptographyâ€"the representation of messages in codeâ€"and its transformation from a national security tool to a key component of the global information superhighway. The committee enlarges the scope of policy options and offers specific conclusions and recommendations for decision makers. Cryptography's Role in Securing the Information Society explores how all of us are affected by information security issues: private companies and businesses; law enforcement and other agencies; people in their private lives. This volume takes a realistic look at what cryptography can and cannot do and how its development has been shaped by the forces of supply and demand. How can a business ensure that employees use encryption to protect proprietary data but not to conceal illegal actions? Is encryption of voice traffic a serious threat to legitimate law enforcement wiretaps? What is the systemic threat to the nation's information infrastructure? These and other thought-provoking questions are explored. Cryptography's Role in Securing the Information Society provides a detailed review of the Escrowed Encryption Standard (known informally as the Clipper chip proposal), a federal cryptography standard for telephony promulgated in 1994 that raised nationwide controversy over its "Big Brother" implications. The committee examines the strategy of export control over cryptography: although this tool has been used for years in support of national security, it is increasingly criticized by the vendors who are subject to federal export regulation. The book also examines other less well known but nevertheless critical issues in national cryptography policy such as digital telephony and the interplay between international and national issues. The themes of Cryptography's Role in Securing the Information Society are illustrated throughout with many examplesâ€"some alarming and all instructiveâ€"from the worlds of government and business as well as the international network of hackers. This book will be of critical importance to everyone concerned about electronic security: policymakers, regulators, attorneys, security officials, law enforcement agents, business leaders, information managers, program developers, privacy advocates, and Internet users.

Competing in the Information Age

Competing in the Information Age PDF Author: Jerry N. Luftman
Publisher: Oxford University Press, USA
ISBN: 0195090160
Category : Business & Economics
Languages : en
Pages : 437

Get Book

Book Description
Synthesizes a body of research and theories relating to the way firms can undergo transformation in order to remain competitive in a changing business environment. This book includes the coordination and alignment of a firm's business strategy.

Social Responsibility in the Information Age

Social Responsibility in the Information Age PDF Author: Gurpreet Dhillon
Publisher: IGI Global
ISBN: 9781931777858
Category : Business & Economics
Languages : en
Pages : 286

Get Book

Book Description
"Information technology is analyzed in terms of who is affected and what impact those changes have on society in this examination of the social challenges of the modern era. The effects of information resource management, information technology, and information systems are discussed in contexts such as business, government, and human relationships. Policies on e-commerce taxation, Internet privacy, and software piracy are covered."

Opening Government

Opening Government PDF Author: John Wanna
Publisher: ANU Press
ISBN: 1760461946
Category : Political Science
Languages : en
Pages : 179

Get Book

Book Description
Transparency and citizen engagement remain essential to good government and sound public policy. Indeed, they may well be the key to restoring trust in government itself, currently at an all-time low in Australia. It is ironic, then, that this has occurred at a time when the technological potential for information dissemination and interaction has never been greater. Opening Government: Transparency and Engagement in the Information Age explores new horizons and scenarios for better governance in the context of the new information age, focusing on the potentials and pitfalls for governments (and governance more broadly) operating in the new, information-rich environment. Its contributors, a range of international and Australian governance academics and practitioners, ask what are the challenges to our governing traditions and practices in the new information age, and where can better outcomes be expected using future technologies. They explore the fundamental ambiguities extant in opening up government, with governments intending to become far more transparent in providing information and in information sharing, but also more motivated to engage with other data sources, data systems and social technologies.

Computers at Risk

Computers at Risk PDF Author: National Research Council
Publisher: National Academies Press
ISBN: 0309043883
Category : Computers
Languages : en
Pages : 320

Get Book

Book Description
Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.

The Information Age

The Information Age PDF Author: James D. Torr
Publisher: Greenhaven Press, Incorporated
ISBN:
Category : Information society
Languages : en
Pages : 200

Get Book

Book Description
The Internet has transformed the way people work, play, and communicate. The many questions raised by new information technologies are explored in the following chapters: Will the Information Highway Benefit Society? How Should the Information Highway Be Developed? How Should the Government Regulate E-Commerce? Should Computer Content Be Regulated?

The Digital Person

The Digital Person PDF Author: Daniel J Solove
Publisher: NYU Press
ISBN: 0814740375
Category : Computers
Languages : en
Pages : 295

Get Book

Book Description
In a revealing study of how digital dossiers are created (usually without our knowledge), the author argues that we must rethink our understanding of what privacy is and what it means in the digital age, and then reform the laws that define and regulate it. Reprint.