Public Administration in an Information Age

Public Administration in an Information Age PDF

Author: I. Th. M. Snellen

Publisher: IOS Press

Published: 1998

Total Pages: 606

ISBN-13: 9789051993950

DOWNLOAD EBOOK →

This book is a joint effort of researchers who have been involved in research-projects and programmes that have been trying to chart and reflect upon the implications of Information and Communication Technologies (ICTs) for Public Administration (Tilburg/Rotterdam, Kassel, Irvine, Nottingham/Glasgow). Since the fifties, computers had largely facilitated and the transformation of the minimal 'Night-Watch-state' into the modern 'Welfare-state', through their contribution to their effectivity, productivity and efficiency. In most Handbooks of Public Administration, computers are seen as neutral instruments and, most of the time, the role of computer technologies in the transformation of public administration is completely neglected. This 'deafening silence' is a great contrast with the way ICT's are actually changing public administration. The faster the developments in a field of study are, the more difficult it is to let the theories, related to that field of study, mature. In such circumstances, most statements will remain provisial and context-dependent. 25 years of research in Irvine (California) and Kassel (Germany) and more than 10 years of research in Tilburg/Rotterdam (The Netherlands) and about seven years of research in Glasgow/Nottingham (the United Kingdom) nonetheless enables the presentation of a modest image of public administration as it is entering the information age. Researchers in each of these groups have, nevertheless, not stopped trying to phrase theories about the implications of informatization for public administration with a more or less larges scope, that are robust in different contexts and over longer periods of time. These results and theories, covering a broad set of elements of the body of knowledge of public administration, are presented in this volume. As the authors try to demonstrate in this book, informatization developments in public administration do not only challenge the existing body of knowledge of the public administration discipline, but they are also opening up new perspectives and paradigms for the study of public administration.

Cryptography's Role in Securing the Information Society

Cryptography's Role in Securing the Information Society PDF

Author: National Research Council

Publisher: National Academies Press

Published: 1996-11-29

Total Pages: 721

ISBN-13: 0309054753

DOWNLOAD EBOOK →

For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and citizens in their private lives. The more information that is transmitted in computer-readable form, the more vulnerable we become to automated spying. It's been estimated that some 10 billion words of computer-readable data can be searched for as little as $1. Rival companies can glean proprietary secrets . . . anti-U.S. terrorists can research targets . . . network hackers can do anything from charging purchases on someone else's credit card to accessing military installations. With patience and persistence, numerous pieces of data can be assembled into a revealing mosaic. Cryptography's Role in Securing the Information Society addresses the urgent need for a strong national policy on cryptography that promotes and encourages the widespread use of this powerful tool for protecting of the information interests of individuals, businesses, and the nation as a whole, while respecting legitimate national needs of law enforcement and intelligence for national security and foreign policy purposes. This book presents a comprehensive examination of cryptographyâ€"the representation of messages in codeâ€"and its transformation from a national security tool to a key component of the global information superhighway. The committee enlarges the scope of policy options and offers specific conclusions and recommendations for decision makers. Cryptography's Role in Securing the Information Society explores how all of us are affected by information security issues: private companies and businesses; law enforcement and other agencies; people in their private lives. This volume takes a realistic look at what cryptography can and cannot do and how its development has been shaped by the forces of supply and demand. How can a business ensure that employees use encryption to protect proprietary data but not to conceal illegal actions? Is encryption of voice traffic a serious threat to legitimate law enforcement wiretaps? What is the systemic threat to the nation's information infrastructure? These and other thought-provoking questions are explored. Cryptography's Role in Securing the Information Society provides a detailed review of the Escrowed Encryption Standard (known informally as the Clipper chip proposal), a federal cryptography standard for telephony promulgated in 1994 that raised nationwide controversy over its "Big Brother" implications. The committee examines the strategy of export control over cryptography: although this tool has been used for years in support of national security, it is increasingly criticized by the vendors who are subject to federal export regulation. The book also examines other less well known but nevertheless critical issues in national cryptography policy such as digital telephony and the interplay between international and national issues. The themes of Cryptography's Role in Securing the Information Society are illustrated throughout with many examplesâ€"some alarming and all instructiveâ€"from the worlds of government and business as well as the international network of hackers. This book will be of critical importance to everyone concerned about electronic security: policymakers, regulators, attorneys, security officials, law enforcement agents, business leaders, information managers, program developers, privacy advocates, and Internet users.

Competing in the Information Age

Competing in the Information Age PDF

Author: Jerry N. Luftman

Publisher: Oxford University Press, USA

Published: 1996

Total Pages: 437

ISBN-13: 0195090160

DOWNLOAD EBOOK →

Synthesizes a body of research and theories relating to the way firms can undergo transformation in order to remain competitive in a changing business environment. This book includes the coordination and alignment of a firm's business strategy.

The Digital Person

The Digital Person PDF

Author: Daniel J Solove

Publisher: NYU Press

Published: 2004

Total Pages: 295

ISBN-13: 0814740375

DOWNLOAD EBOOK →

In a revealing study of how digital dossiers are created (usually without our knowledge), the author argues that we must rethink our understanding of what privacy is and what it means in the digital age, and then reform the laws that define and regulate it. Reprint.

The Information Age

The Information Age PDF

Author: James D. Torr

Publisher: Greenhaven Press, Incorporated

Published: 2003

Total Pages: 200

ISBN-13:

DOWNLOAD EBOOK →

The Internet has transformed the way people work, play, and communicate. The many questions raised by new information technologies are explored in the following chapters: Will the Information Highway Benefit Society? How Should the Information Highway Be Developed? How Should the Government Regulate E-Commerce? Should Computer Content Be Regulated?

Structuring the Information Age

Structuring the Information Age PDF

Author: JoAnne Yates

Publisher: JHU Press

Published: 2005-06-22

Total Pages: 380

ISBN-13: 9780801880865

DOWNLOAD EBOOK →

Structuring the Information Age provides insight into the largely unexplored evolution of information processing in the commercial sector and the underrated influence of corporate users in shaping the history of modern technology. JoAnne Yates examines how life insurance firms—where good record-keeping and repeated use of massive amounts of data were crucial—adopted and shaped information processing technology through most of the twentieth century. The book analyzes this process beginning with tabulating technology, the most immediate predecessor of the computer, and continuing through the 1970s with early computers. Yates elaborates two major themes: the reciprocal influence of information technology and its use, and the influence of past practices on the adoption and use of new technologies. In the 1950s, insurance industry leaders recognized that computers would enable them to integrate processes previously handled separately, but they also understood that they would have to change their ways of working profoundly to achieve this integration. When it came to choosing equipment and applications, most companies ultimately preferred a gradual, incremental migration to an immediate and radical transformation. In tracing this process, Yates shows that IBM's successful transition from tabulators to computers in part reflected that vendor's ability to provide large customers such as insurance companies with the necessary products to allow gradual change. In addition, this detailed industry case study helps explain information technology's so-called productivity paradox, showing that firms took roughly two decades to achieve the initial computerization and process integration that the industry set as objectives in the 1950s.

Cyber War and Peace

Cyber War and Peace PDF

Author: Scott J. Shackelford

Publisher: Cambridge University Press

Published: 2020-03-05

Total Pages: 521

ISBN-13: 1108427731

DOWNLOAD EBOOK →

The frontiers are the future of humanity. Peacefully and sustainably managing them is critical to both security and prosperity in the twenty-first century.

Access to Knowledge in the Age of Intellectual Property

Access to Knowledge in the Age of Intellectual Property PDF

Author: Gaëlle Krikorian

Publisher: Mit Press

Published: 2010

Total Pages: 0

ISBN-13: 9781890951962

DOWNLOAD EBOOK →

A movement emerges to challenge the tightening of intellectual property law around the world. At the end of the twentieth century, intellectual property rights collided with everyday life. Expansive copyright laws and digital rights management technologies sought to shut down new forms of copying and remixing made possible by the Internet. International laws expanding patent rights threatened the lives of millions of people around the world living with HIV/AIDS by limiting their access to cheap generic medicines. For decades, governments have tightened the grip of intellectual property law at the bidding of information industries; but recently, groups have emerged around the world to challenge this wave of enclosure with a new counter-politics of "access to knowledge" or "A2K." They include software programmers who took to the streets to defeat software patents in Europe, AIDS activists who forced multinational pharmaceutical companies to permit copies of their medicines to be sold in poor countries, subsistence farmers defending their rights to food security or access to agricultural biotechnology, and college students who created a new "free culture" movement to defend the digital commons. Access to Knowledge in the Age of Intellectual Property maps this emerging field of activism as a series of historical moments, strategies, and concepts. It gathers some of the most important thinkers and advocates in the field to make the stakes and strategies at play in this new domain visible and the terms of intellectual property law intelligible in their political implications around the world. A Creative Commons edition of this work will be freely available online.

Opening Government

Opening Government PDF

Author: John Wanna

Publisher: ANU Press

Published: 2018-04-23

Total Pages: 179

ISBN-13: 1760461946

DOWNLOAD EBOOK →

Transparency and citizen engagement remain essential to good government and sound public policy. Indeed, they may well be the key to restoring trust in government itself, currently at an all-time low in Australia. It is ironic, then, that this has occurred at a time when the technological potential for information dissemination and interaction has never been greater. Opening Government: Transparency and Engagement in the Information Age explores new horizons and scenarios for better governance in the context of the new information age, focusing on the potentials and pitfalls for governments (and governance more broadly) operating in the new, information-rich environment. Its contributors, a range of international and Australian governance academics and practitioners, ask what are the challenges to our governing traditions and practices in the new information age, and where can better outcomes be expected using future technologies. They explore the fundamental ambiguities extant in opening up government, with governments intending to become far more transparent in providing information and in information sharing, but also more motivated to engage with other data sources, data systems and social technologies.

Computers at Risk

Computers at Risk PDF

Author: National Research Council

Publisher: National Academies Press

Published: 1990-02-01

Total Pages: 320

ISBN-13: 0309043883

DOWNLOAD EBOOK →

Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.