NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Atkinson, Robert D. – Information Technology and Innovation Foundation, 2010
A decade ago, before the tech boom collapsed and the digital economy bubble burst, it seemed to some that issues surrounding information technology (IT) might be central to the politics of the early 21st century. But after September 11, 2001, with so much else on everyone's minds, "digital politics" seemed a boring sideshow. Technocrats,…
Descriptors: Copyrights, Information Technology, Internet, Classification
Farrall, Kenneth N. – ProQuest LLC, 2009
This dissertation problematizes the "state dossier system" (SDS): the production and accumulation of personal information on citizen subjects exceeding the reasonable bounds of risk management. SDS--comprising interconnecting subsystems of records and identification--damage individual autonomy and self-determination, impacting not only…
Descriptors: Foreign Countries, Case Studies, Social Systems, Risk Management
Johnston, Scott D. – Proceedings of the ASIS Annual Meeting, 2000
Examines the role of self-regulation in the establishment of an informational privacy policy. Discusses information technologies and changes in commerce; personal information in databases; demands for accountability; institutional and enforcement models; legislation; government failures; self-regulation and the individual; and potential problems…
Descriptors: Accountability, Databases, Government Role, Information Policy
Peer reviewed Peer reviewed
Gellman, Robert – Government Information Quarterly, 2002
Discusses implications of the U.S.A. Patriot Act, antiterrorism legislation that was passed after the September 11 attacks, regarding privacy issues. Highlights include information privacy; privacy and government, including increases in the surveillance powers of government; privacy and the private sector; and future possibilities. (Author/LRW)
Descriptors: Federal Legislation, Futures (of Society), Government Role, Information Policy
Peer reviewed Peer reviewed
Jaeger, Paul T.; McClure, Charles R.; Fraser, Bruce T. – Government Information Quarterly, 2002
Asserts that the federal government should adopt a centralized governmental structure for the privacy protection of personal information and data. Discusses the roles of federal law, federal agencies, and the judiciary; the concept of information privacy; the impact of current technologies; and models of centralized government structures for…
Descriptors: Centralization, Court Role, Federal Courts, Federal Government
Peer reviewed Peer reviewed
Gegner, Karen E.; Veeder, Stacy B. – Government Information Quarterly, 1994
Examines the standards process used for developing the Escrowed Encryption Standard (EES) and its possible impact on national communication and information policies. Discusses the balance between national security and law enforcement concerns versus privacy rights and economic competitiveness in the area of foreign trade and export controls. (67…
Descriptors: Computer Mediated Communication, Computer Networks, Federal Government, Government Role
Peer reviewed Peer reviewed
Hernon, Peter; Dugan, Robert E. – Journal of Academic Librarianship, 1997
Discusses the significance for libraries of privacy concerns involved with geographic information system (GIS) technology. Argues that librarians need to be aware of federal and state efforts to address privacy issues and monitor developments in government information policy. (AEF)
Descriptors: Access to Information, Copyrights, Government Role, Information Policy
Congress of the U.S., Washington, DC. Office of Technology Assessment. – 1994
The use of information networks for business and government is expanding enormously. Government use of networks features prominently in plans to make government more efficient, effective, and responsive. But the transformation brought about by the networking also raises new concerns for the security and privacy of networked information. This…
Descriptors: Access to Information, Computer Networks, Computer Security, Cryptography