首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Government secrecy has a long history in the American federal experience. Several kinds of government secrecy policy are reviewed here, beginning with their origins, or “policy depths,” and extending to their most recent expressions or “dimensions.” It is a rich history which, in this brief overview, is explored only in terms of its highlights, but offers, nonetheless, a roadmap for pursuing research in this area. It concludes with the observation that, in a democracy, representatives of the citizenry, whether elected or appointed, may momentarily cloak their decisionmaking and their policies in secrecy for the good of the nation—to protect it from enemies and to assure its survival. Those representatives must remember that the secrecy they impose is only momentary and that the shrouded decisions and policies they make, once made known to the citizenry, must be acceptable to them. The citizenry, in turn, accept such secrecy only in limited instances and on a momentary basis in order to have the confidence that their representatives are making decisions and policies acceptable to them. A government failing to honor these arrangements may well be regarded as one “not worth the cost of preservation.”  相似文献   

2.
Mass Digitization of Books   总被引:1,自引:1,他引:1  
Mass digitization of the bound volumes that we generally call “books” has begun, and, thanks to the interest in Google and all that it does, it is getting widespread media attention. The Open Content Alliance (OCA), a library initiative formed after Google announced its library book digitization project, has brought library digitization projects into the public eye, even though libraries were experimenting with digitization for at least a decade. What is different today from some earlier digitization of books is not just the scale of these new initiatives, but the quality of “mass.”  相似文献   

3.
Federal open records laws, executive orders on national security classification, and similar policy instruments in the states require that most records at government agencies be available to the public upon request—subject to exemptions which may entail review. Traditionally, this review has been accomplished by redaction (purging) of hardcopy. Resource limitations and increases in the number of requests demand a rethinking of the process. Offices are experimenting with optical scanning, onscreen purging, and online dissemination. Statutory and common law trends may soon require disclosure of database reports in electronic form, when so requested, rather than printouts. The dissemination of manipulable data of commercial value requires a rationale broader than the “citizenship rights” that justified the Freedom of Information Act. Online publication of agency-controlled records also demands careful planning of information systems and public networks. The issues discussed in this article are central to the establishment of an adequate policy for electronic freedom of information.  相似文献   

4.
5.
This paper assesses the ways in which local actors are reconfiguring public access to broadband through the unlicensed spectrum. The process of adoption and configuration of public Wi-Fi networks in Austin, Texas, is the focus of our case study. Austin is one of the most “unwired” cities in the United States and increasingly known as a world-class industrial center in wireless. The development of strategic visions about public Wi-Fi services among user groups and local startups provided a fertile ground for diverse partnerships among nonprofit groups, broadband providers, wireless ISPs, and the city government. We also found that the popularity of the venue-sponsored or free-to-end-user model of access is supported by different providers that see their interests represented in the growth of public wireless broadband. However, the prevailing model of public Wi-Fi has a strong commercial bias. This, combined with the historical socioeconomic divides in the city, has resulted in an uneven geography of public Wi-Fi networks.  相似文献   

6.
This article is a preliminary analysis of the first few years of the Computer Matching and Privacy Protection Act of 1988 (CMPPA). The act requires Federal agencies to establish Data Integrity Boards (DIBs) with responsibility to approve written agreements for computer matches in which their agencies are involved. Information for this analysis was collected from the annual reports on computer matching submitted by agencies to the Office of Management and Budget (OMB) for 1990 and 1991 and from 108 matching agreements. The secretaries of several DIBs were also interviewed. The effectiveness of DIBs and matching agreements are analyzed using McCubbins and Schwartz's distinction between “police-patrol” and “fire- alarm” oversight. The article concludes that more active and direct oversight, which would occur through an independent data protection or privacy board, is necessary.  相似文献   

7.
Access to government records is increasingly shifting to a nether world-governed neither by the FOIA and the Privacy Act, nor by an executive order on classification. Instead, new categories of records, labeled “sensitive but unclassified,” “for official use only,” or “critical infrastructure information,” are being created in a variety of agencies, and are governed by agency regulations. Statutory authority is found in a number of separate laws, such as the Homeland Security Act and the Aviation and Transportation Security Act. These categories can be assigned by agency officials, contractors, or those in the private sector who originated the records; many records categorized this way are not subject to appeal or review by agencies or the courts, or to any automatic “declassification” process that has applied to documents withheld under the FOIA or subject to classification. Trends toward increased secrecy at all levels of government have become sufficiently alarming that individuals across the political spectrum have begun to speak out, and members of the access community (e.g., newspaper editors and public interest groups) have formed coalitions to focus debate on the need to rethink the balance of access with privacy and records protection, and to lobby actively for reinstatement of principles of access that have governed records policy for the past 35 years.  相似文献   

8.
Israel’s public diplomacy efforts in the U.S. are aimed at garnering American public support for Israeli foreign policy. This study aims to identify the networks of Israeli public diplomacy toward the United States. Using the theoretical frameworks of networked public diplomacy and strategic narrative, the authors try to understand how network strategy is used and information is circulated to create a strategic narrative. Therefore, the two methods of social network analysis and qualitative content analysis are applied to identify the networks of Israeli public diplomacy in the United States and the content produced by it. The study finds that in Israel’s public diplomacy model, the networking method stands in contrast to its government-oriented strategic narrative. Thus, new forms of communication are applied to conduct old strategies. The research identifies four types of actors who apply new public diplomacy techniques and dissects the strategic narrative they employ to affect the American public in the service of Israeli interests. Despite the effort to apply new forms of public diplomacy, strategic narrative production and dissemination remain highly governmental and closed, which is indicative of the persistence of old forms of public diplomacy.  相似文献   

9.
在社会转型中以习惯、道德、法律为表现形态的社会规范,仍然应该是言论的准则,对于新闻评论产生重要的影响。新闻评论的一般性规范包括自由民主法治开放的精神,提倡自由民主的讨论,为受众提供表达不同意见的机会;坚持国家利益原则;坚持公平正义平等的原则;坚持公共利益原则;坚持理性客观的原则;坚持以人为本的原则,尊重基本人权。  相似文献   

10.
This paper reports findings of a study on the influence of theGulf War on the morale level of Israeli men and women. Havingat our disposal panel data from the pre-war period, we wereable to measure the changes in morale over time at the individuallevel by means of a standardized questionnaire. On the basisof previous theory and research, we expected that individualmorale would be affected by proximity to risk areas and by gender.The results indicate that, taking the panel as a whole, themissile attacks had only a small adverse effect on individualmorale. Contrary to our expectations, we found that people livingin high-risk areas did not experience greater decline in moralethan residents of the low-risk communities. However, there hasbeen a salient difference in the effect of the war on the basisof gender: whereas the morale of women did not change, we foundan appreciable decline in the morale level of Israel's men.These results are discussed in terms of the unique featuresof the Gulf War with regard to the civilian population: whilefemales were preoccupied with various activities related tothe needs of the family, Israel's men became demoralized becausethey were unable to perform their traditional roles as soldiersand protectors.  相似文献   

11.
图书馆是保障公民基本文化权益的公共文化机构,在突发公共卫生事件中仍需开展应急管理并向社会公众提供应急服务。文章通过对日本图书馆界、美国医学图书馆、加拿大高校图书馆、澳大利亚图书情报协会、国际图书馆联合会协会和联盟应对突发公共卫生事件中的反应机制进行分析,认为我国图书馆界在应对突发公共卫生事件中,应当在政府主导下,积极推动医学图书馆、高校图书馆和图书馆学(协)会发挥自身的专业作用,构建总体性和专业性的图书馆应急管理和服务机制。  相似文献   

12.
The Internet and its World Wide Web (Web) have an important role to play in the economic development of China. The government of the People's Republic of China has declared its intention to open opportunities for foreign trade and investment in China. Part of the commitment is a commitment to rule of law. Rule of law acceptable to commercial interests requires transparency and decisional rationality. These two features can be realized most quickly by connecting legal institutions through the Internet's Web to bodies of international commercial law, thus creating a virtual library for Chinese legal decision makers, and using the Web as a quick and cheap electronic “printing press” for Chinese legal decision makers. As a result, their statutes, rules, and decisional law become available to commercial interests. But technology is not enough. Innovative cross-cultural exchange programs aimed at the legal, managerial, and Web-master professions will round out this rule of law support for commercial globalization.  相似文献   

13.
Replacing the ineffective Federal Reports Act of 1942, the Paperwork Reduction Act of 1980 (PRA) was enacted largely to relieve the public of the mounting information collection and reporting requirements of the federal government. It also promoted coordinated information management activities on a governmentwide basis by the director of the Office of Management and Budget (OMB) and prescribed information management responsibilities for the executive agencies. The management focus of the PRA was sharpened with the 1986 amendments which refined the concept of “information resources management” (IRM), defined as “the planning, budgeting, organizing, directing, training, promoting, controlling, and management activities associated with the burden, collection, creation, use, and dissemination of information by agencies, and includes the management of information and related resources such as automatic data processing equipment.” This key term and its subset concepts received further definition and explanation in the PRA of 1995, making IRM a tool for managing the contribution of information activities to program performance, and for managing related resources, such as personnel, equipment, funds, and technology. The PRA currently authorizes appropriations for its administration by the Office of Information and Regulatory Affairs (OIRA), located within OMB, through FY2001 (44 U.S.C. 3520). Reauthorization of OIRA appropriations provides an opportunity to upgrade the PRA’s provisions and to address prevailing government information management issues.  相似文献   

14.
Wireless is changing the policy calculus for municipal broadband   总被引:1,自引:0,他引:1  
Historically, the justification for municipal provisioning of “last-mile” communications infrastructure has focused on the natural monopoly aspect of wireline infrastructure. Growing interest in wireless ISPs, municipal hot spots, and access to public space for siting wireless infrastructure suggests new and expanded opportunities for local government participation in telecommunication services. This paper examines the implications of emerging wireless technologies for the policy debate over whether municipalities should be playing an active role in providing last-mile broadband services and, if so, what the nature of that role should be.  相似文献   

15.
The United States Court of Appeals for the District of Columbia Circuit recently heard a suit brought against the Federal Communications Commission by Verizon concerning the 2010 Open Internet Rules. These rules were meant to protect consumers and ensure net neutrality by Internet service providers (ISPs). The Court struck down these rules, and now ISPs will have more power about how content is delivered to users. Librarians should be knowledgeable of net neutrality and this ruling, as it potentially affects abilities of users to exercise intellectual freedoms and could impact the library’s ability to provide services to its users.  相似文献   

16.
The paper deals with theoretical and practical challenges of the information society in the 21st century. In the first part an overview of past and current activities in the field of information ethics at UNESCO is provided (Virtual Forum, Second International Congress on Information Ethics, Observatory on the information Society). The second part presents a historical interpretation of the development of modern information society with the emerging networked world society with its characteristics of interactivity and decentralization. The diversity of moral norms and traditions within this global medium gives rise to the question concerning an Internet-morality as a challenge to ethical thinking. The third part deals with the question of our identity within the framework of a digital ontology. The concepts of “net” and “information” are analysed. A future information ethics is based on a digital ontology. Living in the information age is considered from the point of view of both an ethical imperative and the art of living.  相似文献   

17.
Recently, the Korean government instituted a reform in its archives with the goal of increasing transparency in government and meeting the challenges of the new digital environment in records management. President Roh's administration focused on a “process and system” reform through a shift from paper-based records management to electronic records management. The E-jiwon task management system of the Office of the President, invented by President Roh himself, served as the archetype for the reform. This study explores and critiques the administration's choice of a “process and system” reform over institutional reform, examines the legal framework used to enact the reform and its shortcomings, and analyzes the benefits and deficiencies of the E-jiwon as a tool for democracy in the archives. It concludes that while the new digital environment can assist in promoting government transparency, technological change by itself is inadequate; ultimately, institutional change is necessary for true reform.  相似文献   

18.
The presence–or absence–of locus sigilli “[L.S.]” or “[SEAL]” indicators, to validate the signatures in those texts of American Indian treaties collated by Charles J. Kappler in his Indian Affairs: Laws and Treaties, is examined. The results of this inquiry suggest that Kappler spent far more time examining the original treaty documents than Deloria and DeMallie proposed in their Documents of American Indian Diplomacy: Treaties, Agreements, and Conventions, 1775–1979.  相似文献   

19.
This research contributes to the growing body of literature exploring emotion and communication in the workplace by considering the workers in a variety of jobs that require “compassionate communication.” Compassion is conceptualized as one form of emotional work and is theoretically developed through a model that highlights the subprocesses of noticing, feeling, and responding. Analyses of interviews with 23 workers in a wide range of human service jobs indicated a number of complexities in the communication of compassion in the workplace. Processes of “noticing” included both noticing the need for compassion and noticing details of clients' lives in order to communicate more successfully in compassionate ways. Processes of “connecting” included both emotional processes (empathy) and cognitive processes (perspective taking). Processes of “responding” included both nonverbal strategies, such as immediacy behaviors and environmental structuring, and verbal strategies for balancing the informational and emotional content of messages. These results are interpreted in the light of both contemporary and traditional communication theory, and practical implications are presented for human service workers and others involved in compassionate communication in the workplace.  相似文献   

20.
An evaluation of student online searches explored the value of staff assistance to trained end users searching BRS Menus. Interactions between 19 student volunteers and library staff “coaches” were analyzed via tape recordings, a a questionnaire, and postsearch interviews. The results, and a discussion of their implications, are presented here.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号