Freedom of information is needed to ensure that government and business is transparent and accountable. However, the mass proliferation of computer and communication technologies has created a unique vulnerability that makes it difficult for agencies to effective protect security and privacy without reducing overall access to information. With this in mind, efforts to resolve this dichotomy must be considered.
3.1 Building Better it Infrastructure
Critically reviewing what scholars have noted about balancing freedom of information with privacy and security, the development and implementation of secure information technology infrastructure has been noted as a principle issue for improving outcomes in this area [6]. Scholars argue that with the right it infrastructure in place, agencies will be able to effectively review and evaluate data to determine its relevance in terms of compromising personal information or security. In short, an additional layer of it infrastructure is needed to ensure that agencies are able to make positive decisions about information sharing and data transfer [6].
In addition to improving the infrastructure of it systems, researchers also argue that efforts to develop it systems will also facilitate the development of clear protocols and standards for improving the security of it systems [6]. Because these systems are vulnerable to attack, which can markedly compromise the integrity of data, improved systems will help effectively reduce this threat. Further, scholars argue that through this process it will become a central feature for organizational development; presently, it is often under-funded and overlooked in terms of organizational development [6].
3.2 Defining Free Information
The final issue that should be considered in the context of balancing freedom of information and privacy and security is that of clearly defining what is meant by information. Scholars examining freedom of information argue that what information should and should not be available remains a persistent challenge for most agencies [4]. Although efforts to address this issue have been considered in the past, the reality is that what should and does constitute free information varies from organization to organization and individual to individual. With this in mind, a clear definition of what information should be free and what free information is may provide a stronger...
John Brown: Was he a murderer or a martyr? The actions of John Brown raise many uncomfortable questions about how we view terrorism in modern society. It is often said that 'one man's terrorist is another man's freedom fighter' and that expression certainly holds true with John Brown in his raid on Harper's Ferry. Even before the Harper's Ferry raid, Brown was a "leader of antislavery guerillas" in Kansas and "fought
Privacy of an Individual in the Workplace Argument Length: 2,000 words Task Construct argument notion individual's privacy important consideration workplace, Use ethical theory support position. Rationale This task designed: demonstrate capacity understand evaluate privacy; demonstrate understanding issues encroach individual's privacy workplace; demonstrate ability construct a compelling argument logically consistent supported ethical theory; Privacy of an individual in the workplace In the workplace, it is expected that employees must relinquish some of their most
Privacy Matters: Introduction to Sociology. As Glenn Greenwald points out, the Internet has been turned into a tool of mass surveillance, notably with the NSA always lurking and spying on the Digital Era’s best means of communication. To some extent this type of spying and violation of privacy has become accepted as the norm because sociopolitical discourse in the modern era presupposes that there are two types of people in the
protect the privacy of the individual via EU Directive for Protection of Personal Data The internet revolutionized the human life as we know it. It established a culture of liberty aided by not just ingenuousness but also standardized protocols. This was achieved by transmitting the essential products for business-related growth, adopting a model of governance with no formal existence of regulations along with free availability of abundant software packages. This
Cloud Nursing Technology advancement within today's society ensures that new ways of performing tasks must be learned. This cycle of discovery is at the heart of every academic or professional pursuit that molds and evolves our methods and thinking patterns. The digital revolution that has occurred throughout the last two decades has forced many industries to alter their approach to their tasks, requiring re-education and an open mind ready to welcome
1984 to Now: Fiction Becoming Reality? In the 2016 film Snowden by Oliver Stone, illegal governmental surveillance of the lives of private citizens via digital means (such as ordinary computer webcams) disturbs the film's hero, a dramatized representation of real-life whistleblower Edward Snowden. Snowden ultimately rebels against the government agency that employs him as he rejects the totalitarian principles that govern the agency. Indeed, the film touches upon a reality that
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now