Verified Document

Freedom Of Information Vs. Privacy Term Paper

Freedom of information is needed to ensure that government and business is transparent and accountable. However, the mass proliferation of computer and communication technologies has created a unique vulnerability that makes it difficult for agencies to effective protect security and privacy without reducing overall access to information. With this in mind, efforts to resolve this dichotomy must be considered. 3.1 Building Better it Infrastructure

Critically reviewing what scholars have noted about balancing freedom of information with privacy and security, the development and implementation of secure information technology infrastructure has been noted as a principle issue for improving outcomes in this area [6]. Scholars argue that with the right it infrastructure in place, agencies will be able to effectively review and evaluate data to determine its relevance in terms of compromising personal information or security. In short, an additional layer of it infrastructure is needed to ensure that agencies are able to make positive decisions about information sharing and data transfer [6].

In addition to improving the infrastructure of it systems, researchers also argue that efforts to develop it systems will also facilitate the development of clear protocols and standards for improving the security of it systems [6]. Because these systems are vulnerable to attack, which can markedly compromise the integrity of data, improved systems will help effectively reduce this threat. Further, scholars argue that through this process it will become a central feature for organizational development; presently, it is often under-funded and overlooked in terms of organizational development [6].

3.2 Defining Free Information

The final issue that should be considered in the context of balancing freedom of information and privacy and security is that of clearly defining what is meant by information. Scholars examining freedom of information argue that what information should and should not be available remains a persistent challenge for most agencies [4]. Although efforts to address this issue have been considered in the past, the reality is that what should and does constitute free information varies from organization to organization and individual to individual. With this in mind, a clear definition of what information should be free and what free information is may provide a stronger...

CONCLUSIONS
Synthesizing all of the data provided in this investigation, it becomes evident that a true dichotomy has been created in the context of modern society. Freedom of information, while a vital and necessary part of democratic development, may compromise privacy and security -- two issues that are also important for the development of a democracy. Although this research demonstrates that balancing both of these issues is a formidable challenge for both government agencies and private organizations, the reality is that some consensus on how to achieve each of these goals must be garnered. Without consensus on these issues, the debate over how to effectively balance these issues will only become exacerbated over the course of time.

Given the importance of reconciling these issues, this investigation proposes two specific solutions that may provide some improvements to the current situation. In addition to fortify information technology infrastructure, an effort to define and understand what is meant by free or public information must be considered. Only by reaching consensus on the issue and creating clear guidelines will it be possible for the government and citizens to find a balance between freedom of information and privacy and security. Without consensus, this debate will continue with no effective resolution.

References

1] Holsen, S. (2007). Freedom of information in the UK, U.S. And Canada. Information Management Journal, 41(3), 50-55.

2] Kirtley, J.E. (2006). Transparency and accountability in a time of terror: The Bush Administration's assault on freedom of information. Communication Law & Policy, 11(4), 479-509.

3] Swartz, N. (2004). The world moves toward freedom of information. Information Management Journal, 28(6), 20-23.

4] Halstuk, M.E., & Chamberlin, B.F. (2006). The Freedom of Information Act 1966-2006: A retrospective on the rise of privacy protection over the public interest in knowing what the government's up to. Communication Law & Policy, 11(4), 511-564.

5] Grimes, R.A., & Gincel, R. (2007). Enemy inside the firewall. InfoWorld, 29(6), 27-30.

6] Hewitt, M. (2006, June…

Sources used in this document:
References

1] Holsen, S. (2007). Freedom of information in the UK, U.S. And Canada. Information Management Journal, 41(3), 50-55.

2] Kirtley, J.E. (2006). Transparency and accountability in a time of terror: The Bush Administration's assault on freedom of information. Communication Law & Policy, 11(4), 479-509.

3] Swartz, N. (2004). The world moves toward freedom of information. Information Management Journal, 28(6), 20-23.

4] Halstuk, M.E., & Chamberlin, B.F. (2006). The Freedom of Information Act 1966-2006: A retrospective on the rise of privacy protection over the public interest in knowing what the government's up to. Communication Law & Policy, 11(4), 511-564.
Cite this Document:
Copy Bibliography Citation

Related Documents

John Brown / Health Information Privacy
Words: 840 Length: 2 Document Type: Essay

John Brown: Was he a murderer or a martyr? The actions of John Brown raise many uncomfortable questions about how we view terrorism in modern society. It is often said that 'one man's terrorist is another man's freedom fighter' and that expression certainly holds true with John Brown in his raid on Harper's Ferry. Even before the Harper's Ferry raid, Brown was a "leader of antislavery guerillas" in Kansas and "fought

Privacy of an Individual in the Workplace
Words: 2222 Length: 8 Document Type: Essay

Privacy of an Individual in the Workplace Argument Length: 2,000 words Task Construct argument notion individual's privacy important consideration workplace, Use ethical theory support position. Rationale This task designed: demonstrate capacity understand evaluate privacy; demonstrate understanding issues encroach individual's privacy workplace; demonstrate ability construct a compelling argument logically consistent supported ethical theory; Privacy of an individual in the workplace In the workplace, it is expected that employees must relinquish some of their most

Privacy and the Internet
Words: 689 Length: 2 Document Type: Essay

Privacy Matters: Introduction to Sociology. As Glenn Greenwald points out, the Internet has been turned into a tool of mass surveillance, notably with the NSA always lurking and spying on the Digital Era’s best means of communication. To some extent this type of spying and violation of privacy has become accepted as the norm because sociopolitical discourse in the modern era presupposes that there are two types of people in the

Information Protection Law and Privacy
Words: 4525 Length: 16 Document Type: Essay

protect the privacy of the individual via EU Directive for Protection of Personal Data The internet revolutionized the human life as we know it. It established a culture of liberty aided by not just ingenuousness but also standardized protocols. This was achieved by transmitting the essential products for business-related growth, adopting a model of governance with no formal existence of regulations along with free availability of abundant software packages. This

Information Systems Cloud Computing
Words: 1083 Length: 4 Document Type: Term Paper

Cloud Nursing Technology advancement within today's society ensures that new ways of performing tasks must be learned. This cycle of discovery is at the heart of every academic or professional pursuit that molds and evolves our methods and thinking patterns. The digital revolution that has occurred throughout the last two decades has forced many industries to alter their approach to their tasks, requiring re-education and an open mind ready to welcome

Privacy Rights and Media
Words: 2294 Length: 7 Document Type: Research Paper

1984 to Now: Fiction Becoming Reality? In the 2016 film Snowden by Oliver Stone, illegal governmental surveillance of the lives of private citizens via digital means (such as ordinary computer webcams) disturbs the film's hero, a dramatized representation of real-life whistleblower Edward Snowden. Snowden ultimately rebels against the government agency that employs him as he rejects the totalitarian principles that govern the agency. Indeed, the film touches upon a reality that

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now