Search results

1 – 10 of over 169000
To view the access options for this content please click here
Article
Publication date: 1 August 1998

Ian Rowlands

Commentators in the library and information profession habitually voice concern about the perceived lack of a coherent and integrated set of ‘national information policies

Abstract

Commentators in the library and information profession habitually voice concern about the perceived lack of a coherent and integrated set of ‘national information policies’ in the UK. These concerns are worthy but ultimately misplaced. The real problem is not our inability to come up with a nice neat package of the ‘right policies’, but our failure to think critically about the value systems that shape our perception of information policy problems in the first place. This article contributes to this new agenda by developing a concept mapping of the Field of information policy, based on term co‐occurrence data. This leads to a broader discussion about the values — rather than the specific laws and regulations — that underpin our conceptions of information policy.

Details

Aslib Proceedings, vol. 50 no. 8
Type: Research Article
ISSN: 0001-253X

To view the access options for this content please click here
Article
Publication date: 1 November 1993

Nick Moore

Information will play an important role in the economic, social and political development of the People's Republic of China. The information industries will be of growing…

Abstract

Information will play an important role in the economic, social and political development of the People's Republic of China. The information industries will be of growing importance within the Chinese economy and they will play an important part in the interaction with the international economy. Within Chinese organizations information can be used to improve productivity. Access to information is also an important element in the working of social and political systems. It is necessary to develop a range of policies to ensure that information services and systems are developed in the most effective way. When analysing the policy arena it is possible to identify three different policy levels: industrial; organizational and social. At each of these levels, there are five elements which need to be taken into account: information technology; information markets; information engineering; human resources, and legislation and regulation. By combining the levels and elements it is possible to construct an information policy matrix which can be used to analyse the policy requirements.

Details

Aslib Proceedings, vol. 45 no. 11/12
Type: Research Article
ISSN: 0001-253X

To view the access options for this content please click here
Article
Publication date: 1 March 1990

Ian Malley

No comprehensive national information policy exists in the UK. Although there are many practical reasons for its absence, the lack of political will by government is…

Abstract

No comprehensive national information policy exists in the UK. Although there are many practical reasons for its absence, the lack of political will by government is probably decisive. This paper attempts to examine the political pressures (both domestic and international) for and against a UK national information policy: initially by looking at the major factors which militate against the formulation of a policy (most of these are a result of government philosophy and domestic politics), and then by looking at developments which might bring a policy into existence (most of these relate to political and economic developments in Europe). The number of government departments involved in information matters, their individual and disparate policies, the success of the market‐led information economy, and the difficulty in controlling the multi‐national element of this economy, all stand in the way of the establishment of a national policy. Yet the single European market, European regulations, the need to formulate a European information policy, the historic parallels with other sectors of European policy, each of which have profound economic implication, suggest that the present vacuum might have to be filled.

Details

Aslib Proceedings, vol. 42 no. 3
Type: Research Article
ISSN: 0001-253X

To view the access options for this content please click here
Article
Publication date: 29 April 2021

Leila Namdarian, Sirous Alidousti and Behrooz Rasuli

Strengthening and improving Scientific and Technical Information (S&Ti) flow in all nations require an effective national S&Ti policy (NS&TiP). The very first step in…

Abstract

Purpose

Strengthening and improving Scientific and Technical Information (S&Ti) flow in all nations require an effective national S&Ti policy (NS&TiP). The very first step in developing an integrated NS&TiP is clarifying its scope and dimensions. Therefore, this study aimed to identify the dimensions of NS&TiP, in the form of an analytical framework, and to show how to apply it.

Design/methodology/approach

The current study adopted a qualitative method, called the framework approach, and proposed HeLICAM, a comprehensive framework including different dimensions for NS&TiP. Afterward, Iran's science and technology documents were analyzed based on the proposed framework.

Findings

HeLICAM framework includes (1) human resources, (2) laws and regulations, (3) ICT infrastructure, (4) connections, (5) activities and (6) information market. The results obtained from the application of HeLICAM in the analysis of Iran's science and technology policy documents indicated that the various dimensions of NS&TiP have mostly been overlooked. Although several policies have been developed for science and technology in Iran, the efforts have not been comprehensive and effective enough.

Originality/value

This study proposes the normative analytical framework called HeLICAM. The purpose of HeLICAM is to provide a draft of NS&TiP dimensions to policymakers that will be useful in NS&Ti policymaking because this framework helps to answer questions like “what dimensions have been considered in writing the policy document?” and “What it lacks?”, “What are its strengths and weaknesses?”, and “How can it be improved?”

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/OIR-11-2020-0493

Details

Online Information Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1468-4527

Keywords

To view the access options for this content please click here
Article
Publication date: 2 August 2013

Ezra Shiloba Gbaje and Zakari Mohammed

The study aims to examine availability, coverage of digital preservation policy and the structures put in place by National Information Centres in Nigeria to preserve…

Abstract

Purpose

The study aims to examine availability, coverage of digital preservation policy and the structures put in place by National Information Centres in Nigeria to preserve digital information.

Design/methodology/approach

A qualitative research methodology using a case study approach was adopted. Documentary sources, a semi‐structured questionnaire for the focus group, and interviews were the instruments used to collect data. While a homogeneous sampling of five staff in the digitisation/digital preservation unit was adopted for the focus group interview, only one top management staff member from the rank of Assistant Director of each of the selected three National Information Centres was interviewed.

Findings

The National Bureau of Statistics and the National Library of Nigeria have digital preservation policies. However, the area of coverage of the available policies is not adequate enough to ensure the long‐term preservation of digital information. Similarly, the study revealed that the lack of institutional support from the National Information Centres studied is one of the challenges in the implementation of the digital preservation policy.

Practical implications

For any National Information Centre to ensure the accessibility and reuse of its digital information, it must have a digital preservation policy, without which the active management of digital information will be very challenging and can result in the loss of vital digital information of significant importance.

Originality/value

There is currently no research work addressing issues on digital preservation policy with a particular focus on Nigeria. This paper therefore highlights shortcomings of the available digital preservation policy and proposes a national digital preservation policy that will chart a road map for effective digital preservation activities in any National Information Centre.

Details

The Electronic Library, vol. 31 no. 4
Type: Research Article
ISSN: 0264-0473

Keywords

To view the access options for this content please click here
Article
Publication date: 11 December 2019

Jake Weidman and Jens Grossklags

Colleges and universities across the USA have seen data breaches and intellectual property theft rise at a heightened rate over the past several years. An integral step in…

Abstract

Purpose

Colleges and universities across the USA have seen data breaches and intellectual property theft rise at a heightened rate over the past several years. An integral step in the first line of defense against various forms of attacks are (written) security policies designed to prescribe the construction and function of a technical system, while simultaneously guiding the actions of individuals operating within said system. Unfortunately, policy analysis is an insufficiently discussed topic in many academic communities with very little research being conducted in this space.

Design/methodology/approach

This work aims to assess the current state of information security policies by analyzing in-use policies from 200 universities and colleges in the USA with the goal of identifying important features and general attributes of these documents. The authors accomplish this through a series of analyzes designed to examine the language and construction of these policies.

Findings

To summarize high-level results, the authors found that only 54 per cent of the top 200 universities had publicly accessible information security policies, and the policies that were examined lacked consistency with little shared source material. The authors also found that the tonal makeup of these policies lacked a great deal of emotion, but contained a high amount of tentative or ambiguous language leading toward policies that could be viewed as “unclear.”

Originality/value

This work is an extension of a paper that was presented at ECIS 2018. The authors have added additional analyzes including a cross-policy content and tonal analysis to strengthen the findings and implications of this work for the wider research audience.

Details

Information & Computer Security, vol. 28 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

To view the access options for this content please click here
Article
Publication date: 14 November 2017

Adrienne Muir and Charles Oppenheim

The purpose of this paper is to examine Nick Moore’s information policy matrix and how it has been used by Moore and others.

Abstract

Purpose

The purpose of this paper is to examine Nick Moore’s information policy matrix and how it has been used by Moore and others.

Design/methodology/approach

This study involved secondary search and a bibliographic study of the impact Moore’s work has had on other authors.

Findings

It is clear that there have been two quite separate trains of research in information policy, one in the USA and one in Europe, and that it appears from the literature that there is limited awareness of each other’s work. Focusing on the UK and European research, the papers the authors inspected that report information policy analyses make no mention of Moore’s work. It could be argued that Moore’s matrix is too simplistic for such a complex topic as information policy, but it may also be the case that there is a lack of awareness of how the matrix can be used in policy analysis as Moore’s published papers were general descriptions of the matrix, reported the findings of his analyses or suggested policy goals. Moore did not publish theoretical or methodological papers to explain how to go about policy analysis using his matrix.

Research limitations/implications

This study is based on secondary research and bibliographic analysis. Furthermore, primary research could have revealed deeper insights into use and impact of Moore’s framework by analysts and policy makers.

Originality/value

The paper highlights potential opportunities for international collaboration on information policy research, to explore more deeply theoretical models that could be used to underpin policy analysis as well as the potential value of Moore’s matrix.

To view the access options for this content please click here
Article
Publication date: 1 April 2003

Georgios I. Zekos

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination…

Abstract

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some legal aspects concerning MNEs, cyberspace and e‐commerce as the means of expression of the digital economy. The whole effort of the author is focused on the examination of various aspects of MNEs and their impact upon globalisation and vice versa and how and if we are moving towards a global digital economy.

Details

Managerial Law, vol. 45 no. 1/2
Type: Research Article
ISSN: 0309-0558

Keywords

To view the access options for this content please click here
Article
Publication date: 1 June 1993

Sajjad ur Rehman

Examines the extent of coverage and nature of courses relating toinformation policy in the curricula of 48 library and information studyprogrammes in North America and in…

Abstract

Examines the extent of coverage and nature of courses relating to information policy in the curricula of 48 library and information study programmes in North America and in three Asian countries (Malaysia, Pakistan and Saudi Arabia). Reviews the curricula work by defining 11 categories conceived as an information policy framework. Finds that some categories have little or no coverage in the curricula. Schools in North America offering doctoral degrees had a much better coverage.

Details

Library Review, vol. 42 no. 6
Type: Research Article
ISSN: 0024-2535

Keywords

To view the access options for this content please click here
Article
Publication date: 23 January 2020

Elham Rostami, Fredrik Karlsson and Ella Kolkowska

The purpose of this paper is to survey existing information security policy (ISP) management research to scrutinise the extent to which manual and computerised support has…

Abstract

Purpose

The purpose of this paper is to survey existing information security policy (ISP) management research to scrutinise the extent to which manual and computerised support has been suggested, and the way in which the suggested support has been brought about.

Design/methodology/approach

The results are based on a literature review of ISP management research published between 1990 and 2017.

Findings

Existing research has focused mostly on manual support for managing ISPs. Very few papers have considered computerised support. The entire complexity of the ISP management process has received little attention. Existing research has not focused much on the interaction between the different ISP management phases. Few research methods have been used extensively and intervention-oriented research is rare.

Research limitations/implications

Future research should to a larger extent address the interaction between the ISP management phases, apply more intervention research to develop computerised support for ISP management, investigate to what extent computerised support can enhance integration of ISP management phases and reduce the complexity of such a management process.

Practical implications

The limited focus on computerised support for ISP management affects the kind of advice and artefacts the research community can offer to practitioners.

Originality/value

Today, there are no literature reviews on to what extent computerised support the ISP management process. Findings on how the complexity of ISP management has been addressed and the research methods used extend beyond the existing knowledge base, allowing for a critical discussion of existing research and future research needs.

Details

Information & Computer Security, vol. 28 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of over 169000