What is an Information Society
Why are Information Policies needed
What is an Information Policy
Elements of Information Policy
Who has Information Policies
E-Inclusion
Life Long Learning
E-Business strategies
Infrasture – physical (broadband/e-fibre)
Infrastructure – political / Legal and regulatory
Copyright, Intellectual Property, Data Protection, Freedom of Information
Regulation of Domain Name Spaces ( .ie)
E-government
Information Policy in Ireland
A presentation on historical development of digital libraries by Rupesh Kumar A, Assistant Professor, Department of Studies and Research in Library and Information Science, Tumkur University, Karnataka, India.
A presentation on historical development of digital libraries by Rupesh Kumar A, Assistant Professor, Department of Studies and Research in Library and Information Science, Tumkur University, Karnataka, India.
A discussion over the concept of ERM and its need in a Library. It also covers different software solutions for the management of electronic resources from the libraries.
Presentation given at "Change, Challenge and Collaborate" event held at De Montfort University Kimberlin Library on 22nd May 2012, an event organised by the East Midlands ARL Group of CILIP.
Library and Information Science Education for the 21st Century / Lyn Robinson Infodays
This presentation will consider the recent development of library and information science as an academic discipline, and the consequent changes required to library school curricula, in order to prepare professional practitioners for employment in today’s information society. These changes, led primarily by technological developments, include the need for consideration of new forms of documents, new methods of dissemination, new information behaviour patterns and increasing demand for novel information architectures. Alongside changes in technology, we can see the emergence of overlap with companion disciplines such as the digital humanities, and these must be accommodated, alongside more obvious connections, such as those with computer science. In conclusion from all of this, we can see that a course focused solely on traditional workplace skills will be insufficient for today’s portfolio-based workforce. We must have an emphasis on thinking skills, new literacies, and resilience, so that we prepare our graduates for employment beyond their first position.
Relationship of information science with library scienceSadaf Batool
Relationship of information science with library science
Presentation by Sadaf Batool
MPhil 1st semester
Table of contents
1. Definition of information science
2. Definition of library science
3. Primary history of library
4. Primary history of information
5. Progress of library science as (Library and information science)
6. IS &LS concerned task
7. Relationship of Information science with library science
8. According to S.R Nathan’s five laws
9. Difference of Information science &Library science
10. Conclusion
11. References
Definition of information science
Information science is that discipline that investigates the properties and behavior of information, the forces governing the flow of information, and the means of processing information for optimum accessibility and usability.
It primarily concerned with the analysis, collection, classification, manipulation, storage, retrieval, movement, dissemination, and protection of information.
This includes the investigation of information representations in both natural and artificial systems, the use of codes for efficient message transmission, and the study of information processing devices and techniques such as computers and their programming systems.
It is an interdisciplinary science derived from and related to such fields as mathematics, logic, linguistics, psychology, computer technology, operations research, the graphic arts, communications, library science, management, and other similar fields. It has both a pure science component, which inquiries into the subject without regard to its application, and an applied science component, which develops services and products." (Borko, 1968, p.3The study of – the use of information, – its sources and development; – usually taken to refer to the role of scientific, industrial and specialized libraries and information units – in the handling and – dissemination of information. (Prytherch, 2005)
The systematic study and analysis of the – sources, – development, – collection, – organization, – dissemination, – evaluation, – use, and – management of information in all its forms, including the channels (formal and informal) and technology used in its communication. – –(Reitz, 2004) Definition of library science
The study of principles and practices of library care, and organization and administration of a library, and of its technical, informational, and reference services.
Library science as “a generic term for the study of libraries and information units, the role they play in society, their various component routines and processes, and their history and future development. (Harrods ‘Librarian’s Glossary)
Collection of reading material, its processing, organization and dissemination started with the advent of library. The knowledge and its implementation in respect of library may therefore be called library science.
The professional kn
A presentation on Interoperability in Digital Libraries by Rupesh Kumar A, Assistant Professor, Department of Studies and Research in Library and Information Science, Tumkur University, Tumakuru, Karnataka, India.
Techniques for Electronic Resource Management: Crowdsourcing for Best PracticesJill Emery
We invited interested librarians via social media venues such as Facebook, twitter, Tumblr & a wiki. Come learn how this experiment worked and participate in the development of capturing the best practices of electronic resource management. The TERMS Library Technology Report will be made available to attendees.
The arrival and enormous growth rate of digital contents have fundamentally changed the way in which content is made available to library users. In the recent years, libraries are acquiring more and more electronic resources (e-resources) because of perceived benefits, such as easy access to information and its comprehensiveness. Due to the influx of e-resources in libraries, the collection, acquisition, and maintenance of these resources have become complicated issues to deal with. This has forced libraries to devise strategies to manage and deliver e-resources conveniently. Therefore, “Management of E-resources” or “Electronic Resource Management” (ERM) has become a challenge for library professionals that needs to be addressed through research and practice. To meet these challenges, library professionals and content providers have decided to develop ‘Electronic Resource Management System’ (ERMS) for management of e-resources in a more systematic way.
Knowledge management is a concept that has emerged explosively in the business community starting from the 60s and has been discussed extensively in the literature. The essential part of KM is, of course, knowledge. To determine what KM is, it is necessary to distinguish some definitions and concepts.
Understanding of ethical values.
Appreciate ethical values which enhancing quality in professional performance.
To realize the responsibility of being a LIS profession and ethical standards.
Establish Ethical Standards in professional performance.
Planning and Implementing a Digital Library ProjectJenn Riley
Brancolini, Kristine and Jenn Riley. "Planning and Implementing a Digital Library Project," Indiana LSTA Digital Project Planning Workshop, February 7, 2006.
E. Bryan - E-Governance and Personal PrivacyEmerson Bryan
Critically discussion on the view that the government needs to track and store a citizen’s personal information in order to provide ‘a safe and secure society’ versus a citizen’s right to protect his/ her personal information
A discussion over the concept of ERM and its need in a Library. It also covers different software solutions for the management of electronic resources from the libraries.
Presentation given at "Change, Challenge and Collaborate" event held at De Montfort University Kimberlin Library on 22nd May 2012, an event organised by the East Midlands ARL Group of CILIP.
Library and Information Science Education for the 21st Century / Lyn Robinson Infodays
This presentation will consider the recent development of library and information science as an academic discipline, and the consequent changes required to library school curricula, in order to prepare professional practitioners for employment in today’s information society. These changes, led primarily by technological developments, include the need for consideration of new forms of documents, new methods of dissemination, new information behaviour patterns and increasing demand for novel information architectures. Alongside changes in technology, we can see the emergence of overlap with companion disciplines such as the digital humanities, and these must be accommodated, alongside more obvious connections, such as those with computer science. In conclusion from all of this, we can see that a course focused solely on traditional workplace skills will be insufficient for today’s portfolio-based workforce. We must have an emphasis on thinking skills, new literacies, and resilience, so that we prepare our graduates for employment beyond their first position.
Relationship of information science with library scienceSadaf Batool
Relationship of information science with library science
Presentation by Sadaf Batool
MPhil 1st semester
Table of contents
1. Definition of information science
2. Definition of library science
3. Primary history of library
4. Primary history of information
5. Progress of library science as (Library and information science)
6. IS &LS concerned task
7. Relationship of Information science with library science
8. According to S.R Nathan’s five laws
9. Difference of Information science &Library science
10. Conclusion
11. References
Definition of information science
Information science is that discipline that investigates the properties and behavior of information, the forces governing the flow of information, and the means of processing information for optimum accessibility and usability.
It primarily concerned with the analysis, collection, classification, manipulation, storage, retrieval, movement, dissemination, and protection of information.
This includes the investigation of information representations in both natural and artificial systems, the use of codes for efficient message transmission, and the study of information processing devices and techniques such as computers and their programming systems.
It is an interdisciplinary science derived from and related to such fields as mathematics, logic, linguistics, psychology, computer technology, operations research, the graphic arts, communications, library science, management, and other similar fields. It has both a pure science component, which inquiries into the subject without regard to its application, and an applied science component, which develops services and products." (Borko, 1968, p.3The study of – the use of information, – its sources and development; – usually taken to refer to the role of scientific, industrial and specialized libraries and information units – in the handling and – dissemination of information. (Prytherch, 2005)
The systematic study and analysis of the – sources, – development, – collection, – organization, – dissemination, – evaluation, – use, and – management of information in all its forms, including the channels (formal and informal) and technology used in its communication. – –(Reitz, 2004) Definition of library science
The study of principles and practices of library care, and organization and administration of a library, and of its technical, informational, and reference services.
Library science as “a generic term for the study of libraries and information units, the role they play in society, their various component routines and processes, and their history and future development. (Harrods ‘Librarian’s Glossary)
Collection of reading material, its processing, organization and dissemination started with the advent of library. The knowledge and its implementation in respect of library may therefore be called library science.
The professional kn
A presentation on Interoperability in Digital Libraries by Rupesh Kumar A, Assistant Professor, Department of Studies and Research in Library and Information Science, Tumkur University, Tumakuru, Karnataka, India.
Techniques for Electronic Resource Management: Crowdsourcing for Best PracticesJill Emery
We invited interested librarians via social media venues such as Facebook, twitter, Tumblr & a wiki. Come learn how this experiment worked and participate in the development of capturing the best practices of electronic resource management. The TERMS Library Technology Report will be made available to attendees.
The arrival and enormous growth rate of digital contents have fundamentally changed the way in which content is made available to library users. In the recent years, libraries are acquiring more and more electronic resources (e-resources) because of perceived benefits, such as easy access to information and its comprehensiveness. Due to the influx of e-resources in libraries, the collection, acquisition, and maintenance of these resources have become complicated issues to deal with. This has forced libraries to devise strategies to manage and deliver e-resources conveniently. Therefore, “Management of E-resources” or “Electronic Resource Management” (ERM) has become a challenge for library professionals that needs to be addressed through research and practice. To meet these challenges, library professionals and content providers have decided to develop ‘Electronic Resource Management System’ (ERMS) for management of e-resources in a more systematic way.
Knowledge management is a concept that has emerged explosively in the business community starting from the 60s and has been discussed extensively in the literature. The essential part of KM is, of course, knowledge. To determine what KM is, it is necessary to distinguish some definitions and concepts.
Understanding of ethical values.
Appreciate ethical values which enhancing quality in professional performance.
To realize the responsibility of being a LIS profession and ethical standards.
Establish Ethical Standards in professional performance.
Planning and Implementing a Digital Library ProjectJenn Riley
Brancolini, Kristine and Jenn Riley. "Planning and Implementing a Digital Library Project," Indiana LSTA Digital Project Planning Workshop, February 7, 2006.
E. Bryan - E-Governance and Personal PrivacyEmerson Bryan
Critically discussion on the view that the government needs to track and store a citizen’s personal information in order to provide ‘a safe and secure society’ versus a citizen’s right to protect his/ her personal information
Copy of OSTP RFI on Big Data and PrivacyMicah Altman
This document was originally published by OSTP here:
http://www.ofr.gov/(S(rfkilxaktjiadgtykwxaljqm))/OFRUpload/OFRData/2014-04660_PI.pdf
The original link is now broken, so this copy is provided for the transparency and commentary.
ISO/IEC 27001, ISO/IEC 27701, and Data Privacy Laws: Key threats in 2022PECB
In recent years, there has been a significant number of data privacy laws and regulations which have impacted business in different areas.
In this regard, many organizations are training their staff in order to avoid heavy penalties that are coming as a result of noncompliance.
Amongst others, the webinar covers:
• Some of the points that this webinar will cover:
• Privacy history - United Nations, EU/APAC/NA
• The GDPR and implications for global companies
• Practical Guide for Privacy Governance
• How Security and Privacy intersect
Presenters:
Ken Fishkin, CISSP, CIPT, CIPP/US, CIPM, ISO/IEC 27001 Lead Implementer, leads Lowenstein Sandler’s information security and data privacy programs, and mitigates their security and privacy risks to comply with client and regulatory requirements. He has more than 20 years of experience implementing and supporting secure, complex information technology infrastructures. Ken’s detailed knowledge of security and network methodologies, techniques, and best practices enables him to thoroughly assess and remediate cybersecurity threats and vulnerabilities.
He is President of the New Jersey Chapter of (ISC)2, a charitable, nonprofit organization focused on disseminating knowledge, exchanging ideas, and encouraging community outreach efforts in an effort to advance information security practice and awareness.
Ken is also on the Executive and Threat Intelligence Committees of the Legal Services Information Sharing and Analysis Organization (LS-ISAO), a member-driven community providing a secure framework for sharing actionable threat intelligence and vulnerability information.
Alfonso (Al) is currently the Vice President of Data Privacy & Security at a public SaaS-based real estate management firm based in California. Prior to this role, he was the Head of IT Risk & Privacy and Data Protection Officer (DPO) for a global Fortune 500 luxury retailer responsible for protecting $6Bn in annual revenue from traditional brick and mortar and e-Commerce channels. He has also been the Chief Information Security Officer (CISO) for a private consulting firm specialized in regulatory advisory services, and held various Governance, Risk, Compliance, and Privacy leadership roles in Energy, Financial Services, Security and Insurance industries.
Alfonso holds a Masters in Information Systems from Stevens Institute of Technology in Hoboken, New Jersey, and a Bachelor’s degree in Computer Science & Engineering from New York University, Tandon School of Engineering, Polytechnic Institute in Brooklyn, New York.
-------------------------------------------------------------------------------
YouTube video: https://youtu.be/UdE3aaZKCH8
Website link: https://pecb.com/
"Information Compliance - Freedom of Information, Data Protection and Librari...Terry O'Brien
"Information Compliance - FoI, data protection and libraries". Presentation given by Terry O'Brien at Joint English / Irish IIUG Conference, Institute of Technology, Blanchardstown, Dublin, Ireland, June 2009
BCJ 4385, Workplace Security 1 UNIT IV STUDY GUIDE I.docxJASS44
BCJ 4385, Workplace Security 1
UNIT IV STUDY GUIDE
Information, Communications, and
Computer Security
Course Learning Outcomes for Unit IV
Upon completion of this unit, students should be able to:
1. Examine the function of information security management and how it
plays a role in assessing vulnerabilities to critical information.
2. Analyze various information protection strategies and how these can
play a role in the prevention of cybercrimes.
3. Outline strategies for safeguarding information including the protection
strategies of physical security, administrative controls, and logical
controls.
Unit Lesson
General Overview
Information is an asset for organizations that exists in various forms (critical,
propriety, intellectual, and digitized). Thus, securing the various forms of
information are priorities for organizations. Laws such as the Fair Credit
Reporting Act were created to help protect information from improper use, but
such measures are insufficient in providing the level of protection needed to
secure organizational information.
Organizations use various tools and strategies to ensure information security
(INFOSEC) which is the protection of “information assets and systems against
any internal or external threat that might endanger them” (Ortmeier, 2013,
p.135). INFOSEC risk assessments and analyses are conducted to identify the
threats against organizational information that may exist and information
protection strategies are implemented to protect against and respond to the
identified threats. Protection strategies range from control strategies
(discretionary access control, mandatory access control: hierarchical and
non-hierarchical, operations security) to personnel security (information
protection-related agreements) which includes information security legislation
(e.g., National Security Decision Directive 298), classification systems for
business information (e.g., sensitive compartmented information protocols),
information security policies, and copyrights, patents, and trademarks.
Communication security (COMSEC) is important for any information transmitted
regardless of the medium (e.g., voice, electronic, impulses, microwave, etc.).
Computer security is concerned with information accessible through computers.
Maintaining computer security is a complicated task because information can be
accessed locally and remotely through numerous means. The term cybercrime
was coined to identify the crimes that are associated with using the internet to
illegally gain access to information that is used in crimes (e.g., hacking, email
wiretappings, phishing, and vishing).
Thus one can image that one of the greatest challenges related to computer
security is securing computer databases from internal and external threats.
Government agencies have added issues of protection threats against their
agencies and their personnel. To aid all organizations in maintaining co ...
Data Science For Social Good: Tackling the Challenge of HomelessnessAnita Luthra
A talk presented at the Champions Leadership Conference Series - leveraging data provided by New York City’s Department of Homeless Services, software vendor Tibco partnered with SumAll.Org to help tackle the societal challenge of homelessness in New York City.
Introduction to the Global Digital DivideNiamh Headon
Introduction and brief overview the Global Digital Divide.
Definition
Internet access & Globalization of technology and technology skills
Challenges of Global Digital Access
World Summit on the Information Society
Education & Economics
Effective Government
Cultural and Economic differences
Social Class and Access to Technology
Individuals with disability
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
2. Agenda
What is an Information Society
Why are Information Policies needed
What is an Information Policy
Who has Information Policies
Information Policy in Ireland
3. What is an Information Society
A society where the creation, distribution, use,
integration and manipulation of information area
significant economic, political, and cultural activity.
Economic counterpart = Knowledge Economy
Successor to Industrial Society???
4. Theories of ‘Information Society’
: Sample
Machlup – patents & research
Knowledge Industry, sectors
Drucker – materials based > knowledge based economy
Bell – no. of employee > in sector = indicator of
informational character of society.
Other theorists include :
Porat
Touraine
Lyotard
Sonntag
Stehr
Toffler
Van Dijk
5. Castells – Network Society
The key social structures and activities are organized
around electronically processed information networks.
10. History of Information Policy
Image http://www.personal.psu.edu/glh10/ist110/topic_old/topic01/topic01_02.html
11. What is an Information Policy
Information policy is the set of all public laws, regulations and
policies that encourage, discourage, or regulate the creation, use,
storage, access, and communication and dissemination of
information.[1] It thus encompasses any other decision-making
practice with society-wide constitutive efforts that involve the flow
of information and how it is processed.[2]
[1]Weingarten, F.W. (1989) Federal Information Policy Development: The Congressional perspective. In C. McClure, P. Hernon and H. Relyea (eds), United States Government Information Policies: views and Perspectives (Ablex, Norwood, NJ).
[2]Braman, S. (2011). Defining information policy. Journal of Information Policy 1-5. http://jip.vmhost.psu.edu/ojs/index.php/jip/article/view/19/14.
Can be anything
1. How you manage your privacy settings on Social networks
2. Government strategy (Infrastructure, Policy, Law, Regulation)
3. Corporate plan
12. Elements of Information Policy
E-Inclusion
Life Long Learning
E-Business strategies
Infrasture – physical (broadband/e-fibre)
Infrastructure – political / Legal and regulatory
Copyright, Intellectual Property, Data Protection, Freedom
of Information
Regulation of Domain Name Spaces ( .ie)
E-government
15. Freedom of Information (FOI)
Image: http://wayne-newsyoudontsee.blogspot.ie/2011/04/what-freedom-of-information.html
16. Censorship
Is not a thing of the past.
Banned books week 2013 in the USA
Image http://blogs.furman.edu/com221sp10d/2010/04/07/12-months-of-censorship-in-china/
17. Data Protection
About your right to privacy
EU Directive 95/46
Principle: individuals should be in a position to control
how data relating to them is used
18. ISSUES
Digital environment: intellectual property,
economic regulations, freedom of
expression, confidentiality or privacy of
information, information security, access
management, and regulating how the
dissemination of public information
occurs.
20. Issue: Privacy
Habermas:
Public and private sphere
http://www.youtube.com/watch?v=g4tLsTt9LxM
The NSA has huge
capabilities – and if it
wants in to your computer,
it's in.
• Explaining the latest NSA revelations – Q&A
29. Data Protection - Ireland
Data protection acts 1998 & 2003
Data protection commissioner
Data protection is about your fundamental right to
privacy.
You can access and correct data about yourself.
Those who keep data about you have to comply with
data protection principles
30. FOI – Ireland
Table from http://www.oic.gov.ie/en/Publications/Special-Reports/10th-Anniversary-Publication-Freedom-of-Information-The-First-
Decade-/Freedom-of-Information-The-First-Decade.pdf
32. Advantages of having an
Information Policy
Get the best of web 2.0 (ie non-static web
pages – interactivity)
Influence people paying attention to the
social aspect of these socio-technical
systems.
Secure the preservation of digital content
Bring about information production
33. Future needs
Needs to be flexible, and change to meet ever evolving
circumstance as the ability to access, store and share
information continues to grow.
DNA / Genetic information
Medical privacy
We can consider than in very primitive societies, the individual held all the power. As social organizations became more complex, the need for a minimal coordination comes evident: tribes got their chieftains to guide the collective.
The growth of communities and the need to strengthen coordination — especially against the “threat” of other communities — imply (amongst other factors) the militarization of a society and, sooner or later, the seizure of power by the military chaste. Warlords and absolute kings (and also Pharaohs, etc.) do not only rule but also reduce the degree of freedom of their subjects:
Many claim that the Information Society is empowering back individuals, and it well may definitely be true: never before as now can people or people have the potential to freely act, create, speak, reach out… within the given system. But it may also true that,never before as now is governance — as the power to change the system — so far from the citizens’ reach… even of their direct representatives, which are controlled by higher powers, most of them out of anyone’s jurisdiction. Like in an hourglass, the distribution of power is shifted to the (upper and lower) edges, the question being: who is playing the role of the transmission chain between these two edges?
Information goes through a lifecycle from creation to collection, organisation/classification, dissemination and destruction, laws an policies are needed for each stage of this cycle.
This lifecycle informs what need an information policy, and other information related policies like data protection copyright and information security policies.
For one they are needed for legal reasons associated with the development of technology and society and it’s people responding to this technology, especially the digitisation of cultural content – from music downloads to images of the book of kells. Digitisation reduces production costs, but has also seen an increase in the exchange of file – illegally or of unauthorized copies (Napster controversy is an example of this). This exchange can take place online, p2p or via hardcopy off line. It created a grey area. Because it had economic impact something was done about it via information policy. The music industry demanded regulation.
This is also the origin of those lovely anti-piracy sections at the start of our dvd’s.
Information policy shapes many aspects of society and set boundaries as they set a framework to evaluate issues in relation to the life cycle of information and the it’s use.
Organization information policies reflect this in that they Look at the interaction between tech and people, where using information is the aim of the interaction, issues include who sets the policy where it’s top-down or middle-down, AND how the organisation’s culture influences the complexity of it’s information need.