Less Safe

Author(s):  
Harry Hammitt

Since the terrorist attacks of September 11, 2001, there has been a tightening of public access. In response to perceived security threats, government agencies have taken information down from Web sites, curtailed or restricted access to electronic sources of information, broadened the interpretation of FOIA exemptions, created or augmented new categories of restricted information, and prohibited public access for critical infrastructure information. These policy responses have been based both on the perceived security threat and an inhospitable attitude toward open government on the part of the Bush administration.

2015 ◽  
Vol 10 (3) ◽  
pp. 360-374 ◽  
Author(s):  
Androniki Kavoura ◽  
Aikaterini Stavrianeas

Purpose – The purpose of this paper is to examine visitors’ perceptions and relevant importance of social media when choosing a Mediterranean destination and also to explore the extent in which they believe it is important for them to belong to an online community with shared characteristics among its members. Design/methodology/approach – A stratified, based on nationality and gender, sample of 301 respondents of foreign arrivals of visitors in the Athens airport, Greece was collected in June and July 2014 based on the official Athens Airport Authorities Arrival Research. This is a partially exploratory research. Findings – Differences between age groups as far as the importance attributed to social media as sources of information about a tourism destination were found. The respondents, when using the internet for gathering information about a tourism Mediterranean destination, consider different online channels. Facebook is among the most important sources of information for them associated with the tourism destinations. Official web sites/blogs of the destination are the first source and photo sharing sites are the second most preferred source; sharing aesthetics of photos was found to contribute to the feeling of belonging to an on line travel community. Research limitations/implications – Further research will contribute to the development of greater understanding of the strategic approaches to social media and their use to promote a destination. Greek diaspora would be interesting to examine and geographical differences among groups. Practical implications – The paper denotes the importance for destination management organizations and companies, to fully employ the social media in their marketing efforts. Originality/value – The present study increases our understanding of the adoption of online and traditional communications in the visitor’s process for Athens, Greece, shedding light to the literature existing on the significance attributed to the online travel community belonging from visitors through sharing aesthetics of photos and associations of ideas based on age differences.


Author(s):  
Ching-Chieh Kiu ◽  
Lai-Yung Yuen ◽  
Eric Tsui

E-Government emerges from web sites that offer static information, documents and forms for employees and citizens, enquiries, and process automations to many types of stakeholders. Increasingly, different layers of government services are being consolidated into a knowledge portal, providing on time and online services. Such knowledge portals not only provide a platform for integrating applications and information from all government sources, but also provide platforms for knowledge sharing and learning to the public with the objective to improve the efficiency and the quality of E-Government processes and services. However, due to the heterogeneity of applications and information across different levels of government agencies, a significant amount of work is needed to re-configure such applications and services into a new platform. However, semantics are often deficient, which results in problems establishing effective knowledge sharing and learning in E-Government. This paper confers how knowledge intensive portals can be used for enhancing sharing and learning in E-Government. The authors discuss innovative information on how the Semantic Web and Web 2.0 technologies can be applied in providing interoperability to leverage knowledge sharing and learning activities.


Author(s):  
Michael T Compton ◽  
Beth Broussard

As we have discussed in previous chapters, it is very important for people with psychosis and their family members to learn about psychosis and effective treatments. This sort of learning is an important step towards recovery and preventing a relapse. However, seeking information to better understand psychosis can be frustrating at times. The amount of information received from mental health professionals and other sources can be overwhelming. However, aside from this book, very few books focus on first-episode psychosis. When searching the Internet, it is difficult at times to tell the difference between Web sites with correct and helpful information from those that contain opinions and confusing information. This chapter describes the benefits of educating yourself about psychosis and then describes different resources that are available. As discussed in Chapter 7 on Psychosocial Treatments for Early Psychosis, psychoeducation is a type of education that focuses on the topic of mental illnesses. The goal of psychoeducation is to help individuals with a mental illness, and their family members, better understand the illness. If a person understands his or her illness, then he or she will be able to deal with it more successfully. Psychoeducation, for both patients and their families, is an effective form of treatment in itself and an important step in preventing relapse and hospitalization. Research has shown that those who receive psychoeducation are less likely to have a relapse and enter the hospital compared to those who do not receive psychoeducation. The patient’s mental health professional is one of the best sources of information. Do not be afraid to ask him or her to explain more if some piece of information is unclear. Another good idea is to bring a list of questions with you when you meet with the mental health professional to make sure that you leave the appointment with all of your questions answered. Asking questions and getting answers helps you become confident that you understand the next steps. Worksheets provided in Chapters 2 and 9 will help you keep track of information that may be important to share with the mental health professional.


2014 ◽  
Vol 4 (3) ◽  
pp. 11-26
Author(s):  
John S. Hurley ◽  
H. Mark McGibbon ◽  
Roxanne Everetts

Many of the systems that control the critical infrastructure were not originally designed with security in mind. This has left us vulnerable to unwanted attacks in many of the environments. It has become essential that the authors determine if their infrastructures are better prepared for existing and future threats. In this study, the authors will examine the impact of attacks, including terrorist attacks on critical infrastructures, in particular, the Energy sector. The results show that in spite of the warnings of the threats carried out in various sectors and organizations around the world, they have still remain extremely vulnerable because of a number of critical security issues that hamper their ability to better serve and protect our vital information assets. The authors examine some of the most prominent models being used today and how they may be modified to better serve the needs of their user communities and key stakeholders.


Author(s):  
Maher O. Al-Fakhri ◽  
Robert A. Cropf ◽  
Gary Higgs ◽  
Patrick Kelly

Saudi Arabia is in the process of transitioning to e-government. Many of the Saudi government agencies have their own web sites; however, most are ineffective. Based on the findings of this study, the Saudis should consider several reforms, chief among which include the following: Increasing the awareness of its e-government program among its employees and the public at-large; making Internet access more available across the full spectrum of society; equipping public facilities for Internet usage; developing a legal framework for secure e-transactions; adopting a flexible approach to technological change and the IT environment more generally; providing IT training to government employees; partnering with the private sector to establish electronic fund transfers; and, finally, fostering 2-way communication between government agencies and between the government and the public.


1999 ◽  
Vol 2 ◽  
pp. 303-328 ◽  
Author(s):  
Ulf Öberg

There is without doubt a radical difference between the culture of open government in Sweden and the until recently prevailing culture of secrecy in Britain and within the European Union. From a classic British sceptic’s perspective, “public access to official documents is deemed unnecessary, since British democracy has functioned for so long without it”. The British “have always relied heavily, although not always successfully, on the concept of ‘ministerial responsibility’ to Parliament in order to secure public trust in government”. The mainstream of eighteenth-century British political thought held that the nation’s political well-being required the foundation of an informed gentleman citizenry. By the middle decades of the eighteenth-century, the movement away from the idea of a citizenry composed exclusively of gentlemen was firmly established on both sides of the Atlantic. It became increasingly acknowledged that men of the “meaner sort” should have the right to hold opinions on public affairs and ought to be allowed to protest against governments and laws they deemed improper.


Subject Counterterrorism policy and operations in Pakistan. Significance Jamaat-ul-Ahrar, a Sunni terrorist group that splintered from Tehreek-e-Taliban Pakistan (TTP) in 2014, has claimed several deadly terrorist attacks in recent months. This spate of violence has cast a spotlight on Pakistan’s security strategies. Impacts Relatively 'soft' state and civilian targets such as lower courts, media offices and religious sites face the greatest security threat. Pakistan will struggle to persuade Beijing that Chinese-financed infrastructure projects are safe. India-Pakistan ties will continue to fray.


Sign in / Sign up

Export Citation Format

Share Document