Public Information Directive (PSI) implementation in two Swedish municipalities

2018 ◽  
Vol 28 (1) ◽  
pp. 2-17 ◽  
Author(s):  
Proscovia Svärd

Purpose This paper examines the implementation of the Public Sector Information (PSI) directive in two Swedish municipalities amidst a changing information management landscape impacted by e-government development. Government information is currently looked upon as a “gold mine” and “raw material” to be explored by interested parties. The PSI directive grants European citizens a right to access government information flows (PSI) in order to develop new electronic services. The Swedish government implemented its PSI directive in July 2010. Swedish municipalities have to embrace the directive and make the PSI available to the general public. The literature review highlighted a number of critical issues that should be addressed if PSI initiatives are to succeed. This study revealed that the two municipalities had different resource capacities, and the levels of e-government development varied. This meant that the implementation of the PSI directive also varied. The bigger municipality with a bigger budget had implemented the PSI directive and was publishing data sets on its website, while the smaller municipality with a smaller budget only published a few documents. This paper, therefore, argues that the municipalities should have the same capacity if the PSI is to be a democratic endeavor to serve all citizens. Good quality PSI will also require the municipalities to embrace a records and information continua thinking, which highlights the necessity to proactively and holistically manage the information for pluralization in different contexts. Design/methodology/approach This paper builds on interviews that were conducted with four municipal officers. The number of respondents is quite small because the focus was specifically on people who were responsible for the implementation of the PSI directive in the municipalities. The respondents were identified through their fellow colleagues and they also recommended each other. Pickard refers to this kind of approach as a snow-bowling approach. Through interviews and observation, one participant advises on issues that need further inquiry and, hence, directs the researcher to another person who might offer more answers. A general interview guide approach was used to solicit answers to issues such as the implementation of the PSI directive, guidelines for PSI publication, if terms such as big data and open data were being used in the municipalities, if the municipalities had an information governance plan and how it was understood, if the information systems were well aligned to meet with the requirements of the PSI directive, how e-government development affected information management and information security and if the municipalities had information security guidelines. Findings The Swedish government requires its administrations to engage in e-government development. This development has led to increased amounts of information that the municipalities have to effectively manage and make available to the general public. However, the municipalities operate under different conditions. Municipalities that are financially stronger are better placed to invest in measures that will lead to better quality PSI. All municipalities are, however, expected to implement the PSI directive. The two municipalities that were the subjects of this study had different information management environments and the capacity to invest in information management systems that would facilitate the management of their information resources. The budgetary constraints faced by smaller municipalities might impact the implementation of the PSI directive and, hence, hinder the publication of the PSI. e-Government is meant to be an inclusive project, and the PSI is meant for all citizens with innovative ideas. There is a risk that citizens who belong to poorer municipalities might not be equally privileged compared to those living in resourceful municipalities. This poses a democratic challenge that should concern all people interested in an open and inclusive society. Originality/value Little research has so far been published on the implementation process of the PSI directive. The discourses that have started to emerge discuss the challenges of open data without paying much attention to the creation, capture and the management aspects of the PSI. The originality of this paper, therefore, lies in the application of the records and information continua thinking, which highlights dimensions that enhance information management and the democratic challenges that will be caused by the data divide, as municipalities have different capabilities when it comes to the publication of the PSI.

2019 ◽  
Vol 15 (3) ◽  
pp. 181-198
Author(s):  
Keith D. Harris

Theoretical basis This case used the interplay between individuals, firms and markets to examine how a company sustained success from its value adding activities. The theory of value creation was demonstrated by the leader’s ability to configure the firm’s tangible and intangible resources to create opportunities beyond the commodity markets. Also, what matters were not just the technical processes of developing value-added products, but how the company’s culture served as a link to new products, new markets and new ventures. Research methodology The case was based on primary and secondary sources. The primary sources face-to-face semi-structured recorded interviews with the protagonist at the company’s headquarters. The secondary data were from the company’s website, and public information about Johnsonville Sausage LLC. Supplemental information was gathered from market research firms. No names have been disguised. The case has been classroom tested with undergraduate students in a capstone course. The author has no personal relationship with the company. Case overview/synopsis Kevin Ladwig, Vice President, was concerned by the expanded production of ethanol, an attractive supplement to gasoline in the USA. Because most ethanol is processed from corn, expanded production of ethanol heightened the demand for corn. Since corn is a staple feed ingredient for animals, heightened demand for corn increased the cost of Johnsonville’s raw material – hogs. In fact, the cost of feed was Johnsonville’s major economic input in animal production from farrow to finish, accounting for up to 70 percent of the total production cost of hogs. The case introduces the nexus of food and energy markets and how the “Johnsonville Way” was used to convert an old idea into an innovation. Complexity academic level This case is appropriate for undergraduate and graduate courses in business and agribusiness management. It would also be appropriate for courses using concepts in innovation and organizational culture.


2019 ◽  
Vol 32 (5) ◽  
pp. 530-545 ◽  
Author(s):  
David Valle-Cruz

Purpose The purpose of this paper is to identify the factors that generate public value in e-government services through emerging technologies and to answer the following question: Which are the factors that generate public value, in the e-government services, through emerging technologies? Design/methodology/approach Based on a multivariate linear regression model, the author tests the public value of e-government services through emerging technologies in the metropolitan area of the Toluca Valley. Five factors are evaluated to understand public value: anti-corruption strategies, access to public information, transparency platforms, social media and service kiosks. Findings Smart strategies and technologies must be guided by the generation of public value through anti-corruption strategies, open data, access to information and data privacy. The efforts of governments should focus on avoiding corruption, making government transparent, opening data and correct handling of information privacy. Technology is an important mechanism to boost public value generation. Research limitations/implications Mexico is a developing country, and there are very few emerging technologies implemented in e-Government. Practical implications The results are important to identify good practices for the generation of public value in the e-Government area. Originality/value The study of emerging technologies is a new area in government, and this paper studies the generation of public value through emerging technologies in a developing country.


2015 ◽  
Vol 49 (3) ◽  
pp. 242-265 ◽  
Author(s):  
Chariya Nonthakarn ◽  
Vilas Wuwongse

Purpose – The purpose of this paper is to design an application profile that will enable interoperability among research management systems, support research collaboration, and facilitate the management of research information. Design/methodology/approach – The approach is based on the Singapore Framework for Dublin Core Application Profile, a framework for designing metadata schemas for maximum interoperability. The application profile is built from gathering stakeholders’ requirements in research community and integrates four types of research information, i.e., information on researchers, research projects, research outputs, and research reports, which benefits researchers, research managers, and funding agencies. Findings – The resultant application profile is evaluated against widely used similar metadata schemas and requirements; and is found to be more comprehensive than the existing schemas and meets the collected requirements. Furthermore, the application profile is deployed with a prototype of research management system and is found works appropriately. Practical implications – The designed application profile has implications for further development of research management systems that would lead to the enhancement of research collaboration and the efficiency of research information management. Originality/value – The proposed application profile covers information entire the research development lifecycle. Both schema and information can be represented in Resource Description Framework format for reusing purpose and linking with other information. This enables users to share research information, co-operate with others, funding agencies and the community at large, thereby allowing a research management system to increase collaboration and the efficiency of research management. Furthermore, researchers and research information can be linked by means of Linked Open Data technology.


2016 ◽  
Vol 10 (1) ◽  
pp. 99-119 ◽  
Author(s):  
L.C.O. Klaus

Purpose After discussing recent academic attempts to assess the status of worldwide military transparency and accountability in nations which adopted open governance paradigms, this paper tries to show that such countries allegedly committed to democracy and open data should coherently fight for military transparency and citizen inclusion in the governance process, avoiding the prevalence of military secrecy over military transparency. The most important contribution of the paper is discussing the lack of military transparency, until now taken for granted as a traditional armed forces ’informal right, and proposing concrete definitions of military transparency and secrecy within the context of the open government partnership. In addition to the definitions, an exploratory model of how military accountability can affect military transparency has been suggested. Design/methodology/approach For the proposed endeavour, first a description on the context of open governance where the involved public defence sector is inserted is given. Second, notions of military transparency and secrecy are proposed. Finally, the paper discusses when military secrecy could be granted and what it means for military information to be unjustifiably kept secret. At the end, the urge of the citizen involvement to open the still insulated military governance systems is highlighted. Findings This paper proposes notions of military secrecy and military transparency and suggests the second term as a broader notion which includes the first. This paper also indirectly identifies the conditions for the inadmissibility of military secrecy and calls attention to the bad externalities of unjustifiably holding public information back. Research limitations/implications The consideration of the proposed notions of military secrecy and military transparency could minimize the traditional excuse of military confidentiality that armed forces worldwide tend to not to convey public information to the public while making military accountability perfectly possible without overexposing its strategies regarding national defence. Practical implications Providing armed forces and citizens with concrete definitions of military secrecy and military transparency could not only help military institutions to develop a sincere transparency policy based on open government terms, but it could also guide interested media and citizens with their control and oversight tasks by establishing clear limits for alleged secrecy while releasing the borders for military transparency. Social implications The suggested approach for military transparency and secrecy is not only adequate to the globalized strategy of open governance but also mainly a way to finally reward citizens’ often misused and manipulated trust. Originality/value It is the first attempt of an academic definition for military secrecy and military transparency taking into consideration the open government terms and aiming at improving military accountability.


2019 ◽  
pp. 66-70
Author(s):  
K.V. Hlyantseva

The article is devoted to the legal regime of information owned by the National Bank of Ukraine. The content of the concept of information is disclosed and its types are defined. The legal basis for disclosure of information owned by the National Bank of Ukraine is investigated and the aspects of protection are analyzed. Information is any information and/or data that may be stored on a physical medium or displayed electronically. The legislation defines the following types: information about an individual; information of reference and encyclopedic nature; environmental information; product information (job, service); scientific and technical information; tax information; legal information; statistical information; sociological information; other types of information. Information owned by the NBU includes information about an individual, namely information or a set of information about an individual that is identified or can be specifically identified; information about the debtor of the bank (and/or related persons); on credit operations of banks and on the status of the fulfillment of obligations under such operations, analysis and classification of loans; information on monetary and banking statistics; information on the ownership structure of banks and the composition of banking groups, bank executives. The legal bases for disclosure of this information are defined in the Laws of Ukraine “On the National Bank of Ukraine”, “On Banks and Banking”, “On Access to Public Information”, Regulations on the Credit Registry of the National Bank of Ukraine, etc. The regulation on the organization of information security measures in the banking system of Ukraine defines the following principles of information protection: the approach to information security should be systematic (comprehensive); the process of improvement and development of information security must be continuous and carried out by substantiation and implementation of rational means, methods, measures using the best international experience; safeguards against real and potential threats to the information security of the bank should be timely and adequate; ensuring the proper level of information security of the bank is impossible without the support and control of the bank’s executives; sustainable development of information security systems is only possible if resources, including financial resources, are sufficient. The features of information protection in banking systems are set by the National Bank. Keywords: the legal regime of information, information, open data, information with restricted access, information security, National Bank of Ukraine, credit register.


2019 ◽  
Vol 29 (1/2) ◽  
pp. 134-151 ◽  
Author(s):  
Proscovia Svärd

PurposeUsing a case study method, the article investigates the impact New Public Management (NPM), through outsourcing has had on the management of government information at the Swedish Transport Agency. In April 2015 the Agency outsourced its IT-operations to IBM company. Some of the IBM sub-contractors had not been cleared by the Swedish Security Service. This exposed the Agency’s information to risk. By outsourcing the IT operations, the General Director of the Agency deviated from the laws governing government information such as the Swedish Security Protection Act, the Personal Data Act and the Publicity and Secrecy Act.Design/methodology/approachThe researcher has applied a case study method as the investigation focuses on a phenomenon in a real-life setting. The case study method entails the use of past studies, which facilitates the exploration and understanding of a complex issue. The phenomenon under investigation is NPM’s impact, through outsourcing, on the management of public information at the Swedish Transportation Agency.FindingsOutsourcing should be foregone by well-formulated contracts that should put into consideration the management of government information and the involvement of all stakeholders such as records managers/archivists, IT personnel, heads of departments, lawyers and business analysts. Outsourcing risks to compromise the two tenets of democracy that is, accountability and transparency which are central to Swedish public administrations’ operations.Research limitations/implicationsThe study is limited by the fact that it only presents the views of the archivists. This was, however, purposely done because their voice was missing during the discussions that followed after the data breach scandal had become public knowledge. Additionally, archivists are supposed to play a major role in the management of government information at Swedish institutions. Further research that will involve different categories of employees might give a deeper and better understanding of the impact that NPM, through outsourcing, is having on the management of government information and what implications this might have on issues of trust, transparency and accountability.Practical implicationsThe study demonstrates the need for well-formulated outsourcing contracts that will include information management clauses. It is of crucial importance in a democratic society that access to government information is not compromised as institutions endeavor to achieve efficiency and high-quality service delivery.Social implicationsIt is government information that gives citizens knowledge about the various processes of government institutions. It is therefore of paramount importance that government information is not left in the hands of unauthorized companies that are involved in the outsourcing activity but should be securely managed and guarded, as the opposite might pose privacy and national security challenges and hence undermine the trust that citizens have in government institutions.Originality/valueThe search that the author conducted confirmed paucity in research that discusses issues related to NPM, outsourcing and the management of government information. This paper is therefore a contribution to the discourse from an archives and information management perspective.


1970 ◽  
Vol 2 (2) ◽  
pp. 290-307
Author(s):  
Endang Widuri

On April 3rd 2008, DPR enacted Act Number 14 about Disclosure Public Information (UU KIP). This act aimed toinstitutionalize law framework for public right fulfillment to access power implementation process. The main object of this act isfreeing everyone from everything negative caused by a government reticence. People should free to participate in policymaking, free from corruption and human rights violence. Therefore, Disclosure Public Information Act is very important,because information is main resource for everyone to participation in government activity. Without information, people can’tuse his right and duty maximally as citizen


2014 ◽  
Vol 22 (1) ◽  
pp. 24-41 ◽  
Author(s):  
Deepa Mani ◽  
Kim-Kwang Raymond Choo ◽  
Sameera Mubarak

Purpose – Opportunities for malicious cyber activities have expanded with the globalisation and advancements in information and communication technology. Such activities will increasingly affect the security of businesses with online presence and/or connected to the internet. Although the real estate sector is a potential attack vector for and target of malicious cyber activities, it is an understudied industry. This paper aims to contribute to a better understanding of the information security threats, awareness, and risk management standards currently employed by the real estate sector in South Australia. Design/methodology/approach – The current study comprises both quantitative and qualitative methodologies, which include 20 survey questionnaires and 20 face-to-face interviews conducted in South Australia. Findings – There is a lack of understanding about the true magnitude of malicious cyber activities and its impact on the real estate sector, as illustrated in the findings of 40 real estate organisations in South Australia. The findings and the escalating complexities of the online environment underscore the need for regular ongoing training programs for basic online security (including new cybercrime trends) and the promotion of a culture of information security (e.g. when using smart mobile devices to store and access sensitive data) among staff. Such initiatives will enable staff employed in the (South Australian) real estate sector to maintain the current knowledge of the latest cybercrime activities and the best cyber security protection measures available. Originality/value – This is the first academic study focusing on the real estate organisations in South Australia. The findings will contribute to the evidence on the information security threats faced by the sector as well as in develop sector-specific information security risk management guidelines.


2019 ◽  
Vol 75 (5) ◽  
pp. 1082-1099 ◽  
Author(s):  
Rita Marcella ◽  
Graeme Baxter ◽  
Agnieszka Walicka

Purpose The purpose of this paper is to present the results of a study that explored human behaviour in response to political “facts” presented online by political parties in Scotland. Design/methodology/approach The study consisted of interactive online interviews with 23 citizens in North-East Scotland, in the run-up to the 2017 UK General Election. Findings Participants demonstrated cognitive and critical responses to facts but little affective reaction. They judged facts swiftly and largely intuitively, providing evidence that facts are frequently consumed, accepted or rejected without further verification processes. Users demonstrated varying levels of engagement with the information they consume, and subject knowledge may influence the extent to which respondents trust facts, in previously unanticipated ways. Users tended to notice facts with which they disagreed and, in terms of prominence, particularly noted and responded to facts which painted extremely negative or positive pictures. Most acknowledged limitations in capacity to interrogate facts, but some were delusionally confident. Originality/value Relatively little empirical research has been conducted exploring the perceived credibility of political or government information online. It is believed that this and a companion study are the first to have specifically investigated the Scottish political arena. This paper presents a new, exploratory fact interrogation model, alongside an expanded information quality awareness model.


2015 ◽  
Vol 23 (2) ◽  
pp. 161-177 ◽  
Author(s):  
Li-Hsing Ho ◽  
Ming-Tsai Hsu ◽  
Tieh-Min Yen

Purpose – The purpose of this paper is to analyze the cause-and-effect relationship and the mutually influential level among information security control items, as well as to provide organizations with a method for analyzing and making systematic decisions for improvement. Design/methodology/approach – This study utilized the Fuzzy DEMATEL to analyze cause-and-effect relationships and mutual influence of the 11 control items of the International Organization for Standardization (ISO) 27001 Information Security Management System (ISMS), which are discussed by seven experts in Taiwan to identify the core control items for developing the improvement strategies. Findings – The study has found that the three core control items of the ISMS are security policy (SC1), access control (SC7) and human resource security (SC4). This study provides organizations with a direction to develop improvement strategies and effectively manage the ISMS of the organization. Originality/value – The value of this study is for an organization to effectively dedicate resources to core control items, such that other control items are driven toward positive change by analyzing the cause-and-effect relation and the mutual influential level among information security control items, through a cause-and-effect matrix and a systematic diagram.


Sign in / Sign up

Export Citation Format

Share Document