Thursday, August 22, 2019
Opinions about balancing between information sharing and information Assignment
Opinions about balancing between information sharing and information protection - Assignment Example Information sharing and information protection are the two sides of the same coin. Without the existence of a possibility to share information, the concept of information protection sounds absurd. The other way round, without the existence of the systematic mechanisms for protecting information, information sharing is not possible. For, to put it simply, the crux of entire information sharing and protection is to enable the sharing of information with the right individuals and agencies, in just the right format, at just the right time and to just the right extent. The entire scope of online data sharing is hinged on the trust that the concerned individuals and agencies will safeguard the information they receive and will do their best to protect the awkward situations arising owing to information sharing (Smith, 1994, p. 114). Hence, information protection is primarily about trust. So information protection stands to be a pivotal aspect of all the processes aimed at information sharing. Respecting this trust necessitates the envisaging of designing the apt practices that assure that the information being shared does not get into the hands of unauthorized elements (Smith, 1994, p. 114). Information protection also assures the reliability and accuracy of the information being shared and that the right information happens to be accessible as and when required. In a practical context, data protection is not a barrier to information sharing, but rather assures that the information accrued from individuals and organizations gets shared appropriately and within the constraints of a disciplined framework. So, information protection deals with the recognition of benign considerations that protect the safety and confidentially of the sources that may be drastically impacted by the revelation of the information pertaining to them (Nissenbaum, 2010, p. 106). Yet, it is also a fact that too much safeguarding of information may turn out to be constraining and
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.