Journal articles on the topic 'Government information United States'

To see the other types of publications on this topic, follow the link: Government information United States.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Government information United States.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Editorial Submission, Haworth. "United States Government Publications:." Technical Services Quarterly 3, no. 3-4 (August 29, 1985): 37–46. http://dx.doi.org/10.1300/j124v03n03_04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Schankman, Larry. "Introduction to United States Government Information Sources." Journal of Government Information 27, no. 5 (September 2000): 643–45. http://dx.doi.org/10.1016/s1352-0237(00)00209-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lamont, Melissa, and Janice C. Shields. "Introduction to United States Government information sources." Journal of Government Information 24, no. 3 (May 1997): 223–24. http://dx.doi.org/10.1016/s1352-0237(97)00022-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Aldrich, Duncan M. "Introduction to United States government information sources." Journal of Academic Librarianship 23, no. 5 (September 1997): 421. http://dx.doi.org/10.1016/s0099-1333(97)90052-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hernon, Peter. "Introduction to United States government information sources." Government Information Quarterly 14, no. 1 (January 1997): 107. http://dx.doi.org/10.1016/s0740-624x(97)90059-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tulis, Susan E. "Introduction to United States government information sources." Government Publications Review 20, no. 2 (March 1993): 211–12. http://dx.doi.org/10.1016/0277-9390(93)90114-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hernon, Peter. "Introduction to United States government information sources." Government Information Quarterly 10, no. 2 (January 1993): 292–93. http://dx.doi.org/10.1016/0740-624x(93)90062-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Farr, Susan. "Mastering United States Government Information: Sources and Services." Technical Services Quarterly 38, no. 2 (April 3, 2021): 197–99. http://dx.doi.org/10.1080/07317131.2021.1892355.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Foss, Stuart M. "Improving the dissemination of United States government information." Government Publications Review 18, no. 5 (September 1991): 435–50. http://dx.doi.org/10.1016/0277-9390(91)90136-l.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sulzer, Jack. "United States government information policies: Views and perspectives." Government Information Quarterly 8, no. 3 (January 1991): 336. http://dx.doi.org/10.1016/0740-624x(91)90079-n.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Features Submission, Haworth Continuing. "Chapter 6: United States Government Publications." Behavioral & Social Sciences Librarian 5, no. 3-4 (May 14, 1987): 121–24. http://dx.doi.org/10.1300/j103v05n03_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kessler, Ridley R. "Introduction to United States Government Information Sources. Joe Morehead." Library Quarterly 67, no. 2 (April 1997): 199–200. http://dx.doi.org/10.1086/629941.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Bradley, Diane. "Locating United States Government Information: A Guide to Sources." Government Information Quarterly 19, no. 3 (January 2002): 344–46. http://dx.doi.org/10.1016/s0740-624x(02)00113-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Nelson, Jerold. "Introduction to United States government information sources (5th ed.)." Journal of the American Society for Information Science 48, no. 5 (May 1997): 477–78. http://dx.doi.org/10.1002/(sici)1097-4571(199705)48:5<477::aid-asi16>3.0.co;2-w.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Somers, Herbert. "Easy access to information in United States government publications." Government Information Quarterly 5, no. 1 (January 1988): 77. http://dx.doi.org/10.1016/0740-624x(88)90053-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Norden, Margaret. "KWIC Index to Government Publications." Information Technology and Libraries 2, no. 3 (May 3, 2013): 139. http://dx.doi.org/10.6017/ital.v2i3.4659.

Full text
Abstract:
<p><span>United States and United Nations publications were not efficiently proc- essed nor readily available to the reader at Brandeis University Library. Data processing equipment was used to make a list of this material which could be referred to by a computer produced KWIC index. Currency and availability to the user, and time and cost efficiencies </span><span>for </span><span>the library were given precedence over detailed subject access. United States and United Nations classification </span><span>schemes&gt; </span><span>and existing bibliographies and indexes were used extensively. </span></p>
APA, Harvard, Vancouver, ISO, and other styles
17

Bolner, Myrtle Smith. "United States government information policies: Views and perspectives; and United States scientific and technical information policies: Views and perspectives." Journal of the American Society for Information Science 43, no. 6 (July 1992): 455. http://dx.doi.org/10.1002/(sici)1097-4571(199207)43:6<455::aid-asi7>3.0.co;2-b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Sanchez, Lisa. "Dissemination of United States federal government information on CD-ROM." Government Publications Review 16, no. 2 (March 1989): 133–44. http://dx.doi.org/10.1016/0277-9390(89)90023-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Snead, John T., and Elisabeth Wright. "E-government research in the United States." Government Information Quarterly 31, no. 1 (January 2014): 129–36. http://dx.doi.org/10.1016/j.giq.2013.07.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Sproles, Claudene. "Technological transformation of United States government documents librarianship." Journal of Academic Librarianship 48, no. 2 (March 2022): 102498. http://dx.doi.org/10.1016/j.acalib.2022.102498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Samore, Ted. "Subject guide to major United States government publications." Government Information Quarterly 5, no. 4 (January 1988): 402. http://dx.doi.org/10.1016/0740-624x(88)90037-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Dwyer, Catherine M. "Alzheimer's Disease A Selective Bibliography of United States Government Documents." Collection Building 12, no. 1/2 (January 1993): 68–71. http://dx.doi.org/10.1108/eb023330.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Epstein, Ben. "Two decades of e-government diffusion among local governments in the United States." Government Information Quarterly 39, no. 2 (April 2022): 101665. http://dx.doi.org/10.1016/j.giq.2021.101665.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Kolodinsky, Jane. "Persistence of Health Labeling Information Asymmetry in the United States." Journal of Macromarketing 32, no. 2 (April 26, 2012): 193–207. http://dx.doi.org/10.1177/0276146711434829.

Full text
Abstract:
Food labeling in the United States has been a topic of public debate and conflict for almost two centuries. Legislative activity has involved consumer–industry–government battles over both mandated requirements for food labeling, industry’s freedom of speech in messaging, and consumers’ struggle to make informed choices in a complex food environment. Information asymmetries have been attributed to the failure of government in terms of enough legislation, industry’s noncompliance with existing regulations, lack of consumer attention to the information available, and industry marketing practices. This overview of food labeling legislation combined with a discussion of contemporary labeling issues makes the case that information asymmetry is likely to persist. The food environment is changing quickly, regulatory authorities are not nimble, regulators often clash with themselves and industry, business has been unable to look far beyond its bottom line, and consumers are unwilling or unable to comprehend and use label information to make choices that maintain and/or improve their health.
APA, Harvard, Vancouver, ISO, and other styles
25

Price, R. Marcus. "Radio Spectrum Management and RFI in the United States." International Astronomical Union Colloquium 112 (1991): 174–75. http://dx.doi.org/10.1017/s0252921100003936.

Full text
Abstract:
ABSTRACTIn the United States, civil common carrier telecommunications are provided by private companies, not by any agency of the government. Regulation of these services and spectrum management oversight is provided by the Federal Communications Commission (FCC), an agency of the government. Government telecommunications are operated by individual agencies, e.g. the Department of Defense, under the overall regulation of the Office of Spectrum Management of the National Telecommunications and Information Administration (NTIA), a government body separate from the FCC. In bands shared by the civil and government sectors, liaison and coordination is effected between the FCC and the NTIA.
APA, Harvard, Vancouver, ISO, and other styles
26

Hernon, Peter. "Publications and Information of the United States Government in an Electronic Age." Serials Review 12, no. 2-3 (June 1986): 133–47. http://dx.doi.org/10.1080/00987913.1986.10763702.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Lemieux, Victoria L., Stephanie E. Trapnell, Jessie Worker, and Carole Excell. "Transparency and Open Government: Reporting on the Disclosure of Information." JeDEM - eJournal of eDemocracy and Open Government 7, no. 2 (December 14, 2015): 75–93. http://dx.doi.org/10.29379/jedem.v7i2.392.

Full text
Abstract:
This paper provides a summary of data about requests, complaints and appeals published by central reporting bodies in eight countries. It examines available data from the most recent year of aggregated data—ranging between 2011 and 2013. It assessed these statistics for Brazil, India, Jordan, Mexico, South Africa, Thailand, The United Kingdom, and the United States. Through this assessment it provides trends in how countries are collecting and publishing these data and finds that practices are far from standardized and data are often unavailable or incomplete.
APA, Harvard, Vancouver, ISO, and other styles
28

Burgh, Scott G. "United States Federal Government Documents on Acquired Immune Deficiency Syndrome (AIDS)." Collection Building 8, no. 4 (January 1988): 40–49. http://dx.doi.org/10.1108/eb023233.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Eichler, Rose Richerson. "Cybersecurity, Encryption, and Defense Industry Compliance with United States Export Regulations." Texas A&M Journal of Property Law 5, no. 1 (October 2018): 5–36. http://dx.doi.org/10.37419/jpl.v5.i1.2.

Full text
Abstract:
Exports of technology and items containing technical information are regulated by the United States government. United States export control regulations exist to help protect national security, economic, and political interests. United States defense industry companies manufacture products and develop technologies and information that the United States has a particular interest in protecting. Therefore, defense industry companies must comply with United States export control regulations when exporting items and information to their international partners and customers. An “export” not only includes shipments of hardware or other tangible assets to foreign end-users but also includes the sharing of certain types of information with foreign recipients in the form of phone conversations, emails, meetings, conferences, presentations, and so on. Many employees of defense industry companies travel internationally with company issued laptops and cellphones containing company information that could be viewed by foreign persons. All of these activities are considered exports and may require prior authorization from the United States government under export control regulations. Failure to follow export regulations could result in a violation requiring a report to the United States government that may result in civil penalties or criminal charges. Additionally, intentional as well as unintentional releases of information to certain foreign persons could be detrimental to a defense industry company’s business and reputation and may even result in security concerns for the United States. Although the government has an interest in regulating defense industry companies’ technology and information, critics argue that strong export control regulations may result in invasions of privacy, violations of free speech, and a displacement of the United States as a leader in a world of technological advancement. However, despite current regulations, defense industry information is still at risk of cyberattacks and inadvertent data releases, creating potential threats to national security and the security of company technology and information. In an effort to secure company and sensitive information while exporting, defense industry companies utilize encryption and other cybersecurity measures. Advancing technologies in cybersecurity can help the government and defense industry companies by bolstering the security of their information. These same advancements can also aid attackers in breaking through cybersecurity defenses. Some advances in technology are even preventing law enforcement from gathering necessary information to conduct investigations when cyber-attacks occur, making it difficult to identify criminal actors and seek justice.The United States government faces challenges in creating and up- dating regulations to keep up with consistently advancing technology. Likewise, defense industry companies must adhere to government regulations by creating robust compliance programs, but they should also implement security and compliance measures above and beyond what the government requires to ensure more effective security for their technology and information. This Article discusses the effect of advancing cyber technology; United States export regulations; reporting requirements related to the export of encrypted items; and encryption technology in the defense industry. First, the Article defines encryption and encrypted items. Second, the Article explains United States regulations of ex- ports and specifically, regulations related to encryption and encrypted items. Third, the Article explains the need for defense industry companies to export and to use encrypted items. Fourth, the Article analyzes criticisms of export regulations and the differing views on United States controls. Fifth, the Article will discuss the complexities of com- plying with export regulations and defense industry compliance pro- grams. Sixth, the Article examines the outlook for encryption technology, the future of regulations related to cybersecurity, and the outlook for defense industry security measures and compliance with regulations. The United States government is beginning to recognize the need for more advanced security measures to protect domestically produced technology and information, especially information that puts national security at risk. Specifically, the technology and information produced by United States defense industry companies should be protected from getting into the hands of our foreign adversaries at all costs. In response to the growing need for security measures, the United States government has implemented new programs, commissions, agencies, and projects to create more robust security systems and regulations. The United States should employ the most talented and experienced cybersecurity professionals to innovate and produce security systems that protect our nation’s most sensitive information. The government should then provide these systems to its defense industry companies at minimal cost and should require companies to use the best technology in its security measures. With or without the government’s assistance, defense industry companies within the United States must also implement their own measures of protection. Current policies offer little protection of sensitive and export controlled information including encrypted items and in- formation. In addition, the government should also provide the defense industry companies better guidance and access to resources in order to assist them in protecting the important information and encrypted items.207 For example, any new systems or software purchased by the United States should be made available to defense industry companies as the standard. If the government truly wishes to protect its most important technology and information, it should provide the new systems at minimal cost to the defense industry. Advancements in security programs should be shared with defense industry companies as soon as they are available and ready for use. Nevertheless, the government may not want to provide defense industry companies with the best security technology because in the event that the government needs to conduct an investigation, a company utilizing strong cyber- security and encryption software is much more difficult to investigate. Alternatively, the United States could update current regulations to require that defense industry companies must utilize specific security measures or face a penalty for failing to do so. Such regulation could require defense companies to implement more robust security pro- grams with updated security software. This is a less effective solution as the advancement in cyberattack technology increases so rapidly, and reformed regulations will likely be outdated as soon as they are implemented. It makes more sense to require that defense companies must implement the most updated software and programs determined by government security experts and cyber-security experts. Also, by allowing defense companies to decide which security companies it will work with, the defense companies obtain the option to shop for the best and most expensive program, or the company could choose the cheapest option, resulting in less efficient security. Cybersecurity regulations that are too specific run the risk of being outdated quickly, whereas broad requirements leave the option for companies to implement the lowest of security measures. Even if the government declines these suggested measures, defense industry companies should make the protection of their sensitive in- formation and encrypted items top priority. This method would re- quire complete buy-in from the senior management within the company and a thorough flow-down of cultural beliefs among its employees. A change in norms must be implemented, and defense industry personnel should be inundated with reminders on the importance of information security. Companies should provide employees with easy access to guidance, training, and assistance in handling, sharing, protecting, and exporting sensitive and export controlled information. Changing company culture takes time, and failure to change personnel beliefs will result in a lack of understanding and potential violations of export control regulations. In the worst cases, data spills and cyberattacks could result in the loss of sensitive or even classified in- formation that could jeopardize national security. Huge unauthorized data releases of sensitive information will negatively affect a company’s reputation thus affecting its ability to generate revenue. The risks in using and exporting encryption technology and sensitive information should be a major concern for defense industry companies. This concern should motivate the government to invest significant resources into compliance programs. Resources such as dedicated and qualified personnel can create policy and procedure to ensure compliance with United States government regulations, and the procedures will provide guidance and training to all employees. In addition, companies should employ IT security, data security, and counterintelligence personnel to work with the compliance team in innovating preventive measures and in addressing any potential data releases and export violations. Immediate actions and counter measures should be prioritized not just among the compliance and security teams but should be a known, expected response from all employees. In other words, cybersecurity norms should be instilled company-wide and thoroughly policed from within the company. How a company chooses to implement such measures remains discretionary, but a better resourced compliance department dedicated to implementing effective policies and responding quickly to potential issues will prevent export control violations and data releases of important information. Defense industry companies transfer export controlled information that may subject the United States to security risks. The United States responds to this risk by implementing regulations to control the high- risk exports. Defense industry companies must comply with these regulations. Therefore, defense industry companies should approach exports and cybersecurity from the standpoint that technology is always advancing—failure to simultaneously advance security and compliance measures will leave the country and the company vulnerable to attack.
APA, Harvard, Vancouver, ISO, and other styles
30

Noked, Noam. "Should the United States Adopt CRS?" Michigan Law Review Online, no. 118 (2019): 118. http://dx.doi.org/10.36644/mlr.online.118.should.

Full text
Abstract:
The United States' one-sided approach to tax transparency might lead to an unprecedented clash with the European Union (EU) in the near future. In light of the EU's deadline for the United States, the U.S. Treasury and Congress should urgently engage in a discussion on whether the United States should adopt the Common Reporting Standard (CRS) for automatic exchange of financial account information. A recent report from the U.S. Government Accountability Office considered this issue and did not recommend adopting CRS. This Essay discusses the contents of the report, as well as important considerations that were left out of the report.
APA, Harvard, Vancouver, ISO, and other styles
31

Shuler, John A. "Foundations of Government Information and Bibliographic Control in the United States: 1789–1900." Cataloging & Classification Quarterly 35, no. 3-4 (January 2003): 309–34. http://dx.doi.org/10.1300/j104v35n03_03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Eisenberg, John M., and Deborah Zarin. "HEALTH TECHNOLOGY ASSESSMENT IN THE UNITED STATES." International Journal of Technology Assessment in Health Care 18, no. 2 (April 2002): 192–98. http://dx.doi.org/10.1017/s026646230200020x.

Full text
Abstract:
Governments may perform health technology assessment (HTA) in their roles as a regulator in the public interest, as a source of information for decision makers in the public and private sectors, and/or as a purchaser or provider of healthcare services. The U.S. government's roles in the health sector as a regulator, source of information, and purchaser and provider of services are influenced both by characteristics of that sector and by its stakeholders' effectiveness in influencing national health policy debates.
APA, Harvard, Vancouver, ISO, and other styles
33

Klimek, Sarah. "Understanding Controversy: Government Information on Dietary Sustainability." DttP: Documents to the People 44, no. 4 (January 31, 2017): 16. http://dx.doi.org/10.5860/dttp.v44i4.6225.

Full text
Abstract:
When the Advisory Report for the 2015 Dietary Guidelines for Americans was released in February 2015, news outlets and other media platforms quickly zeroed in on some of the report’s most controversial guidelines. Roughly one week after the report was released, National Public Radio released a news story titled “Will the Dietary Guidelines Consider the Planet? The Fight is On,” discussing the heated controversy that was already brewing over a particular recommendation that addressed the topic of environmental sustainability.This recommendation essentially warned that current dietary patterns in the United States have created serious environmental problems that threaten long-term food security, and therefore the guidelines should not only recommend dietary changes that support human nutrition, but that also support the consumption of more environmentally sustainable foods.
APA, Harvard, Vancouver, ISO, and other styles
34

Chiewphasa, Ben. "Kaboom! Volcano Hazards Mitigation as Government Information." DttP: Documents to the People 48, no. 3 (September 10, 2020): 18. http://dx.doi.org/10.5860/dttp.v48i3.7422.

Full text
Abstract:
Preparation for an imminent volcanic eruption relies on strategic communication between experts and the general public, ongoing scientific research and monitoring, and government assistance. Should one falter, lives are at stake at the most critical moment, whether it involves inescapable pyroclastic flows or perhaps plane engine shutdown from volcanic ash. Throughout history, legislative concerns surrounding volcano hazards have been built around the notion of proactiveness, yet financial and resource support oftentimes reflect a tendency towards reactiveness. The following document examines the legislative evolution of volcano hazards mitigation that has extended its reach well into 2020. In addition, an overview of the United States Geological Survey’s Volcano Hazards will be followed by an evaluation of government databases for finding historic and current volcanic data and information.
APA, Harvard, Vancouver, ISO, and other styles
35

Bondarenko, Sergii, Tetyana Nagornyak, and Mykola Polovyi. "Institutional Mechanism to Ensure National Security in the Information Space of the United States, the United Kingdom and the Russian Federation." Przegląd Strategiczny, no. 13 (December 31, 2020): 265–79. http://dx.doi.org/10.14746/ps.2020.1.16.

Full text
Abstract:
The paper is devoted to an analysis of the institutional mechanisms that ensure national security in the information space of several leading countries – the United States, the United Kingdom and the Russian Federation. It is stated that institutional mechanisms that ensure national security in the information space of the leading countries all have a similar structure. The main components of these mechanisms involve public authorities (state leaders – president or prime minister, government, ministries, and agencies), local government bodies, civil society institutions, the academic community, business community, and the media. The gradual expansion of the system of institutions that ensure national security in the information space and increase in their powers occurs in all these states. The analysis also demonstrates the paradigm shifts in the development and implementation of US and UK information policy in the context of modern nonlinear processes. Paradigmatic shifts are currently being reoriented towards the interests and needs of target audiences, diversification of channels and mechanisms of the distribution of meaning (strategic narratives) in the information space, from vertical to horizontal interaction with internal and external audiences. Emphases are shifting to the involvement of a wide range of institutions and other stakeholders in the implementation of information policy and delegation of powers from the center to the periphery, while preserving the main parameters of the policy established by state structures.
APA, Harvard, Vancouver, ISO, and other styles
36

Sanders, Amy Kristin, and Daxton "Chip" Stewart. "Ghosted by Government." Journal of Civic Information 3, no. 3 (October 31, 2021): 1–13. http://dx.doi.org/10.32473/joci.v3i3.129756.

Full text
Abstract:
Public records laws across the United States operate under the presumption that citizens should have access to government records, but obtaining this information is not always a simple undertaking. Although state public records laws vary, only a few establish a requirement that government entities acknowledge the existence of a request. And while some state laws mandate a time limit within which entities are supposed to produce records or issue a denial, those limits vary considerably from the specific three business days to the vague requirement of promptness. We analyzed these requirements in the 50 states and recommend policy changes that would hold government entities accountable to requestors and create a more level playing field for citizens seeking public records that should presumptively be open.
APA, Harvard, Vancouver, ISO, and other styles
37

Waldman, HB, and SP Perlman. "Well-being of Hispanic Children in the United States." Journal of Clinical Pediatric Dentistry 36, no. 3 (April 1, 2012): 315–18. http://dx.doi.org/10.17796/jcpd.36.3.58734543672570lt.

Full text
Abstract:
The availability of general information about the economic, health and social well being of Hispanic children in the United States is essential for dental and other health practitioners. Only recently have government and private agencies moved beyond the standard presentation of information by traditional "white, black and other" groupings. The need is to develop an increased awareness of the different factors which affect children in general, and in particular Hispanic children. An overview is carried out to stimulate such an effort.
APA, Harvard, Vancouver, ISO, and other styles
38

Sylves, Richard T. "Adopting Integrated Emergency Management in the United States: Political and Organizational Challenges." International Journal of Mass Emergencies & Disasters 9, no. 3 (November 1991): 413–24. http://dx.doi.org/10.1177/028072709100900308.

Full text
Abstract:
U.S. Federal Emergency Management Agency (FEMA) officials have promoted the Integrated Emergency Management System (IEMS) since 1981. IEMS has many components intended to serve all levels of government in developing, maintaining, and managing an efficient and cost-effective emergency management capability. This study analyzes the implementation of IEMS, and based upon interviews, and primary and secondary source information, reports what U.S. local emergency managers think of FEMA's IEMS initiative and how far local governments have gone in adopting IEMS. The author concludes that a variety of factors, which are separate from the IEMS concept itself have impeded FEMA's ability to successfully promote local government implementation of the IEMS approach to emergency management, but that IEMS remains an important move away from narrow purpose, single hazard program orientations of the past, to a broader, functional, and multi-hazard method of emergency management.
APA, Harvard, Vancouver, ISO, and other styles
39

Carpenter, Kenneth E. "Government Publications and the Development of Libraries." Alexandria: The Journal of National and International Library and Information Issues 15, no. 1 (April 2003): 49–62. http://dx.doi.org/10.1177/095574900301500106.

Full text
Abstract:
This paper examines the history of statistical publishing by governments, looks at other kinds of government publishing, and provides brief case studies of the collecting of government documents by libraries in Europe and the United States. These are revealing of attitudes toward government documents and in some cases show a relationship between government-document collecting and the goals of the library. The author argues that collecting and disseminating statistical information was a conscious decision made by governments on the grounds that information would lead to public support. It is arguable that the budget increases for national libraries in Britain and France, which occurred as well in the 1830s, derived from the value those governments placed on disseminating information. A connection in one era between library support and what is considered to be knowledge and the value placed on it suggests a way of looking at libraries in other periods. Indeed, for all libraries, policies and practices in collecting government documents may be indicative of a library's goals.
APA, Harvard, Vancouver, ISO, and other styles
40

Clarke, Amanda, and Mary Francoli. "What’s in a name? A comparison of ‘open government’ definitions across seven Open Government Partnership members." JeDEM - eJournal of eDemocracy and Open Government 6, no. 3 (November 1, 2014): 248–66. http://dx.doi.org/10.29379/jedem.v6i3.227.

Full text
Abstract:
No longer restricted to access to information laws and accountability measures, “open government” is now associated with a broad range of goals and functions, including public participation, open data, the improvement of public services and government efficiency. The 59 country strong Open Government Partnership (OGP) suggests that consensus on the value of open government is emerging amongst public officials. Similarly, academics have shown a renewed interest in open government as they discuss, debate and critique the meaning and role of open government reforms today. Yet, despite the diverse aims and tools characterizing contemporary open government, public officials and academics typically approach the subject as a cohesive unit of analysis, making sweeping—and generally non-empirical—claims about its implications, without accounting for the homegrown flavours that may characterize open government in practice. Simply put, the practice and study of contemporary open government suffers a lack of definitional clarity: what exactly is open government today, and how does it vary across governments? In response to these questions, this paper analyses the content of open government policy documents in seven OGP member states (Azerbaijan, Brazil, Canada, Netherlands, Kenya, United Kingdom, and the United States), providing the first systematic, empirically-grounded multi-country comparison of contemporary open government. The paper suggests where the term departs from and retains its original meaning, and how its definition varies across different governments
APA, Harvard, Vancouver, ISO, and other styles
41

Chung and Kim. "A Comparative Study of Digital Government Policies, Focusing on E-Government Acts in Korea and the United States." Electronics 8, no. 11 (November 17, 2019): 1362. http://dx.doi.org/10.3390/electronics8111362.

Full text
Abstract:
The first enactment of a single national e-government act took place in Korea in 2001. Subsequently, the United States enacted its electronic government act in November 2002. Unified e-government acts in Korea and the United States have since been established and enforced for nearly two decades, and provide interesting case studies for examining the long-term influences of the e-government act on national e-government and digital government policies. The e-government act of the United States is much more comprehensive than the e-government act of Korea. The US e-government act focuses on strengthening the federal government’s ability to regulate the Office of Management and Budget (OMB)’s role in e-government implementation. The OMB has overall jurisdiction over the e-government promotion process and will continue to consult with ministries on appropriate budget support for each project. In contrast, the e-government law in Korea is based on electronic document processing as the basic viewpoint and has been downgraded to a level that supports document reduction and electronic processing of documents, rather than a comprehensive law that can support e-government projects. The comparative case study of e-government acts in Korea and the United States revealed that, from the standpoint of digital government transformation using information technology, it is most important to promote digital government policy directly from the ministry that manages the budget, or to establish a dedicated organization under the ministry to secure strong coordination while linking it with the budget.
APA, Harvard, Vancouver, ISO, and other styles
42

Palmer, Mark H., and Jack Hanney. "Geographic Information Networks in American Indian Governments and Communities." International Journal of Virtual Communities and Social Networking 2, no. 2 (April 2010): 1–10. http://dx.doi.org/10.4018/jvcsn.2010040101.

Full text
Abstract:
This article describes advantages and disadvantages of federal government centralized geographic information networks and decentralized peer-to-peer geographic information networks as they pertain to North American Indian tribal governments and communities. Geographic information systems (GIS) are used by indigenous groups for natural resource management, land claims, water rights, and cultural revitalization activities on a global-scale. North American groups use GIS for the same reasons, but questions regarding culturally appropriate GIS, cross-cultural understandings of geographic knowledge, and cultural assimilation through Western digital technologies have been raised by scholars. Two network models are germane to American Indian government operations and community organizations. The first is a prescriptive top-down network emanating from federal government agencies. Federal agencies are responsible for the diffusion of nationwide GIS programs throughout indigenous communities in the United States. A second, potentially more inclusive model is a decentralized peer-to-peer network in which all nodes are responsible for the success of the network.
APA, Harvard, Vancouver, ISO, and other styles
43

Carter, Lemuria, Ludwig Christian Schaupp, Jeffrey Hobbs, and Ronald Campbell. "E-Government Utilization." International Journal of Electronic Government Research 8, no. 1 (January 2012): 83–97. http://dx.doi.org/10.4018/jegr.2012010105.

Full text
Abstract:
The implementation of Information and Communication Technologies (ICT) in the public sector has numerous benefits. Government administrators are aggressively seeking ways to enhance the development and implementation of more effective and efficient government services. One electronic government initiative that is growing in importance and popularity is electronic tax filing. This study explores the factors that contribute to e-file utilization. To test the proposed model a survey is administered to 152 taxpayers in the United States. Results of structural equation modeling indicate that performance expectancy, social influence, facilitating conditions, optimism bias, perceived reputation and risk all have a significant impact on e-government usage. Implications for research and practice are discussed.
APA, Harvard, Vancouver, ISO, and other styles
44

Courtney, Kyle K. "The state copyright conundrum: What’s your state government’s rule on copyright?" College & Research Libraries News 79, no. 10 (November 8, 2018): 571. http://dx.doi.org/10.5860/crln.79.10.571.

Full text
Abstract:
U.S. copyright law has a unique place in the world regarding federal works and copyright. Federal copyright law states that “Copyright protection under this title is not available for any work of the United States Government.”1 This is a broad and clear statement that works of the federal government are in the public domain and are free for use by all.
APA, Harvard, Vancouver, ISO, and other styles
45

Martin, Lawrence L., and Karun K. Singh. "Using Government Performance Management Data to Identify New Business Opportunities: Examples from Government Services Outsourcing in the United States." International Review of Administrative Sciences 70, no. 1 (March 2004): 65–76. http://dx.doi.org/10.1177/0020852304041231.

Full text
Abstract:
This article describes how the private sector can utilize government performance management data to identify business opportunities. Governments around the world today are making increased use of outsourcing, performance management and performance budgeting. Utilizing readily available data that can often be accessed via the World Wide Web, private sector businesses can identify current business opportunities in terms of what services governments are outsourcing, in what amounts and at what costs. Additionally, potential future business opportunities can be identified in terms of what services governments are currently providing in-house, at what costs and with what results. Armed with this information, private sector businesses can readily identify markets for their goods and services.
APA, Harvard, Vancouver, ISO, and other styles
46

Von Furstenberg, George M., R. Jeffery Green, and Jin-Ho Jeong. "Have Taxes Led Government Expenditures? The United States as a Test Case." Journal of Public Policy 5, no. 3 (August 1985): 321–48. http://dx.doi.org/10.1017/s0143814x00003147.

Full text
Abstract:
ABSTRACTThis paper explores intertemporal relations between innovations in government receipts and expenditures, by type and in total, at federal and state-local levels in the United States over the period 1955–82. A structural model is specified with tax and spending components as endogenous variables. After estimation with full information maximum likelihood techniques, residuals derived from the reduced form equations are used in causality tests. These tests show that where there is an indication of causality, spending tends to lead taxes. The lesson learned from past data thus appears to be that changing aggregate tax rates does not cause spending to change. Tax initiatives provide little leverage if changes in the growth of government are intended.
APA, Harvard, Vancouver, ISO, and other styles
47

Carter, Lemuria, Vishanth Weerakkody, Brandis Phillips, and Yogesh K. Dwivedi. "Citizen Adoption of E-Government Services: Exploring Citizen Perceptions of Online Services in the United States and United Kingdom." Information Systems Management 33, no. 2 (February 24, 2016): 124–40. http://dx.doi.org/10.1080/10580530.2016.1155948.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Loew, Patty, and Kelly Mella. "Black Ink and the New Red Power: Native American Newspapers and Tribal Sovereignty." Journalism & Communication Monographs 7, no. 3 (September 2005): 99–142. http://dx.doi.org/10.1177/152263790500700301.

Full text
Abstract:
This research explores the relationship between Native American newspapers and tribal sovereignty. By means of a content analysis of more than a thousand environmental stories in four tribal newspapers in Wisconsin, interviews with Native American journalists, and discussions with Indian focus groups, the study examines the themes and values tribal journalists and their readers attach to sovereignty. The research suggests that Native newspapers are an important source of information about sovereignty for Native Americans. It also finds that cultural values and themes that reinforce sovereignty emerge from Native news reports about the environment. The United States Government has a unique legal relationship with Native American tribal governments as set forth in the Constitution of the United States, treaties, statutes, and court decisions. As executive departments and agencies undertake activities affecting Native American tribal rights or trust resources, such activities should be implemented in a knowledgeable, sensitive manner respectful of tribal sovereignty … to ensure that the Federal Government operates within a government-to-government relationship with federally recognized Native American tribes.
APA, Harvard, Vancouver, ISO, and other styles
49

McNutt, John G., Jonathan B. Justice, James M. Melitski, Michael J. Ahn, Shariq R. Siddiqui, David T. Carter, and Angela D. Kline. "The diffusion of civic technology and open government in the United States." Information Polity 21, no. 2 (July 1, 2016): 153–70. http://dx.doi.org/10.3233/ip-160385.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Baker, David L. "Advancing E-Government performance in the United States through enhanced usability benchmarks." Government Information Quarterly 26, no. 1 (January 2009): 82–88. http://dx.doi.org/10.1016/j.giq.2008.01.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography