Access the full text.
Sign up today, get DeepDyve free for 14 days.
In two articles See: Chain-computerisation for better privacy protection, p. 95 of this issue. the author presents some key elements from his recently completed thesis about functional, non-intrusive information infrastructures for interorganisational public policy implementation. The development of these information infrastructures requires a new approach, chain-computerisation, based on new concepts and practices. This methodology is vital for public administration, if the problems associated with interorganisational policy implementation are to be overcome. Chain-computerisation recognises the impossibility in many interorganisational settings of implementing government policy, because no single organisational actor has authority over the system. Thus, for example, a Dutch requirement that prisoners serving longer prison sentences must notify the Benefits system so that benefit paid can be adjusted, cannot be enforced because this multi-agency setting is too complex to allow adequate co-ordinated control. What is needed is an informational solution which automatically signals to the Imprisonment system that a prisoner is receiving benefits. Such highly automated communication systems can also protect privacy, in this particular example by signalling that a note must be sent by the prisoner to his benefit agency rather than by triggering enforcement by the Imprisonment system without the prisoner concerned knowing it. This methodology can be seen as emerged from lessons learned during the period that the author was responsible for the development of information policies at the Dutch Ministry of Justice. Chain-computerisation is explained here by means of examples taken from the penal and social welfare systems, but it should be emphasized that the methodology of chain-computerisation can be applied to many other situations where public policy is to be implemented by close co-operation of many autonomous public and private organisations.
Information Infrastructure and Policy – IOS Press
Published: Jan 1, 1999
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.