Human Resource Work Discussion

Human Resource Work DiscussionFollow the sample i upload and write a 8 page 2400 words paper with these two question1.Why it happened2.what to do to fix the problem or enhance the solutionyou need write the paper with the citation and the reference listObjective 1: Why incident(s) happened?Transparency and privacy have been a controversial, recurring topic in the government sector due to the rapidly, evolving technological cli mate. One of the main reasons is that laws that uphold freedom of information can be interpreted for both the access to information and the privacy of government agencies.A main argument of local governments is that improving transparency could increase costs. Many local governments are partnering with private companies, especially those in technology, to facilitate their operations. Advanced technology used in the private sector, such as high-tech audio and video surveillance, will enable local governments to increase security of their information. However, as local governments are also responsible for funding public areas, investing more in technology will prevent them to disperse funds for other societal needs.Furthermore, the information that local governments release to the public could be deemed as incomprehensible. In 2006, the Federal Funding Accountability and Transparency Act, passed by Barack Obama, made it compulsory for agencies to reveal information to make it accessible to the public. However, local governments manipulated this new concept to disclose vast amount of information to the public, which became known as “data dump” (Latham, 2016), as a way to justify their responsibility of disclosing information. Although the information has been revealed, a majority of individuals are unable to decipher the formal language and major effort is required to find specific, relevant points needed to an individual.Moreover, due to the evolving change of technology, individuals and local governments are increasing their dependence on online storage (Newcombe, 2018), also known as cloud computing. More individuals are relying on technology to store confidential information as certain online storage services claim that information is encrypted. However, it is neverChakka 2guaranteed that data will never be accessible to people who succeed in surpassing online security.As the increased dependence in technology keeps growing, local governments relying more on contractual workers to fulfill certain responsibilities. Although the governments are attempting to improve technology usage for security, hiring third-party contractors to improve efficiency at the major cost of risking security and privacy (Norris, 2019).Furthermore, technology also enables simultaneous access by multiple individuals, making data breach more harmful, especially when the source is completely anonymous. Although the data itself might not be harmful, few of the tactics used by hackers to manipulate data include altering information and converging multiple documents and information.The biggest concern of evolving technology to local governments is the mosaic effect, which enables hackers to consolidate enough information to threaten local government officials and employees. However, it is challenging for local governments to tackle this problem without disclosing any information. The most successful method to counteract this problem is to uphold secrecy. However, local government upholding secrecy from the public is defined as unconstitutional in the United States (Goodwin, 2010). Additionally, due to open meetings and increase in transparency, government officials would be apprehensive to address the public directly in fear of accidently disclosing information that is not yet for public viewing.Furthermore, technology is not the main cause for the lack of balance between privacy and transparency. Rather, the issue is a consequence of cultural, political, and business-related causes (Aden, 2008). Changes and movements are based on idealistic principles of how the current environment should be.Chakka 3Few of the ideal clashes come from the newer generations joining the workforce. Millennials and Generation Z, known to be the most technology savvy and technologically dependent, are also risk factors of data privacy. To correlate with the mindset of current generations, public sector agencies are adopting more technological methods in everyday use.However, as older generations are still working in the government sectors, many of them lack the capacity and skills to retain necessary, institutional knowledge. In fact, although certain roles, especially in the IT departments, require specific technological skills, many candidates who lack the education fail to even apply. This leads to departments designating more tasks to same individuals, threatening the segregation of duties, one of the major factors to upholding privacy.In contrast, putting too much emphasis on hard skills, while neglecting soft skills of new hires, is another way of creating an unpredictable, and potentially dangerous environment. Rather than trying to combat the time required for training, local agencies should screen candidates for their potential ability to learn the required skills (Feffer, 2016). However, many employers do not have the time to train employees in the necessary soft skills due to the increasingly rapid pace of responsibilities of local governments.Another weakness of the public government is the lack of evidence behind the argument privacy is needed to prevent threat. One of the local governments’ defense is that greater secrecy will diminish any potential threats and misgivings. However, this statement can be argued due to the fact that greater secrecy leads to more ignorance of the majority. Therefore, many individuals, even internal employees in local governments, will not have enough information to react to any danger or threat (Goodwin, 2010).Chakka 4Although the United States has few of the most advanced technology, it is lagging behind when concerning implementations of laws and regulations to actively and consistently protect data (O’Connor, 2018). As it is impossible to foresee potential uses of government data, implementing laws in a timely manner to counteract privacy and security threats would be incredibly difficult. Furthermore, local governments need to implement laws that transcend social implications across the border, which makes it increasingly difficult as the evolution of technology is at an accelerated upward trajectory (Kavanagh, 2019).Objective 2: What to do to fix the problem or enhance the solution?Although the government feel the need to collect data for security, it should play a more active role in informing individuals about the use of the data collected. The evolution of technology made it possible for direct communication despite long distance. The government could issue a platform in the Congress’s official website to let the public inform their ideas of change. Furthermore, this could also apply to a local government. If certain ideas receive enough votes, local governments should be able to respond or explain the current status of the idea to improve their sense of accountability.Furthermore, the balance between privacy and transparency should play a role in the public and the government. If the government feels the needs to collect data, it should have an obligation to inform individuals about its proposed plans. As federal agencies execute many of their plans based on tax dollars, they should have a responsibility to inform the public how their tax expenditures are being used. The government should explain the exact methods the funding is being used for, such as to improve unemployment, and the disbursement of the funds in the economy. In order to do this, local governments could implement a public platform on their respective websites to directly answer citizens’ and the public’s concerns (Rokhanna, 2020).Chakka 5Moreover, the general public should educate themselves about their certain rights when it comes to receiving information. As many employees at the lower level are unaware of what information can be disclosed, the public should study the laws and regulations to understand the different policies of receiving information. If both internal employees and the general public review their rights and privacy laws, communication would improve greatly and necessary information would be passed down at a faster rate.Currently, the federal government passed the Digital Accountability and Transparency Act of 2014 (DATA) to ensure to the public increase in usefulness and transparency of laws implemented. In order to successfully carry out this law, the Treasury listed out guidelines to be enacted and list frequent meetings to update local governments any changes. Furthermore, it makes it mandatory for local governments and federal agencies to report how spending is occurred for any special project, etc. (Mader et al, 2015).Furthermore, policies should be implemented city-wide to tackle new technological ground to ensure that the balance of rights between privacy and transparency is still a primary objective of local cities. Implementing codes of ethics and other ethical guidelines in local governments should be categorized by certain, popular norms: truth, freedom, and human rights, as a single policy would not suffice for the balance.Moreover, another method for local governments to use technology as a means of notification at their own right would be to utilize social media. Although there was a rise of social media before the pandemic, it would be beneficial for local government officials to use social media platforms to engage individuals about the current issues. Social media platforms enable a method for younger generations to comprehend the jargon used by local governments to release information (United Nations, 2020).Chakka 6Local governments should be able to use Facebook or Twitter, or other means of technology for live stream. Furthermore, live streams on social media is a direct method to connect with the public without risking any tampering of information and improving direct exchange of information without concern for various interpretations and causing discord within the public of what local government “really mean”. Moreover, live streams also prevent data dump, as government officials should be able to verbally communication in language that is widely understandable with everyday jargon (Arnold, 2018).The government should also invest more on improving cyber security. A key method to do so is for local governments to partner with private technological companies to fulfill the public’s needs. Furthermore, although local governments usually have an IT department, they should create advisory councils solely for cybersecurity to develop strategies to counteract a technological threat (Marsh & McLennan, 2020).However, as there is still a risk of information getting leaked into the wrong hands, a tactic that local governments could be able to use to differentiate information based on secrecy and obligation to be transparent is to create different versions of same data using legal guidelines to differentiate. Documents with personal information should be redacted in one version that poses a less threat when revealed to the public majority. Another version with each segment of information available should be kept within the government sectors (IPC, 2015).Recently, a new law for data protection, General Data Protection Regulations (GDPR), has been passed by the European Union in 2018. As a result of the rise in technology, this regulation reinforces the importance of data privacy in companies, while increasing individual control over personal data. Although, this law creates a major impact in businesses in the US, asChakka 7US companies could be dealing with personal data of employees and individuals in the European Union, especially when US companies have European customers.In order to ensure that required companies are in compliance with GDPR, it is essential for organizations to complete frequent audits of all of their data to be accountable to know where their data is stored, how much access to individuals, etc. However, many companies in the United States may struggle with audit data analytics, as many auditors lack the essential skills to using new technology, as they are not trained to do so, to complete audits. Furthermore, smaller companies lack the financial resources to confidently execute data audits. Other challenges for smaller companies include interaction with auditing standards, expectations, and data security and compatibility to new changes in technology (Adrian, 2017).One method to counteract the ignorance behind data transferability is for local governments to implement training programs to improve the technological capabilities of employees. It will not be enough for local governments to pass regulations that can be open to interpretation. Employees should be able to learn out to execute the importance of balancing transparency and confidentiality.These training programs provide a new resource for local government to tackle crucial problems and create a better synergy within internal employees. These programs would enable employees to develop capacity of working with large access to data files and help them differentiate between types of data and their respective usage. Higher officials would be more comfortable exchanging information is they believe that local employees increased their technological and analytical ability to increase effectiveness (Kreuter et al., 2019).In a simpler method for local governments to be more transparent is to reduce written methods of communication through PDFs. Local government should be able to send informationChakka 8where individuals are able to search certain items that will enable them to decode information. One of the most recent changes in technology-based laws is the Open, Public, Electronic, ad Necessary (OPEN) Government Data Act, a formal law which declares that data published online should be “machine-readable” (Purnell, 2019). This law requires that data cannot only be reported in forms of PDFs. It also makes inspections and tracking of governments regulations and status quo more efficiency and quickly.Another major impact of the OPEN Government Data Act is that local governments are now obligated to explain any reasoning behind certain information being private. Initially, local governments are able to reveal some information and answer any inquiries of the general public. However, this law makes local governments publish any updates automatically, while simultaneously destroying the “entitlement” feeling of data by local governments (Purnell, 2019).Moreover, this act is intended to transform the local governments into being more open with their respective data by dispersing funds for agencies to hire a role of a Chief Data Officer (CDO). The Chief Data Officer’s primary role is to ensure local governments are in compliance with this law. The law also plays a role in alleviating the burden of balancing technology concerns and privacy concerns of the Chief Technology Officer. The segregation of responsibilities plays a pivotal role in ensuring oversight of duties in governments, while simultaneously, reducing fraud or unethical behavior (Purnell, 2019).Regardless of the information is being kept private and the ones that are being disclosed, local governments have an obligation to the public behind the reasoning of each decision before it is made. The method of explaining reasons behind a certain decision will allow local governments to retain some necessary information, while simultaneously fulfilling the role ofChakka 9transparency and obligation of being public servants. Nevertheless, although achieving the exact balance between privacy and transparency is idealistic and excruciatingly difficult, local governments should constantly analyze the current situation and brainstorm new ideas for improvement in order to keep up with changing trends, while withholding certain values in everyday occurrences.WORKS CITEDAden, D. (2008, December 29). Transparency vs. Privacy and Security: What’s an Agency to Do? Retrieved June 2, 2020, from https://www.govtech.com/security/Transparency- vs-Privacy-and-Security-Whats.htmlArnold, A. (2018, February 9). Why Millennial Citizens Want Governments To Be More Active On Social Media. Retrieved June 2, 2020, from https://www.forbes.com/sites/andrewarnold/2018/02/09/why-millennial-citizens- want-governments-to-be-more-active-on-social-media/#195639ae5c41BRITZ, J. J. (n.d.). TECHNOLOGY AS A THREAT TO PRIVACY: Ethical Challenges to the Information Profession. Retrieved June 2, 2020, from http://web.simmons.edu/~chen/nit/NIT’96/96-025-Britz.htmlBurgess, M. (2020, March 24). What is GDPR? The summary guide to GDPR compliance in the UK. Retrieved May 28, 2020, from https://www.wired.co.uk/article/what-is-gdpr- uk-eu-legislation-compliance-summary-fines-2018City Government Transparency. (n.d.). Transparency and City Government Communications. Retrieved June 2, 2020, from https://instituteforpr.org/wp- content/uploads/Transparency-and-City-Government-Communications.pdfChakka 10Feffer, M. (2016, April 1). HR’s Hard Challenge: When Employees Lack Soft Skills. Retrieved June 2, 2020, from https://www.shrm.org/hr-today/news/hr- magazine/0416/pages/hrs-hard-challenge-when-employees-lack-soft-skills.aspxGoodwin, M. (2010). A National Security Puzzle: Mosaic Theory and the First Amendment Right of Access in the Federal Courts. Hastings Communications and Entertainment Journal. Retrieved from https://www.webcitation.org/query?url=http://www.law.georgetown.edu/cnsl/ssa/reso urcedocuments/GoodwinArticle_155.pdf&date=2012-04-07Improving Government Efficiency, Transparency, and Responsiveness. (2019, June 25). Retrieved June 2, 2020, from https://www.rokhanna.com/issues/improving- government-efficiency-transparency-and-responsivenessInformation and Privacy Commissioner of Ontario. (2015, August). Transparency, Privacy and the Internet: Municipal Balancing Acts. Retrieved June 2, 2020, from https://www.ipc.on.ca/wp-content/uploads/Resources/2015-municipal guide-public discl-access.pdfKavanagh, C. (2019, August 28). New Tech, New Threats, and New Governance Challenges: An Opportunity to Craft Smarter Responses? Retrieved June 2, 2020, from https://carnegieendowment.org/2019/08/28/new-tech-new-threats-and-new- governance-challenges-opportunity-to-craft-smarter-responses-pub-79736Kreuter, F., Ghani, R., & Lane, J. (2019). Change Through Data: A Data Analytics Training Program for Government Employees. Harvard Data Science Review, 1(2) from https://hdsr.mitpress.mit.edu/pub/0mb0zzlc/release/5Chakka 11Latham, E. (2016, July 22). Beyond the Data Dump. Retrieved May 27, 2020, fromhttps://www.governing.com/gov-institute/voices/col-fiscal-transparency-open-data-checkbook-portals-predictive-analytics.htmlMader, D., & LEBRYK, D. (2015, May 8). Better data, Better decisions, Better government. Retrieved June 2, 2020, fromhttps://obamawhitehouse.archives.gov/blog/2015/05/08/better-data-better-decisions-better-governmentMalan, D. (2018, June 21). Technology is changing faster than regulators can keep up – here’s how to close the gap. Retrieved June 2, 2020, from https://www.weforum.org/agenda/2018/06/law-too-slow-for-new-tech-how-keep-up/Norris, T. (2019, November 12). The Impact of Digital Transformation in the Public Sector. Retrieved June 2, 2020, from https://www.rsa.com/en-us/blog/2019-11/the-impact-of- digital-transformation-in-the-public-sectorPurnell, S. (2019, April 3). State and Local Governments Should Mimic the Open, Public, Electronic, and Necessary (OPEN) Government Data Act. Retrieved June 2, 2020, from https://reason.org/commentary/state-local-governments-mimic-open-public- electronic-necessary-government-data-act/Chakka 12

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Open chat
1
You can contact our live agent via WhatsApp! Via + 1 929 473-0077

Feel free to ask questions, clarifications, or discounts available when placing an order.

Order your essay today and save 20% with the discount code GURUH