Information Technology Reference
In-Depth Information
Once.you.clear.those.hurdles.and.have.actual.connection.
with. the. person. who. can. access. the. data,. you. will. need. to.
give. that. person. speciic. instructions. about. what. you. need..
In.our.example.that.person.would.probably.need.the.name.
and.employee.number.of.the.individual.in.question.in.order.
to.gather.the.information.you.need.
Finally,.you.will.want.to.work.with.that.individual.to.acquire.
the.needed.information.in.a.manner.that.ensures.and.docu-
ments.its.integrity..We.look.more.speciically.at.those.meth-
ods.in.a.later.chapter.
As. I. hope. it. will. be. apparent. from. this. example,. the.
actual. control. of. the. information. that. you. require. is. an.
important. consideration. that. will. need. to. be. dealt. with. in.
nearly.every.case.
Let's.look.at.a.more.dificult.example.
As.noted,.working.with.a.military.or.paramilitary.organi-
zation.can.require.going.through.very.strict.lines.of.authority.
and.quite.possibly.levels.of.security.classiication.in.order.to.
access.data.(Figure 4.7).
Consider. if. you. need. to. access. information. from. your.
local.police.department.about.recent.arrests.during.a.protest..
Perhaps. you. are. a. student. writing. about. free. speech. rights.
Figure 4.7 Dealing. with. classiied. information. can. be. especially.
challenging.
Search WWH ::




Custom Search