Last day of the OFFER FLAT 20% off & $20 sign up bonus Order Now

Last day of the offer FLAT 20% off & $20 sign up bonus

us

Free Resources

  • icon 67K+ Completed Assignments
  • icon 1.5K+ PhD Experts
  • icon 100+ Subjects we cater
  • icon 100% Secure Payment

PA 4389 Internship in Public Administration

Published : 08-Sep,2021  |  Views : 10

Question:

The purpose of the assignments is to introduce students to the field of public administration and nonprofit organizations by identifying and analyzing the challenges a public administrator faces in a dynamic organizational and political environment. Each assignment builds upon the previous assignment allowing the student to gradually develop an understanding of how public administration and its policies are addressed on all levels of government.

Answer:

Introduction

Public administration policies are the government attempts to address the issues with the public sector. The public administration policies are addressing the standards and principles regarded b the courts or legislatures to spread the fundamental awareness by ensuring the relevant course of action. According to Bryson, Crosby and Bloomberg (2014), the public administration policies help in measuring the regulations imposed by the government in the public sector and embodying the legislative and constitutional acts. Congress receives the power from the constitution to oversee the different functionalities of the executive branch. Congress has the extraordinary power to control the purse, control the state commerce, and maintain the armed forces. The study will provide an overview of the specific issues in the public administration policies. The recommendation will focus on the development of the public administration policy that can address the issue mentioned in the study. Furthermore, the paper will also discuss the positive and negative impacts of the policy modifications. The explanation of the three methods of the constitutions will be provided in the research paper.

Policy Issues

The public administration policies are formulated for facilitating the improved working environment for the employees. However, the issues associated with the policies may affect the public sector in a significant way. One of the major issues found in the implementation of the innovative technologies. In some of the cases, it has been observed that even the public sectors are reluctant to implement the technologies, they have no option left. The sector is persuaded to turn into the data-orientation operations (Durant, 2015). The non-profit organisations have to interface with such technological implementations. The major issues are associated with the maintenance of the personal and organisational security (Lecy, Mergel & Schmitz, 2014). The governmental regulations are somewhat hampering this security maintained for protecting the personal data of the associated members in the organisation. It is necessary to engage the expertise to administer the computing programs as well as the specialized personnel. Hence, the lack of accessing the necessary resources would be the major drawback in such cases.

Public Policy

In order to mitigate the issues with the technological and security aspects of the associated members in the organisation, the information security policy can be imposed. The statements of the information security policy are listed below:

  • The users will be responsible for protecting the confidential information if this is accessed from any unauthorized sources.
  • The users need to recover the passwords of securing the credentials from the unauthorized uses (com, 2017).
  • The access to the systems that include the confidential information that must be used for the authorized purposes.
  • The servers are needed to be protected from the improper accesses (Bryson, Crosby & Bloomberg, 2014).
  • The software needs to be updated in all computers.

The maintenance of these policy statements would be helpful enough in eliminating the issues occurred due to the technology security issues. The government regulations are much helpful in diminishing the security breaches in the public sector. The personal information of the associated employees is needed to be protected by every organisation (Archive.org, 2017). Moreover, it is also necessary to keep the documents in a safer place. The failure to maintain the proper security system can affect the entire organisational scenario. Therefore, this security policy would be much beneficial in addressing these issues. Following the policy statement would also be much beneficial in eliminating the associated risks with the security breaching.

Policy Modifications

The modifications in the security policies can create the impact both positively and negatively. The two most favorable modifications that can create the positive impact on the issues are as follows:

  • One of the modifications made in the security policy is associated with the information policy. In this policy, it is stated that the entire information, regardless the format or form will be used in support of the state entity’s business functionalities (Bertot et al., 2014). It will be helpful since it keeps the data in the safer side and the data will be controlled from a main server. In such cases, during the crisis scenario, the information can be recovered from the central zone.
  • Another modification is suggesting the use of the acceptable use of the electronic mail and internet. Currently, people are quite aware of the use of Internet and email process. Moreover, using the internet and email is saving the data in the archive (Head & Alford, 2015). People can save the information as the bookmark to revisit the page. The electronic mail has the personal drive in which the important data can be stored. Hence, it will be a helpful medium to protect the necessary data.

The above modifications made in the security policies are quite effective to resolve the issues with the protection of the information of the organisations and associated members. However, despite the positive influences, some of the negative influences are also visible in the security policy modifications. The negative influences are described below:

  • The first modification is concerned with the implementation of the centralized location for keeping the data safe. However, the faults in the central server or sudden destruction in the state server may corrupt the data. The lack of the backup system may cause the loss of the security and relevant information from the centralized location.
  • The use of the internet use is much acceptable way for the users. However, it is notable that people worldwide are quite aware of the methods used for using internet. The technicalities and mechanisms for the internet use are quite known to people. Therefore, there is the high chance of the information being hacked by the cyber hackers (May & Jochim, 2013). The lack of proper firewall or malware can destruct the entire security system. The improper security provided in the email access may even leak out the necessary information by the hackers present in the cyber world.

The above negative consequences of the modifications in security policies are quite effective for securing the information of the organisation and the associated members. However, the initiative of the government regulations for improving the public administration policies is thus needed to be modified as per the needs of the public sectors.

The Constitution

In considering the federal level, the government is divided into three branches, Congress, Presidency, and Courts. The public administration policies help in measuring the regulations imposed by the government in the public sector and embodying the legislative and constitutional acts. The main power of the president is usually conditioned by the Constitution, public opinion, president’s personality, congress, and prevailing conditions. However, the president is the major policy maker and the key player in formulation of the public administration policies (West, 2015). The president is the responsible person to set the priorities for the national agenda. However, the power of the congress in addressing the public administration policies is also much commendable.

Congress is another most powerful institution in making the public administration policies. Congress receives the power from the constitution to oversee the different functionalities of the executive branch. Congress has the extraordinary power to control the purse, control the state commerce, and maintain the armed forces (Davidson et al., 2013). The Speaker of the House is the most powerful figure in Congress. Congress looks forward to resolve the issues associated with the committees. It is important to state that Congress maintains the own bureaucracy for supporting the associated functionalities. Hence, the power of Congress is much commendable for determining the formulation of public administration policies.

References

Archive.org, (2017). FDR Social Security Act Speech : Free Download & Streaming : Internet Archive. [online] Internet Archive. Available at: <http://www.archive.org/details/fdrbig> [Accessed 24 Apr. 2017].

Bertot, J. C., Gorham, U., Jaeger, P. T., Sarin, L. C., & Choi, H. (2014). Big data, open government and e-government: Issues, policies and recommendations. Information Polity, 19(1, 2), 5-16.

Bryson, J. M., Crosby, B. C., & Bloomberg, L. (2014). Public value governance: Moving beyond traditional public administration and the new public management. Public Administration Review, 74(4), 445-456.

Davidson, R. H., Oleszek, W. J., Lee, F. E., & Schickler, E. (2013). Congress and its members. Cq Press.

Durant, R. F. (2015). Whither power in public administration? Attainment, dissipation, and loss. Public Administration Review, 75(2), 206-218.

Head, B. W., & Alford, J. (2015). Wicked problems: Implications for public policy and management. Administration & Society, 47(6), 711-739.

Lecy, J. D., Mergel, I. A., & Schmitz, H. P. (2014). Networks in public administration: current scholarship in review. Public Management Review, 16(5), 643-665.

May, P. J., & Jochim, A. E. (2013). Policy regime perspectives: Policies, politics, and governing. Policy Studies Journal, 41(3), 426-452.

Thisnation.com, (2017). ThisNation.com-American Government & Politics Online. [online] Thisnation.com. Available at: <http://www.thisnation.com> [Accessed 24 Apr. 2017].

West, W. F. (2015). The Administrative Presidency as Reactive Oversight: Implications for Positive and Normative Theory. Public Administration Review, 75(4), 523-533.

Our Amazing Features

delivery

No missing deadline risk

No matter how close the deadline is, you will find quick solutions for your urgent assignments.

work

100% Plagiarism-free content

All assessments are written by experts based on research and credible sources. It also quality-approved by editors and proofreaders.

time

500+ subject matter experts

Our team consists of writers and PhD scholars with profound knowledge in their subject of study and deliver A+ quality solution.

subject

Covers all subjects

We offer academic help services for a wide array of subjects.

price

Pocket-friendly rate

We care about our students and guarantee the best price in the market to help them avail top academic services that fit any budget.

Not sure yet?

Get in touch with us or

get free price quote.

Get A Free Quote