Brokering Access
-
Edited by:
Mike Larsen
About this book
Author / Editor information
Mike Larsen is an instructor in the Criminology Department of Kwantlen Polytechnic University. Kevin Walby is an assistant professor of sociology at the University of Victoria.
Contributors: Reem Bahdi, Jim Bronskill, Ann Cavoukian, Tia Dafnos, Willem de Lint, Gary Dickson, Yavar Hameed, Steve Hewitt, Sean P. Hier, Suzanne Legault, David McKie, Jeffrey Monaghan, Justin Piché, Jim Rankin, Ann Rees, Fred Vallance-Jones, and Matthew G. Yeager
Reviews
An important and valuable volume, Brokering Access should be read not only by academics, journalists, and activists, but also by political and bureaucratic actors who are entrusted with interpreting and applying the access laws at the national and provincial level.
Ann Cavoukian, Information and Privacy Commissioner for the Province of Ontario:
When freedom of information can be obstructed under false claims of national security, we all need to ask ourselves, how does this reflect upon the nature of our democracy? It is frustrating that books like this one still need to be published. But the fact that they are being published, and they are being read – and I would strongly encourage all Canadians to read this one – is a good sign.
Topics
Publicly Available Download PDF |
i |
Publicly Available Download PDF |
vii |
Publicly Available Download PDF |
xi |
Ann Cavoukian Publicly Available Download PDF |
xiii |
Publicly Available Download PDF |
xvii |
Publicly Available Download PDF |
xix |
On the Politics of Access to Information Mike Larsen and Kevin Walby Requires Authentication Unlicensed Licensed Download PDF |
1 |
Access to Information, Past and Present
|
|
Executive Branch Resistance to Access to Information in Canada Ann Rees Requires Authentication Unlicensed Licensed Download PDF |
35 |
Provincial Freedom of Information Law across Canada Gary Dickson Requires Authentication Unlicensed Licensed Download PDF |
68 |
Behind Closed Doors – Security and Information Control
|
|
Difficulties in Obtaining Data on Canadian Airport Security Screening Tests Following 9/11 Jim Bronskill Requires Authentication Unlicensed Licensed Download PDF |
97 |
Willem De Lint and Reem Bahdi Requires Authentication Unlicensed Licensed Download PDF |
115 |
Methodological Strategies for Social Problems Research Yavar Hameed and Jeffrey Monaghan Requires Authentication Unlicensed Licensed Download PDF |
142 |
Access to Information and Critical Research Strategies
|
|
Suing the Government for Data Matthew G. Yeager Requires Authentication Unlicensed Licensed Download PDF |
169 |
The Canadian Security State’s Imperfect Censorship under the Access to Information Act Steve Hewitt Requires Authentication Unlicensed Licensed Download PDF |
194 |
Researching the Policing of Aboriginal Activism Using Access to Information Tla Dafnos Requires Authentication Unlicensed Licensed Download PDF |
209 |
Information Barriers and Negotiation Strategies Justin Piché Requires Authentication Unlicensed Licensed Download PDF |
234 |
Sean P. Hier Requires Authentication Unlicensed Licensed Download PDF |
261 |
Dispatches from the Fourth Estate – Access to Information and Investigative Journalism
|
|
Fred Vallance-Jones Requires Authentication Unlicensed Licensed Download PDF |
287 |
The Frustrations – and the Hope David McKie Requires Authentication Unlicensed Licensed Download PDF |
314 |
Where Alice Meets Monty Python Meets Colonel Jessep Jim Rankin Requires Authentication Unlicensed Licensed Download PDF |
335 |
Information Commissioner of Canada Suzanne Legault Requires Authentication Unlicensed Licensed Download PDF |
358 |
Requires Authentication Unlicensed Licensed Download PDF |
363 |
Requires Authentication Unlicensed Licensed Download PDF |
370 |