What's Mine Is . . . Mine
For years, data had a home. It resided in an application on the network, and a particular group of people authorized to access that application controlled how the data was handled. But as information-sharing initiatives begin to take shape in government, data becomes more transient. And that leaves...
Gespeichert in:
Veröffentlicht in: | Government Executive 2008-10, Vol.40 (14), p.59 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 14 |
container_start_page | 59 |
container_title | Government Executive |
container_volume | 40 |
creator | Aitoro, Jill R |
description | For years, data had a home. It resided in an application on the network, and a particular group of people authorized to access that application controlled how the data was handled. But as information-sharing initiatives begin to take shape in government, data becomes more transient. And that leaves many feeling uncomfortable. Most discussions about information sharing revert to security -- how to ensure the protection and integrity of data as it travels across networks. But actually, culture could trump security in terms of difficulty. To get naysayers on board -- or at least cooperating -- they must be included in the discussion, says John Teeter, chief enterprise architect at the Health and Human Services Department. A more open dialogue helps foster relationships, which is another key factor in encouraging information exchange. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_reports_204315348</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1583901381</sourcerecordid><originalsourceid>FETCH-proquest_reports_2043153483</originalsourceid><addsrcrecordid>eNpjYuA0MjQ10jUzNzBiYeA0MDA01zUyMzLjYOAqLs4Ccg2MjUw5GSTDMxJL1IsVfDPzUhU8ixX0wBDE42FgTUvMKU7lhdLcDIpuriHOHroFRfmFpanFJfFFqQX5RSXF8UYGJsaGpsYmFsbEqAEAt-MoKg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>204315348</pqid></control><display><type>article</type><title>What's Mine Is . . . Mine</title><source>ProQuest Central UK/Ireland</source><source>Free E- Journals</source><creator>Aitoro, Jill R</creator><creatorcontrib>Aitoro, Jill R</creatorcontrib><description>For years, data had a home. It resided in an application on the network, and a particular group of people authorized to access that application controlled how the data was handled. But as information-sharing initiatives begin to take shape in government, data becomes more transient. And that leaves many feeling uncomfortable. Most discussions about information sharing revert to security -- how to ensure the protection and integrity of data as it travels across networks. But actually, culture could trump security in terms of difficulty. To get naysayers on board -- or at least cooperating -- they must be included in the discussion, says John Teeter, chief enterprise architect at the Health and Human Services Department. A more open dialogue helps foster relationships, which is another key factor in encouraging information exchange.</description><identifier>ISSN: 0017-2626</identifier><identifier>EISSN: 2152-6702</identifier><identifier>CODEN: GVEXAW</identifier><language>eng</language><publisher>Washington: Atlantic Media, Inc</publisher><subject>Collaboration ; Counterterrorism ; Data integrity ; Employee involvement ; Employees ; Government agencies ; Information sharing ; Intelligence gathering</subject><ispartof>Government Executive, 2008-10, Vol.40 (14), p.59</ispartof><rights>Copyright National Journal Group, Inc. Oct 2008</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/204315348?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>312,776,780,787,64365,64370,72216</link.rule.ids></links><search><creatorcontrib>Aitoro, Jill R</creatorcontrib><title>What's Mine Is . . . Mine</title><title>Government Executive</title><description>For years, data had a home. It resided in an application on the network, and a particular group of people authorized to access that application controlled how the data was handled. But as information-sharing initiatives begin to take shape in government, data becomes more transient. And that leaves many feeling uncomfortable. Most discussions about information sharing revert to security -- how to ensure the protection and integrity of data as it travels across networks. But actually, culture could trump security in terms of difficulty. To get naysayers on board -- or at least cooperating -- they must be included in the discussion, says John Teeter, chief enterprise architect at the Health and Human Services Department. A more open dialogue helps foster relationships, which is another key factor in encouraging information exchange.</description><subject>Collaboration</subject><subject>Counterterrorism</subject><subject>Data integrity</subject><subject>Employee involvement</subject><subject>Employees</subject><subject>Government agencies</subject><subject>Information sharing</subject><subject>Intelligence gathering</subject><issn>0017-2626</issn><issn>2152-6702</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2008</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNpjYuA0MjQ10jUzNzBiYeA0MDA01zUyMzLjYOAqLs4Ccg2MjUw5GSTDMxJL1IsVfDPzUhU8ixX0wBDE42FgTUvMKU7lhdLcDIpuriHOHroFRfmFpanFJfFFqQX5RSXF8UYGJsaGpsYmFsbEqAEAt-MoKg</recordid><startdate>20081001</startdate><enddate>20081001</enddate><creator>Aitoro, Jill R</creator><general>Atlantic Media, Inc</general><scope>0U~</scope><scope>1-H</scope><scope>3V.</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>883</scope><scope>88F</scope><scope>8AO</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>K60</scope><scope>K6~</scope><scope>L.-</scope><scope>L.0</scope><scope>M0C</scope><scope>M0F</scope><scope>M1Q</scope><scope>M2O</scope><scope>MBDVC</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><scope>S0X</scope></search><sort><creationdate>20081001</creationdate><title>What's Mine Is . . . Mine</title><author>Aitoro, Jill R</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_reports_2043153483</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Collaboration</topic><topic>Counterterrorism</topic><topic>Data integrity</topic><topic>Employee involvement</topic><topic>Employees</topic><topic>Government agencies</topic><topic>Information sharing</topic><topic>Intelligence gathering</topic><toplevel>online_resources</toplevel><creatorcontrib>Aitoro, Jill R</creatorcontrib><collection>Global News & ABI/Inform Professional</collection><collection>Trade PRO</collection><collection>ProQuest Central (Corporate)</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>ABI/INFORM Trade & Industry (Alumni Edition)</collection><collection>Military Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>eLibrary</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ABI/INFORM Professional Standard</collection><collection>ABI/INFORM Global</collection><collection>ABI/INFORM Trade & Industry</collection><collection>Military Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><collection>SIRS Editorial</collection><jtitle>Government Executive</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Aitoro, Jill R</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>What's Mine Is . . . Mine</atitle><jtitle>Government Executive</jtitle><date>2008-10-01</date><risdate>2008</risdate><volume>40</volume><issue>14</issue><spage>59</spage><pages>59-</pages><issn>0017-2626</issn><eissn>2152-6702</eissn><coden>GVEXAW</coden><abstract>For years, data had a home. It resided in an application on the network, and a particular group of people authorized to access that application controlled how the data was handled. But as information-sharing initiatives begin to take shape in government, data becomes more transient. And that leaves many feeling uncomfortable. Most discussions about information sharing revert to security -- how to ensure the protection and integrity of data as it travels across networks. But actually, culture could trump security in terms of difficulty. To get naysayers on board -- or at least cooperating -- they must be included in the discussion, says John Teeter, chief enterprise architect at the Health and Human Services Department. A more open dialogue helps foster relationships, which is another key factor in encouraging information exchange.</abstract><cop>Washington</cop><pub>Atlantic Media, Inc</pub></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0017-2626 |
ispartof | Government Executive, 2008-10, Vol.40 (14), p.59 |
issn | 0017-2626 2152-6702 |
language | eng |
recordid | cdi_proquest_reports_204315348 |
source | ProQuest Central UK/Ireland; Free E- Journals |
subjects | Collaboration Counterterrorism Data integrity Employee involvement Employees Government agencies Information sharing Intelligence gathering |
title | What's Mine Is . . . Mine |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T01%3A10%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=What's%20Mine%20Is%20.%20.%20.%20Mine&rft.jtitle=Government%20Executive&rft.au=Aitoro,%20Jill%20R&rft.date=2008-10-01&rft.volume=40&rft.issue=14&rft.spage=59&rft.pages=59-&rft.issn=0017-2626&rft.eissn=2152-6702&rft.coden=GVEXAW&rft_id=info:doi/&rft_dat=%3Cproquest%3E1583901381%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=204315348&rft_id=info:pmid/&rfr_iscdi=true |