Information exchange

Last updated

Information exchange or information sharing means that people or other entities pass information from one to another. This could be done electronically or through certain systems. [1] These are terms that can either refer to bidirectional information transfer in telecommunications and computer science or communication seen from a system-theoretic or information-theoretic point of view. As "information," in this context invariably refers to (electronic) data that encodes and represents [2] the information at hand, a broader treatment can be found under data exchange .

Contents

Information exchange has a long history in information technology. [3] Traditional information sharing referred to one-to-one exchanges of data between a sender and receiver. Online information sharing gives useful data to businesses for future strategies based on online sharing. [4] These information exchanges are implemented via dozens of open and proprietary protocols, message, and file formats. Electronic data interchange (EDI) is a successful implementation of commercial data exchanges that began in the late 1970s and remains in use today. [5]

Some controversy comes when discussing regulations regarding information exchange. [6] Initiatives to standardize information sharing protocols include extensible markup language (XML), simple object access protocol (SOAP), and web services description language (WSDL).

From the point of view of a computer scientist, the four primary information sharing design patterns are sharing information one-to-one, one-to-many, many-to-many, and many-to-one. Technologies to meet all four of these design patterns are evolving and include blogs, wikis, really simple syndication, tagging, and chat.

One example of United States government's attempt to implement one of these design patterns (one to one) is the National Information Exchange Model (NIEM). [7] [8] One-to-one exchange models fall short of supporting all of the required design patterns needed to fully implement data exploitation technology.

Advanced information sharing platforms provide controlled vocabularies, data harmonization, data stewardship policies and guidelines, standards for uniform data as they relate to privacy, security, and data quality.

Information Sharing, Intelligence Reform, and Terrorism Prevention Act

The term information sharing gained popularity as a result of the 9/11 Commission Hearings and its report of the United States government's lack of response to information known about the planned terrorist attack on the New York City World Trade Center prior to the event. The resulting commission report led to the enactment of several executive orders by President Bush that mandated agencies to implement policies to "share information" across organizational boundaries. In addition, an Information Sharing Environment Program Manager [9] (PM-ISE) was appointed, tasked to implement the provisions of the Intelligence Reform and Terrorism Prevention Act of 2004. [10] In making recommendation toward the creation of an "Information Sharing Environment" the 9/11 Commission based itself on the findings and recommendations made by the Markle Task Force on National Security in the Information Age. [11]

See also

Related Research Articles

<span class="mw-page-title-main">Client–server model</span> Distributed application structure in computing

The client–server model is a distributed application structure that partitions tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients. Often clients and servers communicate over a computer network on separate hardware, but both client and server may reside in the same system. A server host runs one or more server programs, which share their resources with clients. A client usually does not share any of its resources, but it requests content or service from a server. Clients, therefore, initiate communication sessions with servers, which await incoming requests. Examples of computer applications that use the client–server model are email, network printing, and the World Wide Web.

<span class="mw-page-title-main">Interoperability</span> Ability of systems to work with each other

Interoperability is a characteristic of a product or system to work with other products or systems. While the term was initially defined for information technology or systems engineering services to allow for information exchange, a broader definition takes into account social, political, and organizational factors that impact system-to-system performance.

Computer science is the study of the theoretical foundations of information and computation and their implementation and application in computer systems. One well known subject classification system for computer science is the ACM Computing Classification System devised by the Association for Computing Machinery.

The Organization for the Advancement of Structured Information Standards is a nonprofit consortium that works on the development, convergence, and adoption of projects - both open standards and open source - for cybersecurity, blockchain, Internet of things (IoT), emergency management, cloud computing, legal data exchange, energy, content technologies, and other areas.

Secure multi-party computation is a subfield of cryptography with the goal of creating methods for parties to jointly compute a function over their inputs while keeping those inputs private. Unlike traditional cryptographic tasks, where cryptography assures security and integrity of communication or storage and the adversary is outside the system of participants, the cryptography in this model protects participants' privacy from each other.

Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet is an inherently insecure channel for information exchange, with high risk of intrusion or fraud, such as phishing, online viruses, trojans, ransomware and worms.

ISO 10303 is an ISO standard for the computer-interpretable representation and exchange of product manufacturing information. It is an ASCII-based format. Its official title is: Automation systems and integration — Product data representation and exchange. It is known informally as "STEP", which stands for "Standard for the Exchange of Product model data". ISO 10303 can represent 3D objects in Computer-aided design (CAD) and related information.

<span class="mw-page-title-main">Enterprise integration</span>

Enterprise integration is a technical field of enterprise architecture, which is focused on the study of topics such as system interconnection, electronic data interchange, product data exchange and distributed computing environments.

In cryptography, a password-authenticated key agreement (PAK) method is an interactive method for two or more parties to establish cryptographic keys based on one or more party's knowledge of a password.

NIEMOpen, frequently referred to as NIEM, originated as an XML-based information exchange framework from the United States, but has transitioned to an OASISOpen Project. This initiative formalizes NIEM's designation as an official standard in national and international policy and procurement. NIEMOpen's Project Governing Board recently approved the first standard under this new project; the Conformance Targets Attribute Specification (CTAS) Version 3.0. A full collection of NIEMOpen standards are anticipated by end of year 2024.

The Clinical Data Interchange Standards Consortium (CDISC) is a standards developing organization (SDO) dealing with medical research data linked with healthcare, to "enable information system interoperability to improve medical research and related areas of healthcare". The standards support medical research from protocol through analysis and reporting of results and have been shown to decrease resources needed by 60% overall and 70–90% in the start-up stages when they are implemented at the beginning of the research process.

A wireless ad hoc network (WANET) or mobile ad hoc network (MANET) is a decentralized type of wireless network. The network is ad hoc because it does not rely on a pre-existing infrastructure, such as routers or wireless access points. Instead, each node participates in routing by forwarding data for other nodes. The determination of which nodes forward data is made dynamically on the basis of network connectivity and the routing algorithm in use.

<span class="mw-page-title-main">Information Sharing and Customer Outreach</span>

The United States government's Information Sharing and Customer Outreach office or ISCO was one of five directorates within the office of the chief information officer (CIO) under the Office of the Director of National Intelligence (ODNI). ISCO changed its name and function to Information Technology Policy, Plans, and Requirements (ITPR) in July 2007. Established by at least February 2006, ISCO is led by the Deputy Associate Director of National Intelligence for Information Sharing and Customer Outreach, which is currently Mr. Richard A. Russell. ISCO's information sharing and customer outreach responsibilities extend beyond the United States Intelligence Community and cross the entire U.S. government.

The National Information Exchange Model (NIEM) is the result of a collaborative effort by the United States Department of Justice and Department of Homeland Security to produce a set of common, well-defined data elements to be used for data exchange development and harmonization.

Reverse engineering is a process or method through which one attempts to understand through deductive reasoning how a previously made device, process, system, or piece of software accomplishes a task with very little insight into exactly how it does so. Depending on the system under consideration and the technologies employed, the knowledge gained during reverse engineering can help with repurposing obsolete objects, doing security analysis, or learning how something works.

A communication protocol is a system of rules that allows two or more entities of a communications system to transmit information via any variation of a physical quantity. The protocol defines the rules, syntax, semantics, and synchronization of communication and possible error recovery methods. Protocols may be implemented by hardware, software, or a combination of both.

Donna Roy is an American information sharing and access specialist, working at the US Department of Homeland Security (DHS).

References

  1. "INFORMATION EXCHANGE | definition in the Cambridge English Dictionary". dictionary.cambridge.org. Retrieved 2019-04-22.
  2. "Information Representation". Archived from the original on 2015-04-30. Retrieved 2015-06-29.
  3. Young-Ybarra, Candace; Wiersema, Margarethe (August 1999). "Strategic Flexibility in Information Technology Alliances: The Influence of Transaction Cost Economics and Social Exchange Theory". Organization Science. 10 (4): 439–459. doi:10.1287/orsc.10.4.439. ISSN   1047-7039.
  4. Hajli, Nick; Lin, Xiaolin (1 January 2016). "Exploring the Security of Information Sharing on Social Networking Sites: The Role of Perceived Control of Information". Journal of Business Ethics. 133: 111–123. doi:10.1007/s10551-014-2346-x. S2CID   143957530.
  5. Lee, Sai Leong; Ainin, Sulaiman; Dezdar, Shahin; Mallasi, Hisham (1 January 2015). "Electronic data interchange adoption from technological, organisational and environmental perspectives". International Journal of Business Information Systems. 18 (3): 299–320. doi:10.1504/IJBIS.2015.068166.
  6. Stasser, Garold; Stewart, Dennis D.; Wittenbaum, Gwen M. (May 1995). "Expert Roles and Information Exchange during Discussion: The Importance of Knowing Who Knows What". Journal of Experimental Social Psychology. 31 (3): 244–265. doi:10.1006/jesp.1995.1012.
  7. NIEM
  8. "NIEM | National Information Exchange Model". NIEM | National Information Exchange Model. Retrieved 2019-04-29.
  9. "Program Manager for the Information Sharing Environment". Archived from the original on 2006-12-12. Retrieved 2017-11-02.
  10. "About the ISE".
  11. Markle Task Force on National Security in the Information Age
  12. Lones, Michael (2003). "6". Enzyme Genetic Programming (Ph.D.). University of York, Heslington. Retrieved 7 Aug 2015. After all, recombination enables co-operative evolution by allowing information exchange within a population.