Enabling Information Sharing Across Government Agencies

Enabling Information Sharing Across Government Agencies

Akhilesh Bajaj (University of Tulsa, USA) and Sudha Ram (University of Arizona, USA)
Copyright: © 2005 |Pages: 26
DOI: 10.4018/978-1-59140-471-2.ch016
OnDemand PDF Download:


Recently, there has been increased interest in information sharing among government agencies with a view toward improving security, reducing costs, and offering better quality service to users of government services. Previous work has focused largely on the sharing of structured information among heterogeneous data sources, whereas government agencies need to share data with varying degrees of structure ranging from free text documents to relational data. In this work, we complement earlier work by proposing a comprehensive methodology called IAIS (Inter Agency Information Sharing). It uses XML to facilitate the definition of information that needs to be shared, the storage of such information, the access to this information, and finally, the maintenance of shared information. We describe potential conflicts that can occur at the information definition stage across agencies. We also compare IAIS with two alternate methodologies to share information among agencies and analyze the pros and cons of each.

Complete Chapter List

Search this Book:
Table of Contents
Keng Siau
Chapter 1
Ling Liu, Calton Pu, Duncan Dubugras Ruiz
This chapter presents a framework for dynamic restructuring of long-running business processes. The framework is composed of the ActivityFlow... Sample PDF
Dynamic Workflow Restructuring Framework for Long-Running Business Processes
Chapter 2
Juan Trujillo, Sergio Lujan-Mora, Il-Yeol Song
Data warehouses (DW), multidimensional databases (MDB), and OnLine Analytical Processing (OLAP) applications are based on the Multidimensional (MD)... Sample PDF
Design and Representation of Multidimensional Models with UML and XML Technologies
Chapter 3
Rick L. Wilson, Peter A. Rosen
Data perturbation is a data security technique that adds noise in the form of random numbers to numerical database attributes with the goal of... Sample PDF
Does Protecting Databases Using Perturbation Techniques Impact Knowledge Discovery?
Chapter 4
Scott J. Lloyd, Joan Peckham, Jian Li, Qing (Ken) Yang
Data play an essential role in business today. Most, if not all, e-business applications are database driven, and data backup is a necessary element... Sample PDF
Simultaneous Database Backup Using TCP/IP and a Specialized Network Interface Card
Chapter 5
Kai Mertins, Thomas Knothe, Martin Zelm
This chapter introduces Enterprise Modeling from a user point of view as a means to support new approaches for the development of networked... Sample PDF
Towards User-Oriented Enterprise Modeling for Interoperability
Chapter 6
John Krogstie, Vibeke Dalberg, Siri Moe Jenson
As more and more modern modeling tools provide the possibility of developing specialized and new modeling languages (also called meta modeling or... Sample PDF
Using a Model Quality Framework for Requirements Specification of an Enterprise Modeling Language
Chapter 7
Adolfo Lozano-Tello, Asunción Gomez-Perez
At present, the Web offers available information to people in diverse ways. With the initiative of Semantic Web, the aim is to make the content of... Sample PDF
Population of a Method for Developing the Semantic Web Using Ontologies
Chapter 8
Yun Lin, Jennifer Sampson, Sari Hakkarainen, Hao Ding
This chapter performs a systematic evaluation of two domain models and modeling languages – UML and OWL. A semiotic quality framework is used to... Sample PDF
An Evaluation of UML and OWL Using a Semiotic Quality Framework
Chapter 9
Owen Ericksson, Pär J. Agerfalk
In traditional modeling approaches, such as entity-relationship modeling, the predominant information modeling problem is how to represent external... Sample PDF
Information Modeling Based on Semantic and Pragmatic Meaning
Chapter 10
Terry Halpin
While some information modeling approaches (e.g., the Relational Model and Object-Role Modeling) are typically formalized using first-order logic... Sample PDF
Higher-Order Types and Information Modeling
Chapter 11
Keng Siau
Information modeling methods are key to the success of IS development projects. The problem in the software engineering field is not the lack of... Sample PDF
Criteria for Comparing Information Modeling Methods: Informational and Computational Equivalence
Chapter 12
Stephen Rockwell, Akhilesh Bajaj
Conceptual models have been evaluated along the dimensions of modeling complexity (how easy is it to create schemas given requirements?) and... Sample PDF
COGEVAL: Applying Cognitive Theories to Evaluate Conceptual Models
Chapter 13
Judith Kabeli, Peretz Shoval
Functional and Object Oriented Methodology (FOOM) combines two essential software-engineering paradigms: the functional (process-oriented) approach... Sample PDF
Quality Analysis Specifications: A Comparison of FOOM and OPM Methodologies
Chapter 14
Christophe Nicolle, Kokou Yetongnon, Jean-Claude Simon
This paper presents a Web-based data integration methodology and tool framework, called X-TIME, for the development of Business-to-Business (B2B)... Sample PDF
Interoperability of B2B Applications: Methods and Tools
Chapter 15
Richard Baskerville, Victor Portougal
Possibility theory is an alternative to probability theory as a basis for security management in settings where information resources are elements... Sample PDF
Possibility Theory in Protecting National Information Infrastructure
Chapter 16
Akhilesh Bajaj, Sudha Ram
Recently, there has been increased interest in information sharing among government agencies with a view toward improving security, reducing costs... Sample PDF
Enabling Information Sharing Across Government Agencies
About the Authors