3.1: Information Mobility
Forge information mobility. Other Information:
Information mobility is the dynamic availability of information which is promoted by the business rules, information systems,
architectures, standards, and guidance/policy to address the needs of both planned and unanticipated information sharing partners
and events. Information mobility provides the foundation for shared and user-defined situational awareness. Trusted information
must be made visible, accessible, and understandable to any authorized user in DoD or to external partners except where limited
by law or policy. Information mobility is both the foundation and core of the DoD Information Sharing capability. There are
five elements of information mobility, as described by the following functional areas: Technology – enables the flow, management
and processing of information. Technology includes architecture, core enterprise services, and information communications
and technology infrastructure. Technology must support information mobility by requiring trusted information to be visible,
accessible, and understandable to any authorized user in DoD or to external partners except where limited by law or policy.
Workforce Information Sharing Competence – the workforce's ability to share information across the enterprise. Workforce competence
will be promoted through leadership examples, shifts in cultural norms, and training on tactics, techniques and procedures.
Social Networks – the ability to form and join social networks and communities of practice. Trust relationships often begin
with individual interactions that reinforce a shared mental model of the decision environment. Opportunities and norms to
establish these networks, build trust in, and accommodate the individual‟s operating practices will be developed through the
federated information sharing community approach. Policies – that enable information mobility across operational domains,
clarifies roles and responsibilities, defines relationships, harmonizes rules and procedures, and creates a risk managed environment
that protects privacy and personal liberties. Spans entire information life cycle process from discovery to disposition. Security
– that promotes information protection and sharing with assurance and trust of information availability, integrity, authentication,
confidentiality, and non-repudiation.
Indicator(s):
|