Documents/DoDISS/3: Agility/3.1: Information Mobility

3.1: Information Mobility

Forge information mobility.

Other Information:

Information mobility is the dynamic availability of information which is promoted by the business rules, information systems, architectures, standards, and guidance/policy to address the needs of both planned and unanticipated information sharing partners and events. Information mobility provides the foundation for shared and user-defined situational awareness. Trusted information must be made visible, accessible, and understandable to any authorized user in DoD or to external partners except where limited by law or policy. Information mobility is both the foundation and core of the DoD Information Sharing capability. There are five elements of information mobility, as described by the following functional areas: Technology – enables the flow, management and processing of information. Technology includes architecture, core enterprise services, and information communications and technology infrastructure. Technology must support information mobility by requiring trusted information to be visible, accessible, and understandable to any authorized user in DoD or to external partners except where limited by law or policy. Workforce Information Sharing Competence – the workforce's ability to share information across the enterprise. Workforce competence will be promoted through leadership examples, shifts in cultural norms, and training on tactics, techniques and procedures. Social Networks – the ability to form and join social networks and communities of practice. Trust relationships often begin with individual interactions that reinforce a shared mental model of the decision environment. Opportunities and norms to establish these networks, build trust in, and accommodate the individual‟s operating practices will be developed through the federated information sharing community approach. Policies – that enable information mobility across operational domains, clarifies roles and responsibilities, defines relationships, harmonizes rules and procedures, and creates a risk managed environment that protects privacy and personal liberties. Spans entire information life cycle process from discovery to disposition. Security – that promotes information protection and sharing with assurance and trust of information availability, integrity, authentication, confidentiality, and non-repudiation.

Indicator(s):