|
Collaboration Productivity Collaboration is our greatest productivity tool. In a networked and IT environment,
collaboration has few natural boundaries and can be scaled to increasing levels and
areas. This can further enhance the derived productivity, with major impacts on economies
and quality of life and production.
Security and Privacy Constraints Collaboration is based on information, knowledge, and resource sharing. Yet, usually,
sharing is not giving and security and privacy constraints challenge and limit collaboration
and its associated productivity. These constraints take many forms and impact in many
ways but the the menu options in this section lead to sections that consider some
of the key implications.
Flow As is typical throughout the document/site, the logic flow follows the order of the
titles in the menus and we recommend, at least initially, following them in sequence.
As usual,feedbackis appreciated.
Collaboration Value Considering knowledge sharing security and privacy constraints implications, as presented
in the menu option sections, the value of collaboration is the value of the productivity
gains that it provides which can be estimated as directly proportional to the following
formula, where if any of the key factors nears zero, so does the whole equation.
Collaboration Value Equation Collaboration Value ==> (information value) * (identification quality) * (classification
quality) * (entitlement) * (purpose) * (communicability) * (rendering) * (delivery)
Entitlement Entitlement is especially important as not only does it ensure information and knowledge
security, privacy, access control, and tracking, as well as provide and justify trust
levels that potential collaborators require in order even to contribute, not only
does it provide a more efficient and better structured collaboration platform infrastructure,
but it also allows higher valued information and knowledge to be shared, increasing
by orders of magnitude, the potential derived productivity and value.
Entitled Collaboration From the evidence and considerations, it seems clear that collaboration and its productivity
potential cannot be achieved without integrating resource and entitlement management
at the root of the collaboration infrastructure.
Entitled Business More than just collaboration, business architecture, governance, and process management,
especially in large distributed environments, also require managing security and privacy.
Storage, system, and application security are required, but more specifically and
often less obviously, as they are being used and shared throughout business processes
and activities, business information and knowledge require entitlement to provide
adequate security and privacy.
Entitlement Standards With adequate information and knowledge architecture, entitlement can be efficiently
implemented. Still, collaboration and sharing are about connectivity which depends
on compatibility. To better support entitlement interoperability, an integrated set
of standards specifications is required and more information about efforts to achieve
them are available on theEntitlementStandards.org/web site.
|