Key Standards

The barriers to reliable information sharing are numerous.

A crucial aspect of most management quality programs is standardization-an attempt to make sure processes produce optimal results every time. One reason standardization is easier said than done is because data systems have yet to allow us to enter data once and then let everyone who needs that information access it on-demand. Will technology eventually let us stop wasting our time searching for the information we need?

Major projects throughout government are seeking to produce more perfect information systems. The Army, for example, is developing the Future Combat Systems. FCS would create a way to capture key information about the battlefield and instantly make it available to soldiers on the ground, their front-line leaders and central commanders. Intelligence agencies have spent years working on systems that gather data from a variety of sources so analysts can identify potential national security threats. The Weather Service and the U.S. Geological Survey constantly are working on systems that capture information and disseminate it to the right people in order to predict natural disasters.

These efforts have run into numerous obstacles that have so far prevented them from developing perfect information systems-ones that capture all the right data and share it with all the right people at the right times.

For one, such efforts have tended to be expensive. FCS has been a target for budget hawks since its inception a decade ago as cost estimates have risen. Major systems take a long time to develop and run into hiccups along the way. It's hard to maintain funding support through the duration.

Developing such systems also can be politically controversial, as was the case with the Defense Department's Total Information Awareness program, one version of the intelligence agencies' data collection efforts. Lawmakers sought to kill the program because of concerns that it was developing into a big brother-type system that gathered too much personal data about Americans, violating their privacy.

Programs that try to connect people in different agencies with a common set of data face a huge set of challenges. Different agencies use different words to describe the same things, meaning they have to change the way they talk about key information in order to standardize data. The things they measure also can be slightly different-one might use inches and another centimeters, for example-requiring additional work to standardize information. Agencies also use different computer systems that have their own idiosyncrasies, making standardization even more difficult.

For example, the USASpending.gov site tries to offer users one place to look up information about government contractors and grantees. But the two primary systems that USASpending.gov draws information from do not have standard methods for identifying contractors and grantees. That has forced site administrators to try to standardize the names of the contractors and grantees. "There may exist some errors in these parent company assignments, so that transaction records that really apply to different contractors are grouped together," USASpending.gov explains.

Technology won't solve every problem that prevents information from being shared effectively. But if managers are committed to making better data available to people when they need it, their agencies will be able to at least reduce the errors caused by the lack of the right information.

Brian Friel covered management and human resources at Government Executive for six years and is now a National Journal staff correspondent.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.