How do you tell the different between when government programs overlap and duplicate each other versus when they complement and reinforce each other in a collaborative network?
The National Institute for Standards and Technology (NIST) at the Commerce Department recently held a workshop to discuss how protection of personal information can be made a key implementation element in the National Strategy for Trusted Identities in Cyberspace (NSTIC).
A recent academic symposium on performance-based budgeting suggests that trying to apply this noble idea across government may be hopeless.
Decades of research and efforts to implement performance budgeting across federal, state, and local governments in the U.S. seem to consistently come down to the conclusion that no matter how rational it sounds, politicians don’t want to use it to make decisions.
The price of interconnectivity is the continuing tradeoff between opportunity and vulnerability. Government organizations need to enact policies to protect networks and networked information.