As the world continues to evolve and change at a rapid pace, it is critical to utilize a secure forum that will allow information sharing. Unfortunately, creating a digital forum for information sharing leads to the possibility of information falling into the hands of adversaries. Adhering to the principles of the Army Knowledge Management will transcend the way business is conducted soon.
Principle Six: Protecting and securing information and knowledge assets bring a challenge for all parties involved. Transitioning to a digital infra-structure causes a greater need to protect and secure information even though it gives US forces an advantage to communicate over a large geographical area. David F. Drab …show more content…
Adhering to regulations and policies provide the best solutions to enforce security. Adversaries continue to deploy new software to breach systems infra-structures. Users must utilize the same vengeance in seeking additional training to aid in protecting communities with relevant information. The best security approach is proactive not reactive.
Most companies thrive on its utilization of knowledge assets. Human involvement in this process creates a vulnerability. Therefore, these knowledge assets need protection from those that do not need to know.
Principle Seven: Embed knowledge assets in standard business processes is critical to promote understanding. Embedded knowledge such as videos and simulations help readers avoid misinterpretations. Having access to the best practices and after action reviews eliminates the need for others to recreate the wheel if they are going through similar scenarios. Those that need to know are provided unlimited resources through links to podcasts to enhance operations and routines.
Digital media within a search reduces the time it takes to perform multiple searches. Thus, the researcher can focus on the task at hand because a search within a search is available. Embedded assets allow for a single central point to access research …show more content…
Authentication tokens do not require information to be stored on the server thus increasing speed of the session. The configuration of the single sign-on portal is critical to the success of maintaining the high level of security.
From an audit trail stand point, single sign-on users leave a distinct blueprint of how credentials are used. In the event of a user account being compromised, audit tools can easily identify where the breach took place, what happened during the breach and which accounts were breached. Therefore, single sign-on is like a digital fingerprint of the user. Using a standard process attracts users because of its simplicity. Less complexity and familiarity with an application like the Army Knowledge Online enhances the user-friendly approach to share best practices, embed links, and collaborate ideas to preserve knowledge for generations to come.
In conclusion, the Army Knowledge Management principles will transform the landscape of knowledge sharing. Losing best practices and new ideas will become a thing of the past. A single sign-on will allow groups in a different geographical location to collaborate on policies and procedures to improve the efficiency and the productivity in the way the Army conducts