Welcome to the Action Methodology
The statement reflects a paradox: ideas that appear simple on the surface often require intricate coordination, alignment of diverse stakeholders, and overcoming unforeseen obstacles to execute effectively.
Data sharing is not just about moving data between places. It’s about creating a shared context and structure so that data can be reused, integrated, and understood across boundaries, much like a common language or infrastructure enables smooth communication and collaboration.
Secure information sharing is the controlled exchange of sensitive or confidential data between parties in a way that protects confidentiality, integrity, and availability of that data—while ensuring that only authorized users can access and use it for legitimate purposes.
SPDX is an open standard for communicating provenance, license, security, and other related information. SPDX reduces redundant work by providing common formats for organizations and communities to share important data, thereby streamlining and improving compliance, security, and dependability.
The Action Methodology is a systematic modeling approach used to identify requirements and implement processes to solve technical information problems. It provides a structured framework that ensures consistency, reliability, and effectiveness in capturing diverse information related to key actions. The framework facilitates the integration of diverse actions and data.
ERMAs verify that IT systems and processes are functioning effectively, securely, and align with business objectives. Machine readable metadata is collected using the ERMA standard that includes core elements such as hardware, software, networking, systems, standards and actions (events). These core classes are supported by key elements such as data centric security, assurance, and relationships. Metadata is used by various tools to provide insights related to data integrity, system security, business and operational policies, and regulatory compliance.
Secure data sharing is an integrated collection of elements needed to support secure universal data sharing.
The Data Framework is based on a common ontology and data sharing standard (SPDX). ERMAs integrate data centric security, cryptology and attestation. Targets and access control is supported by Attribute Based Access Control (ABAC) policies delivered in conjunction with Information Exchange Framework (IEF-RA an OMG standard).
The term "template" in our example equates to a form or template designed to capture specific information related to requirements or tasks. In this example it is simply capturing the name of a company. The traditional method for creating a template is to add a name by hand or more likely a computer using a document format such as MSWord, PDF, or app.
A better method is an automated service that points to a data location to link to the required information such as company name.
Data is created by users. It is consumed by users. Making it easy for user information to be captured, shared and understood is the important for business success.
SPDX, ERMA, DCS, templates and security make it possible to automate template creation, use and distribution. It is simple and easy, once you know how it works.