SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
PEOPLE IN PROGRESS: Collaborating In A Trusted Environment
The MITRE Corporation
Collaborating In A Trusted Environment
The MITRE Corporation is a not-for-profit organization that operates five Federally Funded
Research and Development Centers, (FFRDCs) which partner with government sponsors to
support their crucial missions. Because it supports many highly-sensitive United States
government departments — including the Department of Defense, the Internal Revenue
Service, and the Department of Homeland Security — MITRE faces unique challenges with
Enterprise 2.0 (e2.0) implementations. But its success in implementing these tools can
serve as a lesson for even the most conservative organizations. 
MITRE is an organization where most employees are
used to dealing with sensitive information. Still, it is
necessary to remind people about the nature of social
tools and provide simple checks and balances that
prevent the accidental sharing of it. Before accessing
the newly deployed partnership network/social business networking application called
Handshake, employees must pass through a “reminder” page. And before posting content,
they are prompted again to consider the privacy and security level of the information being
shared. For example, on almost every page, there is a link to report inappropriate content
for removal. Additionally, all posted information is clearly labeled to indicate the level of
access required to view it. If necessary, groups can be closed off so that only certain
individuals can access information after it has been posted. While it is ultimately the
employee’s responsibility to ensure sensitive information is not shared inappropriately, these
reminders and roadblocks provide an additional safeguard.
Donna Cuomo, Chief Information Architect, Center for Information and Technology
"Still, it is necessary to remind people
about the nature of social tools and
provide simple checks and balances that
prevent the accidental sharing of it."
Partnering for Growth outside the Firewall
MITRE’s strategy going forward is to build as many collaboration
and knowledge-sharing systems to be as “outside partner
accessible” as possible. It is MITRE’s hope the company can bring
the broader outside
community to bear on
the sponsor problems of
national importance —
the MITRE team knows
they can't just lock
collaboration behind a
firewall. The need is
clear to acquire or build collaboration systems capable of
controlling privacy and access settings on multiple levels based on
personal trust, organizational trust, and contractual relationships.
Supporting a cross-organizational collaboration work mode while
maintaining a trusted environment is a huge challenge that Cuomo
will have to overcome — but one that will open a whole new arena
of collaboration and sharing possibilities for MITRE and its partners.
PEOPLE IN PROGRESS: Collaborating In A Trusted Environment
©DachisGroup.AllRightsReserved
"The need is clear to acquire or build
collaboration systems capable of controlling
privacy and access settings on multiple levels
based on personal trust, organizational trust,
and contractual relationships."
Social networking should revolutionize how
we bring the broader community to bear.
“ ”
This case study series is brought to you courtesy of IBM Social Collaboration
Software. Market leaders are using social software to get closer to customers
and to transform how work gets done, to accelerate innovation and more easily
locate expertise. Organizations that establish a social business environment across their internal and
external relationships are outpacing their competitors. IBM Collaboration Software empowers individuals
within organizations to stay connected, current, and creative any where, any time, so great thinking
doesn't stay locked behind closed doors. IBM offers the broadest, innovative set of secure Social
Software and Unified Communications services for creating Web communities, locating subject matter
expertise, project collaboration, content and idea sharing. Quickly locate the expertise you need, no
matter where it exists inside or outside of your organization to get the job done faster.
Smarter Software for a Smarter Planet.
Founded in 1999, the MIT Center for Digital Business (MIT CDB)
is the world's largest center for research focused on the digital
economy. MIT CDB has worked with more than 50 corporate
sponsors, funded more than 60 faculty and performed more than 75 research projects. The center’s
faculty and sponsors represent the leaders in Digital Business research, analysis and practice worldwide.
Together with its partners, MIT’s Center for Digital Business is inventing the future of Digital Business.
Dachis Group is the world’s leading social business advisory firm. With
offices in five countries worldwide, Dachis Group helps large scale
enterprises capture value from trends in technology, society, and the
workplace. The firm’s proprietary framework of Social Business Design drives insight across three main
practice areas: Customer Participation and Engagement, Workforce Collaboration, and Business Partner
Optimization. The future of business lies in socially calibrated, dynamic business cultures and Dachis
Group shows leaders how to make the future a reality.

Weitere ähnliche Inhalte

Was ist angesagt?

The hi:project: empowering you, empowering us, with a more human web
The hi:project: empowering you, empowering us, with a more human webThe hi:project: empowering you, empowering us, with a more human web
The hi:project: empowering you, empowering us, with a more human webThe hi:project
 
The Digital Landscape
The Digital LandscapeThe Digital Landscape
The Digital Landscapeqmatheson
 
Iir middle east hr summit social media
Iir middle east hr summit social mediaIir middle east hr summit social media
Iir middle east hr summit social mediaJon Ingham
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attackerseadeloitte
 
The 10 most influential leaders in security, 2021
The 10 most influential leaders in security, 2021The 10 most influential leaders in security, 2021
The 10 most influential leaders in security, 2021Merry D'souza
 
IBM KM Blueprint Workshop: KM Goes Social
IBM KM Blueprint Workshop: KM Goes SocialIBM KM Blueprint Workshop: KM Goes Social
IBM KM Blueprint Workshop: KM Goes SocialDavid Gurteen
 
Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...Philip Sheldrake
 
JNeiditz NLJ Trailblazers 2016
JNeiditz NLJ Trailblazers 2016JNeiditz NLJ Trailblazers 2016
JNeiditz NLJ Trailblazers 2016Jon Neiditz
 
Identity Ecosystem Framework: Establishing rules of the road for digital iden...
Identity Ecosystem Framework: Establishing rules of the road for digital iden...Identity Ecosystem Framework: Establishing rules of the road for digital iden...
Identity Ecosystem Framework: Establishing rules of the road for digital iden...Ian Glazer
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperMarco Essomba
 
Influence measurement – AMEC Measurement Week 2014
Influence measurement – AMEC Measurement Week 2014Influence measurement – AMEC Measurement Week 2014
Influence measurement – AMEC Measurement Week 2014Philip Sheldrake
 
Social networking for human resources professionals wb
Social networking for human resources professionals wbSocial networking for human resources professionals wb
Social networking for human resources professionals wbTodd Nilson
 
Secure by design building id based security
Secure by design building id based securitySecure by design building id based security
Secure by design building id based securityArun Gopinath
 
Information Governance -- Necessary Evil or a Bridge to the Future?
Information Governance -- Necessary Evil or a Bridge to the Future?Information Governance -- Necessary Evil or a Bridge to the Future?
Information Governance -- Necessary Evil or a Bridge to the Future?John Mancini
 
Present & Future of Marketing - Disruption: Social Media vs Social Networks =...
Present & Future of Marketing - Disruption: Social Media vs Social Networks =...Present & Future of Marketing - Disruption: Social Media vs Social Networks =...
Present & Future of Marketing - Disruption: Social Media vs Social Networks =...Dinis Guarda
 
17.3.3 technology first - hackathon results
17.3.3   technology first - hackathon results17.3.3   technology first - hackathon results
17.3.3 technology first - hackathon resultshmhollingsworth
 

Was ist angesagt? (19)

The hi:project: empowering you, empowering us, with a more human web
The hi:project: empowering you, empowering us, with a more human webThe hi:project: empowering you, empowering us, with a more human web
The hi:project: empowering you, empowering us, with a more human web
 
patrick di didomenico
patrick di didomenicopatrick di didomenico
patrick di didomenico
 
The Digital Landscape
The Digital LandscapeThe Digital Landscape
The Digital Landscape
 
Iir middle east hr summit social media
Iir middle east hr summit social mediaIir middle east hr summit social media
Iir middle east hr summit social media
 
CIO Magazine - What We're Reading
CIO Magazine - What We're ReadingCIO Magazine - What We're Reading
CIO Magazine - What We're Reading
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attacker
 
The 10 most influential leaders in security, 2021
The 10 most influential leaders in security, 2021The 10 most influential leaders in security, 2021
The 10 most influential leaders in security, 2021
 
IBM KM Blueprint Workshop: KM Goes Social
IBM KM Blueprint Workshop: KM Goes SocialIBM KM Blueprint Workshop: KM Goes Social
IBM KM Blueprint Workshop: KM Goes Social
 
Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...
 
JNeiditz NLJ Trailblazers 2016
JNeiditz NLJ Trailblazers 2016JNeiditz NLJ Trailblazers 2016
JNeiditz NLJ Trailblazers 2016
 
Identity Ecosystem Framework: Establishing rules of the road for digital iden...
Identity Ecosystem Framework: Establishing rules of the road for digital iden...Identity Ecosystem Framework: Establishing rules of the road for digital iden...
Identity Ecosystem Framework: Establishing rules of the road for digital iden...
 
Sirp microsoft
Sirp microsoftSirp microsoft
Sirp microsoft
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
 
Influence measurement – AMEC Measurement Week 2014
Influence measurement – AMEC Measurement Week 2014Influence measurement – AMEC Measurement Week 2014
Influence measurement – AMEC Measurement Week 2014
 
Social networking for human resources professionals wb
Social networking for human resources professionals wbSocial networking for human resources professionals wb
Social networking for human resources professionals wb
 
Secure by design building id based security
Secure by design building id based securitySecure by design building id based security
Secure by design building id based security
 
Information Governance -- Necessary Evil or a Bridge to the Future?
Information Governance -- Necessary Evil or a Bridge to the Future?Information Governance -- Necessary Evil or a Bridge to the Future?
Information Governance -- Necessary Evil or a Bridge to the Future?
 
Present & Future of Marketing - Disruption: Social Media vs Social Networks =...
Present & Future of Marketing - Disruption: Social Media vs Social Networks =...Present & Future of Marketing - Disruption: Social Media vs Social Networks =...
Present & Future of Marketing - Disruption: Social Media vs Social Networks =...
 
17.3.3 technology first - hackathon results
17.3.3   technology first - hackathon results17.3.3   technology first - hackathon results
17.3.3 technology first - hackathon results
 

Ähnlich wie MITRE: People in Progress

The Benefits of Enterprise Social for IT Professionals
The Benefits of Enterprise Social for IT ProfessionalsThe Benefits of Enterprise Social for IT Professionals
The Benefits of Enterprise Social for IT ProfessionalsMicrosoft
 
Benefitsofentsocialforit 140911152413-phpapp02
Benefitsofentsocialforit 140911152413-phpapp02Benefitsofentsocialforit 140911152413-phpapp02
Benefitsofentsocialforit 140911152413-phpapp02Vini Dilavari
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
tibbr: Enterprise Social Redefined
tibbr: Enterprise Social Redefinedtibbr: Enterprise Social Redefined
tibbr: Enterprise Social Redefinedtibbr
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]Josh Stein
 
Liberal Democrats view of Huddle
Liberal Democrats view of HuddleLiberal Democrats view of Huddle
Liberal Democrats view of HuddleHuddleHQ
 
How IT can empower your organization to wlan
How IT can empower your organization to wlanHow IT can empower your organization to wlan
How IT can empower your organization to wlanMicrosoft
 
Leveraging social media across the organization
Leveraging social media across the organizationLeveraging social media across the organization
Leveraging social media across the organizationHermes F
 
The New Enterprise Collaboration Imperative: How Leading Brands Achieve Tangi...
The New Enterprise Collaboration Imperative: How Leading Brands Achieve Tangi...The New Enterprise Collaboration Imperative: How Leading Brands Achieve Tangi...
The New Enterprise Collaboration Imperative: How Leading Brands Achieve Tangi...Frank Jurden
 
FDIC - Social Media - Managing your business risk related to social media
FDIC - Social Media - Managing your business risk related to social mediaFDIC - Social Media - Managing your business risk related to social media
FDIC - Social Media - Managing your business risk related to social mediaSerge Milman
 
Alcatel: People in Progress
Alcatel: People in ProgressAlcatel: People in Progress
Alcatel: People in ProgressSoCo Partners
 
Ms think-tank-coffee-table-book
Ms think-tank-coffee-table-bookMs think-tank-coffee-table-book
Ms think-tank-coffee-table-bookMicrosoft India
 
Ibm 127 huntalas_e_book_f3
Ibm 127 huntalas_e_book_f3Ibm 127 huntalas_e_book_f3
Ibm 127 huntalas_e_book_f3Maria Huntalas
 
Make social networking work for you
Make social networking work for youMake social networking work for you
Make social networking work for youNuno Fraga Coelho
 
harmon.ie Debuts Collage Press Release
harmon.ie Debuts Collage Press Releaseharmon.ie Debuts Collage Press Release
harmon.ie Debuts Collage Press ReleaseShawn Wiora
 
Enterprise 2.0
Enterprise 2.0Enterprise 2.0
Enterprise 2.0Magan Le
 
Protect Your Workplace e book
Protect Your Workplace e bookProtect Your Workplace e book
Protect Your Workplace e bookPablo Junco
 
Deep dive on digital governance
Deep dive on digital governanceDeep dive on digital governance
Deep dive on digital governanceBen Gilchriest
 

Ähnlich wie MITRE: People in Progress (20)

The Benefits of Enterprise Social for IT Professionals
The Benefits of Enterprise Social for IT ProfessionalsThe Benefits of Enterprise Social for IT Professionals
The Benefits of Enterprise Social for IT Professionals
 
Benefitsofentsocialforit 140911152413-phpapp02
Benefitsofentsocialforit 140911152413-phpapp02Benefitsofentsocialforit 140911152413-phpapp02
Benefitsofentsocialforit 140911152413-phpapp02
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
tibbr: Enterprise Social Redefined
tibbr: Enterprise Social Redefinedtibbr: Enterprise Social Redefined
tibbr: Enterprise Social Redefined
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]
 
Liberal Democrats view of Huddle
Liberal Democrats view of HuddleLiberal Democrats view of Huddle
Liberal Democrats view of Huddle
 
How IT can empower your organization to wlan
How IT can empower your organization to wlanHow IT can empower your organization to wlan
How IT can empower your organization to wlan
 
Leveraging social media across the organization
Leveraging social media across the organizationLeveraging social media across the organization
Leveraging social media across the organization
 
The New Enterprise Collaboration Imperative: How Leading Brands Achieve Tangi...
The New Enterprise Collaboration Imperative: How Leading Brands Achieve Tangi...The New Enterprise Collaboration Imperative: How Leading Brands Achieve Tangi...
The New Enterprise Collaboration Imperative: How Leading Brands Achieve Tangi...
 
India hardy presentation
India hardy   presentationIndia hardy   presentation
India hardy presentation
 
FDIC - Social Media - Managing your business risk related to social media
FDIC - Social Media - Managing your business risk related to social mediaFDIC - Social Media - Managing your business risk related to social media
FDIC - Social Media - Managing your business risk related to social media
 
Alcatel: People in Progress
Alcatel: People in ProgressAlcatel: People in Progress
Alcatel: People in Progress
 
Alcatel: People in Progress
Alcatel: People in ProgressAlcatel: People in Progress
Alcatel: People in Progress
 
Ms think-tank-coffee-table-book
Ms think-tank-coffee-table-bookMs think-tank-coffee-table-book
Ms think-tank-coffee-table-book
 
Ibm 127 huntalas_e_book_f3
Ibm 127 huntalas_e_book_f3Ibm 127 huntalas_e_book_f3
Ibm 127 huntalas_e_book_f3
 
Make social networking work for you
Make social networking work for youMake social networking work for you
Make social networking work for you
 
harmon.ie Debuts Collage Press Release
harmon.ie Debuts Collage Press Releaseharmon.ie Debuts Collage Press Release
harmon.ie Debuts Collage Press Release
 
Enterprise 2.0
Enterprise 2.0Enterprise 2.0
Enterprise 2.0
 
Protect Your Workplace e book
Protect Your Workplace e bookProtect Your Workplace e book
Protect Your Workplace e book
 
Deep dive on digital governance
Deep dive on digital governanceDeep dive on digital governance
Deep dive on digital governance
 

Mehr von The 2.0 Adoption Council

Enterprise 2.0 Black Belt Workshop: Mitigating Real or Perceived Risks
Enterprise 2.0 Black Belt Workshop: Mitigating Real or Perceived RisksEnterprise 2.0 Black Belt Workshop: Mitigating Real or Perceived Risks
Enterprise 2.0 Black Belt Workshop: Mitigating Real or Perceived RisksThe 2.0 Adoption Council
 
Enterprise 2.0 Black Belt Workshop: Positioning Social Collaboration Tools in...
Enterprise 2.0 Black Belt Workshop: Positioning Social Collaboration Tools in...Enterprise 2.0 Black Belt Workshop: Positioning Social Collaboration Tools in...
Enterprise 2.0 Black Belt Workshop: Positioning Social Collaboration Tools in...The 2.0 Adoption Council
 
Enterprise 2.0 Black Belt Workshop: Measuring Success and Business Value
Enterprise 2.0 Black Belt Workshop: Measuring Success and Business ValueEnterprise 2.0 Black Belt Workshop: Measuring Success and Business Value
Enterprise 2.0 Black Belt Workshop: Measuring Success and Business ValueThe 2.0 Adoption Council
 
Enterprise 2.0 Black Belt Workshop: Community Roles & Adoption Planning
Enterprise 2.0 Black Belt Workshop: Community Roles & Adoption PlanningEnterprise 2.0 Black Belt Workshop: Community Roles & Adoption Planning
Enterprise 2.0 Black Belt Workshop: Community Roles & Adoption PlanningThe 2.0 Adoption Council
 
Enterprise 2.0 Black Belt Workshop: Business Case, Planning, and Adoption
Enterprise 2.0 Black Belt Workshop: Business Case, Planning, and AdoptionEnterprise 2.0 Black Belt Workshop: Business Case, Planning, and Adoption
Enterprise 2.0 Black Belt Workshop: Business Case, Planning, and AdoptionThe 2.0 Adoption Council
 
EMC Enterprise 2.0 Case Study Webinar for The 2.0 Adoption Council & Newsgator
EMC Enterprise 2.0 Case Study Webinar for The 2.0 Adoption Council & NewsgatorEMC Enterprise 2.0 Case Study Webinar for The 2.0 Adoption Council & Newsgator
EMC Enterprise 2.0 Case Study Webinar for The 2.0 Adoption Council & NewsgatorThe 2.0 Adoption Council
 
2.0 Adoption in the Enterprise - The After
2.0 Adoption in the Enterprise - The After2.0 Adoption in the Enterprise - The After
2.0 Adoption in the Enterprise - The AfterThe 2.0 Adoption Council
 
2.0 Adoption in the Enterprise - The Before
2.0 Adoption in the Enterprise - The Before2.0 Adoption in the Enterprise - The Before
2.0 Adoption in the Enterprise - The BeforeThe 2.0 Adoption Council
 

Mehr von The 2.0 Adoption Council (13)

Swiss Re: People in Progress
Swiss Re: People in ProgressSwiss Re: People in Progress
Swiss Re: People in Progress
 
Avery: People in Progress
Avery: People in ProgressAvery: People in Progress
Avery: People in Progress
 
Alstom: Case Study
Alstom: Case StudyAlstom: Case Study
Alstom: Case Study
 
Nokia: People in Progress
Nokia: People in ProgressNokia: People in Progress
Nokia: People in Progress
 
Enterprise 2.0 Black Belt Workshop: Mitigating Real or Perceived Risks
Enterprise 2.0 Black Belt Workshop: Mitigating Real or Perceived RisksEnterprise 2.0 Black Belt Workshop: Mitigating Real or Perceived Risks
Enterprise 2.0 Black Belt Workshop: Mitigating Real or Perceived Risks
 
Enterprise 2.0 Black Belt Workshop: Positioning Social Collaboration Tools in...
Enterprise 2.0 Black Belt Workshop: Positioning Social Collaboration Tools in...Enterprise 2.0 Black Belt Workshop: Positioning Social Collaboration Tools in...
Enterprise 2.0 Black Belt Workshop: Positioning Social Collaboration Tools in...
 
Enterprise 2.0 Black Belt Workshop: Measuring Success and Business Value
Enterprise 2.0 Black Belt Workshop: Measuring Success and Business ValueEnterprise 2.0 Black Belt Workshop: Measuring Success and Business Value
Enterprise 2.0 Black Belt Workshop: Measuring Success and Business Value
 
Enterprise 2.0 Black Belt Workshop: Community Roles & Adoption Planning
Enterprise 2.0 Black Belt Workshop: Community Roles & Adoption PlanningEnterprise 2.0 Black Belt Workshop: Community Roles & Adoption Planning
Enterprise 2.0 Black Belt Workshop: Community Roles & Adoption Planning
 
Enterprise 2.0 Black Belt Workshop: Business Case, Planning, and Adoption
Enterprise 2.0 Black Belt Workshop: Business Case, Planning, and AdoptionEnterprise 2.0 Black Belt Workshop: Business Case, Planning, and Adoption
Enterprise 2.0 Black Belt Workshop: Business Case, Planning, and Adoption
 
The 2.0 Adoption Council Intro @ e2conf
The 2.0 Adoption Council Intro @ e2confThe 2.0 Adoption Council Intro @ e2conf
The 2.0 Adoption Council Intro @ e2conf
 
EMC Enterprise 2.0 Case Study Webinar for The 2.0 Adoption Council & Newsgator
EMC Enterprise 2.0 Case Study Webinar for The 2.0 Adoption Council & NewsgatorEMC Enterprise 2.0 Case Study Webinar for The 2.0 Adoption Council & Newsgator
EMC Enterprise 2.0 Case Study Webinar for The 2.0 Adoption Council & Newsgator
 
2.0 Adoption in the Enterprise - The After
2.0 Adoption in the Enterprise - The After2.0 Adoption in the Enterprise - The After
2.0 Adoption in the Enterprise - The After
 
2.0 Adoption in the Enterprise - The Before
2.0 Adoption in the Enterprise - The Before2.0 Adoption in the Enterprise - The Before
2.0 Adoption in the Enterprise - The Before
 

Kürzlich hochgeladen

Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 

Kürzlich hochgeladen (20)

Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 

MITRE: People in Progress

  • 1. PEOPLE IN PROGRESS: Collaborating In A Trusted Environment The MITRE Corporation Collaborating In A Trusted Environment The MITRE Corporation is a not-for-profit organization that operates five Federally Funded Research and Development Centers, (FFRDCs) which partner with government sponsors to support their crucial missions. Because it supports many highly-sensitive United States government departments — including the Department of Defense, the Internal Revenue Service, and the Department of Homeland Security — MITRE faces unique challenges with Enterprise 2.0 (e2.0) implementations. But its success in implementing these tools can serve as a lesson for even the most conservative organizations.  MITRE is an organization where most employees are used to dealing with sensitive information. Still, it is necessary to remind people about the nature of social tools and provide simple checks and balances that prevent the accidental sharing of it. Before accessing the newly deployed partnership network/social business networking application called Handshake, employees must pass through a “reminder” page. And before posting content, they are prompted again to consider the privacy and security level of the information being shared. For example, on almost every page, there is a link to report inappropriate content for removal. Additionally, all posted information is clearly labeled to indicate the level of access required to view it. If necessary, groups can be closed off so that only certain individuals can access information after it has been posted. While it is ultimately the employee’s responsibility to ensure sensitive information is not shared inappropriately, these reminders and roadblocks provide an additional safeguard. Donna Cuomo, Chief Information Architect, Center for Information and Technology "Still, it is necessary to remind people about the nature of social tools and provide simple checks and balances that prevent the accidental sharing of it."
  • 2. Partnering for Growth outside the Firewall MITRE’s strategy going forward is to build as many collaboration and knowledge-sharing systems to be as “outside partner accessible” as possible. It is MITRE’s hope the company can bring the broader outside community to bear on the sponsor problems of national importance — the MITRE team knows they can't just lock collaboration behind a firewall. The need is clear to acquire or build collaboration systems capable of controlling privacy and access settings on multiple levels based on personal trust, organizational trust, and contractual relationships. Supporting a cross-organizational collaboration work mode while maintaining a trusted environment is a huge challenge that Cuomo will have to overcome — but one that will open a whole new arena of collaboration and sharing possibilities for MITRE and its partners. PEOPLE IN PROGRESS: Collaborating In A Trusted Environment ©DachisGroup.AllRightsReserved "The need is clear to acquire or build collaboration systems capable of controlling privacy and access settings on multiple levels based on personal trust, organizational trust, and contractual relationships." Social networking should revolutionize how we bring the broader community to bear. “ ” This case study series is brought to you courtesy of IBM Social Collaboration Software. Market leaders are using social software to get closer to customers and to transform how work gets done, to accelerate innovation and more easily locate expertise. Organizations that establish a social business environment across their internal and external relationships are outpacing their competitors. IBM Collaboration Software empowers individuals within organizations to stay connected, current, and creative any where, any time, so great thinking doesn't stay locked behind closed doors. IBM offers the broadest, innovative set of secure Social Software and Unified Communications services for creating Web communities, locating subject matter expertise, project collaboration, content and idea sharing. Quickly locate the expertise you need, no matter where it exists inside or outside of your organization to get the job done faster. Smarter Software for a Smarter Planet. Founded in 1999, the MIT Center for Digital Business (MIT CDB) is the world's largest center for research focused on the digital economy. MIT CDB has worked with more than 50 corporate sponsors, funded more than 60 faculty and performed more than 75 research projects. The center’s faculty and sponsors represent the leaders in Digital Business research, analysis and practice worldwide. Together with its partners, MIT’s Center for Digital Business is inventing the future of Digital Business. Dachis Group is the world’s leading social business advisory firm. With offices in five countries worldwide, Dachis Group helps large scale enterprises capture value from trends in technology, society, and the workplace. The firm’s proprietary framework of Social Business Design drives insight across three main practice areas: Customer Participation and Engagement, Workforce Collaboration, and Business Partner Optimization. The future of business lies in socially calibrated, dynamic business cultures and Dachis Group shows leaders how to make the future a reality.