GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Data Management Content

Overcoming Barriers to Data Sharing in the United States

Overcoming Barriers to Data Sharing in the United...

Both public and private sector actors face legal, social, technical, and economic barriers to data sharing in the United States, inhibiting much-needed innovation and discoveries. Overly restrictive data privacy laws…

Learn More
Overview and Considerations of Access Control Based on Attribute Encryption

Overview and Considerations of Access Control...

Traditional public-key encryption (PKE) requires different data to have different keys that – along with the encrypted version of the data – can be distributed to users who satisfy access…

Learn More
Exploring Data-Sharing Models to Maximize Benefits From Data

Exploring Data-Sharing Models to Maximize Benefits...

Data-driven innovation has the potential to be a massive force for progress. Data sharing enables organizations to increase the utility and value of the data they control and gain access…

Learn More
Missing Persons: The Case of National AI Strategies

Missing Persons: The Case of National AI Strategies

Policy makers should inform, consult and involve citizens as part of their efforts to data-driven technologies such as artificial intelligence (AI). Although many users rely on AI systems, they do…

Learn More
For What It’s Worth: Measuring Land Value in the Era of Big Data and Machine Learning

For What It’s Worth: Measuring Land Value in the...

This paper develops a new method for valuing land, a key asset on a nation’s balance sheet. The method first employs an unsupervised machine learning method, which means clustering, to…

Learn More
Future of Health: Imperatives for Advancing Data Sharing to Support Digitally Enabled Care

Future of Health: Imperatives for Advancing Data...

Traditional brick-and-mortar health care organizations and digital health companies are actively partnering to provide novel, digitally enabled care models to patients. Despite the potential of these new care models, it…

Learn More
Reviving and Reimagining the Federal Data Strategy for Mission Success

Reviving and Reimagining the Federal Data Strategy...

The Federal Data Strategy suffers from a lack of leadership and fails to link its well-defined principles and practices to government-wide and agency-level missions. The Biden administration must revive and…

Learn More
Dynamic Data Protection Using Attribute-Based Access Control (ABAC)

Dynamic Data Protection Using Attribute-Based...

In this technical white paper, the importance of dynamic data protection in relation to Attribute-Based Access Control (ABAC) is discussed. With ABAC, companies as well as the federal government/military can…

Learn More
Data Sharing Between Public and Private Sectors: When Local Governments Seek Information from the Sharing Economy

Data Sharing Between Public and Private Sectors:...

Governments at the state, county, and municipal levels have become increasingly interested in the treasure troves of local data amassed by the sharing economy. A growing number of localities are…

Learn More
How Stream Delivered Over 40 MW of Dedicated Data Center Capacity in 16 Months for a Hyperscale Tech Company With an Ambitious Vision

How Stream Delivered Over 40 MW of Dedicated Data...

One of the world’s largest technology companies announces an ambitious new vision, requiring the very rapid deployment of hundreds of megawatts of new data center capacity. For the company’s data…

Learn More
De-Identifying Government Datasets: Techniques and Governance

De-Identifying Government Datasets: Techniques and...

De-identification is a general term for any process of removing the association between a set of identifying data and the data subject. This document describes the use of deidentification with…

Learn More
Digital Equity 2.0: How to Close the Data Divide

Digital Equity 2.0: How to Close the Data Divide

Unlike the digital divide, many ignore the data divide or argue that the way to close it is to collect vastly less data. But without substantial efforts to increase data…

Learn More
Deep Web Research and Discovery Resources 2023

Deep Web Research and Discovery Resources 2023

The deep web is part of the world wide web whose contents are not indexed by standard search engines. The deep web is not to be confused with the dark…

Learn More
Securing the Future: Strategies for Fraud Monitoring and Prevention

Securing the Future: Strategies for Fraud...

Since the earliest days of government, the fundamentals of public records and the need their security have remained constant. Yet the methods and strategies to achieve this security have evolved…

Learn More
Knowledge Graph Implementation: Costs and Obstacles to Consider

Knowledge Graph Implementation: Costs and...

Breaking through barriers to entry is key to making any data management initiative a success. This is doubly true when seeking to adopt semantic standards to implement a knowledge graph…

Learn More