FAQs
The GJXDM provides three basic ways of associating two pieces of information: inclusion, referencing, and relationships. Referencing links one piece of information using a reference or “pointer” to another piece of information described elsewhere in the XML instance. The referencing facility exists natively in GJXDM. As every element included within each complex type is paired with a “reference” element that points to a structure at some other place in the instance. These reference elements are of GJXDM’s type “ReferenceType”, which basically just contains an attribute that references an element with a particular unique identifier attribute. Using referencing, an example that represents a person’s birth location would look like this:
<j:Location j:id=”location1”>
<j:LocationAddress>
<j:LocationCityName>Boston</j:LocationCityName>
<j:LocationStateCode.USPostalService>MA
</ j:LocationStateCode.USPostalService>
</j:LocationAddress>
</j:Location>
…
<j:Person>
<j:PersonBirthLocationReference j:ref=”location1”/>
</j:Person>
The GJXDM provides three basic ways of associating two pieces of information: inclusion, referencing, and relationships. The association method is accomplished by using a separate structure, called a relationship that links two pieces of information. This facility is also provided by GJXDM’s “RelationshipType” structure, which contains attributes for a “subject” (one side of the association), an “object” (the other side of the association), and a name for the association or relationship. Using a relationship, an example that represents a person’s birth location would look like this:
<j:Location j:id=”location1”>
<j:LocationAddress>
<j:LocationCityName>Boston</j:LocationCityName>
<j:LocationStateCode.USPostalService>MA
</j:LocationStateCode.USPostalService>
</j:LocationAddress>
</j:Location>
<j:Person j:id=”person1”>
</j:Person>
<j:Relationship j:subject=”person1” j:object=”location1” name=”j:PersonBirthLocation”/>
Inclusion is recommended as the "default" choice and should be used in all cases where the information is hierarchical (e.g. if there is a containment relationship and the information is not represented somewhere else).
References are useful when the object of an association has a unique identity and appears in multiple places. However, schema designers should ensure that the object truly has identity, and not use references because the information happens to be the same. Using a reference conveys semantics about two subjects referencing the same object and should not be used as a tool to reduce the size of instances.
Relationships can be used under similar circumstances as references, but are particularly useful when the association is not already defined in the GJXDM. Relationships result in simpler extensions and more flexibility than extending GJXDM types to include new elements. However, using relationships requires the schema designer to choose names for the relationship (in cases where the association is not represented by an existing GJXDM property). As of this moment, there is no agreed upon standard for these names.
References or relationships potentially add complexity and memory consumption of software built to process instances, because the software must maintain a list of objects and their identifiers to re-establish association links as the instance is parsed.
With the increase of travel throughout the United States and beyond, Intelligent Transportation Systems (ITS) are vital to ensuring safety, protecting environment and relieving traffic congestion. Working in cooperation with the United States Department of Transportation (USDOT), the Institute of Electrical and Electronics Engineers, Inc. (IEEE) is developing a family of standards known as 1512®.
This IEEE 1512 family of standards supports the exchange of incident-related data between transportation, public safety, and other responding agencies.
Click Here to read more about the IEEE 1512 family of standards.
UBL, the Universal Business Language, is the product of an international effort to define a royalty-free library of standard electronic XML business documents such as purchase orders and invoices. Developed in an open and accountable OASIS Technical Committee with participation from a variety of industry data standards organizations, UBL is designed to plug directly into existing business, legal, auditing, and records management practices, eliminating the re-keying of data in existing fax- and paper-based supply chains and providing an entry point into electronic commerce for small and medium-sized businesses.
Click Here to read more about the Universal Business Language (UBL).
Nillability allows tags to exisit without content and have that lack of content be meaningful.
Without some prior agreement, the absence of an element does not have any particular meaning. Take PersonMiddleName as an example. The following snippet of XML does not mean that the person has no middle name. It only means that no middle name was included in the exchange.
<PersonName>
<PersonGivenName>John</PersonGivenName>
<PersonSurName>Smith</PersonSurName>
</PersonName>
To show that the person in question really has no middle name, the PersonMiddleName can be set to nil via the xsi namespace:
<PersonName>
<PersonGivenName>John</PersonGivenName>
<PersonMiddleName xsi:nil="true"></PersonMiddleName>
<PersonSurName>Smith</PersonSurName>
</PersonName>
Nillability lets you show where the lack of data is meaningful. GJXDM and NIEM elements are nillable.
Biometrics is the science of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.
In information technology, the term “biometric authentication” refers to technologies that measure and analyze human physical and behavioral characteristics for authentication purposes. Examples of physical characteristics include fingerprints, eye retinas and irises, facial patterns and hand measurements, while examples of mostly behavioral characteristics include signature, gait and typing patterns.
Although biometrics have primarily been utilized by law enforcement, biometric technologies are now being used by other government agencies to authenticate a person’s identity and to secure the nation’s borders. Biometric systems recognize a person based on physiological characteristics, such as fingerprints, hand and facial features, and iris patterns, or behavioral characteristics that are learned or acquired, such as how a person signs his name, types, or even walks. The Commerce Department’s National Institute of Standards and Technology (NIST) has been a partner with Justice in improving the nation’s human identification systems.
The successful use of the classic biometric, fingerprints, has benefited from NIST research and development. For more than 30 years, NIST has helped the Federal Bureau of Investigation (FBI) improve the automation process for matching “rolled” fingerprints taken by law enforcement agencies or “latent” prints found at crime scenes against the FBI’s master file of fingerprints. NIST test data have been used to develop automated systems that can correctly match fingerprints by the minutiae, or tiny details, that investigators previously had to read by hand. In cooperation with the American National Standards Institute (ANSI), NIST also developed a uniform way for fingerprint, facial, scar, mark, and tattoo data to be exchanged between different jurisdictions and between dissimilar systems made by different manufacturers.
Within GJXDM and NIEM one can use BiometricType property to describe information used to measure a biological or behavioral characteristic.
Data integration is the method of combining data from different sources and providing the user with a unified view of the information. During recent years, data integration has been implemented in a variety of integration applications, for example:
§ By synchronizing the data of different applications to ensure that all changes in one application are reflected in another;
§ By migrating information from one system to another, e.g., populating databases of one application with information from another;
§ Using a ETL (Extract, Transform and Load) method to pull data from various sources into a data warehouse;
§ Providing access to a specific set of data for viewing, reporting, etc., e.g., via a portal.
However, data integration using these methods often provides information that is not current. Depending on the architecture, the data can be weeks, even months, old, and the data warehouse is usually updated through a batch, extract-aggregate-and-load, process. FTP is still the primary form of data integration today.
Fortunately, the recent development and standardization of web services, driven by the adoption of service oriented architecture (SOA), will allow the user to design an enterprise integration approach with a standards-based bus so that he can orchestrate sequences of services to perform complex business processes. SOA solutions allow all participating databases and services to receive new data constantly, thus providing more value to those using the source and target systems existing within the SOA.
A group of agencies acting together in a peer relationship to share sensitive information with each other, subject to applicable access control policies.
The establishment of an inter-federation trust model between like and unlike federations.
An Enterprise Information Exchange Model (EIEM) is a MPD based on Business Information Exchange Components (BIEC). A BIEC is a NIEM-conforming XML schema data component (type, element, attribute, or other XML construct) that is reused, subsetted, and/or extended, that meets a business requirement for an information-sharing enterprise. An EIEM is a collection of BIECs organized into a subset and one or more extension schemas. Constraint schemas and non-NIEM-conforming external standards schemas with type adapters are optional in an EIEM.???????????
Links: http://reference.niem.gov/niem/guidance/business-information-exchange-c…
Documents
https://bja.ojp.gov/media/document/29991
The NIEM Conformance Tool or ConTesA Tool is an option available for you to validate schema. The Conformance Validation Tool is a dynamic tool that allows you to upload an IEPD, a set of schemas in a zip file, or an individual schema.? This free public release tool of the NIEM Conformance intended to assist developers by automatically identifying potential locations of non-conformance within IEPD artifacts (including schemas, metadata, catalogs, and XML). The tool will generate the report after your file has been uploaded and generate a report in HTML, EXCEL, or XML format. The tool uses the NIEM Naming and Design Rules (NDR) 1.3 and associated IEPD specifications. This tool will soon integrate into NDR 3.0.
User need to have a NIEM Tool Account which is local account to access the tool or you can use your own personal Yahoo or Google account because this tool is using Open Id.
NIEM Tools Account Registered Link: http://tools.niem.gov/niemtools/user/user-add.iepd
Conformance Tool Link: http://tools.niem.gov/contesaNIEM/
Naming and Design Rules 1.3 and 3.0: http://reference.niem.gov/niem/specification/naming-and-design-rules/
The Information Sharing Environment (ISE) broadly refers to the people, projects, systems, and agencies that enable responsible information sharing for national security. This includes many different communities: law enforcement, public safety, homeland security, intelligence, defense, and foreign affairs. The people in these communities may work for federal, state, local, tribal, or territorial governments. The Program Manager for the Information Sharing Environment (PM-ISE) is Kshemendra Paul. The PM-ISE has government-wide authority to plan, oversee the build-out, and manage use of the ISE. He also co-chairs the White House’s Information Sharing and Access Interagency Policy Committee (ISA-IPC).
ISE's mission and vision:
- Advance responsible information sharing to further counterterrorism, homeland security, and cybersecurity missions
- Improve nationwide decision making by transforming from information ownership to stewardship
- Promote partnerships across federal, state, local, and tribal governments, the private sector, and internationally
Resources:
ISE's document libary
ISE's Programs
Video Interview with ISE's Program Manager
NIEM Github is the Sharing Spot is for the community to have access to resources that will help them use NIEM and make NIEM easier for others to use. At its very core, GitHub is a web-based hosting platform for Git repositories. Git is a popular version control system that's widely used among programmers and developers for developing and maintaining code.
For more information on this tool, please click on the links below.
Resources:
http://www.lynda.com/GitHub-tutorials/What-GitHub/162276/173432-4.html
A description of a subset can be saved as a "wantlist". A NIEM / GJXDM wantlist is an XML instance (based on a schema) for identifying the NIEM / GJXDM components required for a given subset. It is the intermediate format that the SSGT itself uses and edits, and can be persisted (saved to disk, emailed, published online, etc.) to feed the selected types and elements into the SSGT at a later time.
By employing this open XML-based specification, it is possible for other tools (such as editors or schema builders) to interact with the SSGT and to exchange subset definitions between tools.