Cyber-attackers exploit people, processes, and technologies to steal high-value organizational data. The corresponding attacks are complex, cost organizations millions of dollars to resolve, and require rapid-response, architecture-based mitigation. Consequently, Cybersecurity strategies that...
The ISO 9000 family of standards, first issued in 1987, has been accepted as the worldwide standard for quality management systems, having more than one million companies, representing 178 countries, registered to it as of 2009. Companies implement this standard either voluntarily and...
The purpose of this study was to propose an effective knowledge elicitation method and representation scheme that empowers humanitarian assistance/disaster relief (HA/DR) analysts and experts to create analytic models without the aid of data scientists and methodologists while addressing the...
Over the last several decades the technology revolution has compounded system complexity with the integration of multi-spectral sensors and interactive command and control systems. These complexities create additional challenges for requirement developers to produce an encompassing set of...
Cloud computing offers the advantage of on-demand, reliable and cost efficient computing solutions without the capital investment and management resources to build and maintain in-house data centers and network infrastructures. Scalability of cloud solutions enable consumers to upgrade or...
There are significant challenges involved in regulating the growing commercial human spaceflight industry. The safety of the crew and passengers should be protected; however, care should be taken not to overburden the industry with too many or too stringent, or perhaps inapplicable,...
Functionality and performance have been key elements of requirements generation for major systems, especially within the Department of Defense (DoD). However, rising cost growth rates and decreasing funding has led to legislation requiring DoD to factor cost into requirements selection and to...
Each year, the Department of Defense (DoD) is provided with an appropriation and authorization act from Congress known as the Military Construction (MILCON) program. The DoD delegates this financial authority to subordinate units for the purpose of funding the design and execution of new...
Every year, the Department of Defense (DoD) invests billions of dollars on the development of major defense acquisition programs. In return, many of these weapon systems have been plagued with cost overruns and schedule delays during the Engineering and Manufacturing Development phase. Under...
Public and private organizations face the challenges of protecting their networks from cyber-attacks, while reducing the amount of time and money spent on Information Technology. Organizations can reduce their expenditures by reusing server, switch and router hardware, but they must use reliable...
The past decade has seen the rapid development and deployment of unmanned systems throughout the world in both civilian and military applications. Significant development has been led by the Department of Defense (DoD), which has sought to develop and field military systems, such as unmanned...
In 2008, the Government Accountability Office (GAO) performed a study on 11 Department of Defense (DoD) programs and compared how requirements were developed between DoD and private industry. The study found that the DoD did not follow good Systems Engineering practices when developing...
The electromagnetic spectrum is a crucial asset for wireless technology innovation and for the industry's economy. The significance of the telecommunications industry's capital expenditures increases with the spectrum acquisition value in its primary market due to the scarcity factor, which is...