This article discusses cyber security controls and a use case that involves decision theory methods to produce a model and independent first-order results using a form-fit-function approach as a generalized application benchmarking framework. The frame work combines subjective judgments that are based on a survey of 502 cyber security respondents with quantitative data and identifies key performance drivers in the selection of specific criteria for three communities of interest: local area network, wide area network, and remote users.
p. 222The Threat Detection System That Cried Wolf: Reconciling Developers with Operators
Shelley M. CazaresThreat detection systems that perform well in testing can "cry wolf" during operation, generating many false alarms. The author posits that program managers can still use these systems as part of a tiered system that, overall, exhibits better perfor mance than each individual system alone. (Ret.), Shahram Sarkani, and Thomas A. Mazzuchi Programs lack an optimized solution set of require ments attributes. This research provides a set of validated requirements attributes for ultimate program execution success. Given the recent enhancements in acquisition data collection, a meta-analysis reveals that nonparametric data mining techniques may improve the accuracy of future DoD cost estimates.
CONTENTS | Featured Research
Critical Success Factors for Crowdsourcing with Virtual Environments to Unlock InnovationGlenn E. Romanczuk, Christopher Willy, and John E. Bischoff Delphi methods were used to discover critical success factors in five areas: virtual environments, MBSE, crowdsourcing, human systems integra tion, and the overall process. Results derived from this study present a framework for using virtual environments to crowdsource systems design using warfighters and the greater engineering staff.http://www.dau.mil/library/arj p. 376
Defense ARJ Guidelines for ContributorsThe Defense Acquisition Research Journal (ARJ) is a scholarly peer-reviewed journal published by the Defense Acquisition University. All submissions receive a blind review to ensure impartial evaluation.p. 381
Call for AuthorsWe are currently soliciting articles and subject matter experts for the 2017-2018 Defense ARJ print years.
p. 384Defense Acquisition University WebsiteYour online access to acquisition research, consulting, information, and course offerings.
FROM THE CHAIRMAN AND EXECUTIVE EDITORDr. Larrie D. Ferreiro [R&E]), will carry out the mission of defense technological innovation. The second office, the Under Secretary of Defense for Acquisition and Sustainment (USD[A&S]), will ensure that sus tainment issues are integrated during the acquisition process. The articles in this issue show some of the innovative ways that acqui sition can be tailored to these new paradigms.The first article is "Using Analytical Hierarchy and Analytical Network Processes to Create Cyber Security Metrics" by George C. Wilamowski, Jason R. Dever, and Steven M. F. Stuban. It was the recipient (from among strong co...