Using Analytical Hierarchy and Analytical Network Processes to Create Cyber Security Metrics
George C. Wilamowski, Jason R. Dever, and Steven M. F. Stuban
This article discusses cyber security controls and a use case that involves decision theory methods to produce a model and independent first-order results using a form-fit-function approach as a generalized application benchmarking framework. The framework combines subjective judgments that are based on a survey of 502 cyber security respondents with quantitative data and identifies key performance drivers in the selection of specific criteria for three communities of interest: local area network, wide area network, and remote users.
Wilamowski, G. C., Dever, J. R., & Stuban, S. M. F. (2017). Using analytical hierarchy and analytical network processes to create cyber security metrics. Defense Acquisition Research Journal, 24(2), 186–221. https://doi.org/10.22594/dau.16-760.24.02
The Threat Detection System That Cried Wolf: Reconciling Developers with Operators
Shelley M. Cazares
Threat detection systems that perform well in testing can “cry wolf” during operation, generating many false alarms. The author posits that program managers can still use these systems as part of a tiered system that, overall, exhibits better performance than each individual system alone.
Cazares, S. M. (2017). The threat detection system that cried wolf: Reconciling developers with operators. Defense Acquisition Research Journal, 24(2), 222–244. https://doi.org/10.22594/dau.16-749.24.01
Army Aviation: Quantifying the Peacetime and Wartime Maintenance Man-Hour Gaps
LTC William Bland, USA (Ret.), CW5 Donald L. Washabaugh Jr., USA (Ret.), and Mel Adams
The Maintenance Man-Hour (MMH) Gap Calculator confirms and quantifies a large, persistent gap in Army aviation maintenance required to support each Combat Aviation Brigade.
Bland, W., Washabaugh, D. L., & Adams, M. (2017). Army aviation: Quantifying the peacetime and wartime maintenance man-hour gaps. Defense Acquisition Research Journal, 24(2), 246–265. https://doi.org/10.22594/dau.16-751.24.02
Complex Acquisition Requirements Analysis Using a Systems Engineering Approach
Col Richard M. Stuckey, USAF (Ret.), Shahram Sarkani, and Thomas A. Mazzuchi
Programs lack an optimized solution set of requirements attributes. This research provides a set of validated requirements attributes for ultimate program execution success.
Stuckey, R. M., Sarkani, S., & Mazzuchi, T. A. (2017). Complex acquisition requirements analysis using a systems engineering approach. Defense Acquisition Research Journal, 24(2), 266–301. https://doi.org/10.22594/dau.16-755.24.02
An Investigation of Nonparametric Data Mining Techniques for Acquisition Cost Estimating
Capt Gregory E. Brown, USAF, and Edward D. White
Given the recent enhancements in acquisition data collection, a meta-analysis reveals that nonparametric data mining techniques may improve the accuracy of future DoD cost estimates.
Brown, G. E., & White, E. D. (2017). An investigation of nonparametric data mining techniques for acquisition cost estimating. Defense Acquisition Research Journal, 24(2), 302–322. https://doi.org/10.22594/dau.16-756.24.02
Critical Success Factors for Crowdsourcing with Virtual Environments to Unlock Innovation
Glenn E. Romanczuk, Christopher Willy, and John E. Bischoff
Delphi methods were used to discover critical success factors in five areas: virtual environments, MBSE, crowdsourcing, human systems integration, and the overall process. Results derived from this study present a framework for using virtual environments to crowdsource systems design using warfighters and the greater engineering staff.
Romanczuk, G. E., Willy, C., & Bischoff, J. E. (2017). Critical success factors for crowdsourcing with virtual environments to unlock innovation. Defense Acquisition Research Journal, 24(2), 334–367. https://doi.org/10.22594/dau.16-758.24.02