With PQDT Open, you can read the full text of open access dissertations and theses free of charge.
About PQDT Open
Search
COMING SOON! PQDT Open is getting a new home!
ProQuest Open Access Dissertations & Theses will remain freely available as part of a new and enhanced search experience at www.proquest.com.
Questions? Please refer to this FAQ.
The use of information has dramatically changed over the past decade. In addition to traditional cyber-attacks, there has been an increase in the use of social-media to spread misinformation and opinion through the internet. The United States Department of Defense (DOD) is actively developing capabilities to defend against these cyberspace and information threats. Unfortunately, one of the principal dilemmas of this challenge is the speed at which these threats can be introduced. Adversaries are not constrained by U.S. regulations allowing deployment of new threats simply by modifying an available commercial product or application. The DOD needs similar agility to deliver counter-threat capabilities while remaining compliant with regulations. This research centers on increasing the government’s delivery speed by adding a transformational threat-focused acquisition method to compliment the traditional capability-based development process. The DOD’s current resourcing, programming, and acquisition processes are studied to offer a pragmatic synergistic threat-focused approach to continuously resource, research, and provide the latest in available technology to the information environment. This recommended approach offers an institutional method to acquire technology targeting delivery within months while maintaining the inherent ability to annually transition these products into the traditional process for sustainability. To enhance the speed of the research and refresh capability, the use of multi-criteria decision models (MCDM) are evaluated to accelerate the assessment of alternatives and engineering trade-offs. A mathematical model is provided to assess the selection of decision criteria and moreover its impact on the final alternative selection. Sensitivity analysis techniques are then used to identify the points where outcome probabilities are subject to change given different criteria. Ultimately, a stable methodology to accelerate the DOD’s acquisition of cyber-unique capabilities is provided.
Some files may require a special program or browser plug-in. More Information
Advisor: | Moreland, James, Doskey, Steven |
Commitee: | Cirillo, Michael, Etemadi, Amir, Murphree, E. Lile |
School: | The George Washington University |
Department: | Engineering Management |
School Location: | United States -- District of Columbia |
Source: | DAI-B 79/07(E), Dissertation Abstracts International |
Source Type: | DISSERTATION |
Subjects: | Engineering, Information science, Computer science |
Keywords: | DOD acquisition, Multi-criteria decision making, Sensitivity analysis, TOPSIS |
Publication Number: | 10744116 |
ISBN: | 978-0-355-65293-2 |