dc.contributor.author | Klemas, Thomas | |
dc.contributor.author | Lively, Rebecca K. | |
dc.contributor.author | Choucri, Nazli | |
dc.date.accessioned | 2022-04-07T15:36:51Z | |
dc.date.available | 2022-04-07T15:36:51Z | |
dc.date.issued | 2018-11-14 | |
dc.identifier.uri | https://www.hsdl.org/?view&did=818911 | |
dc.identifier.uri | https://www.jstor.org/stable/26846123 | |
dc.identifier.uri | https://hdl.handle.net/1721.1/141746 | |
dc.description.abstract | The United States of America faces great risk in the cyber domain because our adversaries are growing bolder, increasing in number, improving their capabilities, and doing so rapidly. Meanwhile, the associated technologies are evolving so quickly that progress to harden and secure this domain is ephemeral, as systems reach obsolescence in just a few years and revolutionary paradigm shifts, such as cloud computing and ubiquitous mobile devices, can pull the rug out from the best laid defensive planning by introducing entirely new regimes of operations. Contemplating these facts in the context of Department of Defense acquisitions is particularly sobering, because many cyber capabilities, bought within the traditional acquisition framework, may be of limited usefulness by the time that they are delivered to the warfighters. Thus, it is a strategic imperative to improve DoD acquisitions pertaining to cyber capabilities. This paper proposes novel ideas and a framework for addressing these challenges. | en_US |
dc.description.sponsorship | This material is based on work supported by the MIT Political Science Department & U.S. Department of Defense. Any opinions, findings, conclusions or recommendations therein are those of the author(s) and do not necessarily reflect the views of the U.S. Department of Defense. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Army Cyber Institute (ACI) at West Point / © 2019 Authors. | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.title | Cyber Acquisition: Policy Changes to Drive Innovation in Response to Accelerating Threats in Cyberspace | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Klemas, T., Lively, R. & Choucri, N. (2018). Cyber acquisition: Policy changes to drive innovation in response to accelerating threats in cyberspace. Proceedings of the 2018 International Conference on Cyber Conflict (CYCON U.S.), 103–120. | en_US |
dc.eprint.version | Author's final manuscript. | en_US |