In software-intensive product development, relatively risk-free opportunities are long gone. Software risk is actually on the rise because it increases as system complexity increases. Managing risk is necessary when software risk prevents us from achieving our goals and objectives. People inherit risk at work by assuming one (or more) of the project roles.
The Journal of Cyber Security and Information Systems
The Journal of Cyber Security and Information Systems is a quarterly journal focusing on scientific and technical research & development, methods and processes, policies and standards, security, reliability, quality, and lessons learned case histories.
This issue features an article from the U.S. Strategic Command on "Incorporating IA into Global Guardian" and an article from the Navy INFOSEC Program Office on "Security Tools for Network Centric Warfare." From the R&D community comes an article from the Army Research Laboratory entitled "ARL Primes Army Information Assurance Capability." Also included
This issue highlights ongoing Information Assurance initiatives within the Department of Defense. The newsletter includes a feature article by the Joint Command and Control Warfare Center (JC2WC) on "Defending Against C2W and IW Attack" and a summary article highlighting the recent Information Assurance Seminar Game hosted by the U.S. Army War College. The
Rapid Application Development (RAD), a revolutionary software archetype of the 1990’s, while living up to its promise is still a fertile area for continued research and additional capitalization. This is evidenced by recent workshops at the University of Southern California; Center for Software Engineering (June 1997 and March 1998), the Software
The feature article for this issue encircles the Defense Intelligence Agency's (DIA) commitment to information operations by establishing the DIA Information Warfare Support Office. Also included is a commentary by then Director of CSIAC, Dr. John I. Algers, title "Information Assurance Evolves from Definitional Debate" that considers the rise and importance
The Cyber Security and Information Systems Information Analysis Center's inaugural issue includes an introduction to the establishment of CSIAC and a brief description of core operations and the technical area task program. Also included is a feature article by the Joint Staff on JV2010 and the OSD initiatives by ASD/C3I.
One of the most common questions I receive today goes something like, “Does earned value management apply to an automated information system effort?” This question reflects DoD history relative to both earned value management and AIS. Historically, earned value (under the guise of CS/CSC) was commonly perceived as a required reporting process oriented toward
In September 1996, the Software Management Review Council (SMRC) designated the Data & Analysis Center for Software (DACS) as the DoD Software Information Clearinghouse. In so doing, the SMRC has identified the DACS as the focal point for DoD and other personnel to locate information about all aspects of software technology; state of the art and best
The original DARPA STARS project had a number of objectives as it sought to infuse leading edge software engineering technology into the Department of Defense (DoD). One of those objectives was to develop well-defined processes that were not only repeatable, but practical and effective in developing software that was better, faster and cheaper. The Air Force
In 1992 Norm Brown, founder of the Software Program Managers Network (SPMN), was assigned responsibility for planning and conducting assessments of Navy programs in the Assistant Secretary of the Navy's office. He observed firsthand the devastating effect that ineffective software management has on software projects. During the same period Mike Evans,