Please use this identifier to cite or link to this item:
https://dair.nps.edu/handle/123456789/1626
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jack Reid | |
dc.contributor.author | Donna H. Rhodes | |
dc.date.accessioned | 2020-03-16T17:59:56Z | - |
dc.date.available | 2020-03-16T17:59:56Z | - |
dc.date.issued | 2018-04-30 | |
dc.identifier.citation | Published--Unlimited Distribution | |
dc.identifier.uri | https://dair.nps.edu/handle/123456789/1626 | - |
dc.description | Acquisition Management / Defense Acquisition Community Contributor | |
dc.description.abstract | Acquisition programs increasingly use model-centric approaches, generating and using digital assets throughout the lifecycle. Model-centric practices have matured, yet in spite of sound practices there are uncertainties that may impact programs over time. The emergent uncertainties (policy change, budget cuts, disruptive technologies, threats, changing demographics, etc.) and related programmatic decisions (e.g., staff cuts, reduced training hours) may lead to cascading vulnerabilities within model-centric acquisition programs, potentially jeopardizing program success. This paper presents ongoing research that seeks to provide program managers with the means to identify model-centric program vulnerabilities and determine where interventions can most effectively be taken. Cause-Effect Mapping (CEM), a technique developed at MIT, is employed to examine cascading effects between emerging perturbations and terminal outcomes. Research begins with literature investigation and gathering results of past studies of relevance, including studies of model-centric environments and transformations from a traditional to model-centric engineering paradigm (sometimes referred to as the digital engineering paradigm), recent workshop findings, and related work on vulnerability assessment that may have implications for this work. The results are used to refine the CEM and analytic approach to develop a reference model for vulnerability assessment of model-centric programs. Usability of the resulting model is tested with selected research stakeholders. | |
dc.description.sponsorship | Acquisition Research Program | |
dc.language | English (United States) | |
dc.publisher | Acquisition Research Program | |
dc.relation.ispartofseries | Acquisition Management | |
dc.relation.ispartofseries | SYM-AM-18-109 | |
dc.subject | Model-Centric Acquisition Programs | |
dc.subject | Cascading Vulnerabilities | |
dc.subject | Cause-Effect Mapping | |
dc.subject | CEM | |
dc.subject | Digital Assets | |
dc.subject | Programmatic Decisions | |
dc.subject | Emerging Perturbations | |
dc.subject | Terminal Outcomes | |
dc.subject | Engineering Paradigm | |
dc.title | Assessing Vulnerabilities in Model-Centric Acquisition Programs Using Cause-Effect Mapping | |
dc.type | Article | |
Appears in Collections: | Annual Acquisition Research Symposium Proceedings & Presentations |
Files in This Item:
File | Size | Format | |
---|---|---|---|
SYM-AM-18-109.pdf | 3.78 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.