Please use this identifier to cite or link to this item:
https://dair.nps.edu/handle/123456789/1777
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Terry Leary | |
dc.contributor.author | Erin M. Schultz | |
dc.contributor.author | Virginia L. Wydler | |
dc.date.accessioned | 2020-03-16T18:01:20Z | - |
dc.date.available | 2020-03-16T18:01:20Z | - |
dc.date.issued | 2019-05-13 | |
dc.identifier.citation | Published--Unlimited Distribution | |
dc.identifier.uri | https://dair.nps.edu/handle/123456789/1777 | - |
dc.description | Acquisition Management / Defense Acquisition Community Contributor | |
dc.description.abstract | There is a plethora of best practices and strategies for information technology (IT) systems implementation. This abundance of information can overwhelm government acquisition professionals when trying to select the most appropriate path to execute IT modernization and may lead to sub-optimum decisions and disappointing outcomes. Mistakes can be very expensive, especially when shifting from legacy systems to modernized technology. Recent legislation addresses the cost of inefficiency: The Federal Government spends nearly 75 percent of its annual information technology funding on operating and maintaining existing legacy information technology systems. These systems can pose operational risks. These systems also pose security risks, including the inability to use current security best practices making these systems particularly vulnerable to malicious cyber activity. (The Modernizing Government Act of 2017). Government and industry need to create a process for efficient and cost-effective approaches to manage IT acquisition. Unfortunately, very few approaches are grounded in practical and tactical applications. This report provides recommendations for best practices, frameworks, and models that will improve IT acquisitions and modernization efforts for network services. The report will allow federal program managers and acquisition professionals to implement IT acquisition strategies that appropriately fit their situation on the acquisition lifecycle spectrum. | |
dc.description.sponsorship | Acquisition Research Program | |
dc.language | English (United States) | |
dc.publisher | Acquisition Research Program | |
dc.relation.ispartofseries | Acquisition Management | |
dc.relation.ispartofseries | SYM-AM-19-085 | |
dc.subject | Information Technology | |
dc.subject | Government Acquisition | |
dc.title | Information Technology Acquisition Best Practices | |
dc.type | Article | |
Appears in Collections: | Annual Acquisition Research Symposium Proceedings & Presentations |
Files in This Item:
File | Size | Format | |
---|---|---|---|
SYM-AM-19-085.pdf | 1.18 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.