Please use this identifier to cite or link to this item: https://dair.nps.edu/handle/123456789/4604
Full metadata record
DC FieldValueLanguage
dc.contributor.authorErin Butkowski-
dc.date.accessioned2022-05-05T21:51:56Z-
dc.date.available2022-05-05T21:51:56Z-
dc.date.issued2022-05-02-
dc.identifier.citationPublished--Unlimited Distributionen_US
dc.identifier.urihttps://dair.nps.edu/handle/123456789/4604-
dc.descriptionExcerpt from the Proceedings of the Nineteenth Annual Acquisition Research Symposiumen_US
dc.description.abstractCritical technologies—such as elements of artificial intelligence and biotechnology—are those necessary to maintain U.S. technological superiority. As such, they are frequently the target of theft, espionage, and illegal export by adversaries. Prior Department of Defense (DoD) efforts to identify these technologies were considered by some military officials to be too broad to adequately guide protection. This presentation examines (1) the DoD’s recent efforts to identify and protect its critical technologies and (2) opportunities for these efforts to inform government-wide protection efforts.en_US
dc.description.sponsorshipAcquisition Research Programen_US
dc.language.isoen_USen_US
dc.publisherAcquisition Research Programen_US
dc.relation.ispartofseriesAcquisition Management;SYM-AM-22-080-
dc.subjectCritical Technologyen_US
dc.subjectArtificial Intelligence (AI)en_US
dc.subjectUSTRANSCOM Acquisition (US)-
dc.subjectTechnological Superiority-
dc.titleCritical Technologies: How is the DoD Protecting These Valuable Assets?en_US
dc.typeTechnical Reporten_US
Appears in Collections:Annual Acquisition Research Symposium Proceedings & Presentations

Files in This Item:
File Description SizeFormat 
SYM-AM-22-080.pdfProceedings341.42 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.