system acquisition
Recently Published Documents


TOTAL DOCUMENTS

135
(FIVE YEARS 19)

H-INDEX

10
(FIVE YEARS 0)

2022 ◽  
Vol 9 (2) ◽  
pp. 91-98
Author(s):  
Arthur Middlebrooks ◽  
Jackson Brownfield ◽  
Gabriel Lajeunesse ◽  
Ryan Leach ◽  
Christopher Sharfin

The United States’ (US) ability to maintain a technological edge in the current operational environment is challenged by the increased ability of near-peer nations to produce military technology. In response to this problem, the US Army Engineer Research and Development Center (ERDC) seeks to model the three key elements of military system acquisition—context, product, and process—to develop a more comprehensive understanding regarding how and why nations acquire technical solutions. Through the application of the System Dynamics Modeling Process (SDMP), this research examines the interactions between the strategic context of Germany, the military products it acquires to address its operational needs, and the processes it employs to acquire military technology. The results of this research indicate that numerous dynamic variables of context impact the acquisitions process for Germany, particularly political support and subsequent monetary allocations to research and development.


2021 ◽  
Vol 4 (3) ◽  
pp. 191-208
Author(s):  
Seungmok Lee

With the advent of the Fourth Revolution, military weapon systems are also being advanced. In particular, as the proportion of software embedded in these weapon systems increases, the cyber vulnerabilities of advanced weapon systems also gradually increase. If cutting-edge weapons stop abruptly or malfunction owing to software defects or cyberattacks, they will adversely affect defense security as well as combat power and economic losses. The U.S. DoD is implementing the risk management framework (RMF) to cope with cyber vulnerabilities and threats. RMF is a risk management (RM)-based framework that classifies the cyber vulnerabilities of weapon systems based on data and evaluates them according to confidentiality, integrity, and availability. The application of RMF to the Korean military's weapon-system acquisition procedure is still in its infancy. In this study, we studied the application of the RMF to weapon acquisition processors in the U.S. DoD and suggested that measures of availability, reliability, and safety that can affect weapon performance should be managed with security, and that security systems should be applied to reliability, availability, and maintenance (RAM).


2021 ◽  
Vol 2143 (1) ◽  
pp. 012002
Author(s):  
Changwei Huang

Abstract With the rapid development of Internet and electronic technology, the Internet of things (hereinafter referred to as IOT) has become an important way of many intelligent devices, which can improve people’s application of intelligent devices. Through the IOT, we can carry out the research on the centralized monitoring system of central air conditioning [1]. Through the IOT, we can realize the IOT of indoor and outdoor units of central air conditioning, which can realize the important application of practical engineering projects. Through fuzzy algorithm, this paper can improve the overall improvement of the project. Through the cooperation of MCU and GPRS module, we can complete the wireless transmission of data., This can realize computer terminal monitoring and mobile terminal monitoring. Through engineering application, we can realize the automation and information integration of system monitoring, which will greatly improve the monitoring efficiency. Through the development of acquisition device, we can improve the comfort and security of central air conditioning, which will enhance the communication between the physical equipment of the system and the upper server network. Firstly, this paper analyzes the flow of fuzzy PID algorithm. Then, this paper specifies the system diagram of the central air conditioning control acquisition system [2]. Finally, this paper puts forward the important work of system acquisition.


2021 ◽  
Author(s):  
John Green

This paper highlights the System Effectiveness methodology and its role in acquiring and sustaining U.S. military weapons systems from 1958 to 2021. Given the long period covered by this study and the many changes to the acquisition process, it would be reasonable to expect that the methodology would change and adapt, and the study supports this assumption. The study used three qualitative methods: a structured review of the literature related to System Effectiveness, a grounded theory analysis of the structured literature review, and a historiography of the initial grounded theory results. The research identified three epochs, the first two lasting approximately 22 years each. The conclusions are fourfold. First, the role of System Effectiveness today is vastly diminished from its original purpose because original material was not widely accessible to the community of interest during the formative years. Second, analysis of source documents provides insight into how to correct the misconceptions of the past and incorporate System Effectiveness into modern system engineering. Third, the models developed in epoch one may have relevance for today’s problems. The last conclusion is that an integrated research methodology is a valuable tool for making sense of a mass of conflicting information spread out over time. This the most comprehensive research on systems effectiveness ever published. Based on over 500 documents, it is rigorous and innovative and provides the basis for a structured and integrated approach for utilizing System Effectiveness in emerging U.S. defense system acquisition and sustainment challenges. <br>


2021 ◽  
Author(s):  
John Green

This paper highlights the System Effectiveness methodology and its role in acquiring and sustaining U.S. military weapons systems from 1958 to 2021. Given the long period covered by this study and the many changes to the acquisition process, it would be reasonable to expect that the methodology would change and adapt, and the study supports this assumption. The study used three qualitative methods: a structured review of the literature related to System Effectiveness, a grounded theory analysis of the structured literature review, and a historiography of the initial grounded theory results. The research identified three epochs, the first two lasting approximately 22 years each. The conclusions are fourfold. First, the role of System Effectiveness today is vastly diminished from its original purpose because original material was not widely accessible to the community of interest during the formative years. Second, analysis of source documents provides insight into how to correct the misconceptions of the past and incorporate System Effectiveness into modern system engineering. Third, the models developed in epoch one may have relevance for today’s problems. The last conclusion is that an integrated research methodology is a valuable tool for making sense of a mass of conflicting information spread out over time. This the most comprehensive research on systems effectiveness ever published. Based on over 500 documents, it is rigorous and innovative and provides the basis for a structured and integrated approach for utilizing System Effectiveness in emerging U.S. defense system acquisition and sustainment challenges. <br>


Author(s):  
Ito Setiawan ◽  
Aldistya Riesta Sekarini ◽  
Retno Waluyo ◽  
Fiby Nur Afiana

Bertambahnya ketergantungan organisasi terhadap penggunaan sistem informasi dalam rutinan sejalan dengan ancaman dan risiko yang timbul dari penggunaan sistem informasi tersebut. Permasalahan penggunaan sistem informasi juga dialami oleh Tripio Purwokerto. Tripio merupakan perusahaan yang bergerak di bidang teknologi di Purwokerto. Tripio memiliki dua sistem informasi untuk menunjang proses bisnisnya yaitu website dan Point of Sales (POS) systems. Dalam penggunaan sistem informasi mengalami permasalahan seperti server mengalami error, jaringan yang bermasalah, data yang rusak karena terkena virus dan human error. Tujuan penelitian adalah mengetahui risiko dan juga dampak dari penggunaan sistem informasi di Tripio Purwokerto. Metode yang digunakan adalah International Organization for Standardization (ISO) 3100:2018 dan standar pengendalian menggunakan International Organization for Standardization (ISO) 27001:2013. Dari hasil penelitian yang telah dilakukan dapat ditarik kesimpulan bahwa terdapat 15 risiko yang terdiri dari 6 risiko dengan tingkat risiko high, 7 risiko dengan tingkat risiko medium, dan 2 risiko dengan tingkat risiko low. Rekomendasi kontrol yang digunakan mengacu pada ISO 27001:2013 bagian human recource security, access control, physical and environmental security, operations security, protection from malware, communications security, system acquisition, development and maintenance.


2021 ◽  
Author(s):  
G. Busanello ◽  
B. Soliman ◽  
J. Saathoff ◽  
A. Poole ◽  
P.W. Bilsby ◽  
...  

2020 ◽  
Vol 15 (10) ◽  
pp. P10029-P10029
Author(s):  
D. Richtsmeier ◽  
C.A.S. Dunning ◽  
K. Iniewski ◽  
M. Bazalova-Carter

Sign in / Sign up

Export Citation Format

Share Document