• DocumentCode
    80932
  • Title

    Building a Bridge across the Transition Chasm

  • Author

    D´Amico, A. ; O´Brien, Bill ; Larkin, M.

  • Volume
    11
  • Issue
    2
  • fYear
    2013
  • fDate
    March-April 2013
  • Firstpage
    24
  • Lastpage
    33
  • Abstract
    Best practices for transitioning commercially funded research to operational environments don\´t always apply to government-funded cybersecurity endeavors due to constraints imposed by government regulations, certifications, and funding cycles. Most approaches for crossing this "valley of death" have been offered from the perspective of government sponsors and acquisition authorities. This article offers the perspective of an R&D team that has transitioned three cybersecurity situation awareness technologies from early research to installations in the US Department of Homeland Security and Department of Defense. The authors describe the techniques they used to build a bridge across the transition chasm.
  • Keywords
    certification; computer network security; government policies; national security; public finance; research and development management; technology transfer; R and D team; US Department of Homeland Security and Department of Defense; acquisition authorities; certifications; cybersecurity situation awareness technologies; funding cycles; government regulations; government-funded cybersecurity endeavors; government-sponsored cybersecurity research; operational environments; team composition; technology transition; Commercialization; Computer crime; Computer security; Costs; Government policies; Research and development; Software engineering; maintenance planning; modeling; simulation; software acquisition; testing strategies; user interfaces; visualization;
  • fLanguage
    English
  • Journal_Title
    Security & Privacy, IEEE
  • Publisher
    ieee
  • ISSN
    1540-7993
  • Type

    jour

  • DOI
    10.1109/MSP.2012.160
  • Filename
    6365619