This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Building a Bridge across the Transition Chasm
March-April 2013 (vol. 11 no. 2)
pp. 24-33
Anita D'Amico, Secure Decisions, Division of Applied Visions, Inc.
Brianne O'Brien, Secure Decisions, Division of Applied Visions, Inc.
Mark Larkin, Secure Decisions, Division of Applied Visions, Inc.
Best practices for transitioning commercially funded research to operational environments don't always apply to government-funded cybersecurity endeavors due to constraints imposed by government regulations, certifications, and funding cycles. Most approaches for crossing this "valley of death" have been offered from the perspective of government sponsors and acquisition authorities. This article offers the perspective of an R&D team that has transitioned three cybersecurity situation awareness technologies from early research to installations in the US Department of Homeland Security and Department of Defense. The authors describe the techniques they used to build a bridge across the transition chasm.
Index Terms:
Government policies,Computer security,Computer crime,Software engineering,Research and development,Commercialization,Costs,visualization,user interfaces,testing strategies,maintenance planning,software acquisition,simulation,modeling
Citation:
Anita D'Amico, Brianne O'Brien, Mark Larkin, "Building a Bridge across the Transition Chasm," IEEE Security & Privacy, vol. 11, no. 2, pp. 24-33, March-April 2013, doi:10.1109/MSP.2012.160
Usage of this product signifies your acceptance of the Terms of Use.