{"id":"https://openalex.org/W3122045286","doi":"https://doi.org/10.15439/2020km3","title":"An Analysis and Discussion of the Defense Information Systems Agency\u2019s Level of Compliance and Integration of the U.S. Congress\u2019 Title Viii National Defense Authorization Act Fy 2015 Subtitle D\u2014Federal Information Technology Acquisition Reform","display_name":"An Analysis and Discussion of the Defense Information Systems Agency\u2019s Level of Compliance and Integration of the U.S. Congress\u2019 Title Viii National Defense Authorization Act Fy 2015 Subtitle D\u2014Federal Information Technology Acquisition Reform","publication_year":2020,"publication_date":"2020-01-20","ids":{"openalex":"https://openalex.org/W3122045286","doi":"https://doi.org/10.15439/2020km3","mag":"3122045286"},"language":"en","primary_location":{"id":"doi:10.15439/2020km3","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2020km3","pdf_url":"https://annals-csis.org/proceedings/icrmat2020/drp/pdf/3.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://annals-csis.org/proceedings/icrmat2020/drp/pdf/3.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066885874","display_name":"S. Raschid Muller","orcid":"https://orcid.org/0000-0002-1742-7575"},"institutions":[{"id":"https://openalex.org/I4210143258","display_name":"SBS CyberSecurity (United States)","ror":"https://ror.org/0572r3k48","country_code":"US","type":"company","lineage":["https://openalex.org/I4210143258"]},{"id":"https://openalex.org/I98993165","display_name":"Capitol Technology University","ror":"https://ror.org/045ej2q36","country_code":"US","type":"education","lineage":["https://openalex.org/I98993165"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"S. Raschid Muller","raw_affiliation_strings":["Assistant Professor of Cybersecurity","Capitol Technology University Laurel, MD, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Assistant Professor of Cybersecurity","institution_ids":["https://openalex.org/I4210143258"]},{"raw_affiliation_string":"Capitol Technology University Laurel, MD, USA","institution_ids":["https://openalex.org/I98993165"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5066885874"],"corresponding_institution_ids":["https://openalex.org/I4210143258","https://openalex.org/I98993165"],"apc_list":null,"apc_paid":null,"fwci":0.7291,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.70086527,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"24","issue":null,"first_page":"79","last_page":"86"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14306","display_name":"Technology Assessment and Management","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14306","display_name":"Technology Assessment and Management","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11572","display_name":"Information Technology Governance and Strategy","score":0.9298999905586243,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T14484","display_name":"Technology and Data Analysis","score":0.9057000279426575,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/agency","display_name":"Agency (philosophy)","score":0.7459450960159302},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.6771330237388611},{"id":"https://openalex.org/keywords/compliance","display_name":"Compliance (psychology)","score":0.6132976412773132},{"id":"https://openalex.org/keywords/subtitle","display_name":"Subtitle","score":0.5830770134925842},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.4828222692012787},{"id":"https://openalex.org/keywords/united-states-national-security-agency","display_name":"United States National Security Agency","score":0.4366992115974426},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41776201128959656},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.39594385027885437},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.3786506950855255},{"id":"https://openalex.org/keywords/public-administration","display_name":"Public administration","score":0.3495815396308899},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.31194043159484863},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.2947198152542114},{"id":"https://openalex.org/keywords/national-security","display_name":"National security","score":0.2720825672149658},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.12702292203903198},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.09775221347808838}],"concepts":[{"id":"https://openalex.org/C108170787","wikidata":"https://www.wikidata.org/wiki/Q3951828","display_name":"Agency (philosophy)","level":2,"score":0.7459450960159302},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.6771330237388611},{"id":"https://openalex.org/C2781460075","wikidata":"https://www.wikidata.org/wiki/Q1399332","display_name":"Compliance (psychology)","level":2,"score":0.6132976412773132},{"id":"https://openalex.org/C2780364048","wikidata":"https://www.wikidata.org/wiki/Q204028","display_name":"Subtitle","level":2,"score":0.5830770134925842},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.4828222692012787},{"id":"https://openalex.org/C517823627","wikidata":"https://www.wikidata.org/wiki/Q121194","display_name":"United States National Security Agency","level":3,"score":0.4366992115974426},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41776201128959656},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.39594385027885437},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.3786506950855255},{"id":"https://openalex.org/C3116431","wikidata":"https://www.wikidata.org/wiki/Q31728","display_name":"Public administration","level":1,"score":0.3495815396308899},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.31194043159484863},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.2947198152542114},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.2720825672149658},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.12702292203903198},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.09775221347808838},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.15439/2020km3","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2020km3","pdf_url":"https://annals-csis.org/proceedings/icrmat2020/drp/pdf/3.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:doaj.org/article:ef2b4d1652e943efb74ccbd3cc6f50c2","is_oa":false,"landing_page_url":"https://doaj.org/article/ef2b4d1652e943efb74ccbd3cc6f50c2","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Annals of computer science and information systems, Vol 24, Pp 79-86 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.15439/2020km3","is_oa":true,"landing_page_url":"https://doi.org/10.15439/2020km3","pdf_url":"https://annals-csis.org/proceedings/icrmat2020/drp/pdf/3.pdf","source":{"id":"https://openalex.org/S4220651875","display_name":"Annals of Computer Science and Information Systems","issn_l":"2300-5963","issn":["2300-5963"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":"https://openalex.org/P4310317484","host_organization_name":"Polskie Towarzystwo Informatyczne","host_organization_lineage":["https://openalex.org/P4310317484"],"host_organization_lineage_names":["Polskie Towarzystwo Informatyczne"],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annals of Computer Science and Information Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3122045286.pdf","grobid_xml":"https://content.openalex.org/works/W3122045286.grobid-xml"},"referenced_works_count":13,"referenced_works":["https://openalex.org/W32053824","https://openalex.org/W221682682","https://openalex.org/W585141568","https://openalex.org/W1828331568","https://openalex.org/W2022444195","https://openalex.org/W2121212693","https://openalex.org/W2147713977","https://openalex.org/W2279211883","https://openalex.org/W2325421495","https://openalex.org/W2344231763","https://openalex.org/W4232595330","https://openalex.org/W4254007046","https://openalex.org/W6601312562"],"related_works":["https://openalex.org/W1950334511","https://openalex.org/W3119551990","https://openalex.org/W2351264416","https://openalex.org/W3004133161","https://openalex.org/W4311609618","https://openalex.org/W2370494932","https://openalex.org/W2975517425","https://openalex.org/W2952626934","https://openalex.org/W2349976842","https://openalex.org/W3172548481"],"abstract_inverted_index":{"conducted":[0],"assessment":[1,69],"of":[2,9,41,48,109,144],"the":[3,13,59,110,114,134,141],"Defense":[4],"Information":[5,15,64,75],"Systems":[6],"Agency's":[7],"(Department":[8],"Defense)":[10],"compliance":[11],"with":[12,113],"Federal":[14,28],"Technology":[16,65,76],"Acquisition":[17],"Reform":[18],"Action":[19],"(FITARA)":[20],"Section":[21,26,57,94],"833:":[22],"Portfolio":[23],"Management":[24,67],"and":[25,79,87,102,116,148],"834:":[27],"Data":[29],"Center":[30],"Consolidation":[31],"Initiatives.":[32],"The":[33],"paper":[34],"is":[35],"organized":[36],"by":[37],"providing":[38],"an":[39],"overview":[40],"DISA":[42],"leading":[43,98],"into":[44,99],"a":[45,100,126],"brief":[46],"history":[47],"FITARA":[49],"(and":[50],"its":[51],"associated":[52],"federal":[53],"government":[54],"implementation).":[55],"For":[56],"833,":[58],"Government":[60],"Accountability":[61],"Office":[62],"(GAO)":[63],"Investment":[66,80],"(ITIM)":[68],"tool":[70],"was":[71,96,123],"applied":[72,124],"to":[73,106],"DISA's":[74,107],"Capital":[77],"Planning":[78],"Control":[81],"(CPIC)":[82],"process":[83],"for":[84,89,131,136],"evaluation,":[85],"analysis,":[86],"recommendations":[88],"improvement.":[90],"Following":[91],"GAO":[92],"ITIM,":[93],"834":[95],"introduced,":[97],"PEST":[101],"SWOT":[103],"analyses":[104],"relative":[105],"implementation":[108,132],"framework":[111],"concluding":[112],"evaluation":[115],"recommendations.":[117],"Summarily,":[118],"Kotter's":[119],"8-step":[120],"change":[121],"model":[122],"in":[125,139],"proposed":[127],"12":[128],"-36-month":[129],"plan":[130],"throughout":[133],"agency":[135],"senior":[137],"leadership":[138],"addressing":[140],"various":[142],"gaps":[143],"both":[145],"sections":[146],"833":[147],"834.":[149]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
