Issues with Access to Acquisition Data and Information in the Department of Defense: Doing Data Right in Weapon System Acquisition

Abstract : Acquisition data lay the foundational role for decision-making, management, and oversight of the weapon-systems acquisition portfolio for the Department of Defense. How to effectively and efficiently spend these dollars has been a top priority for the Better Buying Power initiatives led by the Office of the Secretary of Defense (OSD) and the Under Secretary of Defense for Acquisition, Technology, and Logistics. The OSD asked RAND to help identify how available data can help assist defense-acquisition decision-making. In particular, we documented factual information on 21 information systems that contain acquisition data. This builds on our earlier work (Riposo et al., 2015, Issues With Access to Acquisition Data and Information in the Department of Defense: Policy and Practice, RAND RR-880; and McKernan et al., 2016, Issues With Access to Acquisition Data and Information in the Department of Defense: A Closer Look at the Origins and Implementation of Controlled Unclassified Information Labels and Security Policy, RAND RR-1476) by exploring in more detail the data that support decision-making.

[1]  th Congress,et al.  National Defense Authorization Act for Fiscal Year 1999 , 1999 .

[2]  Philip Campbell,et al.  Department of Defense Instruction 8500.2 “Information Assurance (IA) Implementation:” A retrospective , 2012, 2012 IEEE International Carnahan Conference on Security Technology (ICCST).

[3]  Elizabeth Ann Severns,et al.  Office, Secretary of Defense , 2019, U.S. Defense Planning.

[4]  policy.htmlcnd DoD Instruction 4630.8: Procedures for Interoperability and Supportability of Information Technology (IT) and National Security Systems (NSS) , 2004 .

[5]  Marco R. Spruit,et al.  MD3M: The master data management maturity model , 2015, Comput. Hum. Behav..

[6]  Clifford A. Grammich,et al.  Issues with Access to Acquisition Data and Information in the Department of Defense: A Closer Look at the Origins and Implementation of Controlled Unclassified Information Labels and Security Policy , 2016 .

[7]  Nidhi Kalra,et al.  What Should Be Classified?: A Framework with Application to the Global Force Management Data Initiative , 2011 .

[8]  Ciência política,et al.  Chairman of the Joint Chiefs of Staff , 2010 .

[9]  J. Frey The 9/11 Commission Report: Final Report of the National Commission on Terrorist attacks upon the United States , 2004 .

[10]  Carol V. Brown,et al.  Designing data governance , 2010, CACM.

[11]  J. Fowlkes Department of Defense Occupational Information Collection and Reporting , 1995 .

[12]  Clifford A. Grammich,et al.  Issues with Access to Acquisition Data and Information in the Department of Defense , 2015 .

[13]  H. McIntyre Clearance of DoD Information for Public Release. , 1996 .

[14]  Torben Bach Pedersen Warehousing The World: A Vision for Data Warehouse Research , 2009, New Trends in Data Warehousing and Data Analysis.

[15]  Ewa Ziemba,et al.  Information Technology For Management , 2009 .

[16]  D. Appler Withholding of Unclassified Technical Data from Public Disclosure. Change 1. , 1995 .

[17]  Tim Lohman 5 Things CIOs Need to Know , 2010 .

[18]  M. David Allen,et al.  Measuring Data Management Practice Maturity: A Community's Self-Assessment , 2007, Computer.

[19]  Justin Dearborn Five steps to a complete enterprise data management strategy. , 2013, Health management technology.

[20]  L. Diamond IT Governance : How Top Performers Manage IT Decision Rights for Superior Results , 2005 .