Knowledge Management And Information Technology (Know-IT Encyclopedia)

Transcription

Knowledge Managementand Information Technology(Know-IT Encyclopedia)Neal PollockPublished by the Defense Acquisition University Press,Fort Belvoir, Virginia, for theProgram Executive Office for Information TechnologyFirst EditionSeptember 20021

2

Navigation Tool:ABCDEFGHIJKLMNOPQRSTUVWX1ACRONYM LISTINTRODUCTIONAs knowledge management (KM) and information technology (IT) have developed andgrown, they have evolved numerous technical terms and phrases that those not intimatelyinvolved in these disciplines may find difficult to understand. These terms are useful in efficientlycommunicating among professionals, but they can be difficult to absorb in a rapid manner, and itcan be difficult to obtain consistent definitions. There is a spectrum of tools to address differentaspects of the jargon development phenomenon. At the low end of the range are lists that defineeach letter of an acronym but do not usually provide much else—they are essentially data-leveltools. Many glossaries provide short definitions of terms and phrases; they are essentiallyinformation-level tools. Unless one has an idea or context already, it is difficult to trulyunderstand when only provided with information. This encyclopedia addresses a void in thepresent spectrum. It is an attempt to create and distribute a knowledge-level tool, although it isnot as voluminous as a full-boat encyclopedia (which would be impossible to adequatelydistribute). This encyclopedia was constructed using a number of different sources. Much of it,however, is tacit knowledge taken from my experience on-the-job at the Program Executive Officefor Information Technology (PEO-IT), the Department of the Navy (DON) Chief InformationOffice (CIO), and from courses taken at the Information Resources Management College (IRMC)to achieve certifications (CIO and National Security Telecommunications and InformationSystems Security Instruction [NSTISSI] 4011).This document is not all-inclusive, but it provides a first step at capturing and elucidatingmany commonly used KM and IT terms and phrases. Descriptions are limited to KM and IT wordusage though some words have other meanings (not addressed here) as well. A Web version ishosted on the Defense Acquisition University (DAU) and PEO-IT Web sites athttp://www.dau.mil/pubs/pubs-main.asp and http://www.peo-it.navy.mil, and included infuture versions of the DON Knowledge Centric Organization (KCO) Toolkit CD. The onlineversion will be maintained and periodically updated. Please help keep the online version currentby submitting additional terms and comments via the Web site. For more information, feedback,or to submit changes, please contact me at 703-601-3061, 703-946-2731, orpollockn@spawar.navy.mil.I have added a considerable number of quotations from various sources to enhance theencyclopedia. They are an attempt to extend the knowledge inherent in this document into thelonger scope of human knowledge and into the realm of wisdom. I anticipate that some readerswill find them of particular value and interest while others will find them perplexing or even3

annoying. I have differentiated them from the text via differing font size and placement at the endof each entry. However, similar to Zen Buddhist koans, the quotations that may appear the leastrelevant may be the very ones to shed light where it is needed most (though I had to stretch a bitto find a quote for a few of the entries). I hope you find them enjoyable as well as enlightening. AsSamuel Johnson (1709–1784) stated: “Every quotation contributes something to the stability orenlargement of the language” (from The Oxford Dictionary of Quotations, Oxford University Press,New York, 1980, p. 281, No. 7) and Pettibone Poole said, “He who laughs, lasts” (from A Glass Eyeat the Keyhole, 1938 as quoted by Robert Byrne in The 637 Best Things Anybody Ever Said, Atheneum,NY, 1982, #72).USESThis encyclopedia can, of course, be used as a reference document (similar to the EncyclopediaBritannica or Americana) for KM and IT terms and phrases. It can also be used as a training aid forKM and IT courses. In addition, in can be used as an INDOC (indoctrination) tool for newemployees. Such usage can provide the person new to IT or KM with basic knowledge fromwhich to build and can elicit informed questions to expand the person’s personal knowledge baseby eliciting implicit or tacit knowledge from more experienced employees. In addition, PEO-ITintends to employ the encyclopedia as part of its Enterprise Solutions outreach program.NAVIGATIONAn alphabetic banner at the start of the document provides hyperlinks to the letters of thealphabet within the document as well as to the acronym list. Depending upon your software, youmay have to hit the “control” key while clicking the left mouse button to reach the desiredlocation. The letters and acronym list may also be directly accessed through “Insert” on the toolbar, followed by “Bookmark,” selecting the element desired, and then “Go to.”The acronym list is attached at the beginning of the document. It includes references to whereacronyms are used within the encyclopedia and can, therefore, be used as an abbreviated index.Searches in Microsoft Word can also be made. These can be facilitated (if searching for entries) byselecting “advanced search,” “font,” and “bold” since the entry headers are all in bold. Thus, onlythe entry headers (which are repeated in the acronym list) will be found via this search.DISCLAIMEROpinions, conclusions, and recommendations expressed or implied within are solelythose of the authors. They do not necessarily represent the views of the Department of theNavy or any other U.S. government agency. Cleared for public release; distributionunlimited (from Information Age Anthology: Part Four, International Affairs, David Albertsand Daniel Papp, Eds., National Defense University (NDU) Press, Washington, DC, 1987,p. iv).4

ACKNOWLEDGMENTSThe idea for this document came from my former boss, John DeSalme, former DON programexecutive officer for space, communications, and sensors (PEO-SCS) while he was attending ourDON CIO electronic Business/Knowledge Fair 2001 on August 30, 2001. The effort to create thisencyclopedia was encouraged by our deputy chief information officer, Ms. Alex Bennet, withoutwhose support it would certainly not have been possible. I thank Messrs. Joseph Cipriano andSteven Ehrler (PEO-IT) and Dan Porter (DON CIO), who supported my request for a rotationalassignment at the DON CIO, and Ms. Eileen Roberson for her continued support that enabled meto complete the encyclopedia.I also wish to thank my instructors at the IRMC: Jay Alden, LTC Carr, Dr. Chang, NormCrane, Pete Denega, Jack Egan, Ed Fitzpatrick, Gerry Gingrich, Bill Hodson, Phil Irish, LTC CraigKaucher, Howard Looney, Dr. M. L. Martin, LTC McNamara, John Michel, Robert Norris, JeromePaige, Les Pang, Phil Parsons, Blair Peterson, Linda Polydys, MAJ Cliff Poole, CAPT Jean Sando,John Saunders, Geoff Seaver, Carolyn Strano, Brian Sutton, Dwight Toavs, Charles Tompkins,Nancy Wills, N. Wood, et al., and the many individual contributors to this pocket encyclopedia:DON CIO Contributors: Karen Danis, Jill Garcia, Floyd Groce, Matthew Hart, CAPT JamesKantner, Debbie Lemmeyer, Jean Pate, Lynda Pierce, Sandra Smith, and Frank Sowa.Other Contributors: David Akin (University of Maryland), John Andre (GSA), Richard Burk(HUD), Dr. Robert Burkuhl (SOCOM), Charles Cather (HQDA, U.S. Army), Ken Creighton (IITResearch Institute), Matt D'Antuono (SSC Charleston, Washington Navy Yard), Clay Dean(NAVFAC), Walt Dyer (PEO-IT), Becky Fitzgerald (CINCPACFLT, U.S. Navy), Virgil Frizzel(George Mason University), Karen Gilmore (DAU), Beth Gramoy (SPAWAR Systems Center, SanDiego), Gary Hacker (OPM), Janice Herd (Library of Congress), John Hickok (DAU), Hans Jerrell(DAU), Erik Johnson (PEO-IT), Seth Kahan (World Bank), Geoff Malafsky (TII Corp.), Dr.3Margaret Myers (ASD (C I)), Dick Opp (PEO-IT), Lisa Pirone (EDO Corp.), Mike Rauscher (U.S.Forest Service), Dr. Vincent Ribiere (American University), Harriet Riofrio (OSD), CharlesRogers (SSC Charleston, Washington Navy Yard), Janet Scheitle (U.S. Army), Susan Tarr(Library of Congress), Susan Turnbull (GSA), Bob Turner (FAA), Peter Williams (Utah StateUniversity), and Bill Windhurst (SPAWAR). A special thank you to my publisher, Greg Caruth,and editors Martha Polkey and Debbie Gonzalez of the DAU, who have vastly improved thereadability and usefulness of this book, and to everyone who helped make this dream into areality.Neal J. Pollock5

6

AcronymsNote: encyclopedia entries (headers) are in AANSIAOLAPAPCAPIAPMCAPPARASASCIIASN CAActivity-Based CostingAcquisition CATegory—see CBR, CCA, DAE, PM, and 8121Actual Cost of Work Performed—see EVMAmericans with Disabilities Act—see Section 508Automated Data Processing—see ITAir Force Base—see DSSAir Force Institute of Technology—see DSSApproval for Full Production—see Buzzword CompliantAnalytical Hierarchy ProcessArtificial IntelligenceAssuring the Information Infrastructure—IRMC CourseAutomated Information System—see ITAnalog Mobile Phone ServiceANalysis Of VArianceAmerican National Standards InstituteAmerica OnLine—see ISP, P2P, VortalAccess PointAcquisition Professional Corps—see DAWIAApplication Programming InterfaceAdvanced Program Management Course—see Decision Theory, PM,Systems EngineeringApplication Portability Profile—see NIST, PortabilityAcquisition ReformAdministrative Support—see DAWPDPAmerican Standard Code for Information Interchange—see CookieAssistant Secretary of the Navy for Acquisition Reform—see PMActive Server Page—see WebificationApplication Service ProviderAutomatic Speech RecognitionAutomated System Security Incident Support Team—see IO, PGPApproval for Service Use—see Buzzword CompliantAsynchronous Transfer ModeAbstract Windowing Toolkit—see JavaBaseLineBusiness to BusinessBusiness to Customer (or Consumer)Budgeted At Completion—see EVMBehaviorally-Anchored Rating (Scale)Bulletin Board System—see Intellectual PropertyBridge Certification Authority—see CABusiness Case Analysis—see ROI7

IC4ISPBudgeted Cost of Work Performed—see EVMBudgeted Cost of Work Scheduled—see EVMBusiness Impact Analysis—see COOPBasic Ordering Agreements—see GWACBlanket Purchasing Agreements—see GWAC, ESIBusiness Process ReengineeringBase Realignment And Closure ActBasic Service SetBusiness and Technical Management Professionals—see DAWPDPBUreau of PERSonnel—see DSSBandWidthCommand and Control—see CCRP, C2W, DIAPCommand and Control WarfareCommand, Control, Communications, and IntelligenceCommand, Control, Communications, Computers, and IntelligenceCommand, Control, Communications, Computers, and Intelligence SupportPlan—see ArchitectureCACertification AuthorityCAAPCritical Asset Assurance ProgramCACCommon Access CardCADCard Acceptance Device—see Smart CardCAD/CAM Computer-Aided Design/Manufacturing—see DBCAIVCost As an Independent VariableCALEACommunications Assistance to Law Enforcement ActCAPPCrisis Action Planning Process—see IOCASEComputer-Aided Software Engineering—see DB, S/WCBRCase Based ReasoningCCAClinger-Cohen ActCCITTCommittee for International Telegraph and Telephone—see ITUc-commerce collaborative commerceCCPACable Communications Policy ActCCRPCommand and Control Research Program(formerly: Command, Control, Communications, Computers, Intelligence,4Surveillance, and Reconnaissance (C ISR) Cooperative Research Project)CDCompact DiskCDACentral Design Activity or Communications Decency ActCDAComponent Data Administrator—see Data AdministrationCDMACode-Division Multiple AccessCDRLContract Data Requirements List—see DataCD-RCompact Disk-Recordable—see CD, Log Files, OSDCD-ROMCompact Disk Read-Only Memory—see DVD, Distributed Learning, IT,OSDCD-RWCompact Disk-Re-Writable—see Optical Storage Device8

MUCNACNACNDCOATCobITCOECoICOMSECCOOCOOPCoPChief Executive Officer—see Capital Planning and Investment, CXOs,NSTAC, Performance- and Results-Based Management, Vision andMental ModelCenter for Education and Research in Information Assurance andSecurity—see Electronic Business, HackersComputer Emergency Response TeamSee (in References)Computer Fraud and Abuse ActComputer Fraud and Hacking ActChief Financial Officer—see Capital Planning and Investment, FISCAM,GPRAChief Financial Officers ActCHi square Automatic Interaction Detection—see Data MiningChallenge Handshake Authentication Protocol—see AuthenticationCentral Intelligence Agency—see PCCIP, VulnerabilityConfidentiality, Integrity, Availability, Nonrepudiation, andAuthenticationCritical Infrastructure Assurance OfficerCritical Infrastructure Coordination Group—see PDD-63Computer Integrated Manufacturing—see DBChief Information OfficerCritical Infrastructure ProtectionCritical Infrastructure Protection CouncilComputer Incident Response TeamCommand, Control, Communications, Computers, Intelligence,Surveillance, and Reconnaissance (C4ISR) Integration Support ActivityChief Information Security Officer—see DB, IAMCertified Information Systems Security Professional—see ISC2Close In Weapons System—see CNDChief Knowledge OfficerChief Learning Officer—see CXOsCapability Maturity ModelCarnegie-Mellon University—see CMM, Risk Assessment/Analysis, S/W,SEICenter for Naval Analyses—see InteroperabilityComputer Network Attack—see IOComputer Network DefenseCouncil On Accessible Technology—see Section 508Control objectives for Information and related TechnologyCommon Operating EnvironmentCommunity of InterestCOMmunications SECurity—see DITSCAPChief Operating Officer—see CXOsContinuity Of Operations PlanCommunity of Practice9

COPPACORBACOSCOTSCPICPOChildren’s Online Privacy Protection ActCommon Object Request Broker ArchitectureChip Operating SystemContractor Off-The-ShelfCost Performance Index—see EVMChief Planning Officer, Chief Privacy Officer, or Chief Petty Officer—seeCXOsCPSCertificate Practice Statement—see PolicyCPUCentral Processor Unit—see S/WCREATECommittee on Resources for Electronic Accessible Technology to Endusers—see Section 508CRLCertificate Revocation ListCRMCustomer Relationship ManagementCSAComputer Security ActC/SCSCCost/Schedule Control Systems Criteria—see Buzzword Compliant, EVMCSMA/CA Carrier Sense Multiple Access/Collision Avoidance—see IEEECSSPABComputer System Security and Privacy Advisory Board—see ComputerSecurity ActCSTCritical information systems technologies—IRMC CourseCWCollected Works (of Carl Gustav Jung)CWMLCompact Wireless Markup Language—see WMLCXOcombination acronym for CEO, CIO, etc. where x is a variableC&ACertification and Accreditation—see DITSCAP, IASEC&ECause and Effect (chain)-cf. FeedbackDADesign Agent—see CDADAADesignated Approval Authority—see DITSCAP, IAM, NSTISSI, SSAADACDiscretionary Access ControlDAEDefense Acquisition ExecutiveD-AMPSDigital Advanced Mobile Phone Service—see AMPSDARPADefense Advanced Research Project Agency—see CIRT, ITU, Internet, NIIDAUDefense Acquisition University—see DAWIA, PM, Systems EngineeringDAWIADefense Acquisition Workforce Improvement ActDAWPDP Defense Acquisition Workforce Personnel Demonstration ProjectDBDataBaseDBMSDataBase Management SystemDCMCDefense Contract Management Command—see Components,Performance- and Results-Based ManagementDDDSDefense Data Dictionary System—see Data Dictionary, StandardizationDDLData Definition Language—see DBDDMDepartment of Defense Data Model—see Data AdministrationDDOSDistributed Denial Of ServiceDESData Encryption StandardDFASDefense Finance and Accounting Service—see EFTDIAPDefense-wide Information Assurance Program10

DNSDoADoAFDoCDoDDoDDDoEDoEDoJDOLAPDoNDefense in DepthDefense Information InfrastructureData, INformation, and KnowledgeDefense Information Systems AgencyDefense Information Systems Network—see DISADefense Information Technology Security Certification and AccreditationProcessDefense Logistics Agency—see components, DSSDisk Operating System Local Area Network requestor—see ProtocolData ManagementDigital Millennium Copyright ActData Management and Interoperability Repository—see DM, DataRepository, Metadata RepositoryData Manipulation Language—see DBData Management Strategies and Technologies—IRMC CourseDeMilitarized ZoneDomain Name ServerDepartment of the Army—see DepartmentsDepartment of the Air Force—see DepartmentsDepartment of Commerce—see PCCIPDepartment of Defense—see Architecture Framework, Architectures andInfrastructures, A-11, A-76, BRAC, Buzzword Compliant, Capital3Planning and Investment, CIO, CCA, C I, CAC, COE, Components, CIRT,Core Functions, CAIV, CAAP, CIAO, CIP, CIPC, cyberlaw, cybrarian,CISA, Data Administration, Data Dictionary, Data Element, DM, DAE,Defense, Departments, DoDD, EVM, eB, eC, EDI, EFT, Enterprise, FASA,GIG, Information, IASE, Information Infrastructure, IM, IRM, IRMC,INFOSEC, ITA, IDEF1X, IPT, Interface, ISO, Internet, JTA, NII, OA,Performance- and Results-Based Management, PPBS, PCCIP, Privacy Act,Process Improvement, PM, PKI, Quality, Seat Management, SBU,Services, SCSCG, S/W, SEI, Spectrum Management, Standardization, TA,TCO, X.509, 8121Department of Defense Directive—see C3I, CAAP, DAE, DISA, DITSCAP,DIAP, Eb, IM, IO, IRM, INFOSEC, NSTISSI, policyDepartment of Education—see PCCIPDepartment of Energy—see CIRT, PCCIPDepartment of Justice—see PCCIPDesktop OnLine Analytical Processing —see OLAPDepartment of the Navy—see INTRODUCTION,ACKNOWLEDGMENTS, Benchmarking, Capital Planning, ChangeManagement, CCA, Cop, Cop CD, CIAO, CIP, CIPC, Cybrarian, DM, DII,Departments, e-Gov, Hyperlink, IL, KCO CD, KM, LO, NMCI, NCW,Organizational Learning, PM, Reverse Auction, Search Engine, SeatManagement, Section 508, S/W, Systems Thinking, Tacit Knowledge,Taxonomy11

DoSDOSDoSDoTDoTDRIDSADS-CDMADSLDSMCDepartment of State—see Information Assurance Red Team, SPODisk Operating System—see COS, OS, Protocol, System SoftwareDenial of ServiceDepartment of Transportation—see PCCIPDepartment of the Treasury—see PCCIPDefense Reform InitiativeDigital Signature Algorithm—see Public Key Cryptosystemsanother name for Direct Sequence Spread Spectrum (DSSS)Digital Subscriber LineDefense Systems Management College—see acquisition, DAWIA, PM,Systems EngineeringDSSDecision Support SystemsDSSSDirect Sequence Spread SpectrumDVDDigital Versatile DiskDWDMDense Wavelength Division MultiplexingEAEconomic Analysis—see 8121EACEstimate At Completion—see EVMEAIEnterprise Application IntegrationeBelectronic BusinesseBusinesselectronic BusinesseCelectronic Commercee-checkselectronic checkseCommerce electronic CommerceECPAElectronic Communications Privacy ActEDGEEnhanced Data Global System for Mobile Communications EnvironmentEDIElectronic Data InterchangeEEAEconomic Espionage Acte-FOIAelectronic Freedom Of Information ActEFTElectronic Funds Transfer or Electronic Financial Transactione-Govelectronic GovernmentEISExecutive Information Systeme-learning electronic learning—cf. Distributed Learninge-mailelectronic mailEMSElectronic Meeting System—see DSSE/MSSEmployee/Member Self Service—see EFTEOExecutive Order—see CCA, CIP, NSTAC, Strategic PlanningEPAEnvironmental Protection Agency—see NICERPEnterprise Resource PlanningESEnterprise SolutionsESAEnterprise Software Agreement—see ESIESIEnterprise Software Initiativee-signelectronic signatureESPExternal Services ProviderESS[developing] Enterprise Security Strategies, Guidelines, And Policies—IRMC Course12

FISCAMFMFIAFOIAFORMISFOUOfour A’sFPCFSSFTEFTPFVF/WExtended Service Set— See IBSS and BSS.Extroverted, Sensate, Thinking, Judgmental—see ModelEducation, Training and Awareness—see DITSCAP, IASEEstimate To Complete—see EVMEuropean UnionEarned Value ManagementElectronic Warfare—see C2W, IWEntity-Wide Security ProgramFederal Aviation Administration—see A-76, DSSFederal Activities Inventory Reform ActFrequently Asked QuestionsFederal Acquisition Regulations—see FSS, Section 508Federal Acquisition Reform ActFederal Acquisition Regulatory Council—see AcquisitionFederal Acquisition Streamlining ActFederal Bureau of Investigation—see CIRT, Cyberlaw, PCCIPFederal Communications Commission—cf. Frequency, IEEE, Policy,Section 508Functional Data Administrator—see Data AdministrationFrequency-Division MultiplexingFrequency Division Multiple Access—see AMPSFunctional Evaluation and Integration Team—see DIAPFederal Emergency Management Agency—cf. COOP, CIP, DisasterRecovery, PCCIPfootnote (in a reference)—see Regression AnalysisFederally Funded Research and Development CenterFreedom from Government Competition ActFrequency Hopping Spread SpectrumFederal Information Infrastructure—see DIIFederal Information Processing Standard—see A-130, Data, DES, IDEF1XForeign Intelligence Surveillance ActFederal Information Technology Security Assessment ManualFederal Managers Financial Integrity ActFreedom Of Information ActFramework and Open Reference Model for Information Security—seeINFOSECFor Official Use Only—see CIO, CAAP, CIP, DIAP, SBUAdaptability, Accountability, Alignment and AwarenessFederal Preparedness Circular—see COOP, CIPFederal Supply SchedulesFull Time Equivalents—see DRIFile Transfer Protocol—see Cache Server, PGP, Trojan Horse, URLFirst VirtualFirmWare—see S/W13

HLLHMDHOLHONEHPSHSMHTMLGenetic AlgorithmsGenerally Applicable and AcceptedGenerally Accepted Accounting Principles—see GAAGeneral Accounting Office—see Audit, Balanced Scorecard, CERT, CIRT,Core Functions, CIP, EVM, FISCAM, GPRA, Information Assurance RedTeam, INFOSEC, Penetration Test, Performance- and Results-BasedManagement, Portfolio Management, Privacy, Pki, Spo, StrategicPlanning9Gigabits per second; one billion or 10 bits/secondGlobal Command and Control System—see COEGlobal Combat Support System—see COEGlobal Information GridGlobal Information InfrastructureGeographic Information SystemGovernment Information Security Reform ActGovernment Information Technology Services Board—see CCAGovernment Management and Reform ActGlobal Networked Information Enterprise—see GIGGlobal Operations and Security Center—see IOGovernment Paperwork Elimination ActGovernment Printing Office—see XMLGovernment Performance and Results ActGeneral Packet Radio ServiceGeneral Semantics—see Semantic AnalysisGeneral Schedule—see DAWPDPGeneral Services Administration—see Balanced Scorecard, CapitalPlanning and Investment, FSS, GWAC, Performance- and Results-BasedManagement, PDD-63, Seat Management, Section 508Global System for Mobile CommunicationsGeneral Systems TheoryGraphical User InterfaceGovernment Wide Acquisition ContractHuman Computer InterfaceHarvard Business Review—cf. Assumptions, Balanced Scorecard, ChangeManagement, DSS, IM, IPT, Leadership, LO, Performance- and ResultsBased Management, Reengineering, Simulation, Vision and MentalModelHealth Insurance Portability and Accountability ActHigh-Level Languages—cf. Mainframe ComputerHead Mounted Devices—cf. VRHigh Order Languages—cf. Mainframe ComputerHands On Network Environment—cf. Information MapHigh Performing System—cf. Flow, Organizational LearningHierarchical Storage ManagementHyperText Markup Language14

FHyperText Transfer ProtocolInformation AssuranceIntelligent AgentInternational Agreements Generator—cf. CBRInformation Security or Information System Security AssessmentMethodologyInformation Assurance Support EnvironmentInformation Assurance Vulnerability Alerts—cf. DIAP, IOIndependent Basic Service SetIntegrated Computer Aided Software Engineering—cf. S/WIndependent Cost Analysis—cf. TCOInternational Computer Security Association—cf. virusesIntegrated Digital EnvironmentIntegrated DEFinition for information modelingInterface Definition Language—cf. CORBA, JavaInterface Design Specification—cf. InterfaceIntrusion Detection SystemInstitute of Electrical and Electronics EngineersInformation Exchange RequirementsInternet Engineering Task Force—see X.509Internet Foundation Classes—cf. JavaInspector General—cf. GISRAIntegrating Integrated Product (or Process) Team—cf. IPTInformation Infrastructure Task Force—cf. Information InfrastructureInstitute for Knowledge ManagementInformation LiteracyInformation ManagementInternational Merchant Purchasing Authorization card—cf. FASAINFOrmation SECurity or INFOrmation system SECurityInformation OperationsIntellectual PropertyInternet ProtocolIntegrated Product and Process Development—cf. DSSIntegrated Product (or Process) TeamIntelligence Quotient—cf. Information Infrastructure, Time HorizonInformation Resources ManagementAdvanced Information System Acquisition—IRMC CourseInformation Resources Management CollegeInternal Revenue Service—cf. Data Warehouse, DSS, Expert System,GPEAInternet Relay ChatInformation Superiority or Information Security or Information SystemInformation Security Analysis CenterInformation Systems Audit and Control Association—cf. CobITInformation Systems Audit and Control Foundation—cf. CobIT15

BITSECITUIT-21IWJFCJFCOMJOPESJSCOPEJTAJVMJV 2020KBKCLKCOKCO nal Information Systems Security Certification ConsortiumIntegrated Services Digital NetworkIndustry, Science, And Medicine—cf. Frequency, Home RF, IEEEInternational Standards OrganizationInternet Service ProviderInter-Service Support Agreements—cf. A-76Information System Security Manager—cf. IASE, IAMInformation System Security Officer—cf. IASE, IAM, NSTISSIInformation System Security Program—cf. NIIInformation TechnologyInformation Technology ArchitectureInformation Technology Investment Management—cf. PortfolioManagementInformation Technology Management Reform Act—cf. Acquisition,Capital Planning and Investment, CCA, DM, FARA, PolicyInformation Technology Requirements Board—cf. CCAInformation Technology SECurity—see DITSCAP, IASEInternational Telecommunications UnionstInformation Technology for the 21 Century—cf. Gateway, NMCIInformation WarfareJava Foundation Classic—cf. JavaJoint Forces COMmand—cf. DSSJoint Operations Planning and Execution System—cf. IOJoint Services Conference On Professional Ethics—cf. FMFIAJoint Technical ArchitectureJava Virtual Machine—cf. JavaJoint Vision 2020—cf. Decision Superiority, DiD, IO, InformationSuperiority, KSKnowledge BaseKnowledge Community LeaderKnowledge-Centric OrganizationKnowledge-Centric Organization Compact Disk (toolkit)Knowledge DensityKnowledge, Information, and/or DataKnowledge ManagementKnowledge Management Community of Practice—cf. CoPKey Management InfrastructureKey Process Area—cf. Acquisition, CMM, S/Wcontractor—cf. Penetration TestKnowledge SuperiorityLocal Area NetworkLife-Cycle Cost—cf. PMLCCE, TCOLieutenant CommanDeR—cf. Micro PurchasesLower Control Limits—cf. Change ManagementLight-Weight Directory Access Protocol16

Leadership for the 21 Century—IRMC CourseLocal Multipoint Distribution ServiceLearning OrganizationLevel of AbstractionLines Of Code—cf. IT, software qualityLevel of Detail—cf. LoALocal Registration AuthorityLeast Significant Bit—cf. steganographyLayer two Tunneling Protocol—cf. VPNMerced Automated Global Information Collector—cf. Expert SystemMajor Automated Information System—cf. DAE, IRM, 8121Metropolitan Area NetworkMyers-Briggs Type Indicator—cf. CRM, Item Analysis, Model, NLSMilestone Decision Authority—cf. DAEMajor Defense Acquisition Program—cf. DAEMost Efficient Organization—cf. A-76, DRIMultifunctional Information Distribution System—cf. CBR, Common, IERsMILitary DEPartment—cf. AR, Agency, CIO, Enterprise, 8121Multipurpose Internet Mail ExtensionMultilevel Information System Security Initiative—cf. MLSMean Logistics Delay Time—cf. AvailabilityMultiLevel SecurityMultipoint Multichannel Distribution ServiceMagneto-Optical—cf. OSDMultidimensional OnLine Analytical Processing —cf. OLAPMeasuring results of Organizational Performance—IRMC CourseModified Off-The-Shelf—see COTSMPEG-1 (Motion Picture Expert Group) Audio Layer-3Most Significant Bit—cf. SteganographyMean Time Between Failures—cf. Availability, Burn-In, SPOFMulti-User Dungeon, Multi-User Dimension, Multi-User DialogueNaval Air Development Center—cf. Cryptology, JavaNational Aeronautics and Space Administration—cf. Seat Management,VTCNorth Atlantic Treaty Organization—cf. CBR, Common, DSS, IERs,interoperabilityNAVal AIR systems command—cf. BRAC, CAIV, Knowledge Elicitation,PMNAVal FACilities engineering command—cf. CoI, Domain, KnowledgeNetworkNAVal SEA systems command—cf. Acronym, ANOVA, CDA, ChangeManagement, Eb, Interoperability, PMNetwork Centric WarfareNon Developmental Item—cf. COTS, DITSCAP17

ISSINUWCNWCOAOCSODBCOEBFOIOOIPTOIRAOLAPOLE DBOLTPOMBNational Defense University—cf. ASR, CIO, Cybrarian, DSS, DAWIA,IRMC, IW, Performance- and Results-Based Management,Standardization, VRNobody Ever Tells Me Anything—cf. Net CastingiNtuitive Feeler—cf. NLS, Strategic ThinkingNational Infrastructure Assurance Council—cf. PDD-63National Information Assurance Certification and Accreditation Process—cf. DITSCAPNetworked Improvement CommunitiesNational Information InfrastructureNational Information Infrastructure Protection ActNatio

7 Acronyms Note: encyclopedia entries (headers) are in bold ABC Activity-Based Costing ACAT Acquisition CATegory—see CBR, CCA, DAE, PM, and 8121 ACWP Actual Cost of Work Performed—see EVM ADA Americans with Disabilities Act—see Section 508 ADP Automated Data Processing—see IT AFB Air Force Base—see DSS AFIT Air Force Institute of Technology —see DSS