DocumentCode :
5724
Title :
Crossing the "Valley of Death": Transitioning Cybersecurity Research into Practice
Author :
Maughan, D. ; Balenson, D. ; Lindqvist, Ulf ; Tudor, Z.
Volume :
11
Issue :
2
fYear :
2013
fDate :
March-April 2013
Firstpage :
14
Lastpage :
23
Abstract :
New and innovative technologies will only make a difference if they´re deployed and used. It doesn´t matter how visionary a technology is unless it meets user needs and requirements and is available as a product via user-acceptable channels. One of the cybersecurity research community´s biggest ongoing challenges is transitioning technology into commercial or open source products available in the marketplace. This article presents an R&D execution model to increase the success rate of technology transition along with several examples of successful technology transition from the US Department of Homeland Security Science and Technology Directorate´s cybersecurity R&D program.
Keywords :
computer network security; public domain software; research and development; technology transfer; R and D execution model; US Department of Homeland Security Science and Technology Directorate; commercial products; cybersecurity R and D program; cybersecurity research community; open source products; technology transition; user needs; user requirements; Commercialization; Computer crime; Computer security; Marketing and sales; Technological innovation; Technology transfer; cybersecurity; open source; research and development; small business; technology transition;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSP.2013.31
Filename :
6493323
Link To Document :
بازگشت