Information Systems Case Study. Joseph Piper

Submitted by: Submitted by

Views: 10

Words: 807

Pages: 4

Category: Science and Technology

Date Submitted: 09/29/2015 11:00 AM

Report This Essay

Running head: CASE STUDY #2: ENLISTING OPEN-SOURCE APPLICATIONS​1

U.S. Department of Defense: Enlisting Open-Source Applications

Joseph W. Piper

Northwest Christian University

U.S. Department of Defense: Enlisting Open-Source Applications

Description of the case

The U.S Defense Department is switching to an open source approach to software development. This decision is unexpected, and unlike the Defense Department. The Department of Defense (DoD) lists the advantages of switching. Two of the most important advantages are reducing defects, and decreasing costs. The advantages are reiterated throughout the case with different spokespersons commenting on the success the different departments of the government have had with open source software. The software is also extremely user-friendly which has reduced support tickets substantially.

Identification of the key topic or concept

“The basic idea behind open source is very simple: When programmers can read, redistribute, and modify the source code for a piece of software, the software evolves.” (Marakas & O'Brien, 2012, p. 157). In other words, open source software is much like a recipe for cheese pizza, anyone can take that pizza and add the topping of their liking by adding on to the original recipe.

The case also stresses the decline of help desk support due to taking advantage of web-based interfaces. A web based interface defined by PCMag as “The interaction between a user and software running on a Web server. The user interface is the Web browser and the Web page it downloaded and rendered.” (PC Mag, 2015).

Case Questions

Case Question #1 “Given the critical nature of defense activities, security in this environment is a primary concern. How do the agencies discussed in the case address this issue? Can you think of anything else they could be doing? Provide some recommendations.”

The case lacks specifics on how the DoD approaches security with open source...