Grid view
Report abuse
Use this data
Sign up for free
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
Drag to adjust the number of frozen columns
Chapter 18 Citations
Website Link
Date updated
Margaret McConnell, “The Process of Procuring Information Technology,” Public Contract Law Journal, 25, no. 2 (1996): 379–392, http://www.jstor.org/stable/25754218.
http://www.jstor.org/stable/25754218
9/29/2023
“Executive Order N-04-19,” Executive Department State of California, last modified January 9, 2019, https://www.gov.ca.gov/wp-content/uploads/2019/01/1.8.19-EO-N-04-19.pdf.
https://www.gov.ca.gov/wp-content/uploads/2019/01/1.8.19-EO-N-04-19.pdf
9/29/2023
See “Procurement: Avoiding Risky Business,” National Association of Chief Information Officers, last modified September 4, 2013, https://www.nascio.org/resource-center/resources/procurement_avoiding_risky_business/.
https://www.nascio.org/resource-center/resources/procurement_avoiding_risky_business/
9/29/2023
Stakeholders, as used in this chapter, means anyone who is involved in or affected by a course of action. Since IT within a public entity affects so many—citizens, user and user agencies, suppliers, media, legislative bodies, government executive leadership such as governors and mayors, public procurement personnel, and public IT personnel, to name some of those affected, this chapter uses the term stakeholder to encompass all of whom rely on or who are touched by a state or local government’s I
9/29/2023
See “Procurement: Avoiding Risky Business,” National Association of Chief Information Officers.
https://www.nascio.org/resource-center/resources/procurement_avoiding_risky_business/
9/29/2023
“What’s the Difference Between Cybersecurity and Information Security?” The University of Alabama at Birmingham, accessed May 2, 2023, https://businessdegrees.uab.edu/blog/whats-the-difference-between-cybersecurity-and-information-security/#:~:text=As%20defined%20by%20the%20U.S.,%2C%20and%20availability%20of%20information.%E2%80%9D.
https://businessdegrees.uab.edu/blog/whats-the-difference-between-cybersecurity-and-information-security/#:~:text=As%20defined%20by%20the%20U.S.,%2C%20and%20availability%20of%20information.%E2%80%9D
9/29/2023
“Glossary,” National Institute of Standards and Technology, accessed February 22, 2023, https://csrc.nist.gov/glossary/term/spyware.
https://csrc.nist.gov/glossary/term/spyware
9/29/2023
“What is Cybersecurity?” CompTIA, accessed February 22, 2023, https://www.comptia.org/content/articles/what-is-cybersecurity
https://www.comptia.org/content/articles/what-is-cybersecurity
9/29/2023
“What is Cybersecurity?” CompTIA.
https://www.comptia.org/content/articles/what-is-cybersecurity
9/29/2023
Cliff Nilson (CPO Florida), Risk Is Inevitable presentation, presentation (2022).
9/29/2023
“Who We Are,” StateRAMP, accessed February 22, 2023, https://stateramp.org/.
https://stateramp.org/
9/29/2023
“StateRAMP Frequently Asked Questions,” StateRAMP, accessed February 22, 2023, https://stateramp.org/faqs/.
https://stateramp.org/faqs/
9/29/2023
“Buyer Be Aware: Integrating Cybersecurity into the Acquisition Process,” Center for Internet Security, NASCIO and NASPO, last modified May 2021, https://cdn.naspo.org/R&I%20Content%20Library/Buyer%20Be%20Aware_%20Integrating%20Cybersecurity%20into%20the%20Acquisition%20Process.pdf.
https://cdn.naspo.org/R&I%20Content%20Library/Buyer%20Be%20Aware_%20Integrating%20Cybersecurity%20into%20the%20Acquisition%20Process.pdf
9/29/2023
“Cybersecurity Considerations for Procurement,” Federal Energy Management Program, accessed February 22, 2023, https://www.energy.gov/eere/femp/cybersecurity-considerations-procurement.
https://www.energy.gov/eere/femp/cybersecurity-considerations-procurement
9/29/2023
Bernard Golden, “What Gartner’s Bimodal IT Model Means to Enterprise CIOs,” CIO, last modified January 27, 2015, https://www.cio.com/article/251139/what-gartner-s-bimodal-it-model-means-to-enterprise-cios.html.
https://www.cio.com/article/251139/what-gartner-s-bimodal-it-model-means-to-enterprise-cios.html
9/29/2023
A Maintenance Management Information System is a mechanized claims processing and information retrieval system for Medicaid that is required by the federal government.
9/29/2023
“Modular Procurement: A Primer,” NASPO, last modified September 2023, https://cdn.naspo.org/R&I%20Content%20Library/Modular%20Procurement_%20A%20Primer_2023.pdf.
https://cdn.naspo.org/R&I%20Content%20Library/Modular%20Procurement_%20A%20Primer_2023.pdf
9/29/2023
“Procurement Policies,” Virginia IT Agency, accessed February 22, 2023, https://www.vita.virginia.gov/supply-chain/scm-policies-forms/.
https://www.vita.virginia.gov/supply-chain/scm-policies-forms/
9/29/2023
“Designing for Agility: Advancing IT and Procurement Modernization,” NASCIO and NASPO, last modified May 2023, https://cdn.naspo.org/R&I%20Content%20Library/Designing%20for%20Agility_%20Advancing%20IT%20and%20Procurement%20Modernization.pdf.
https://cdn.naspo.org/R&I%20Content%20Library/Designing%20for%20Agility_%20Advancing%20IT%20and%20Procurement%20Modernization.pdf
12/18/2023
“What is the Difference Between a Pilot Project and a Trial Implementation?” KAI Partners, last modified April 19, 2017, https://kaipartners.com/difference-pilot-project-trial-implementation/.
https://kaipartners.com/difference-pilot-project-trial-implementation/
9/29/2023
“George Cronin Awards for Procurement Excellence,” NASPO, accessed February 22, 2023, https://www.naspo.org/awards/george-cronin-awards/.
https://www.naspo.org/awards/george-cronin-awards/
9/29/2023
“Tech Next: Leasing vs. Owning Hardware and Software,” NASPO, last modified September 2023, https://cdn.naspo.org/R&I%20Content%20Library/2023_TechNext_LeasingVsOwing.pdf.
https://cdn.naspo.org/R&I%20Content%20Library/2023_TechNext_LeasingVsOwing.pdf
9/29/2023
A comprehensive total cost of ownership analysis is defined in Chapter 15, Sustainable Procurement.
9/29/2023
“A virtual private network (VPN) is a technology that creates a safe and encrypted connection over a less secure network, such as the internet.” Alexander Gillis, “What is a VPN,” Tech Target Network, last modified September 2021, https://searchnetworking.techtarget.com/definition/virtual-private-network.
https://www.techtarget.com/searchnetworking/definition/virtual-private-network
9/29/2023
Scalability “is the ability of a computer application or product (hardware or software) to continue to function well when it (or its context) is changed in size or volume in order to meet a user need. Typically, the rescaling is to a larger size or volume.” “Scalability,” Tech Target Network, last modified June 2021, https://searchdatacenter.techtarget.com/definition/scalability.
https://searchdatacenter.techtarget.com/definition/scalability
9/29/2023
See Federal Government’s Cloud First Policy, “Federal Cloud Computing Strategy,” Office of the Chief Federal Information Officer, accessed February 22, 2023, https://www.whitehouse.gov/wp-content/uploads/2019/06/Cloud-Strategy.pdf.
www.whitehouse.gov/wp-content/uploads/2019/06/Cloud-Strategy.pdf
9/29/2023
Sarbanes-Oxley Act, Pub. L. No. 104-204 §116 Stat. 745 (2002).
9/29/2023
“Information and Resources,” State of California Office of Systems Integration, accessed February 22, 2023, https://www.osi.ca.gov/Information_and_Resources.html.
https://www.osi.ca.gov/Information_and_Resources.html
9/29/2023
“DoIT Independent Verification and Validation (IV&V) Master Contract,” Maryland Department of Information Technology, accessed February 22, 2023, https://doit.maryland.gov/epmo/Pages/MITDP/ivv.aspx.
https://doit.maryland.gov/epmo/Pages/MITDP/ivv.aspx
9/29/2023
29 records

Alert

Lorem ipsum
Okay