Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where John Bergey is active.

Publication


Featured researches published by John Bergey.


software product lines | 2002

Using the Options Analysis for Reengineering (OAR) Method for Mining Components for a Product Line

Dennis B. Smith; Liam O' Brien; John Bergey

The Options Analysis for Reengineering (OAR) method is a systematic, architecture-centric means for mining existing components for a product line or new software architecture. The method incorporates a set of scalable techniques and exercises to collaboratively analyze existing components, determine viable mining options, and evaluate the most promising options. The OAR method has 5 activities that are followed in a systematic manner to identify components for mining and estimate the cost and risk of changes required to each legacy component to enable its reuse within a new software architecture. The OAR method provides visibility into this highly complex analysis activity. It also provides insights into implicit stakeholder assumptions, constraints, and other major drivers that impact the mining of components. Results from a pilot application of the OAR method are presented in this paper.


Information Strategy: The Executive's Journal | 1999

Enterprise Framework for the Disciplined Evolution of Legacy Systems

John Bergey; Linda M. Northrop; Dennis B. Smith

Organizations that migrate legacy systems to distributed, open system environments or to a single product line of systems often fail because they concentrate on a narrow set of software issues without fully considering a broader set of enterprisewide management and technical issues. This article describes an enterprise framework that characterizes the global environment in which system evolution takes place and provides insight into the activities, processes, and work products that shape the disciplined evolution of legacy systems. The following checklists help identify critical enterprise issues that correspond to each of the frameworks elements.


hawaii international conference on system sciences | 2014

Unintentional Insider Threat: Contributing Factors, Observables, and Mitigation Strategies

Frank L. Greitzer; Jeremy R. Strozer; Sholom Cohen; John Bergey; Jennifer Cowley; Andrew P. Moore; David A. Mundie

Organizations often suffer harm from individuals who bear them no malice but whose actions unintentionally expose the organizations to risk in some way. This paper examines initial findings from research on such cases, referred to as unintentional insider threat (UIT). The goal of this paper is to inform government and industry stakeholders about the problem and its possible causes and mitigation strategies. As an initial approach to addressing the problem, we developed an operational definition for UIT, reviewed research relevant to possible causes and contributing factors, and provided examples of UIT cases and their frequencies across several categories. We conclude the paper by discussing initial recommendations on mitigation strategies and countermeasures.


Archive | 1997

Approaches to Legacy System Evolution.

Nelson H. Weiderman; John Bergey; Dennis B. Smith; Scott R. Tilley


Archive | 1999

Why Reengineering Projects Fail.

John Bergey; Dennis B. Smith; Scott R. Tilley; Nelson H. Weiderman; Steven Woods


Archive | 1999

Options Analysis for Reengineering (OAR): Issues and Conceptual Approach

John Bergey; Dennis B. Smith; Nelson H. Weiderman; Steven Woods


Archive | 2001

Options Analysis for Reengineering (OAR): A Method for Mining Legacy Assets

John Bergey; Liam O'Brien; Dennis B. Smith


Archive | 2006

A Comparison of Requirements Specification Methods from a Software Architecture Perspective

Len Bass; John Bergey; Paul C. Clements; Paulo Merson; Ipek Ozkaya; Raghvinder S. Sangwan


Archive | 2000

Mining Existing Assets for Software Product Lines

John Bergey; Liam O'Brien; Dennise Smith


Archive | 1999

DoD Legacy System Migration Guidelines

John Bergey; Dennis B. Smith; Nelson H. Weiderman

Collaboration


Dive into the John Bergey's collaboration.

Top Co-Authors

Avatar

Dennis B. Smith

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Lawrence G. Jones

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Liam O'Brien

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Matthew J. Fisher

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Paul C. Clements

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Linda M. Northrop

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Nelson H. Weiderman

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Sholom Cohen

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Tim Morrow

Carnegie Mellon University

View shared research outputs
Researchain Logo
Decentralizing Knowledge