Management perspectives pertaining to Root Cause Analyses of Nunn-McCurdy Breaches. contractor motivations and anticipating breaches / Mark V. Arena, John Birkler, Irv Blickstein, Charles Nemfakos, Abby Doll, Jeffrey A. Drezner, Gordon T. Lee, Megan McKernan, Brian McInnis, Carter C. Price, Jerry M. Sollinger, Erin York. Volume 6 :

With an eye to making defense acquisition more effective and efficient, the authors explore defense contractor motivations in pursuing defense contracts and identify mechanisms that might more closely align those incentives with Department of Defense goals. They enumerate several motivations that dr...

Full description

Saved in:
Bibliographic Details
Main Authors: Arena, Mark V. (Author), Birkler, J. L., 1944- (Author), Blickstein, Irv, 1939- (Author), Nemfakos, Charles Panagiotis (Author), Doll, Abby (Author), Drezner, Jeffrey A. (Author), Lee, Gordon T. (Author), McKernan, Megan P. (Author), McInnis, Brian (Author), Price, Carter C. (Author), Sollinger, Jerry M. (Author), York, Erin (Author)
Corporate Authors: United States. Department of Defense. Office of the Secretary of Defense, Acquisition and Technology Policy Center
Format: Ebook
Language:English
Published: Santa Monica, CA : RAND, [2014]
Subjects:
Online Access:JSTOR Open Access
Description
Summary:With an eye to making defense acquisition more effective and efficient, the authors explore defense contractor motivations in pursuing defense contracts and identify mechanisms that might more closely align those incentives with Department of Defense goals. They enumerate several motivations that drive contractors, most of which center on the financial aspects of running an enterprise. Then, they turn to the other side of the negotiating table and identify areas of influence or levers that the government can use to align the contracting process more closely with contractor motivations. They also analyze major defense acquisition programs to determine if it is possible to identify programs that might incur a future Nunn-McCurdy breach by reviewing a number of acquisition programs that have incurred breaches in the past and analyzing them for common characteristics. Their analytic framework enables oversight officials to identify programs with a greater risk of incurring a critical cost breach, which enables officials to focus more intently on a smaller set of programs and which provides hypotheses about what to look for in these programs.
Item Description:"RAND National Defense Research Institute.".
"Prepared for the Office of the Secretary of Defense.".
"This research was sponsored by OSD PARCA and conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute"--Preface.
Physical Description:1 online resource (xxvi, 108 pages) : illustrations
Bibliography:Includes bibliographical references.
ISBN:0833090089
9780833090089
0833087398
9780833087393
Availability
Requests
Request this item Request this AUT item so you can pick it up when you're at the library.
Interlibrary Loan With Interlibrary Loan you can request the item from another library. It's a free service.