Management perspectives pertaining to Root Cause Analyses of Nunn-McCurdy Breaches. contractor motivations and anticipating breaches / Volume 6 :

With an eye to making defense acquisition more effective and efficient, the authors explore defense contractor motivations in pursuing defense contracts and identify mechanisms that might more closely align those incentives with Department of Defense goals. They enumerate several motivations that dr...

Full description

Saved in:
Bibliographic Details
Main Authors: Arena, Mark V. (Author), Birkler, J. L., 1944- (Author), Blickstein, Irv, 1939- (Author), Nemfakos, Charles Panagiotis (Author), Doll, Abby (Author), Drezner, Jeffrey A. (Author), Lee, Gordon T. (Author), McKernan, Megan P. (Author), McInnis, Brian (Author), Price, Carter C. (Author), Sollinger, Jerry M. (Author), York, Erin (Author)
Corporate Authors: Acquisition and Technology Policy Center, United States. Department of Defense. Office of the Secretary of Defense
Format: Electronic eBook
Language:English
Published: Santa Monica, CA : RAND, [2014]
Subjects:
Online Access:CONNECT
Description
Summary:With an eye to making defense acquisition more effective and efficient, the authors explore defense contractor motivations in pursuing defense contracts and identify mechanisms that might more closely align those incentives with Department of Defense goals. They enumerate several motivations that drive contractors, most of which center on the financial aspects of running an enterprise. Then, they turn to the other side of the negotiating table and identify areas of influence or levers that the government can use to align the contracting process more closely with contractor motivations. They also analyze major defense acquisition programs to determine if it is possible to identify programs that might incur a future Nunn-McCurdy breach by reviewing a number of acquisition programs that have incurred breaches in the past and analyzing them for common characteristics. Their analytic framework enables oversight officials to identify programs with a greater risk of incurring a critical cost breach, which enables officials to focus more intently on a smaller set of programs and which provides hypotheses about what to look for in these programs.
Item Description:"RAND National Defense Research Institute."
"Prepared for the Office of the Secretary of Defense."
"This research was sponsored by OSD PARCA and conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute"--Preface
Books at JSTOR Open Access
Physical Description:1 online resource (xxvi, 108 pages) : color illustrations
Bibliography:Includes bibliographical references (pages 103-108).
ISBN:9780833090089
0833090089