Management Perspectives Pertaining to Root Cause Analyses of Nunn-McCurdy Breaches, Volume 4 Program Manager Tenure, Oversight of Acquisition Category II Programs, and Framing Assumptions
The authors investigate whether the tenure of program managers contributes to Nunn-McCurdy breaches. They also examine the existing decentralized systems used to track cost growth to determine whether additional guidance and control are needed to make acquisition category II programs' performan...
Saved in:
Main Author: | |
---|---|
Other Authors: | , , , |
Format: | Electronic Book Chapter |
Language: | English |
Published: |
RAND Corporation
2013
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_115240 | ||
005 | 20231005 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20231005s2013 xx |||||o ||| 0|eng d | ||
020 | |a j.ctt5hhttw | ||
020 | |a 9780833083791 | ||
020 | |a 9780833082053 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.7249/j.ctt5hhttw |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a HBW |2 bicssc | |
072 | 7 | |a JPV |2 bicssc | |
072 | 7 | |a TTM |2 bicssc | |
100 | 1 | |a Arena, Mark V. |4 auth | |
700 | 1 | |a Blickstein, Irv |4 auth | |
700 | 1 | |a Doll, Abby |4 auth | |
700 | 1 | |a Drezner, Jeffrey A. |4 auth | |
700 | 1 | |a Kallimani, James G. |4 auth | |
245 | 1 | 0 | |a Management Perspectives Pertaining to Root Cause Analyses of Nunn-McCurdy Breaches, Volume 4 |b Program Manager Tenure, Oversight of Acquisition Category II Programs, and Framing Assumptions |
260 | |b RAND Corporation |c 2013 | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a The authors investigate whether the tenure of program managers contributes to Nunn-McCurdy breaches. They also examine the existing decentralized systems used to track cost growth to determine whether additional guidance and control are needed to make acquisition category II programs' performance more transparent. Finally, they investigate whether key assumptions, so-called framing assumptions, could be useful risk management tools. | ||
540 | |a All rights reserved |4 http://oapen.org/content/about-rights | ||
546 | |a English | ||
650 | 7 | |a Military history |2 bicssc | |
650 | 7 | |a Political control & freedoms |2 bicssc | |
650 | 7 | |a Military engineering |2 bicssc | |
653 | |a History | ||
653 | |a Technology | ||
653 | |a Political Science | ||
856 | 4 | 0 | |a www.oapen.org |u https://www.jstor.org/stable/10.7249/j.ctt5hhttw |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/115240 |7 0 |z DOAB: description of the publication |