Management Perspectives Pertaining to Root Cause Analyses of Nunn-McCurdy Breaches, Volume 6 Contractor Motivations and Anticipating Breaches
The authors explore defense contractor motivations and identify mechanisms that might more closely align those incentives with Department of Defense goals. They also analyze major defense acquisition programs to determine if it is possible to identify programs that might incur a future Nunn-McCurdy...
Saved in:
Main Author: | |
---|---|
Other Authors: | , , , |
Format: | Electronic Book Chapter |
Language: | English |
Published: |
RAND Corporation
2014
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_115470 | ||
005 | 20231005 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20231005s2014 xx |||||o ||| 0|eng d | ||
020 | |a j.ctt14bs3kg | ||
020 | |a 9780833090089 | ||
020 | |a 9780833087393 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.7249/j.ctt14bs3kg |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a HBW |2 bicssc | |
072 | 7 | |a JPV |2 bicssc | |
072 | 7 | |a TTM |2 bicssc | |
100 | 1 | |a Arena, Mark V. |4 auth | |
700 | 1 | |a Birkler, John |4 auth | |
700 | 1 | |a Blickstein, Irv |4 auth | |
700 | 1 | |a Nemfakos, Charles |4 auth | |
700 | 1 | |a Doll, Abby |4 auth | |
245 | 1 | 0 | |a Management Perspectives Pertaining to Root Cause Analyses of Nunn-McCurdy Breaches, Volume 6 |b Contractor Motivations and Anticipating Breaches |
260 | |b RAND Corporation |c 2014 | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a The authors explore defense contractor motivations and identify mechanisms that might more closely align those incentives with Department of Defense goals. They also analyze major defense acquisition programs to determine if it is possible to identify programs that might incur a future Nunn-McCurdy breach by reviewing a number of acquisition programs that have incurred breaches and analyzing them for common characteristics. | ||
540 | |a All rights reserved |4 http://oapen.org/content/about-rights | ||
546 | |a English | ||
650 | 7 | |a Military history |2 bicssc | |
650 | 7 | |a Political control & freedoms |2 bicssc | |
650 | 7 | |a Military engineering |2 bicssc | |
653 | |a Technology | ||
653 | |a History | ||
653 | |a Political Science | ||
856 | 4 | 0 | |a www.oapen.org |u https://www.jstor.org/stable/10.7249/j.ctt14bs3kg |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/115470 |7 0 |z DOAB: description of the publication |