Management Perspectives Pertaining to Root Cause Analyses of Nunn-McCurdy Breaches, Volume 6 Contractor Motivations and Anticipating Breaches
The authors explore defense contractor motivations and identify mechanisms that might more closely align those incentives with Department of Defense goals. They also analyze major defense acquisition programs to determine if it is possible to identify programs that might incur a future Nunn-McCurdy...
Bewaard in:
Hoofdauteur: | |
---|---|
Andere auteurs: | , , , |
Formaat: | Elektronisch Hoofdstuk |
Taal: | Engels |
Gepubliceerd in: |
RAND Corporation
2014
|
Onderwerpen: | |
Online toegang: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Voeg label toe
Geen labels, Wees de eerste die dit record labelt!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_115470 | ||
005 | 20231005 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20231005s2014 xx |||||o ||| 0|eng d | ||
020 | |a j.ctt14bs3kg | ||
020 | |a 9780833090089 | ||
020 | |a 9780833087393 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.7249/j.ctt14bs3kg |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a HBW |2 bicssc | |
072 | 7 | |a JPV |2 bicssc | |
072 | 7 | |a TTM |2 bicssc | |
100 | 1 | |a Arena, Mark V. |4 auth | |
700 | 1 | |a Birkler, John |4 auth | |
700 | 1 | |a Blickstein, Irv |4 auth | |
700 | 1 | |a Nemfakos, Charles |4 auth | |
700 | 1 | |a Doll, Abby |4 auth | |
245 | 1 | 0 | |a Management Perspectives Pertaining to Root Cause Analyses of Nunn-McCurdy Breaches, Volume 6 |b Contractor Motivations and Anticipating Breaches |
260 | |b RAND Corporation |c 2014 | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a The authors explore defense contractor motivations and identify mechanisms that might more closely align those incentives with Department of Defense goals. They also analyze major defense acquisition programs to determine if it is possible to identify programs that might incur a future Nunn-McCurdy breach by reviewing a number of acquisition programs that have incurred breaches and analyzing them for common characteristics. | ||
540 | |a All rights reserved |4 http://oapen.org/content/about-rights | ||
546 | |a English | ||
650 | 7 | |a Military history |2 bicssc | |
650 | 7 | |a Political control & freedoms |2 bicssc | |
650 | 7 | |a Military engineering |2 bicssc | |
653 | |a Technology | ||
653 | |a History | ||
653 | |a Political Science | ||
856 | 4 | 0 | |a www.oapen.org |u https://www.jstor.org/stable/10.7249/j.ctt14bs3kg |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/115470 |7 0 |z DOAB: description of the publication |