|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910220115703321 |
|
|
Autore |
Arena Mark V |
|
|
Titolo |
Management perspectives pertaining to root cause analyses of Nunn-McCurdy breaches. Volume 6 : : Contractor motivations and anticipating breaches / / Mark V. Arena [et al.] |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Santa Monica, CA : , : Rand Corporation ; , 2014 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (xxvi, 108 pages) : color illustrations |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Public contracts - Auditing - United States |
Government contractors - United States |
United States Armed Forces Weapons systems Costs |
United States Armed Forces Equipment Costs |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
"Prepared for the Office of the Secretary of Defense." |
"This research was sponsored by OSD PARCA and conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute"--Preface |
|
|
|
|
|
|
|
|
Nota di contenuto |
|
Introduction -- Contractor incentives -- A methodology for anticipating Nunn-McCurdy breaches -- Concluding observations. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
With an eye to making defense acquisition more effective and efficient, the authors explore defense contractor motivations in pursuing defense contracts and identify mechanisms that might more closely align those incentives with Department of Defense goals. They enumerate several motivations that drive contractors, most of which center on the financial aspects of running an enterprise. Then, they turn to the other side of the negotiating table and identify areas of influence or levers that the government can use to align the contracting process more closely with contractor motivations. They also analyze major defense acquisition programs to determine if it is possible to identify programs that might incur a future Nunn-McCurdy breach by reviewing a number of acquisition programs that have incurred breaches in the past and analyzing them for common characteristics. Their analytic framework |
|
|
|
|