The Locator -- [(author = "United States Office of the Secretary of Defense Office of the Secretary of Defense")]

273 records matched your query       


Record 35 | Previous Record | Long Display | Next Record
03074aam a2200373 a 4500
001 AAC633A43DE011E299E05AAC6AFF544E
003 SILO
005 20121204010235
008 121011s2012    caua     b    000 0 eng d
020    $a 0833076302
020    $a 9780833076304
035    $a (OCoLC)812525067
040    $a SYB $b eng $c SYB $d SILO $d OCLCO $d OCLCQ $d YDXCP $d BTCTA $d NUI $d SILO
043    $a n-us---
245 0  $a Methodologies in analyzing the root causes of Nunn-McCurdy breaches / $c Irv Blickstein ... [et al.].
260    $a Santa Monica, CA : $b RAND, $c 2012.
300    $a xix, 85 p. : $b col. ill. ; $c 26 cm.
500    $a "TR-1248-OSD"--P. [4] of cover.
500    $a "Prepared for the Office of the Secretary of Defense."
500    $a "National Defense Research Institute."
520    $a Congressional concern with cost overruns, or breaches, in several major defense acquisition programs led the authors, in a partnership with the Performance Assessments and Root Cause Analysis Office in the Office of the Secretary of Defense, Acquisition, Technology, and Logistics, to investigate root causes by examining program reviews, analyzing data, participating in contractor briefings, and holding meetings with diverse stakeholders. In two companion studies, the authors analyzed the reasons for six program breaches and developed a methodology for carrying out root cause analyses. This report documents that methodology, whose key components include the following steps: formulate a hypothesis, set up long-lead-time activities, document the unit cost threshold breach, construct a time line of cost growth recent events from the program history, verify cost data and quantify cost growth, create program cost profiles and pinpoint occurrences of cost growth, match the time line with profiles and derive causes of cost growth, reconcile remaining issues, attribute cost growth to root causes, and create postulates. This study represents an important chronicle of the approach to use in performing such analyses -- one that others may use in their own analytic efforts. In addition, it gathers extensive documentation on the data sources used to examine the six program breaches investigated.
504    $a Includes bibliographical references (p. 85).
505 0  $a Introduction -- Root cause analysis methodology -- Data sources for root cause analysis -- Conclusions.
610 10 $a United States. $b Dept. of Defense $x Methodology. $x Costs $x Evaluation $x Methodology.
651  0 $a United States $x Methodology. $x Weapons systems $x Costs $x Evaluation $x Methodology.
651  0 $a United States $x Methodology. $x Equipment $x Costs $x Evaluation $x Methodology.
700 1  $a Blickstein, Irv, $d 1939-
710 1  $a United States. $b Office of the Secretary of Defense. $b Office of the Secretary of Defense.
710 2  $a National Defense Research Institute (U.S.)
710 2  $a Rand Corporation.
941    $a 2
952    $l OVUX522 $d 20180118060140.0
952    $l USUX851 $d 20160826064101.0
956    $a http://locator.silo.lib.ia.us/search.cgi?index_0=id&term_0=AAC633A43DE011E299E05AAC6AFF544E

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.