It looks like you're offline.
Open Library logo
additional options menu
We're fighting in court to restore access to 500,000+ books: Join us

MARC Record from Library of Congress

Record ID marc_loc_2016/BooksAll.2016.part38.utf8:230825085:3086
Source Library of Congress
Download Link /show-records/marc_loc_2016/BooksAll.2016.part38.utf8:230825085:3086?format=raw

LEADER: 03086cam a2200385 a 4500
001 2011277879
003 DLC
005 20130611081028.0
008 121016s2012 caua b 000 0 eng d
010 $a 2011277879
020 $a9780833076304 (pbk.)
020 $a0833076302 (pbk.)
035 $a(OCoLC)ocn812525067
040 $aSYB$beng$cSYB$dOCLCQ$dOCLCO$dDLC
042 $alccopycat
043 $an-us---
050 00 $aUF503$b.M48 2012
245 00 $aMethodologies in analyzing the root causes of Nunn-McCurdy breaches /$cIrv Blickstein ... [et al.].
260 $aSanta Monica, CA :$bRAND,$c2012.
300 $axix, 85 p. :$bcol. ill. ;$c26 cm.
490 1 $aTechnical report ;$vTR-1248-OSD
500 $a"Prepared for the Office of the Secretary of Defense."
500 $a"National Defense Research Institute."
520 $aCongressional concern with cost overruns, or breaches, in several major defense acquisition programs led the authors, in a partnership with the Performance Assessments and Root Cause Analysis Office in the Office of the Secretary of Defense, Acquisition, Technology, and Logistics, to investigate root causes by examining program reviews, analyzing data, participating in contractor briefings, and holding meetings with diverse stakeholders. In two companion studies, the authors analyzed the reasons for six program breaches and developed a methodology for carrying out root cause analyses. This report documents that methodology, whose key components include the following steps: formulate a hypothesis, set up long-lead-time activities, document the unit cost threshold breach, construct a time line of cost growth recent events from the program history, verify cost data and quantify cost growth, create program cost profiles and pinpoint occurrences of cost growth, match the time line with profiles and derive causes of cost growth, reconcile remaining issues, attribute cost growth to root causes, and create postulates. This study represents an important chronicle of the approach to use in performing such analyses -- one that others may use in their own analytic efforts. In addition, it gathers extensive documentation on the data sources used to examine the six program breaches investigated.
504 $aIncludes bibliographical references (p. 85).
505 0 $aIntroduction -- Root cause analysis methodology -- Data sources for root cause analysis -- Conclusions.
610 10 $aUnited States.$bDepartment of Defense$xProcurement$xCosts$xEvaluation$xMethodology.
651 0 $aUnited States$xArmed Forces$xWeapons systems$xCosts$xEvaluation$xMethodology.
651 0 $aUnited States$xArmed Forces$xEquipment$xCosts$xEvaluation$xMethodology.
700 1 $aBlickstein, Irv,$d1939-
710 1 $aUnited States.$bDepartment of Defense.$bOffice of the Secretary of Defense.
710 2 $aNational Defense Research Institute (U.S.)
710 2 $aRand Corporation.
830 0 $aTechnical report (Rand Corporation) ;$vTR-1248-OSD.
856 42 $3Publisher description$uhttp://www.loc.gov/catdir/enhancements/fy1304/2011277879-d.html