TY - BOOK AU - Arena,Mark V. AU - Birkler,J.L. AU - Blickstein,Irv AU - Nemfakos,Charles Panagiotis AU - Doll,Abby AU - Drezner,Jeffrey A. AU - Lee,Gordon T. AU - McKernan,Megan P. AU - McInnis,Brian AU - Price,Carter C. AU - Sollinger,Jerry M. AU - York,Erin ED - Rand eBooks. TI - Management perspectives pertaining to Root Cause Analyses of Nunn-McCurdy Breaches: contractor motivations and anticipating breaches SN - 0833087398 (pbk. : alk. paper) AV - UF503 .A746 2014 PY - 2014/// CY - Santa Monica, CA PB - RAND KW - United States KW - Department of Defense KW - Procurement KW - Defense contracts KW - Cost effectiveness KW - Government contractors KW - Motivation (Psychology) KW - Electronic books KW - local N1 - "RAND National Defense Research Institute."; "Prepared for the Office of the Secretary of Defense."; "This research was sponsored by OSD PARCA and conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute"--Preface; Includes bibliographical references (p. 103-108); Introduction -- Contractor Incentives -- A Methodology for Anticipating Nunn-McCurdy Breaches -- Concluding Observations -- Appendix A: Membership of the COG -- Appendix B: Truth-Revealing Incentive Mechanisms Manages Asymmetric Information Example -- C: Executive Compensation -- Appendix D: Exploration of Multiyear Use -- Appendix E: Evolution of Nunn-McCurdy Legislation; Also available on the internet via WWW in PDF format N2 - With an eye to making defense acquisition more effective and efficient, the authors explore defense contractor motivations in pursuing defense contracts and identify mechanisms that might more closely align those incentives with Department of Defense goals. They enumerate several motivations that drive contractors, most of which center on the financial aspects of running an enterprise. Then, they turn to the other side of the negotiating table and identify areas of influence or levers that the government can use to align the contracting process more closely with contractor motivations. They also analyze major defense acquisition programs to determine if it is possible to identify programs that might incur a future Nunn-McCurdy breach by reviewing a number of acquisition programs that have incurred breaches in the past and analyzing them for common characteristics. Their analytic framework enables oversight officials to identify programs with a greater risk of incurring a critical cost breach, which enables officials to focus more intently on a smaller set of programs and which provides hypotheses about what to look for in these programs UR - http://ezproxy.alfaisal.edu/login?url=http://www.rand.org/pubs/monographs/MG1171z6.html ER -