M M · Megan McCormick · Meghan McCarron
title | ISBN-13 | year of publica- tion | other author(s) |
---|---|---|---|
Are Ships Different? Policies and Procedures for the Acquisition ofShip Programs | 978-0-8330-5013-7 | 2011 | Jeffrey A. Drezner · Mark V. Arena · Robert Murphy · Jessie Riposo |
Contestability Frameworks: An International Horizon Scan | 978-0-8330-9278-6 | 2016 | Cynthia R. Cook · Emma Westerman · Badreddine Ahtchi · Gordon T. Lee · Jenny Oberholtzer · Douglas Shontz · Jerry M. Sollinger |
DoD and Commercial Advanced Waveform Developments and Programs with Nunn-McCurdy Breaches | 978-0-8330-8734-8 | 2014 | Mark V. Arena · Irv Blickstein · Daniel Gonzales · Sarah Harting · Jennifer Lamping Lewis · Michael McGee · Charles Nemfakos |
Issues with Access to Acquisition Data and Information in the Department of Defense: A Closer Look at the Origins and Implementation of Controlled Unclassified Information Labels and Security Policy | 978-0-8330-9596-1 | 2016 | Jessie Riposo · Jeffrey A. Drezner · Geoffrey McGovern · Douglas Shontz · Clifford A. Grammich |
Issues with Access to Acquisition Data and Information in the Department of Defense: Policy and Practice | 978-0-8330-8892-5 | 2015 | Jessie Riposo · Jeffrey A. Drezner · Geoffrey McGovern · Daniel Tremblay |
Joint Precision Approach and Landing System Nunn-McCurdy Breach Root Cause Analysis and Portfolio Assessment Metrics for DoD Weapons Systems | 978-0-8330-9172-7 | 2015 | Jennifer Kavanagh · Kathryn Connor · Abby Doll · Jeffrey A. Drezner · Kristy N. Kamarck · Katherine Pfrommer · Mark V. Arena |
Management Perspectives Pertaining to Root Cause Analyses of Nunn-McCurdy Breaches: Program Manager Tenure, Oversight of Acquisition Category II Programs, and Framing Assumptions | 978-0-8330-8205-3 | 2013 | Mark V. Arena · Irv Blickstein · Abby Doll · Jeffrey A. Drezner · Jennifer Kavanagh · Daniel F. McCaffrey · Charles Nemfakos |
ManageMent perspeCtives pertaining to root Cause analyses of nunn-McCurdy BreaChes Volumes 6: Contractor Motivastions and Anticpating Breaches | 978-0-8330-8739-3 | 2014 | Mark V. Arena · John Birkler · Irv Blickstein · Charles Nemfakos · Abby Doll · Jeffrey A Drezner · Gordon T Lee |
Measuring the Statutory and Regulatory Constraints on Department of Defense Acquisition: An Empirical Analysis | 978-0-8330-4176-0 | 2007 | Jeffrey A. Drezner · Irv Blickstein · Raj Raman · Monica Hertzman |
Methodologies in Analyzing the Root Causes of Nunn-McCurdy Breaches | 978-0-8330-7630-4 | 2012 | Irv Blickstein · Jeffrey A. Drezner · Brian McInnis · Charles Nemfakos · Jerry M. Sollinger · Carolyn Wong |
Prolonged Cycle Times and Schedule Growth in Defense Acquisition: A Literature Review | 978-0-8330-8515-3 | 2014 | Jessie Riposo · Chelsea Kaihoi Duran |
Rapid Acquisition and Fielding for Information Assurance and Cyber Security in the Navy | 978-0-8330-7855-1 | 2013 | Isaac R. Porche III · Shawn McKay · Robert W. Button · Elliot Axelband |
Rapid Acquisition of Army Command and Control Systems | 978-0-8330-8510-8 | 2014 | Shara Williams · Jeffrey A. Drezner · Douglas Shontz · Jerry M. Sollinger |
Root Cause Analyses of Nunn-McCurdy Breaches: Excalibur Artillery Projectile and the Navy Enterprise Resource Planning Program, with an Approach to ... Risk | 978-0-8330-7643-4 | 2012 | Irv Blickstein · Jeffrey A. Drezner · Martin C. Libicki · Brian McInnis · Charles Nemfakos · Jerry M. Sollinger · Carolyn Wong |
Root Cause Analyses of Nunn-McCurdy Breaches: Zumwalt-Class Destroyer, Joint Strike Fighter, Longbow Apache, and Wideband Global Satellite | 978-0-8330-5927-7 | 2011 | Irv Blickstein · Michael Boito · Jeffrey A. Drezner · James Dryden · Kenneth Horn · James G. Kallimani · Martin C. Libicki |
Tailoring the Acquisition Process in the U.S. Department of Defense | 978-0-8330-8899-4 | 2015 | Jeffrey A. Drezner · Jerry M. Sollinger |