Application of a network perspective to DoD weapon system acquisition: an exploratory study

Download
Author
Mantz, Ryan D.
Date
2006-12Advisor
Roberts, Nancy C.
Matthews, David F.
Metadata
Show full item recordAbstract
One of the foundations of military command and control is that authority must match responsibility. Yet in weapon system acquisition, a program manager is responsible to deliver capabilities to the warfighter without full control of the resources he needs to carry out this task. Successful program managers recognize their dependencies upon other actors and execute their programs using a network with a common goal of enhancing a specific warfighting capability. A hierarchical chain of command still exists, but the network enables the actors to carry out their objectives in an efficient and effective manner. This report describes how acquisition process purportedly works in hierarchical terms. It also introduces a process model to describe the set of activities actually used and the actors who are required to collaborate to deliver capabilities to the warfighter. The analysis of those activities between actors reveals that weapon system acquisition behaves like a network. Describing acquisition in network terms allows those involved in weapon system acquisition oversight, policy, and practice to have a new insights and measurement tools to understand how to improve the weapon systems acquisition process.
Description
MBA Professional Report
Related items
Showing items related by title, author, creator and subject.
-
Application of a Network Perspective to DoD Weapon System Acquisition: An Exploratory Study
Roberts, Nancy; Mantz, Ryan (2007-04-01); NPS-AM-07-014One of the foundations of military command and control is that authority must match responsibility. Yet in weapon system acquisition, a program manager is responsible to deliver capabilities to the warfighter without full ... -
Cybersecurity: Converting Shock into Action
Tremaine, Robert; Shaw, Paul (Monterey, California. Naval Postgraduate School, 2018-04-30); SYM-AM-18-177BIGBADABOOM-2. That's the name of a recent cybersecurity breach affecting 5 million stolen credit card and debit card holders (O'Brien, 2018). Unfortunately, these breaches are becoming all too common. At an alarming rate, ... -
Cybersecurity: Converting Shock Into Action (Part 1)
Shaw, Paul; Tremaine, Robert (Monterey, California. Naval Postgraduate School, 2018-04-30); SYM-AM-18-092BIGBADABOOM-2. That's the name of a recent cybersecurity breach affecting 5 million stolen credit card and debit card holders (O'Brien, 2018). Unfortunately, these breaches are becoming all too common. At an alarming rate, ...