United States Navy contracting officer warranting process
Cowans, Mark A.
Kremer, Matthew D.
Kidalov, Max V.
Maddox, Janie L.
MetadataShow full item record
The purpose of this project was to investigate how Navy contracting activities warrant the contracting officers under their purview. The FAR and DAWIA establishes minimum training, education, and experience requirements for federal contracting officers. However, most commands implement supplementary requirements. Additionally, we wanted to discover the basis for the selection criteria utilized. The goal was to discover the general, "unwritten" requirements for Navy warranting, and whether the process created inconsistencies in the contracting workforce. We expected to find that all commands set different internal procedures for warranting above DAWIA minimums. Furthermore, we expected to find ad hoc processes tailored to the organization's mission and to the individual Appointing Official. According to this research, we discovered that warranting procedures were fragmented within and across Navy contracting commands. This fragmentation could potentially lead to inconsistencies in contracting officer knowledge, abilities, and capabilities. While this project was limited in scope, it is an initial step into the much broader research area of DoD contracting officer-warranting processes.
Joint Applied ProjectApproved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Frey, Kimberly A. (Monterey, California. Naval Postgraduate School, 2001-12);This study examines the changing role of the contracting professional in the Department of Defense. Specifically, it examines the work effort of the contemporary contracting professional, the primary factors driving the ...
Warnke, Scott D. (Monterey, California: Naval Postgraduate School, 2016-06);Identifying communities in a dark network is a potentially difficult task. The nature of dark networks, and their characteristic of con-cealing connections within the network, makes community detection an enterprise based ...
Beedenbender, Mark G. (Monterey, California. Naval Postgraduate School, 1990-03);A widely used access control mechanism is the password. Passwords are normally composed of a meaningful detail, such as a name of a person or a sequence of numbers such as birthdate. Any person attempting to gain unauthorized ...