Application of a Network Perspective to DoD Weapon System Acquisition: An Exploratory Study
Abstract
One of the foundations of military command and control is that authority must match responsibility. Yet in weapon system acquisition, a program manager is responsible to deliver capabilities to the warfighter without full control of the resources he needs to carry out this task. Successful program managers recognize their dependencies upon other actors and execute their programs using a network with a common goal of enhancing a specific warfighting capability. A hierarchical chain of command still exists, but the network enables the actors to carry out their objectives in an efficient and effective manner. This report describes how the acquisition process purportedly works in hierarchical terms. It also introduces a process model to describe the set of activities actually used and the actors who are required to collaborate to deliver capabilities to the warfighter. The analysis of those activities between actors reveals that weapon system acquisition behaves like a network. Describing acquisition in network terms allows those involved in weapon system acquisition oversight, policy, and practice to have new insights and measurement tools to understand how to improve the weapon systems acquisition process.
Description
Proceedings Paper (for Acquisition Research Program)
NPS Report Number
NPS-AM-07-014Related items
Showing items related by title, author, creator and subject.
-
Application of a network perspective to DoD weapon system acquisition: an exploratory study
Mantz, Ryan D. (Monterey, California. Naval Postgraduate School, 2006-12);One of the foundations of military command and control is that authority must match responsibility. Yet in weapon system acquisition, a program manager is responsible to deliver capabilities to the warfighter without ... -
Cybersecurity: Converting Shock into Action
Tremaine, Robert; Shaw, Paul (Monterey, California. Naval Postgraduate School, 2018-04-30); SYM-AM-18-177BIGBADABOOM-2. That's the name of a recent cybersecurity breach affecting 5 million stolen credit card and debit card holders (O'Brien, 2018). Unfortunately, these breaches are becoming all too common. At an alarming rate, ... -
Cybersecurity: Converting Shock Into Action (Part 1)
Shaw, Paul; Tremaine, Robert (Monterey, California. Naval Postgraduate School, 2018-04-30); SYM-AM-18-092BIGBADABOOM-2. That's the name of a recent cybersecurity breach affecting 5 million stolen credit card and debit card holders (O'Brien, 2018). Unfortunately, these breaches are becoming all too common. At an alarming rate, ...