Public-private partnerships in defense acquisition programs-defensible?
Low, Kuan Hong
San Miguel, Joseph
MetadataShow full item record
Public-Private Partnerships (PPPs) in defense have gained momentum in various countries around the world over the past decade. This research project explores the experiences and evolutions of PPPs in the United Kingdom (UK), the United States (U.S.), Australia, and Singapore. Each of these countries has its own unique fiscal system, operating environment, and defense focus. It is timely to study how defense PPPs has evolved around the world since their inception in the UK in the 1990s. Through the study of these four countries' journeys into defense PPPs, the objective of this project is to first determine whether there are any key common denominators that steer the countries toward the adoption of PPPs to meet their defense needs. The next objective is to determine whether PPPs are suitable for defense acquisitions. The final objective is to determine whether there are specific areas in defense that are more suitable than others for PPPs.
Approved for public release, distribution unlimited
Showing items related by title, author, creator and subject.
Low, Kuan Hong (Monterey, California: Naval Postgraduate School, 2009-12);Public-Private Partnerships (PPPs) in defense have gained momentum in various countries around the world over the past decade. This research project explores the experiences and evolutions of PPPs in the United Kingdom ...
An analysis of the departments of the Air Force, Army, and Navy budget offices and budget processes Taylor, Brian R. (Monterey, California. Naval Postgraduate School, 2002-12);The objective of each of the budget offices of the Departments of the Air Force, Army, and Navy is to create a budget request to be submitted to the Secretary of Defense for incorporation in the President's Budget. The ...
Testing and evaluation of DynaSig Biometric pen in support of tactical military and law enforcement missions Odgers, Kenton M. (Monterey, California. Naval Postgraduate School, 2007-03);Existing access control methods depend on mechanicsms that can either be copied or stolen. From passwrods to identification cards, these forms of authentication are unique only while they remain in possession of the owner. ...