An analysis of Army rapid acquisition
Author
Coleman, Sarah
Lopez, Linda
Luntz, David
Date
2015-09Advisor
Pickar, Charles
Second Reader
Jones, Raymond
Metadata
Show full item recordAbstract
The purpose of this research is to determine if current regulations support a repeatable and manageable rapid acquisition process. The methodology used to analyze the research is the knowledge value-added theory and data extrapolated from selected acquisition reports. The results of our analysis demonstrate a need for an institutionalized rather than ad hoc rapid acquisition process. The recommendation is to cull pieces from the various rapid acquisition options currently available to develop a process that is repeatable and manageable.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Related items
Showing items related by title, author, creator and subject.
-
Maturing Cost Estimation in a Rapid Acquisition Environment
Manring, Jennifer E.; Restivo, Thomas; Faucher, Natalie; Tepel, Richard (Monterey, California. Naval Postgraduate School, 2018-04-30); SYM-AM-18-093The Department of Defense (DoD) acquisition community is increasingly pursuing means to introduce new capabilities to the warfighter as quickly as possible. When facing emerging threats, the warfighter cannot wait for a ... -
Maturing Cost Estimation in Rapid Acquisitions
Manring, Jennifer; Restivo, Thomas; Faucher, Natalie; Tepel, Rich (Monterey, California. Naval Postgraduate School, 2018-04-30); SYM-AM-18-178The Department of Defense (DoD) acquisition community is increasingly pursuing means to introduce new capabilities to the warfighter as quickly as possible. When facing emerging threats, the warfighter cannot wait for a ... -
Effective electronic security: process for the development and validation from requirements to testing
Prokop, James A. (Monterey California. Naval Postgraduate School, 2013-06);An electronic physical security system will often fail to meet user expectations or even basic needs. The inability to easily determine if the system is effective is a key symptom of this failure. This paper explored the ...