Search Results - McKernan, Megan
- Showing 1 - 5 results of 5
-
1
Prolonged cycle times and schedule growth in defense acquisition : a literature review by Riposo, Jessie, McKernan, Megan, Duran, Chelsea Kaihoi
Imprint 2014Call Number: Loading…Access full-text online via JSTOR
Located: Loading…
Electronic -
2
Rapid acquisition and fielding for information assurance and cyber security in the Navy by Porche, Isaac, 1968-, McKay, Shawn, McKernan, Megan, Button, Robert, Giglio, Kate
Imprint 2012Call Number: Loading…Access full-text online via JSTOR
Located: Loading…
Electronic -
3
DoD and commercial advanced waveform developments and programs with multiple Nunn-McCurdy breaches by Arena, Mark V., Blickstein, Irv, 1939-, Gonzales, Daniel, 1956-, Harting, Sarah J., Lewis, Jennifer, McGee, Michael, McKernan, Megan P., Nemfakos, Charles Panagiotis, Osburg, Jan, Rudavsky, Rena, Sollinger, Jerry M.
Imprint 2014Call Number: Loading…Access full-text online via JSTOR
Located: Loading…
Electronic -
4
Management perspectives pertaining to root cause analyses of Nunn-McCurdy breaches. Vol. 4 : program manager tenure, oversight of acquisition category II programs, and framing assu... by Arena, Mark V., Blickstein, Irv, 1939-, Doll, Abby, Drezner, Jeffrey A., Kavanagh, Jennifer, 1981-, McCaffrey, Daniel F., McKernan, Megan, Nemfakos, Charles Panagiotis, Sollinger, Jerry M., Tremblay, Daniel, Wong, Carolyn, 1952-
Imprint 2013Call Number: Loading…Access full-text online via JSTOR
Located: Loading…
Electronic -
5
Management perspectives pertaining to Root Cause Analyses of Nunn-McCurdy Breaches. Volume 6 : contractor motivations and anticipating breaches by Arena, Mark V., Birkler, J. L., 1944-, Blickstein, Irv, 1939-, Nemfakos, Charles Panagiotis, Doll, Abby, Drezner, Jeffrey A., Lee, Gordon T., McKernan, Megan P., McInnis, Brian, Price, Carter C., Sollinger, Jerry M., York, Erin
Imprint 2014Call Number: Loading…Access full-text online via JSTOR
Located: Loading…
Electronic
Search Tools:
Related Subjects
Procurement
Defense contracts
Armed Forces
Computer security
Computer software
Computers
Cost control
Cost effectiveness
Costs
Cyberterrorism
Electronic digital computers
Equipment
Government contractors
Government purchasing
Information technology
Law and legislation
Motivation (Psychology)
Planning
Prevention
Purchasing
Weapons systems