Open Access. Powered by Scholars. Published by Universities.®

Operations Research, Systems Engineering and Industrial Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering

Relating Initial Budget To Program Growth With Rayleigh And Weibull Models, Eric J. Unger Mar 2001

Relating Initial Budget To Program Growth With Rayleigh And Weibull Models, Eric J. Unger

Theses and Dissertations

Previous research on completed defense R&D shows that contract expenditures can be fit well with a Rayleigh model. With fixed outlay rates, as prescribed by the OSD comptroller, the budget profile must have most of the funds in the early years to produce Rayleigh-distributed expenditures. R&D programs with more delayed funding profiles may also produce expenditures that a Rayleigh model fits through schedule slips and cost overruns. This research tests how well the initial funding profile produces Rayleigh-distributed expenditures that can be related to the program's final cost overrun and schedule slips. Based only on the initial budget profile, we …


A Delphi Assessment Of The Digital Rosetta Stone Model, Don M. Kelley Mar 2001

A Delphi Assessment Of The Digital Rosetta Stone Model, Don M. Kelley

Theses and Dissertations

Information that is stored digitally can only be used if it can be retrieved and interpreted. if the methods to retrieve the information are lost, it may be difficult, if not impossible, to recreate them. The knowledge to interpret the bitstream is also at risk. The Digital Rosetta Stone (DRS) Model was developed as a framework for capturing and maintaining the methods necessary to retrieve and display digital information stored on obsolete media or using obsolete software. However, this conceptual model had not yet been assessed by the community of professionals for its practical efficacy. This thesis began the assessment …


The Effects Of Budgetary Constraints, Multiple Strategy Selection, And Rationality On Equilibrium Attainment In An Information Warfare Simulation, Steven W. Tait Mar 2001

The Effects Of Budgetary Constraints, Multiple Strategy Selection, And Rationality On Equilibrium Attainment In An Information Warfare Simulation, Steven W. Tait

Theses and Dissertations

Information warfare (IW) has developed into a significant threat to the national security of the United States. Our critical infrastructures, linked together by information systems, are increasingly vulnerable to information attack. This study seeks to understand some of those factors which affect the ability of an individual to make accurate decisions in an IW environment. The study used game theory to analyze the behavior of decision-makers within an IW simulation. The IW game model is based on a set of games known as infinitely repeated games of incomplete information. It uses the Bayesian Nash equilibrium concept to determine the strategy …


Award Term Incentive Contracting: An Investigation Of United States Air Force Strategic Purchasing, Rachael A. Harris Mar 2001

Award Term Incentive Contracting: An Investigation Of United States Air Force Strategic Purchasing, Rachael A. Harris

Theses and Dissertations

This research explored implementing a best commercial practice of establishing strategic purchasing relationships within the Department of Defense (DOD) procurement environment. The research was sparked by Air Force Material Command's (AFMC) instituting a commercial style acquisition strategy using an award term incentive on several programs. The award term incentive provides for extensions or reductions to the term of the contract based on contractors' level of performance. Forthcoming implementation of Air Force FAR supplement 5317.7X Incentive Term Extension, will likely increase the number of acquisitions using an award term incentive. Research findings indicate that management should consider expanding the AFMC award …


The Effect Of External Safeguards On Human-Information System Trust In An Information Warfare Environment, Gregory S. Fields Mar 2001

The Effect Of External Safeguards On Human-Information System Trust In An Information Warfare Environment, Gregory S. Fields

Theses and Dissertations

This research looks at how human trust in an information system is influenced by external safeguards in an Information Warfare (1W) domain. Information systems are relied upon in command and control environments to provide fast and reliable information to the decision-makers. The degree of reliance placed in these systems by the decision-makers suggests a significant level of trust. Understanding this trust relationship and what effects it is the focus of this study. A model is proposed that predicts behavior associated with human trust in information systems. It is hypothesized that a decision-maker's belief in the effectiveness of external safeguards will …


Influence Of Anonymity In A Group Problem-Solving Environment, Robert A. Sylvester Mar 2001

Influence Of Anonymity In A Group Problem-Solving Environment, Robert A. Sylvester

Theses and Dissertations

A group support system (GSS) uses a combination of networked personal computers, software that collects, manipulates, and aggregates member's individual input, and human facilitation to improve the group decision-making process. Prior GSS research has found that content and process anonymity influence problem solving groups. However, previous studies report mixed results on which levels of anonymity positively influence group performance. This thesis looked at content and process anonymity using four treatments to explore possible explanations for the mixed results found in previous GSS research. The study examined numerous theories including anonymity, identification, social loafing, and social comparison. An experiment was developed …


Gss Technology As A Moderator Of Influence And Perceived Expertise, Kevin V. Thompson Mar 2001

Gss Technology As A Moderator Of Influence And Perceived Expertise, Kevin V. Thompson

Theses and Dissertations

Group Support System (355) research has found this content and process anonymity influence problem solving groups. However, previous studies report mixed results on how OSS technology changes social influence processes and recognition of expertise which affect group performance. This thesis explored content and process anonymity's affect on influence and perceived expertise using three treatments to derive possible explanations for the mixed results found in previous GSS research. The study developed a theoretical model of influence, perceived expertise, and performance. Using structural equation modeling the study tested the relationships between expertise and participation rates, and overall group performance. An experiment was …


A Case Study Analysis Of The Overhead Rate Impact Model Used During The C-5 Maintenance Source Selection, William N. Ward Mar 2001

A Case Study Analysis Of The Overhead Rate Impact Model Used During The C-5 Maintenance Source Selection, William N. Ward

Theses and Dissertations

The Overhead Rate Impact (ORI) model was used during the C-5 Maintenance source selection to evaluate the impact the new workload would have on the existing overhead rates. The objectives of this research study were to evaluate the ORI model and to identify the lessons learned from this source selection. To accomplish these objectives, interviews were conducted with members of the source selection team who were on the Cost Integrated Product Team (IPT). The experts were asked to identify the strengths and weaknesses of the ORI model and to make recommendation on how to improve the model. This study identified …


An Analysis Of The Acquisition Process For Simplified Acquisition Of Base Engineering Requirements (Saber) Contracts And Its Potential Impact On Contractor Performance, Brian J. Heaps Mar 2001

An Analysis Of The Acquisition Process For Simplified Acquisition Of Base Engineering Requirements (Saber) Contracts And Its Potential Impact On Contractor Performance, Brian J. Heaps

Theses and Dissertations

The Simplified Acquisition of Base Engineering Requirements (SABER) contract's main purpose is to expedite contract award of civil engineer requirements through the issuance of individual delivery orders. The contract contains a collection of detailed task specifications that include most types of real property maintenance, repair, and construction work. The Assistant Secretary of the Air Force for Acquisition's Operational Contracting Division (SAF/AQCO) identified a number of failed SABER contracts. The problem statement designed for this research effort was: There are a large number of SABER contractors that are failing during the performance period on their SABER contracts. SAF/AQCO is trying to …