Download

Download eBook for Free

Full Document

FormatFile SizeNotes
PDF file 0.4 MB

Use Adobe Acrobat Reader version 10 or higher for the best experience.

Summary Only

FormatFile SizeNotes
PDF file 0.1 MB

Use Adobe Acrobat Reader version 10 or higher for the best experience.

Purchase

Purchase Print Copy

 FormatList Price Price
Add to Cart Paperback106 pages $24.95 $19.96 20% Web Discount

Research Questions

  1. What is the best way to proceed with a root cause analysis?
  2. What data sources need to be examined to perform such an analysis?

Congressional concern with cost overruns, or breaches, in several major defense acquisition programs led the authors, in a partnership with the Performance Assessments and Root Cause Analysis Office in the Office of the Secretary of Defense, Acquisition, Technology, and Logistics, to investigate root causes by examining program reviews, analyzing data, participating in contractor briefings, and holding meetings with diverse stakeholders. In two companion studies, the authors analyzed the reasons for six program breaches and developed a methodology for carrying out root cause analyses. This report documents that methodology, whose key components include the following steps: formulate a hypothesis, set up long-lead-time activities, document the unit cost threshold breach, construct a time line of cost growth recent events from the program history, verify cost data and quantify cost growth, create program cost profiles and pinpoint occurrences of cost growth, match the time line with profiles and derive causes of cost growth, reconcile remaining issues, attribute cost growth to root causes, and create postulates. This study represents an important chronicle of the approach to use in performing such analyses — one that others may use in their own analytic efforts. In addition, it gathers extensive documentation on the data sources used to examine the six program breaches investigated.

Key Findings

A Method for Conducting a Root Cause Analysis Has Been Developed

  • Each program is unique but a generic methodology can be applied.
  • Recording bibliographic information for a data source archive is vital.
  • Analysts need to examine each program’s history, to include the military requirement, financial data, technical data, contractual issues, schedules, and the acquisition environment.
  • The methodology will iteratively improve the research focus.

Recommendations

  • Analysts should consult a variety of sources during their investigation of a program breach.
  • They should establish a permanent archive to record sources used, which will assist with future root cause analyses and maintain the sources for future efforts.
  • Analysts will need a way to search data sources, so a searchable database should be created.

Table of Contents

  • Chapter One

    Introduction

  • Chapter Two

    Root Cause Analysis Methodology

  • Chapter Three

    Data Sources for Root Cause Analysis

  • Chapter Four

    Conclusions

  • Appendix A

    Assessment of Data, by Provider and Functional Area

  • Appendix B

    Data Sources for the Longbow Apache Block III (AB3)

  • Appendix C

    Data Sources for the DDG-1000

  • Appendix D

    Data Sources for Excalibur

  • Appendix E

    Data Sources for the Joint Strike Fighter

  • Appendix F

    Data Sources for the Navy Enterprise Resource Planning Program

  • Appendix G

    Data Sources for the Wideband Global Satellite

The research described in this report was prepared for the Office of the Secretary of Defense (OSD). The research was conducted within the RAND National Defense Research Institute, a federally funded research and development center sponsored by OSD, the Joint Staff, the Unified Combatant Commands, the Navy, the Marine Corps, the defense agencies, and the defense Intelligence Community.

This report is part of the RAND Corporation technical report series. RAND technical reports may include research findings on a specific topic that is limited in scope or intended for a narrow audience; present discussions of the methodology employed in research; provide literature reviews, survey instruments, modeling exercises, guidelines for practitioners and research professionals, and supporting documentation; or deliver preliminary findings. All RAND reports undergo rigorous peer review to ensure that they meet high standards for research quality and objectivity.

Permission is given to duplicate this electronic document for personal use only, as long as it is unaltered and complete. Copies may not be duplicated for commercial purposes. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. For information on reprint and linking permissions, please visit the RAND Permissions page.

The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.