GAO-04-722 Information Technology: DOD's Acquisition Policies and Guidance Need to Incorporate Additional Best Practices and Controls
ثبت نشده
چکیده
منابع مشابه
INVENTORY MANAGEMENT: Greater Use of Best Practices Could Reduce DOD's Logistics Costs GAO/T-NSIAD-97-214
متن کامل
GAO-09-41 Defense Logistics: Improved Analysis and Cost Data Needed to Evaluate the Cost-effectiveness of Performance Based Logistics
In 2001, the Department of Defense (DOD) identified performance based logistics (PBL) as the preferred weapon system support strategy. Within DOD, PBL is the purchase of performance outcomes, such as system availability, rather than the purchase of individual elements of logistics support—such as parts, repairs, and engineering support. Although PBL initially arose from efforts to reduce suppor...
متن کاملUse of Evidence-informed Deliberative Processes by Health Technology Assessment Agencies Around The Globe
Background Evidence-informed deliberative processes (EDPs) were recently introduced to guide health technology assessment (HTA) agencies to improve their processes towards more legitimate decision-making. The EDP framework provides guidance that covers the HTA process, ie, contextual factors, installation of an appraisal committee, selecting health technologies and criteria, assessment, a...
متن کاملA TQM and JIT Integrated Continuous Improvement Model For Organizational Success: An Innovative Framework
Abstract Manufacturing companies must find competitive methods to produce products cheaper, faster and better to continuously satisfy their customers and acquire organizational success. For continuous improvement to be more successful, hybrid programs such as integrated TQM and JIT approaches give better results. As the existing TQM and JIT integrated approaches in literatures are not analogous...
متن کاملRisks, Limitations and the Need for Additional Measures Against Ransomware in the Health Information Technology Infrastructure
Introduction: Even before the Covid 19 pandemic, one of the lucrative targets for attackers behind ransomware attacks was Encroaching on the continuity of services in the field of health information technology. In this study, for the first time, while introducing, relying on statistics and modeling, it is shown that the prevention and counteraction of these attacks in the IT infrastructure of t...
متن کامل