GAO-04-722 Information Technology: DOD's Acquisition Policies and Guidance Need to Incorporate Additional Best Practices and Controls

ثبت نشده
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GAO-09-41 Defense Logistics: Improved Analysis and Cost Data Needed to Evaluate the Cost-effectiveness of Performance Based Logistics

In 2001, the Department of Defense (DOD) identified performance based logistics (PBL) as the preferred weapon system support strategy. Within DOD, PBL is the purchase of performance outcomes, such as system availability, rather than the purchase of individual elements of logistics support—such as parts, repairs, and engineering support. Although PBL initially arose from efforts to reduce suppor...

متن کامل

Use of Evidence-informed Deliberative Processes by Health Technology Assessment Agencies Around The Globe

Background Evidence-informed deliberative processes (EDPs) were recently introduced to guide health technology assessment (HTA) agencies to improve their processes towards more legitimate decision-making. The EDP framework provides guidance that covers the HTA process, ie, contextual factors, installation of an appraisal committee, selecting health technologies and criteria, assessment, a...

متن کامل

A TQM and JIT Integrated Continuous Improvement Model For Organizational Success: An Innovative Framework

Abstract Manufacturing companies must find competitive methods to produce products cheaper, faster and better to continuously satisfy their customers and acquire organizational success. For continuous improvement to be more successful, hybrid programs such as integrated TQM and JIT approaches give better results. As the existing TQM and JIT integrated approaches in literatures are not analogous...

متن کامل

Risks, Limitations and the Need for Additional Measures Against Ransomware in the Health Information Technology Infrastructure

Introduction: Even before the Covid 19 pandemic, one of the lucrative targets for attackers behind ransomware attacks was Encroaching on the continuity of services in the field of health information technology. In this study, for the first time, while introducing, relying on statistics and modeling, it is shown that the prevention and counteraction of these attacks in the IT infrastructure of t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004