Better cost data is the key to performance budgeting, expert says

Agencies must track the full cost of their operations before they can link spending decisions to performance goals, an expert said Thursday. John Mercer, a former counsel to the Senate Governmental Affairs Committee who wrote the 1993 Government Performance and Results Act (GPRA), said full cost accounting is essential to the Bush administration's initiative on performance-based budgeting. "When you do a full cost accounting, it allows you to clearly show the linkage between dollars and results," said Mercer, who is now deputy director for government performance at Logicon Inc., a Herndon, Va.-based consulting arm of Northrop Grumman. Agencies need to know how much a program costs before they can adequately assess its performance, according to Mercer. Mercer sees a clear connection between two Bush management reforms still under development: legislation that requires agencies to track the full costs of their operations, and a mandate that agencies use performance-based budgeting on a select set of programs in the fiscal 2003 budget. Budget examiners at the Office of Management and Budget are currently selecting a few programs at each agency that will use the budgeting technique, according to Mercer and other sources. Full knowledge of a program's costs enables lawmakers to make informed choices about how increasing or decreasing funding would affect program results, said Mercer. "Right now, if you try to cut funding, [agencies] say it will hurt and they will achieve less results. But they can't show how performance will decline," he said. "If [agencies] knew the unit cost of an activity, they could see what the impact of a change in funding would be." At present, many agencies are unable to account for the overhead, support, and nondirect costs associated with their programs. The Bush administration is crafting legislation that will require agencies to use accounting tools, such as activity-based costing, to determine those costs. Despite the success that agencies such as the Patent and Trademark Office have had with activity-based costing, businesses and agencies often fail to connect the accounting technique to their programs, according to experts. "A lot of folks have tried to implement activity-based costing and failed," said Joe Donlan, an accounting expert with Arthur Andersen who formerly served as deputy chief information officer at the Internal Revenue Service. Donlan is part of a working group at the Consortium for Advanced Management-International that is developing an application to walk agencies and businesses through the accounting process. The consortium is a Dallas-based nonprofit group that developed activity-based costing in the 1980s.
Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.