Open Access. Powered by Scholars. Published by Universities.®

Risk Analysis Commons

Open Access. Powered by Scholars. Published by Universities.®

920 Full-Text Articles 1,577 Authors 348,814 Downloads 100 Institutions

All Articles in Risk Analysis

Faceted Search

920 full-text articles. Page 3 of 40.

2021-2022 Annual Security And Fire Report - Sayre Campus, Southwestern Oklahoma State University 2022 Southwestern Oklahoma State University

2021-2022 Annual Security And Fire Report - Sayre Campus, Southwestern Oklahoma State University

ANNUAL SECURITY & FIRE REPORTS

This is the 2021-2022 Annual Security and Fire Report of the Sayre Campus by Southwestern Oklahoma State University.


Choosing Wearable Internet Of Things Devices For Managing Safety In Construction Using Fuzzy Analytic Hierarchy Process As A Decision Support System, Sharique Khalid 2022 Marshall University

Choosing Wearable Internet Of Things Devices For Managing Safety In Construction Using Fuzzy Analytic Hierarchy Process As A Decision Support System, Sharique Khalid

Theses, Dissertations and Capstones

Many safety and health risks are faced daily by workers in the field of construction. There is unpredictability and risk embedded in the job and work environment. When compared with other industries, the construction industry has one of the highest numbers of worker injuries, illnesses, fatalities, and near-misses. To eliminate these risky events and make worker performance more predictable, new safety technologies such as the Internet of Things (IoT) and Wearable Sensing Devices (WSD) have been highlighted as effective safety systems. Some of these Wearable Internet of Things (WIoT) and sensory devices are already being used in other industries to …


Transdisciplinarity In Experience Design: A Global Survey Of Higher Ed Programs In Exd/Xd, Yvonne Houy 2022 University of Nevada, Las vegas

Transdisciplinarity In Experience Design: A Global Survey Of Higher Ed Programs In Exd/Xd, Yvonne Houy

Creative Collaborations

In our age of ubiquitous devices and digital media it is the perceived value of the end-to-end experience that brings people to a place. Designing inspiring and emotionally engaging end-to-end experiences requires experts in a wide range of disciplines committed to an interdisciplinary collaboration that can arrive at transdisciplinary design - the sum becomes greater than its parts.

Civil engineering, hospitality, business, psychology, digital User Experience (UX) design, and experience data analysis need to be seamless integrated with the fine and performing arts and design fields:

  • Architecture, interior, landscape and sound design actively engage the senses.

  • Graphic and fine arts …


Development Of A Framework To Support Informed Shipbuilding Based On Supply Chain Disruptions, Katherine Smith, Rafael Diaz, Yuzhong Shen 2022 Old Dominion University

Development Of A Framework To Support Informed Shipbuilding Based On Supply Chain Disruptions, Katherine Smith, Rafael Diaz, Yuzhong Shen

VMASC Publications

In addition to stresses induced by the Covid-19 pandemic, supply chains worldwide have been growing more complex while facing a continuous onslaught of disruptions. This paper presents an analysis and extension of a graph based model for modeling and simulating the effects of such disruptions. The graph based model combines a Bayesian network approach for simulating risks with a network dependency analysis approach for simulating the propagation of disruptions through the network over time. The initial analysis provides evidence supporting extension to for using a multi-layered approach allowing for the inclusion of cyclic features in supply chain models. Initial results …


The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He 2022 Old Dominion University

The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He

Information Technology & Decision Sciences Faculty Publications

This paper identifies opportunities for potential theoretical and practical improvements in employees' awareness of cybersecurity and their motivational behavior to protect themselves and their organizations from cyberattacks using the protection motivation theory. In addition, it contributes to the literature by examining additional variables and mediators besides the core constructs of the Protection Motivation Model (PMT). This article uses empirical data and structural equation modeling to test the antecedents and mediators of employees' cybersecurity motivational behavior. The study offers theoretical and pragmatic guidance for cybersecurity programs. First, the model developed in this study can partially explain how people may change their …


Energy And Economic Modeling Of Stillage Dewatering Processes In Kentucky Bourbon Distilleries, William Brennan 2022 University of Kentucky

Energy And Economic Modeling Of Stillage Dewatering Processes In Kentucky Bourbon Distilleries, William Brennan

Theses and Dissertations--Mechanical Engineering

Stillage is a byproduct of alcohol distillation and must be managed in all distilleries to sustain operations. In the United States, fuel ethanol plants typically convert all stillage into Dried Distillers’ Grains with Solubles (DDGS). This process and its variations are well known. Typical stillage management approaches are not well known, however, for the Kentucky bourbon industry. A survey of stillage management approaches in operational bourbon distilleries was conducted. Process modeling was performed to evaluate the energy and economic considerations of the available stillage dewatering methods for a 7 Million Original Proof Gallon (MMOPG) distillery. Monte Carlo simulations were performed …


On A New Framework For Detecting, Classifying, And Forecasting Floods For Large-Scale Flood Risk Analysis, Equisha Glenn 2022 CUNY City College of New York

On A New Framework For Detecting, Classifying, And Forecasting Floods For Large-Scale Flood Risk Analysis, Equisha Glenn

Dissertations and Theses

Increasing trends in flooding events are projected to continue as climate changes have increased the chance of extreme weather events. Given the significant, damaging impacts of extreme floods, the ability to effectively model floods is crucial for risk management and mitigation of the impacts of these extreme flooding events. This dissertation presents a new framework for detecting and predicting large-scale flood risk in the United States using climate information. This methodology categorizes regional, simultaneous floods into an index that is used to forecast the risk of extreme flooding a season ahead. The index proposed herein, named the Spatial Flood Index …


Analysis Of Non-Conventional Radiological Terrorism, James N. Padgett 2022 Virginia Commonwealth University

Analysis Of Non-Conventional Radiological Terrorism, James N. Padgett

Theses and Dissertations

Nuclear terrorism has been a risk since the dawn of the first atomic bomb. Though state sponsored nuclear weapons development is of concern for countries, non-state sponsored terrorism with radiological material can be of even greater concern. This stems from the fact that the material is under less stringent or no safeguards and can readily change hands between different terrorist groups or innocent civilians may accidently come into contact with the material.

Within this paper an analysis of previous accidents using orphan radiological sources, malicious use of orphan radiological sources, and how these sources could be used by terrorists is …


Co2 Based Parachute Deployment, Anthony M. S. Settlemier, Nicholas Motter 2022 The University of Akron

Co2 Based Parachute Deployment, Anthony M. S. Settlemier, Nicholas Motter

Williams Honors College, Honors Research Projects

This paper describes the design process of a CO2 based parachute deployment system for the Akronauts Rocket Design team, with particular emphasis on the selection of methodologies of deployment as well as design iteration. The objective was to create a fully mechanical system in order to replace the black powder based systems that were used previously by the team.

Emphasis was put in creating a system that would function well at higher altitudes while also preventing damage to the parachute during deployment. This system emphasizes robustness under launch conditions.


Performing A Penetration Test On A Storage Network, Scott Moskal 2022 The University of Akron

Performing A Penetration Test On A Storage Network, Scott Moskal

Williams Honors College, Honors Research Projects

A small storage network will be designed with two wired routers, one wireless router, a switch, two laptops, a desktop, and a Raspberry Pi. Both laptops will be connected to the wireless router. The HP laptop will run Parrot OS and the Acer laptop will run Windows 11. The wireless router will be connected to the second router via port eth0. The eth2 port on the second router will be connected to eth1 port of the third router. The third router will be connected to the eth0 port of the Netgear switch. The switch will have two VLANs. VLAN 10 …


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion 2022 Penn State Dickinson Law

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


A Human Factors Study Of Risk Management Of Complex Agile Scrum Projects In Large Enterprises, Ravi Kalluri 2022 Old Dominion University

A Human Factors Study Of Risk Management Of Complex Agile Scrum Projects In Large Enterprises, Ravi Kalluri

Engineering Management & Systems Engineering Faculty Publications

Agile Project Management methods have gained phenomenal success in the IT software world in managing projects of high complexity and uncertainty. However, Agile projects come with their unique set of risks. This paper seeks to explore the risks posed by human factors to complex Agile Scrum projects in large enterprises. Project Risk Management is crucial in determining the future performance of a complex project. Increasing project complexity makes it more and more difficult to anticipate potential events that could affect the project and to make effective decisions to reduce project risk exposure. This is even more true for Agile projects …


Assessing The Alignment Of Social Robots With Trustworthy Ai Design Guidelines: A Preliminary Research Study, Abdikadar Ali, Danielle Thaxton, Ankur Chattopadhyay 2021 Northern Kentucky University

Assessing The Alignment Of Social Robots With Trustworthy Ai Design Guidelines: A Preliminary Research Study, Abdikadar Ali, Danielle Thaxton, Ankur Chattopadhyay

Posters-at-the-Capitol

The last couple of years have seen a strong movement supporting the need of having intelligent consumer products align with specific design guidelines for trustworthy artificial intelligence (AI). This global movement has led to multiple institutional recommendations for ethically aligned trustworthy design of the AI driven technologies, like consumer robots and autonomous vehicles. There has been prior research towards finding security and privacy related vulnerabilities within various types of social robots. However, none of these previous works has studied the implications of these vulnerabilities in terms of the robot design aligning with trustworthy AI. In an attempt to address this …


Forecasting Nigeria's Electricity Demand And Energy Efficiency Potential Under Climate Uncertainty, Olawale Olabisi 2021 University of Tennessee, Knoxville

Forecasting Nigeria's Electricity Demand And Energy Efficiency Potential Under Climate Uncertainty, Olawale Olabisi

Doctoral Dissertations

The increasing population and socio-economic growth of Nigeria, coupled with the current, unmet electricity demand, requires the need for power supply facilities expansion. Of all Nigeria’s electricity consumption by sector, the residential sector is the largest and growing at a very fast rate. To meet this growing demand, an accurate estimation of the demand into the future that will guide policy makers to adequately plan for the expansion of electricity supply and distribution, and energy efficiency standards and labeling must be made. To achieve this, a residential electricity demand forecast model that can correctly predict future demand and guide the …


Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim 2021 California State University, San Bernardino

Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim

Electronic Theses, Projects, and Dissertations

Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …


Seismic Performance Assessment Of Building Contents: Monetary Losses And Injuries, Sereen Majdalaweyh 2021 Clemson University

Seismic Performance Assessment Of Building Contents: Monetary Losses And Injuries, Sereen Majdalaweyh

All Dissertations

Building contents include all the components that are not attached to the building which the owners place after the construction phase, such as furniture, electrical equipment, glassware, and other personal items. Loss and damage assessment of building contents proved to be challenging in performance-based earthquake engineering frameworks because of the data sparsity. Damages to building contents during an earthquake not only cause monetary losses; tumbling and over-toppling of heavy building contents could result in injuries and even deaths of occupants. While major advancements have been made in performance-based earthquake engineering; however, the focus is mainly on damages and collapse risk …


Application Of Image Processing And Convolutional Neural Networks For Flood Image Classification And Semantic Segmentation, Jaku Rabinder Rakshit Pally 2021 Clemson University

Application Of Image Processing And Convolutional Neural Networks For Flood Image Classification And Semantic Segmentation, Jaku Rabinder Rakshit Pally

All Theses

Floods are among the most destructive natural hazards that affect millions of people across the world leading to severe loss of life and damage to property, critical infrastructure, and the environment. Deep learning algorithms are exceptionally valuable tools for collecting and analyzing the catastrophic readiness and countless actionable flood data. Convolutional neural networks (CNNs) are one form of deep learning algorithms widely used in computer vision which can be used to study flood images and assign learnable weights and biases to various objects in the image. Here, we leveraged and discussed how connected vision systems can be used to embed …


Interactive Risk Management Approach: A Simulation Game â Rigã¢, Safinaz M. El-Dawod 2021 The American University in Cairo AUC

Interactive Risk Management Approach: A Simulation Game â Rigã¢, Safinaz M. El-Dawod

Archived Theses and Dissertations

No abstract provided.


Ransomware Education: Availability, Accessibility, And Ease Of Use, Judson Gager, Judson Gager 2021 Murray State University

Ransomware Education: Availability, Accessibility, And Ease Of Use, Judson Gager, Judson Gager

Honors College Theses

With cybersecurity constantly in the media outlets with breaches, cybercrime, and cyberwarfare, it has become a significant concern for all. One of the most recent breaches in the summer of 2021 was the Colonial Pipeline breach, which has proven the country's reliance on these industrial control systems and networking. The systems were taken for ransom by a new type of ransomware written in a different programming language. Although the Colonial Pipeline breach was quickly addressed, the impact of the gas shortage and the response time were alarming at triaging the breach. However, this attack showed the public how dangerous ransomware …


The Air Littoral: Another Look, Maximilian K. Bremer, Kelly A. Grieco 2021 US Army War College

The Air Littoral: Another Look, Maximilian K. Bremer, Kelly A. Grieco

The US Army War College Quarterly: Parameters

Assessing threats to the air littoral, the airspace between ground forces and high-end fighters and bombers, requires a paradigm change in American military thinking about verticality. This article explores the consequences of domain convergence, specifically for the Army and Air Force’s different concepts of control. It will assist US military and policy practitioners in conceptualizing the air littoral and in thinking more vertically about the air and land domains and the challenges of domain convergence.


Digital Commons powered by bepress