Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Business

Deploying Machine Learning For A Sustainable Future, Cary Coglianese May 2020

Deploying Machine Learning For A Sustainable Future, Cary Coglianese

All Faculty Scholarship

To meet the environmental challenges of a warming planet and an increasingly complex, high tech economy, government must become smarter about how it makes policies and deploys its limited resources. It specifically needs to build a robust capacity to analyze large volumes of environmental and economic data by using machine-learning algorithms to improve regulatory oversight, monitoring, and decision-making. Three challenges can be expected to drive the need for algorithmic environmental governance: more problems, less funding, and growing public demands. This paper explains why algorithmic governance will prove pivotal in meeting these challenges, but it also presents four likely obstacles that …


Rethinking Risk-Based Information Security, Herbert Mattord May 2014

Rethinking Risk-Based Information Security, Herbert Mattord

Herbert J. Mattord

The information security discipline has a common body of knowledge comprised of many facts, techniques, and ways for its practitioners to accomplish the objectives of securing the information assets of the companies by which they are employed. Sometimes these practitioners simply do things the way they have always been done. Perhaps some of the practices need to be reexamined. One that needs attention is the way that risk-based decision making is applied in places that it may not improve the outcomes of the problems being addressed.


End-User Computing Applications, Mary C. Hill, W. Alan Barnes Jul 2011

End-User Computing Applications, Mary C. Hill, W. Alan Barnes

Faculty and Research Publications

Businesses today rely on the work being done by staff using personal computers. The proliferation of personal computers has led to widespread implementation of end-user computing applications. As their name implies, end-user applications are designed, implemented, and controlled by users rather than by IT professionals. End-user applications can be risky for organizations, both with respect to management decision making and to financial reporting. For public companies, the risk involved in these applications has been increased by the requirements of the Sarbanes-Oxley Act of 2002, which call for management to document end-to-end financial operations and internal control structures. This article review …


Data Analysis And Its Impact On Predicting Schedule & Cost Risk, Steven M. Cross Mar 2006

Data Analysis And Its Impact On Predicting Schedule & Cost Risk, Steven M. Cross

Theses and Dissertations

Many databases rely on documents (research) of the past to input data to create a comprehensive database. The Selected Acquisition Report (SAR) is one such document. The SARs are pervasive documents that have undergone decades of scrutiny by Congress and watchdog organizations such as the Government Accountability Office. Since the SAR has undergone such massive evolutionary changes, creating an accurate acquisition database presents a daunting task for the analyst and researcher alike. This research concerns itself with one such database. From this prior research database, we look to fill in missing data. We first conduct a literature review to determine …