Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Operations Research, Systems Engineering and Industrial Engineering

2021

Risk assessment

Articles 1 - 2 of 2

Full-Text Articles in Business

Prioritizing Facilities Linked To Corporate Strategic Objectives Using A Fuzzy Model, Devin Depalmer, Steven J. Schuldt, Justin D. Delorit Jun 2021

Prioritizing Facilities Linked To Corporate Strategic Objectives Using A Fuzzy Model, Devin Depalmer, Steven J. Schuldt, Justin D. Delorit

Faculty Publications

Excerpt: Limited facilities operating and modernization budgets require organizations to carefully identify, prioritize and authorize projects to ensure allocated resources align with strategic objectives. Traditional facility prioritization methods using risk matrices can be improved to increase granularity in categorization and avoid mathematical error or human cognitive biases. These limitations restrict the utility of prioritizations and if erroneously used to select projects for funding, they can lead to wasted resources. This paper aims to propose a novel facility prioritization methodology that corrects these assessment design and implementation issues.


Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection And Machine Learning, Goksel Kucukkaya Apr 2021

Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection And Machine Learning, Goksel Kucukkaya

Engineering Management & Systems Engineering Theses & Dissertations

The cyber domain is a great business enabler providing many types of enterprises new opportunities such as scaling up services, obtaining customer insights, identifying end-user profiles, sharing data, and expanding to new communities. However, the cyber domain also comes with its own set of risks. Cybersecurity risk assessment helps enterprises explore these new opportunities and, at the same time, proportionately manage the risks by establishing cyber situational awareness and identifying potential consequences. Anomaly detection is a mechanism to enable situational awareness in the cyber domain. However, anomaly detection also requires one of the most extensive sets of data and features …