Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Business

System And Risk Analysis Of Cloud Manufacturing System, Trupti Narayan Rane Jan 2022

System And Risk Analysis Of Cloud Manufacturing System, Trupti Narayan Rane

Engineering Management & Systems Engineering Faculty Publications

The Cloud manufacturing(C-Mfg) system involves remote distributed manufacturing resources and capabilities collaborating as a single virtual entity. The system receives orders for custom products and provides manufacturing as a service to the end customers. The primary activities of the system, among others, are transaction control, resource allocation and monitoring, distributed manufacturing, quality control, and delivery of consignments to the customers. The actual manufacturing is done by a network of third-party partner manufacturers providing the services to end customers, helping them with cost reduction, shorter time-to-market, and enabling efficient collaboration between manufacturers in the CMfg network. This paper aims to deep …


Prioritizing Facilities Linked To Corporate Strategic Objectives Using A Fuzzy Model, Devin Depalmer, Steven J. Schuldt, Justin D. Delorit Jun 2021

Prioritizing Facilities Linked To Corporate Strategic Objectives Using A Fuzzy Model, Devin Depalmer, Steven J. Schuldt, Justin D. Delorit

Faculty Publications

Excerpt: Limited facilities operating and modernization budgets require organizations to carefully identify, prioritize and authorize projects to ensure allocated resources align with strategic objectives. Traditional facility prioritization methods using risk matrices can be improved to increase granularity in categorization and avoid mathematical error or human cognitive biases. These limitations restrict the utility of prioritizations and if erroneously used to select projects for funding, they can lead to wasted resources. This paper aims to propose a novel facility prioritization methodology that corrects these assessment design and implementation issues.


Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection And Machine Learning, Goksel Kucukkaya Apr 2021

Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection And Machine Learning, Goksel Kucukkaya

Engineering Management & Systems Engineering Theses & Dissertations

The cyber domain is a great business enabler providing many types of enterprises new opportunities such as scaling up services, obtaining customer insights, identifying end-user profiles, sharing data, and expanding to new communities. However, the cyber domain also comes with its own set of risks. Cybersecurity risk assessment helps enterprises explore these new opportunities and, at the same time, proportionately manage the risks by establishing cyber situational awareness and identifying potential consequences. Anomaly detection is a mechanism to enable situational awareness in the cyber domain. However, anomaly detection also requires one of the most extensive sets of data and features …