Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (3)
- Physical Sciences and Mathematics (3)
- Artificial Intelligence and Robotics (2)
- Business Administration, Management, and Operations (2)
- Information Security (2)
-
- Cognition and Perception (1)
- Engineering (1)
- Entrepreneurial and Small Business Operations (1)
- Management Information Systems (1)
- Management Sciences and Quantitative Methods (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Psychology (1)
- Risk Analysis (1)
- Social and Behavioral Sciences (1)
- Systems Engineering (1)
- Institution
Articles 1 - 4 of 4
Full-Text Articles in Business
Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection And Machine Learning, Goksel Kucukkaya
Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection And Machine Learning, Goksel Kucukkaya
Engineering Management & Systems Engineering Theses & Dissertations
The cyber domain is a great business enabler providing many types of enterprises new opportunities such as scaling up services, obtaining customer insights, identifying end-user profiles, sharing data, and expanding to new communities. However, the cyber domain also comes with its own set of risks. Cybersecurity risk assessment helps enterprises explore these new opportunities and, at the same time, proportionately manage the risks by establishing cyber situational awareness and identifying potential consequences. Anomaly detection is a mechanism to enable situational awareness in the cyber domain. However, anomaly detection also requires one of the most extensive sets of data and features …
Return On Investment Of The Cftp Framework With And Without Risk Assessment, Anne Lim Lee
Return On Investment Of The Cftp Framework With And Without Risk Assessment, Anne Lim Lee
Walden Dissertations and Doctoral Studies
In recent years, numerous high tech companies have developed and used technology roadmaps when making their investment decisions. Jay Paap has proposed the Customer Focused Technology Planning (CFTP) framework to draw future technology roadmaps. However, the CFTP framework does not include risk assessment as a critical factor in decision making. The problem addressed in this quantitative study was that high tech companies are either losing money or getting a much smaller than expected return on investment when making technology investment decisions. The purpose of this research was to determine the relationship between returns on investment before and after adding risk …
Judging Dread: A Quantitative Investigation Of Affect, Psychometric Dread And Risk Consequence, Melvyn Griffiths
Judging Dread: A Quantitative Investigation Of Affect, Psychometric Dread And Risk Consequence, Melvyn Griffiths
Theses: Doctorates and Masters
Risk is generally understood as a product of the likelihood and consequence of an event. However, the way in which estimations of consequences are formed is unclear due to the complexities of human perception. In particular, the influence of Affect, defined as positive or negative qualities subjectively assigned to stimuli, may skew risk consequence judgements. Thus a clearer understanding of the role of Affect in risk consequence estimations has significant implications for risk management, risk communication and policy formulation.
In the Psychometric tradition of risk perception, Affect has become almost synonymous with the concept of Dread, despite Dread being measured …
Data Analysis And Its Impact On Predicting Schedule & Cost Risk, Steven M. Cross
Data Analysis And Its Impact On Predicting Schedule & Cost Risk, Steven M. Cross
Theses and Dissertations
Many databases rely on documents (research) of the past to input data to create a comprehensive database. The Selected Acquisition Report (SAR) is one such document. The SARs are pervasive documents that have undergone decades of scrutiny by Congress and watchdog organizations such as the Government Accountability Office. Since the SAR has undergone such massive evolutionary changes, creating an accurate acquisition database presents a daunting task for the analyst and researcher alike. This research concerns itself with one such database. From this prior research database, we look to fill in missing data. We first conduct a literature review to determine …