Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Engineering

Measuring Risks Of Interdependencies In Enterprise Systems: An Application To Ghana’S Salt Enterprise, Yaw Mensah Aug 2019

Measuring Risks Of Interdependencies In Enterprise Systems: An Application To Ghana’S Salt Enterprise, Yaw Mensah

Engineering Management & Systems Engineering Theses & Dissertations

This dissertation describes the use of Functional Dependency Network Analysis (FDNA) for modeling risks resulting from dependencies among elements of enterprise systems with application to salt processing enterprise in Ghana. FDNA was developed to model dependencies among members of enterprise systems by highlighting two dimensions of dependency: strength and criticality. Nonetheless, the concepts and analytics for these two dimensions of dependencies needed further development and generalization in the context of project management and systems development in developing countries.

Managing risks within the interdependency in enterprise systems through integration will help improve global economic growth. Coherent theory for enterprise integration must …


A Study To Determine How To Measure The Laser Safety Climate At Academic Institutions, John Settlemyer Jul 2019

A Study To Determine How To Measure The Laser Safety Climate At Academic Institutions, John Settlemyer

OTS Master's Level Projects & Papers

Statement of Problem

The purpose of this study was to determine if the laser safety climate can be measured at academic institutions and what factors would provide valid measures of the laser safety climate at academic institutions. Specifically, the study attempted to answer the following questions:

Research Questions

RQ1. Can laser safety climate be measured at academic institutions using a climate survey instrument?

RQ2. What factors should be measured by a laser safety climate instrument?

RQ3. What measures would provide actionable data for prescriptive intervention by laser safety professionals at academic institutions? (p. 4)


Difference Between Algorithmic Processing And The Process Of Lifeworld (Lebenswelt), Domenico Schneider May 2019

Difference Between Algorithmic Processing And The Process Of Lifeworld (Lebenswelt), Domenico Schneider

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

The following article compares the temporality of the life-world with the digital processing. The temporality of the life-world is determined to be stretched and spontaneous. The temporality of the digital is given by discrete step-by-step points of time. Most ethical issues can be traced back to a mismatch of these two ways of processing. This creates a foundation for the ethics of the digital processing. Methodologically, phenomenological considerations are merged with media-philosophical considerations in the article.


Responding To Some Challenges Posed By The Re-Identification Of Anonymized Personal Data, Herman T. Tavani, Frances S. Grodzinsky May 2019

Responding To Some Challenges Posed By The Re-Identification Of Anonymized Personal Data, Herman T. Tavani, Frances S. Grodzinsky

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

In this paper, we examine a cluster of ethical controversies generated by the re-identification of anonymized personal data in the context of big data analytics, with particular attention to the implications for personal privacy. Our paper is organized into two main parts. Part One examines some ethical problems involving re-identification of personally identifiable information (PII) in large data sets. Part Two begins with a brief description of Moor and Weckert’s Dynamic Ethics (DE) and Nissenbaum’s Contextual Integrity (CI) Frameworks. We then investigate whether these frameworks, used together, can provide us with a more robust scheme for analyzing privacy concerns that …


A Ulysses Pact With Artificial Systems. How To Deliberately Change The Objective Spirit With Cultured Ai, Bruno Gransche May 2019

A Ulysses Pact With Artificial Systems. How To Deliberately Change The Objective Spirit With Cultured Ai, Bruno Gransche

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

The article introduces a concept of cultured technology, i.e. intelligent systems capable of interacting with humans and showing (or simulating) manners, of following customs and of socio-sensitive considerations. Such technologies might, when deployed on a large scale, influence and change the realm of human customs, traditions, standards of acceptable behavior, etc. This realm is known as the "objective spirit" (Hegel), which usually is thought of as being historically changing but not subject to deliberate human design. The article investigates the question of whether the purposeful design of interactive technologies (as cultured technologies) could enable us to shape modes of …


A Metacognitive Approach To Trust And A Case Study: Artificial Agency, Ioan Muntean May 2019

A Metacognitive Approach To Trust And A Case Study: Artificial Agency, Ioan Muntean

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

Trust is defined as a belief of a human H (`the trustor') about the ability of an agent A (the `trustee') to perform future action(s). We adopt here dispositionalism and internalism about trust: H trusts A iff A has some internal dispositions as competences. The dispositional competences of A are high-level metacognitive requirements, in the line of a naturalized virtue epistemology. (Sosa, Carter) We advance a Bayesian model of two (i) confidence in the decision and (ii) model uncertainty. To trust A, H demands A to be self-assertive about confidence and able to self-correct its own models. In the Bayesian …


Keeping Anonymity At The Consumer Behavior On The Internet: Proof Of Sacrifice, Sachio Horie May 2019

Keeping Anonymity At The Consumer Behavior On The Internet: Proof Of Sacrifice, Sachio Horie

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

The evolution of the Internet and AI technology has made it possible for the government and the businesses to keep track of their personal lives. GAFA continues to collect information unintended by the individuals. It is a threat that our privacy is violated in this way. In order to solute such problems, it is important to consider a mechanism that enables us to be peaceful lives while protecting privacy in the Internet society.

This paper focuses on the consumption behavior on the Internet and addresses anonymity. We consider some network protocols that enable sustainable consensus by combining anonymity methods such …


Legal And Technical Issues For Text And Data Mining In Greece, Maria Kanellopoulou - Botti, Marinos Papadopoulos, Christos Zampakolas, Paraskevi Ganatsiou May 2019

Legal And Technical Issues For Text And Data Mining In Greece, Maria Kanellopoulou - Botti, Marinos Papadopoulos, Christos Zampakolas, Paraskevi Ganatsiou

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

Web harvesting and archiving pertains to the processes of collecting from the web and archiving of works that reside on the Web. Web harvesting and archiving is one of the most attractive applications for libraries which plan ahead for their future operation. When works retrieved from the Web are turned into archived and documented material to be found in a library, the amount of works that can be found in said library can be far greater than the number of works harvested from the Web. The proposed participation in the 2019 CEPE Conference aims at presenting certain issues related to …


On The Responsibility For Uses Of Downstream Software, Marty J. Wolf, Keith W. Miller, Frances S. Grodzinsky May 2019

On The Responsibility For Uses Of Downstream Software, Marty J. Wolf, Keith W. Miller, Frances S. Grodzinsky

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

In this paper we explore an issue that is different from whether developers are responsible for the direct impact of the software they write. We examine, instead, in what ways, and to what degree, developers are responsible for the way their software is used “downstream.” We review some key scholarship analyzing responsibility in computing ethics, including some recent work by Floridi. We use an adaptation of a mechanism developed by Floridi to argue that there are features of software that can be used as guides to better distinguish situations where a software developer might share in responsibility for the software’s …


Quantifying Impact Of Cyber Actions On Missions Or Business Processes: A Multilayer Propagative Approach, Unal Tatar Apr 2019

Quantifying Impact Of Cyber Actions On Missions Or Business Processes: A Multilayer Propagative Approach, Unal Tatar

Engineering Management & Systems Engineering Theses & Dissertations

Ensuring the security of cyberspace is one of the most significant challenges of the modern world because of its complexity. As the cyber environment is getting more integrated with the real world, the direct impact of cybersecurity problems on actual business frequently occur. Therefore, operational and strategic decision makers in particular need to understand the cyber environment and its potential impact on business. Cyber risk has become a top agenda item for businesses all over the world and is listed as one of the most serious global risks with significant financial implications for businesses.

Risk analysis is one of the …


An Investigation Of General Criteria For Assessing Space Flight Systems Of Diverse Mission Concept Designs, Cindy L. Daniels Apr 2019

An Investigation Of General Criteria For Assessing Space Flight Systems Of Diverse Mission Concept Designs, Cindy L. Daniels

Engineering Management & Systems Engineering Theses & Dissertations

The purpose of this research is to investigate the general criteria for assessing the technical implementation risk factors of proposed space science missions at the mission concept stage. According to the National Aeronautics and Space Administration (NASA) Space Flight Program and Project Management Handbook (NASA, 2012), the mission concept review objectives are “To evaluate the feasibility of the proposed mission concept(s) and its fulfillment of the program's needs and objectives. To determine whether the maturity of the concept and associated planning are sufficient to begin Phase A” (p.33). Experts previously defined two technical risk factors, to assess aspects of the …