Open Access. Powered by Scholars. Published by Universities.®

Operations Research, Systems Engineering and Industrial Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering

Identifying Criteria To Predict Army Rifle Marksmanship Proficiency, Katlin Makina Anglin Sep 2018

Identifying Criteria To Predict Army Rifle Marksmanship Proficiency, Katlin Makina Anglin

Doctoral Dissertations and Master's Theses

The United States Army requires each Soldier to develop marksmanship proficiency in an effort to achieve combat readiness. Soldiers currently develop marksmanship proficiency through Basic Rifle Marksmanship (BRM) training, but significant skill deficiencies are apparent at the end of training. These skill deficiencies remain throughout training because instructors rarely assess Soldiers objectively before the final qualification, reducing the opportunity for instructors to diagnose skill deficiencies until it is too late. Therefore, the goal of the current research is to identify individual differences and sensor-based performance measures for inclusion in a formative assessment during BRM training. The results of the current …


Developing A Cyberterrorism Policy: Incorporating Individual Values, Osama Bassam J. Rabie Jan 2018

Developing A Cyberterrorism Policy: Incorporating Individual Values, Osama Bassam J. Rabie

Theses and Dissertations

Preventing cyberterrorism is becoming a necessity for individuals, organizations, and governments. However, current policies focus on technical and managerial aspects without asking for experts and non-experts values and preferences for preventing cyberterrorism. This study employs value focused thinking and public value forum to bare strategic measures and alternatives for complex policy decisions for preventing cyberterrorism. The strategic measures and alternatives are per socio-technical process.


An Epistemological Inquiry Into The Incorporation Of Emergency Management Concept In The Homeland Security With A Post-Disaster Security Centric Focus, Mehmet Secilmis Apr 2013

An Epistemological Inquiry Into The Incorporation Of Emergency Management Concept In The Homeland Security With A Post-Disaster Security Centric Focus, Mehmet Secilmis

Engineering Management & Systems Engineering Theses & Dissertations

The historical roots of the Emergency Management concept in the U.S. date back to 19th century. As disasters occurred, policies relating to disaster response have been developed, and many statuary provisions, including several Federal Disaster Relief Acts, conceptually established the framework of Emergency Management. In 1979, with the foundation of the Federal Emergency Management Agency (FEMA), disaster relief efforts were finally institutionalized, and the federal government acknowledged that Emergency Management included mitigation, preparedness, response and recovery activities as abbreviated 'MPRR.'

However, after 2000, the U.S. experienced two milestone events - the September 11 terrorist attacks in 2001 and Hurricane Katrina …


Risk Quadruplet: Integrating Assessments Of Threat, Vulnerability, Consequence, And Perception For Homeland Security And Homeland Defense, Kara Norman Hill Apr 2012

Risk Quadruplet: Integrating Assessments Of Threat, Vulnerability, Consequence, And Perception For Homeland Security And Homeland Defense, Kara Norman Hill

Engineering Management & Systems Engineering Theses & Dissertations

Risk for homeland security and homeland defense is often considered to be a function of threat, vulnerability, and consequence. But what is that function? And are we defining and measuring these terms consistently? Threat, vulnerability, and consequence assessments are conducted, often separately, and data from one assessment could be drastically different from that of another due to inconsistent definitions of terms and measurements, differing data collection methods, or varying data sources. It has also long been a challenge to integrate these three disparate assessments to establish an overall picture of risk to a given asset. Further, many agencies conduct these …


The Hybrid Counterinsurgency Strategy: System Dynamics Employed To Develop A Behavioral Model Of Joint Strategy, Ferdinand Maldonado Mar 2009

The Hybrid Counterinsurgency Strategy: System Dynamics Employed To Develop A Behavioral Model Of Joint Strategy, Ferdinand Maldonado

Theses and Dissertations

Since the recent focus on the Global War on Terror, both military and civilian theorists have begun to “relearn” the intricacies of counterinsurgency warfare. We face difficult challenges when confronting non-state actors that tend to attack in the time between conventional battles and the establishment of stable governments. This research compares and contrasts current counterinsurgency strategies (Hearts and Minds and Cost Benefit Theory) by applying System Dynamics to provide insight into the influences and emergent behavior patterns of counterinsurgency systems. The information gained from the development of the models and from their simulation behaviors is used to construct a System …


Planning And Assessing Stability Operations: A Proposed Value-Focused Thinking Approach, Gerald D. Fensterer Mar 2007

Planning And Assessing Stability Operations: A Proposed Value-Focused Thinking Approach, Gerald D. Fensterer

Theses and Dissertations

Stability operations are vital to establish peace in the aftermath of conflict. The United States is often called in for military support during conflict. The new American military paradigms include establishing peace through stability operations after a military conflict. Due to this new role, military decision makers face many difficulties in conducting successful stability operations. Compounding this problem is the limited number of resources pertaining to stability operations: experts, doctrine, knowledge, and technology. Two overarching challenges of stability operations facing decision makers are planning and prioritizing of stability operations and determining progress. This thesis applies a structured analytical approach to …


Modeling Network Centric Warfare (Ncw) With The System Effectiveness Analysis Simulation (Seas), Jason B. Honabarger Mar 2006

Modeling Network Centric Warfare (Ncw) With The System Effectiveness Analysis Simulation (Seas), Jason B. Honabarger

Theses and Dissertations

Significant technological advances over the past few decades have fueled the continual and rapid development of an information-based world. Network Centric Warfare (NCW) has become the buzzword of the young millennium within the Department of Defense (DoD) and is quickly becoming a popularly shared vision and rallying cry for force transformation among United States military leaders. An essential element in fully implementing this network-centric way of thinking is to develop useful measures to help gauge the effectiveness and efficiency of both our military networks and our strategic NCW doctrine. The goal of this research is first to provide a comprehensive …


Strategic Airlift En Route Analysis To Support The Global War On Terrorism Using A Value Focused Thinking Approach, Marykathryn W. Tharaldson Mar 2006

Strategic Airlift En Route Analysis To Support The Global War On Terrorism Using A Value Focused Thinking Approach, Marykathryn W. Tharaldson

Theses and Dissertations

The Global War on Terrorism (GWOT) has yielded new challenges to the United States' strategic airlift infrastructure. The network of en-route airfields that serve as refueling and maintenance stops were designed primarily to service relatively static Cold War requirements. However, the GWOT has resulted in the need for an infrastructure that is responsive to a highly dynamic environment. This research uses a "value focused" methodology to identify en-route airfield locations that simultaneously maximize cargo throughput capability while possessing a high degree of adaptability to volatile cargo delivery requirements.


A Methodology For Performing Effects-Based Assessments, Benjamin A. Thoele Mar 2006

A Methodology For Performing Effects-Based Assessments, Benjamin A. Thoele

Theses and Dissertations

In order to bring the doctrine of Effects-Based Operations (EBO) into a fully operational capability, Effects-Based Assessment (EBA) must provide relevant insight to the commander and his planning staff. Assessments of an effects-based plan and execution must include an assessment of the effects of a campaign on the enemy in addition to an assessment of the accomplishment of friendly actions taken to achieve the desired effects. Determining the effects of a campaign requires an analysis of the dynamics of the enemy systems. EBA must be able to recognize the states of the enemy's systems as the system states change over …


Modeling And Simulation Of The Military Intelligence Process, Carl R. Pawling Mar 2004

Modeling And Simulation Of The Military Intelligence Process, Carl R. Pawling

Theses and Dissertations

There is concern within U.S. space and intelligence organizations that the current Tasking, Processing, Exploitation, and Dissemination processes may be insufficient to support current and future Intelligence, Surveillance, and Reconnaissance systems. As part of a larger intelligence process, more detailed analysis becomes critical to determine what portions need to be improved. This analysis can be accomplished by simulation, which is appropriate due to the complexity of the process and the ability to compare variations in the process. We construct a high level model of a generalized military intelligence process based in part on the Intelligence Cycle outlined in Joint Publications. …


A Methodology For Evaluating Military Systems In A Counterproliferation Role, Stanley Stafira Jr. Mar 1995

A Methodology For Evaluating Military Systems In A Counterproliferation Role, Stanley Stafira Jr.

Theses and Dissertations

This thesis develops a methodology to evaluate how dissimilar military systems support the accomplishment of the United States? counterproliferation objectives. The overall scope is to develop a model of the counterproliferation decision process that enables systems to be evaluated against common criteria. By using decision analysis, an influence diagram model is developed which represents military activities in the counterproliferation process. The key questions which must be asked in evaluating counterproliferation systems are highlighted. An analysis of perfect intelligence, perfect defensive, and perfect offensive systems reveal that a perfect intelligence system provides the greatest potential to meet the United States' counterproliferation …