Open Access. Powered by Scholars. Published by Universities.®

Operations Research, Systems Engineering and Industrial Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering

Information Management Principles Applied To The Ballistic Missile Defense System, John M. Koehler Ii Mar 2007

Information Management Principles Applied To The Ballistic Missile Defense System, John M. Koehler Ii

Theses and Dissertations

Information systems (IS) have evolved over the last 50 plus years from individual components with single functionality to grand architectures that integrate multiple individual business functions into global organizational enterprises. Similarly several military systems with the single mission of missile defense have evolved in service stovepipes, and are now being integrated into a national and global missile defense architecture. The Missile Defense Agency (MDA) is currently tasked with developing an integrated Ballistic Missile Defense System (BMDS) capable of defending against all ranges of ballistic missiles in all phases of flight in defense of the homeland, our deployed forces, and our …


Selecting Electricity Generation Sources In Remote Locations, Kelly E. Kwan Mar 2007

Selecting Electricity Generation Sources In Remote Locations, Kelly E. Kwan

Theses and Dissertations

The purpose of this research was to investigate the impact of using a decision analysis technique for the selection of an electrical generation system for remote locations. Specifically, this thesis sought to answer five research questions addressing the types of energy sources used in remote locations, the decision-making processes used to identify these sources, the types of constraints incorporated in such a process, other valued factors, and their level of importance in relation to each other. The research questions were answered through a comprehensive literature review and the 10-Step Value-Focused Thinking Process on a specific case study in the National …


Towards The Development Of A Defensive Cyber Damage And Mission Impact Methodology, Larry W. Fortson Jr. Mar 2007

Towards The Development Of A Defensive Cyber Damage And Mission Impact Methodology, Larry W. Fortson Jr.

Theses and Dissertations

The purpose of this research is to establish a conceptual methodological framework that will facilitate effective cyber damage and mission impact assessment and reporting following a cyber-based information incidents. Joint and service guidance requires mission impact reporting, but current efforts to implement such reporting have proven ineffective. This research seeks to understand the impediments existing in the current implementation and to propose an improved methodology. The research employed a hybrid historical analysis and case study methodology for data collection through extensive literature review, examination of existing case study research and interviews with Air Force members and civilian personnel employed as …


Recommendations For A Standardized Program Management Office (Pmo) Time Compliance Network Order (Tcno) Patching Process, Michael Czumak Iii Mar 2007

Recommendations For A Standardized Program Management Office (Pmo) Time Compliance Network Order (Tcno) Patching Process, Michael Czumak Iii

Theses and Dissertations

Network security is a paramount concern for organizations utilizing computer technology, and the Air Force is no exception. Network software vulnerability patching is a critical determinant of network security. The Air Force deploys these patches as Time Compliance Network Orders (TCNOs), which together with associated processes and enforced timelines ensure network compliance. While the majority of the network assets affected by this process are Air Force owned and operated, a large number are maintained by external entities known as Program Management Offices (PMOs). Although these externally controlled systems provide a service to the Air Force and reside on its network, …