Open Access. Powered by Scholars. Published by Universities.®

Operations Research, Systems Engineering and Industrial Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering

Systemic Methodology For Cyber Offense And Defense, C. Ariel Pinto, Matthew Zurasky Jan 2020

Systemic Methodology For Cyber Offense And Defense, C. Ariel Pinto, Matthew Zurasky

Engineering Management & Systems Engineering Faculty Publications

This paper describes a systemic method towards standardization of a cyber weapon effectiveness and effectiveness prediction process to promote consistency and improve cyber weapon system evaluation accuracy – for both offensive and defensive postures. The approach included theoretical examination of existing effectiveness prediction processes for kinetic and directed energy weapons, complemented with technical and social aspects of cyber realm. The examination highlighted several paradigm-shifts needed to transition from purely kinetic-based processes and transition into the realm of combined kinetic and cyber weapons. Components of the new method for cyber weapons are cyber payload assessment, effects identification, and target assessment. The …


A Systems Theory Based Examination Of Failure In Acquisition System Reform, Charles B. Keating, Joseph M. Bradley, Polinpapilinho F. Katina, Craig Arndt Jan 2018

A Systems Theory Based Examination Of Failure In Acquisition System Reform, Charles B. Keating, Joseph M. Bradley, Polinpapilinho F. Katina, Craig Arndt

Engineering Management & Systems Engineering Faculty Publications

The defense acquisition system has been the source of intense scrutiny and calls for reform for over four decades. This research is to examine the contributions of Systems Theory to enhance prospects related to acquisition reform. Systems Theory offers a set of principles, laws, and concepts that explain the behavior of complex systems. Although the acquisition system and constituent programs have been critiqued and examined from multiple perspectives, they have never been the subject of exploration from Systems Theory. Recent advances in Systems Theory have identified 83 different potential system pathologies that can result in degraded system performance or outright …


Chapter 7: Human View, Holly A.H. Handley Jan 2018

Chapter 7: Human View, Holly A.H. Handley

Engineering Management & Systems Engineering Faculty Publications

No abstract provided.


Reducing Uncertainty In Technology Selection For Long Life Cycle Engineering Designs, Halil I. Ozdemir, C. Ariel Pinto, Resit Unal, Charles B. Keating, Colin Britcher, Sila Çetinkaya (Ed.), J. K. Ryan (Ed.) Jan 2015

Reducing Uncertainty In Technology Selection For Long Life Cycle Engineering Designs, Halil I. Ozdemir, C. Ariel Pinto, Resit Unal, Charles B. Keating, Colin Britcher, Sila Çetinkaya (Ed.), J. K. Ryan (Ed.)

Engineering Management & Systems Engineering Faculty Publications

The best capabilities are usually achieved by having the latest technologies in defense systems. However, including the new, usually immature, technologies in a system design does not always easily result in achieving the capabilities at the right level, at an affordable cost, and in a timely manner. Many programs have suffered from immature technologies as cost overruns, late or no deliveries, and poor performance levels. Another impact of technology selection appears as obsolescence after the deployment of systems, or even before the deployment of the system. As the technologies of a system become obsolete, the cost of maintaining the system …


Delayed-Bang Approach Towards More Sustainable Critical Infrastructure Risk Management, C. Ariel Pinto, Michael K. Mcshane, Abhishek S. Pathak Jan 2011

Delayed-Bang Approach Towards More Sustainable Critical Infrastructure Risk Management, C. Ariel Pinto, Michael K. Mcshane, Abhishek S. Pathak

Finance Faculty Publications

This article describes the Delayed Bang Approach for determining the value of risk management alternatives in critical infrastructure security. The discussion includes (1) the need for sustainable risk management (2) the importance of time valuation in evaluating competing loss prevention and loss reduction alternatives, (3) the convergence of deterministic engineering economics, survivability analysis, and probabilistic analysis, and (4) hypothetical examples of the Delayed-Bang Approach and significance towards more sustainable risk management.