Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Accident analysis (1)
- Attitudes (1)
- Autonomous vehicles (1)
- Axioms and propositions (1)
- Behavior (1)
-
- Blockchain (1)
- Compliance (1)
- Compliance research (1)
- Computer security (1)
- Electronic mail (1)
- Engineering-- Industrial engineering (1)
- Evaluation capacity development (1)
- Human error analysis (1)
- Human factors (1)
- Human readiness levels (1)
- Human systems integration (1)
- Hypothesis testing (1)
- Information security (1)
- Maritime systems (1)
- Modeling (1)
- National evaluation systems (1)
- Norms (1)
- Organizations (1)
- Perceptions (1)
- Personal information (1)
- Phishing (1)
- Precursors (1)
- Risk assessment (1)
- SAE levels of automation (1)
- Simulation (1)
Articles 1 - 5 of 5
Full-Text Articles in Social and Behavioral Sciences
Exploring Blockchain Adoption Supply Chains: Opportunities And Challenges, Adrian V. Gheorghe, Omer F. Keskin, Farinaz Sabz Ali Pour
Exploring Blockchain Adoption Supply Chains: Opportunities And Challenges, Adrian V. Gheorghe, Omer F. Keskin, Farinaz Sabz Ali Pour
Engineering Management & Systems Engineering Faculty Publications
In modern supply chains, acquisition often occurs with the involvement of a network of organizations. The resilience, efficiency, and effectiveness of supply networks are crucial for the viability of acquisition. Disruptions in the supply chain require adequate communication infrastructure to ensure resilience. However, supply networks do not have a shared information technology infrastructure that ensures effective communication. Therefore decision-makers seek new methodologies for supply chain management resilience. Blockchain technology offers new decentralization and service delegation methods that can transform supply chains and result in a more flexible, efficient, and effective supply chain. This report presents a framework for the application …
Grounding Evaluation Capacity Development In Systems Theory, Sarah D. Klier, Raphael J. Nawrotzki, Nataly Salas-Rodríguez, Sven Harten, Charles B. Keating, Polinpapilinho F. Katina
Grounding Evaluation Capacity Development In Systems Theory, Sarah D. Klier, Raphael J. Nawrotzki, Nataly Salas-Rodríguez, Sven Harten, Charles B. Keating, Polinpapilinho F. Katina
Engineering Management & Systems Engineering Faculty Publications
While “systemic thinking” is popular in the context of capacity development and evaluation, there is currently a lack of understanding about the benefits to employing systems theory in evaluation capacity development. Systems theory provides a useful orientation to the work involved in complex systems (e.g. national evaluation systems). This article illustrates how evaluation capacity development practitioners can use systems theory as a conceptual tool to gain a better understanding of the functional aspects and interrelationships present within a given evaluation system. Specifically, the systems theory perspective can help elucidate the reasons for the success or failure of a given evaluation …
A Primer On The Human Readiness Level Scale (Ansi/Hfes 400-2021), Kelly Steelman, Holly Handley, Katie Plant (Ed.), Gesa Praetorius (Ed.)
A Primer On The Human Readiness Level Scale (Ansi/Hfes 400-2021), Kelly Steelman, Holly Handley, Katie Plant (Ed.), Gesa Praetorius (Ed.)
Engineering Management & Systems Engineering Faculty Publications
"The Human Readiness Level (HRL) Scale is a simple 9-level scale for evaluating, tracking, and communicating the readiness of a technology for safe and effective human use. It is modeled after the well-established Technology Readiness Level (TRL) framework that is used throughout the government and industry to communicate the maturity of a technology and to support decision making about technology acquisition. Here we (1) introduce the ANSI/HFES 400-2021 Standard that defines the HRL scale and (2) provide concrete examples of evaluation activities to support the application of HRLs in the development of automated driving systems."
Adapting The Human Factors Analysis And Classification System For Commercial Fishing Vessel Accidents, Peter Zohorsky, Holly Handley, Ronald Boring (Ed.)
Adapting The Human Factors Analysis And Classification System For Commercial Fishing Vessel Accidents, Peter Zohorsky, Holly Handley, Ronald Boring (Ed.)
Engineering Management & Systems Engineering Faculty Publications
The commercial fishing industry is frequently described as one of the most hazardous occupations in the United States. The objective, to maximize the catch, is routinely challenged by a variety of elements due to the environment, the vessel, the crew, and how they interact with each other. This study developed and evaluated a version of Wiegmann and Shappell’s (2003) Human Factors Analysis and Classification System (HFACS), specifically for commercial fishing industry vessels (HFACS-FV), using data from ten years of fatal fishing vessel accidents. For this study, the accident investigation information was converted into the HFACS-FV format by independent raters and …
Precursors Of Email Response To Cybersecurity Scenarios: Factor Exploration And Scale Development, Miguel A. Toro-Jarrin, Pilar Pazos-Lago, Miguel Padilla
Precursors Of Email Response To Cybersecurity Scenarios: Factor Exploration And Scale Development, Miguel A. Toro-Jarrin, Pilar Pazos-Lago, Miguel Padilla
Engineering Management & Systems Engineering Faculty Publications
In the last decade, information security research has further expanded to include human factors as key elements of the organization's cybersecurity infrastructure. Numerous factors from several theories have been explored to explain and predict the multitude of information security-related behaviors in organizations. Lately, there has been a call for the study of specific cybersecurity behaviors in contextualized scenarios that reflect specific and realistic situations of a potential cyber-attack. This paper focuses on precursors of email response in situations that can be the origin of cybersecurity incidents in organizations (i.e., phishing attacks, ransomware, etc.). This study explores participants' intentions to follow …