Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Social and Behavioral Sciences

Establishing Relationships Between Risk Management And Knowledge Transfer, Garrett S. Haltiwanger Jul 2012

Establishing Relationships Between Risk Management And Knowledge Transfer, Garrett S. Haltiwanger

Engineering Management & Systems Engineering Theses & Dissertations

Risk management (RM) and Knowledge management (KM) have mostly been treated as separate management philosophies. Risk management is a widely taught topic in academia and is practiced in industry. Knowledge management is being taught at increasingly more colleges and many companies are discovering a need for managing knowledge. This dissertation shows that some research has been conducted to apply the principles of knowledge management in establishing risk management plans. To a lesser extent there has been research conducted to apply the philosophies of risk management to identifying knowledge gaps and maintaining corporate knowledge. Both risk management and knowledge management are …


Towards Managing And Understanding The Risk Of Underwater Terrorism, Richard J. Gay Jul 2012

Towards Managing And Understanding The Risk Of Underwater Terrorism, Richard J. Gay

Engineering Management & Systems Engineering Theses & Dissertations

This dissertation proposes a methodology to manage and understand the risk of underwater terrorism to critical infrastructures utilizing the parameters of the risk equation. Current methods frequently rely on statistical methods, which suffer from a lack of appropriate historical data to produce distributions and do not integrate epistemic uncertainty. Other methods rely on locating subject matter experts who can provide judgment and then undertaking an associated validation of these judgments.

Using experimentation, data from unclassified successful, or near successful, underwater attacks are analyzed and instantiated as a network graph with the key characteristics of the risk of terrorism represented as …


Agile Knowledge Management; A Review, Reconceptualization, And Extension To Military Applications, Dogan Ozturk Apr 2012

Agile Knowledge Management; A Review, Reconceptualization, And Extension To Military Applications, Dogan Ozturk

Engineering Management & Systems Engineering Theses & Dissertations

The purpose of this research is to explore the conceptual background of agility in knowledge management, re-conceptualize it and extend it to military applications with a special focus on Counterinsurgency (COIN).

An initial qualitative exploration of agility in knowledge management was performed. Three different concepts and their interrelationships were analyzed: (1) knowledge management, (2) agility in operations, and (3) military organizations in the COIN environment. Findings from this initial qualitative analysis were used to inductively redefine, re-conceptualize and extend the concept of Agile Knowledge Management (AKM), as well as, to compare and adapt the AKM concept to the military environment …


Evaluating Network Analysis And Agent Based Modeling For Investigating The Stability Of Commercial Air Carrier Schedules, Sheila Ruth Conway Apr 2012

Evaluating Network Analysis And Agent Based Modeling For Investigating The Stability Of Commercial Air Carrier Schedules, Sheila Ruth Conway

Engineering Management & Systems Engineering Theses & Dissertations

For a number of years, the United States Federal Government has been formulating the Next Generation Air Transportation System plans for National Airspace System improvement. These improvements attempt to address air transportation holistically, but often address individual improvements in one arena such as ground or in-flight equipment.

In fact, air transportation system designers have had only limited success using traditional Operations Research and parametric modeling approaches in their analyses of innovative operations. They need a systemic methodology for modeling of safety-critical infrastructure that is comprehensive, objective, and sufficiently concrete, yet simple enough to be deployed with reasonable investment. The methodology …


An Investigation Into The Relationship Between An Engineering Manager's Purpose-Seeking Beliefs And Behaviors And The Engineering Manager's Perception Of Employee Creativity, Initiative And Purpose-Seeking Behavior, Charles Burton Daniels Apr 2012

An Investigation Into The Relationship Between An Engineering Manager's Purpose-Seeking Beliefs And Behaviors And The Engineering Manager's Perception Of Employee Creativity, Initiative And Purpose-Seeking Behavior, Charles Burton Daniels

Engineering Management & Systems Engineering Theses & Dissertations

Organizations have placed an overwhelming emphasis on extrinsic motivation of its workforce, normally in the form of financial incentives, in an attempt to assure individual and organizational high performance. While a significant level of financial resources is expended in this attempt to predict and influence employee behavior, no objective evidence exists of a favorable return of investment. In fact, the primary impact of most extrinsic motivation might actually be demotivation – the opposite of the intended use.

In this research the prevailing literature was examined and a conclusion about the power of both extrinsic and intrinsic motivation was synthesized to …


An Analysis Of Factors Affecting The Effective Use Of Knowledge Management In Counter Improvised Explosive Device (C-Ied) Operations, Umit Gencer Apr 2012

An Analysis Of Factors Affecting The Effective Use Of Knowledge Management In Counter Improvised Explosive Device (C-Ied) Operations, Umit Gencer

Engineering Management & Systems Engineering Theses & Dissertations

This dissertation investigates factors that influence effective use of Knowledge Management (KM) in Counter Improvised Explosive Device (C-IED) operations in the military.

The study suggests that effective KM program is determined by the interaction of three organizational capabilities: knowledge infrastructure, knowledge process, and leadership orientation.

A self-administrated survey was conducted on 300 NATO staff officers who have served in C-IED environments. A structural equation modeling technique was used to test a set of hypotheses using 118 completed responses collected from the survey.

The results suggest that out of the 11 constructs within the model; two are rated as 'attribute needs …


Risk Quadruplet: Integrating Assessments Of Threat, Vulnerability, Consequence, And Perception For Homeland Security And Homeland Defense, Kara Norman Hill Apr 2012

Risk Quadruplet: Integrating Assessments Of Threat, Vulnerability, Consequence, And Perception For Homeland Security And Homeland Defense, Kara Norman Hill

Engineering Management & Systems Engineering Theses & Dissertations

Risk for homeland security and homeland defense is often considered to be a function of threat, vulnerability, and consequence. But what is that function? And are we defining and measuring these terms consistently? Threat, vulnerability, and consequence assessments are conducted, often separately, and data from one assessment could be drastically different from that of another due to inconsistent definitions of terms and measurements, differing data collection methods, or varying data sources. It has also long been a challenge to integrate these three disparate assessments to establish an overall picture of risk to a given asset. Further, many agencies conduct these …