Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Business

Lean Application: An Assessment Of 5s On Employee Attitudes And Productivity, Nickolaos Dimitrios Karvounis Dec 2021

Lean Application: An Assessment Of 5s On Employee Attitudes And Productivity, Nickolaos Dimitrios Karvounis

STEMPS Theses & Dissertations

This study examines the effect of the implementation of 5S on employee attitudes and productivity in an Asian based facility of a global manufacturing company. Utilizing an assessment of the 5S implementation in various areas of the facility and organizational performance data for each of those areas, a non-experimental, causal comparative approach is used to analyze the impact. The study concluded that statistically significant improvements from the implementation of 5S were found both in quality and product cost for this facility; however, the study also found statistical significance where the implementation of 5S led to a decrease in performance and …


Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection And Machine Learning, Goksel Kucukkaya Apr 2021

Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection And Machine Learning, Goksel Kucukkaya

Engineering Management & Systems Engineering Theses & Dissertations

The cyber domain is a great business enabler providing many types of enterprises new opportunities such as scaling up services, obtaining customer insights, identifying end-user profiles, sharing data, and expanding to new communities. However, the cyber domain also comes with its own set of risks. Cybersecurity risk assessment helps enterprises explore these new opportunities and, at the same time, proportionately manage the risks by establishing cyber situational awareness and identifying potential consequences. Anomaly detection is a mechanism to enable situational awareness in the cyber domain. However, anomaly detection also requires one of the most extensive sets of data and features …