Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Dayton (151)
- Selected Works (23)
- Old Dominion University (11)
- California State University, San Bernardino (8)
- Embry-Riddle Aeronautical University (8)
-
- Walden University (6)
- SelectedWorks (5)
- University of Colorado Law School (5)
- University of Tennessee, Knoxville (4)
- Santa Clara University (3)
- Technological University Dublin (3)
- University of Wisconsin Milwaukee (3)
- Portland State University (2)
- Southwestern Oklahoma State University (2)
- The University of San Francisco (2)
- University of Arkansas, Fayetteville (2)
- University of Kentucky (2)
- University of Massachusetts Amherst (2)
- University of Pennsylvania Carey Law School (2)
- University of South Florida (2)
- Wayne State University (2)
- World Maritime University (2)
- Air Force Institute of Technology (1)
- Bowling Green State University (1)
- Bryant University (1)
- California Polytechnic State University, San Luis Obispo (1)
- Cedarville University (1)
- College of Saint Benedict and Saint John's University (1)
- Florida International University (1)
- Illinois State University (1)
- Keyword
-
- Stander Symposium project (151)
- School of Education and Health Sciences (27)
- Student affairs (25)
- California (5)
- Simulation (5)
-
- Sustainability (5)
- Water law (5)
- Water supply (5)
- Editor (4)
- Table (4)
- Uncertainty (4)
- Water resource management (4)
- Water resources management (4)
- Auction (3)
- Aviation (3)
- Climate change (3)
- Colorado (3)
- Contents (3)
- Cyber Security (3)
- Cyber security (3)
- Drought (3)
- Italian Transport and Logistics Analysis (3)
- Management (3)
- Market-based resource allocation (3)
- Periodicals. Universities and colleges (3)
- Robustness (3)
- Santa Clara (3)
- Santa Clara University (3)
- Scheduling (3)
- Technology (3)
- Publication
-
- Stander Symposium Projects (151)
- Journal of International Technology and Information Management (8)
- Walden Dissertations and Doctoral Studies (6)
- Engineering Management & Systems Engineering Faculty Publications (5)
- Innovations in Managing Western Water: New Approaches for Balancing Environmental, Social and Economic Outcomes (Martz Summer Conference, June 11-12) (5)
-
- Maurice Dawson (5)
- Theses and Dissertations (5)
- Engineering Management & Systems Engineering Theses & Dissertations (4)
- International Journal of Nuclear Security (4)
- Aviation / Aeronautics / Aerospace International Research Conference (3)
- Dr. Tamilla Curtis (3)
- SAJJAD KHAKSARI (3)
- Santa Clara Magazine (3)
- All Faculty Scholarship (2)
- Doctoral Dissertations (2)
- Graduate Theses and Dissertations (2)
- International Journal of Aviation, Aeronautics, and Aerospace (2)
- Shih-Fen Cheng (2)
- Theses and Dissertations--Mechanical Engineering (2)
- Aaron D. Clevenger (1)
- Abhijith Anand (1)
- Articles (1)
- Aviation Faculty Publications (1)
- Biology Faculty Publications (1)
- Brad J. Kallenberg (1)
- Business Analytics and Information Systems (1)
- Business Review (1)
- Business and Information Technology Faculty Research & Creative Works (1)
- Celebrating Scholarship & Creativity Day (2011-2017) (1)
- Conference papers (1)
- Publication Type
- File Type
Articles 271 - 284 of 284
Full-Text Articles in Business
Safety Culture Monitoring: A Management Approach For Assessing Nuclear Safety Culture Health Performance Utilizing Multiple-Criteria Decision Analysis, James Harold Warren Jr.
Safety Culture Monitoring: A Management Approach For Assessing Nuclear Safety Culture Health Performance Utilizing Multiple-Criteria Decision Analysis, James Harold Warren Jr.
Engineering Management & Systems Engineering Theses & Dissertations
Nuclear power plants are among the most technologically complex of all energy facilities. This complexity reflects the precision needed in design, maintenance and operations to harness the energy of the atom safely, reliably and economically. Nuclear energy thus requires consistent, high levels of organizational performance by the highly skilled professionals who operate and maintain nuclear power plants (Nuclear Energy Institute [NEI], 2014, p. 1).
A key element for achieving consistent, high levels of performance in a nuclear organization is its safety culture. Nuclear safety culture is for an organization what character and personality is for an individual: a feature that …
A Market-Oriented Analysis Of The 'Terminating Access Monopoly' Concept, Jonathan E. Nuechterlein, Christopher S. Yoo
A Market-Oriented Analysis Of The 'Terminating Access Monopoly' Concept, Jonathan E. Nuechterlein, Christopher S. Yoo
All Faculty Scholarship
Policymakers have long invoked the concept of a “terminating access monopoly” to inform communications policy. Roughly speaking, the concept holds that a consumer-facing network provider, no matter how small or how subject to retail competition, generally possesses monopoly power vis-à-vis third-party senders of communications traffic to its customers. Regulators and advocates have routinely cited that concern to justify regulatory intervention in a variety of contexts where the regulated party may or may not have possessed market power in any relevant retail market.
Despite the centrality of the terminating access monopoly to modern communications policy, there is surprisingly little academic literature …
Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo
Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo
All Faculty Scholarship
Many observers attribute the Internet’s success to two principles: Moore’s Law and Metcalfe’s Law. These precepts are often cited to support claims that larger networks are inevitably more valuable and that costs in a digital environment always decrease. This Article offers both a systematic description of both laws and then challenges the conventional wisdom by exploring their conceptual limitations. It also explores how alternative mechanisms, such as gateways and competition, can permit the realization benefits typically attributed to Moore’s Law and Metcalfe’s Law without requiring increases in network size.
Unknown Exception Handling Tool Using Humans As Agents, Mwaka Mahanga
Unknown Exception Handling Tool Using Humans As Agents, Mwaka Mahanga
UNF Graduate Theses and Dissertations
In a typical workflow process, exceptions are the norm. Exceptions are defined as deviations from the normal sequence of activities and events. Exceptions can be divided into two broad categories: known exceptions (i.e., expected and predefined deviations) and unknown exceptions (i.e., unexpected and undefined deviations). Business Process Execution Language (BPEL) has become the de facto standard for executing business workflows with the use of web services. BPEL includes exception handling methods that are sufficient for known exception scenarios. Depending on the exception and the specifics of the exception handling tools, processes may either halt or move to completion. Instances of …
Life Cycle Assessment (Lca) Of Tourism Activities, Kayla Santello
Life Cycle Assessment (Lca) Of Tourism Activities, Kayla Santello
Honors Theses and Capstones
Abstract— Tourism, like other developed industries is a commerce that requires energy inputs and yields outputs with significant effects on the environment. However a comprehensive study examining the life cycle impact associated with each tourism component including transportation, accommodation, food services, and recreation is still lacking. Therefore a search of previous tourism life cycle studies was carried out and ten studies were further investigated. Indicators, assessment approaches, and system boundaries of these previous studies were assessed. Then the outcomes were normalized and compared in order to obtain ranges for the four components of tourism. It was found that energy intensity …
A Simulation-Based Approach To Risk Assessment And Mitigation In Supply Chain Networks, Mamadou Seck, Ghaith Rabadi, Christian Koestler
A Simulation-Based Approach To Risk Assessment And Mitigation In Supply Chain Networks, Mamadou Seck, Ghaith Rabadi, Christian Koestler
Engineering Management & Systems Engineering Faculty Publications
We present in this paper a simulation-based approach to evaluate the risk associated with supply chain disruptions caused by failures in some supply chains nodes and measure the impact of such disruptions on supply chain key performance measures (KPIs) of interest. The proposed framework enables analysts and managers to repeatedly assess the risk to their supply chains based on various simulated scenarios and identify the most critical nodes whose disruption will have the highest impact on the KPIs of interest. As a result, companies can focus on the most critical supply chain assets and develop targeted mitigation plans that minimize …
Analyzing Stakeholders Using Fuzzy Cognitive Mapping, Patrick T. Hester
Analyzing Stakeholders Using Fuzzy Cognitive Mapping, Patrick T. Hester
Engineering Management & Systems Engineering Faculty Publications
Stakeholder analysis was first explored as a methodology to assist business leaders with their strategic management functions. Stakeholder analysis has since expanded beyond the corporate arena. Stakeholders are a vital element in all complex systems problems; they are the customers, users, clients, suppliers, employees, regulators, and team members of a system. They fund a system, design it, build it, operate it, maintain it, and dispose of it. Each stakeholder contributes their own value-added perspective, as described by the systems principle known as complementarity. While many approaches exist for classifying and determining their attitudes, these approaches stop short of evaluating stakeholders …
Air Service Liberalization: China And Its Top Destinations, Tamilla Curtis, John Ledgerwood, Blaise Waguespack
Air Service Liberalization: China And Its Top Destinations, Tamilla Curtis, John Ledgerwood, Blaise Waguespack
Dr. Tamilla Curtis
Project Management Decisions With Uncertain Targets, Jeffrey Keisler, Robert Bordley
Project Management Decisions With Uncertain Targets, Jeffrey Keisler, Robert Bordley
Jeffrey Keisler
Project management decision rules presume that fixed and inflexible targets have been defined for the project. If a project's slack is defined as the difference between actual project performance and these targets, then these decision rules can be characterized as maximizing the probability that slack is non-negative (i.e., maximizing the probability of meeting the targets). These rules rely on z-scores to compare uncertain performance to target levels. Following these decision rules will not always suffice for the project manager to act consistently with customer preferences. In particular, actual requirements may be uncertain or subject to change, and customers may have …
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Maurice Dawson
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …
Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim
Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim
Maurice Dawson
As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other software-based design methodologies. These methodologies include looking at software-based alternatives that could save a significant amount of money by reducing the amount of proprietary software. This chapter explores the use and integration of Open Source Software (OSS) in software-driven projects to include in enterprise organizations. Additionally, the legalities of the GNU General Public License (GPL), Lesser General Public License (LGPL), Berkeley Software Distribution (BSD), and Creative Commons are explored with the integration of these OSS solutions into organizations. …
A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson
A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson
Maurice Dawson
Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including utilities, regulators, energy markets, government entities, and even those that wish to exploit the cyber infrastructure. Cyber warfare is quickly becoming the method of warfare and the tool of military strategists. Additionally, it is has become a tool for governments to aid or exploit for their own personal benefits. For cyber terrorists there has been an overwhelmingly abundance of new tools and technologies available that have allowed criminal acts to occur virtually anywhere in the …
Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson
Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson
Maurice Dawson
Cyber security has become a matter of national, international, economic, and societal importance that affects multiple nations (Walker, 2012). Since the 1990s users have exploited vulnerabilities to gain access to networks for malicious purposes. In recent years the number of attacks on U.S. networks has continued to grow at an exponential rate. This includes malicious embedded code, exploitation of backdoors, and more. These attacks can be initiated from anywhere in the world from behind a computer with a masked Internet Protocol (IP) address. This type of warfare, cyber warfare, changes the landscape of war itself (Beidleman, 2009). This type of …
Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim
Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim
Maurice Dawson
As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other software-based design methodologies. These methodologies include looking at software-based alternatives that could save a significant amount of money by reducing the amount of proprietary software. This chapter explores the use and integration of Open Source Software (OSS) in software-driven projects to include in enterprise organizations. Additionally, the legalities of the GNU General Public License (GPL), Lesser General Public License (LGPL), Berkeley Software Distribution (BSD), and Creative Commons are explored with the integration of these OSS solutions into organizations. …