Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

2015

Engineering

Institution
Keyword
Publication
Publication Type
File Type

Articles 271 - 284 of 284

Full-Text Articles in Business

Safety Culture Monitoring: A Management Approach For Assessing Nuclear Safety Culture Health Performance Utilizing Multiple-Criteria Decision Analysis, James Harold Warren Jr. Jan 2015

Safety Culture Monitoring: A Management Approach For Assessing Nuclear Safety Culture Health Performance Utilizing Multiple-Criteria Decision Analysis, James Harold Warren Jr.

Engineering Management & Systems Engineering Theses & Dissertations

Nuclear power plants are among the most technologically complex of all energy facilities. This complexity reflects the precision needed in design, maintenance and operations to harness the energy of the atom safely, reliably and economically. Nuclear energy thus requires consistent, high levels of organizational performance by the highly skilled professionals who operate and maintain nuclear power plants (Nuclear Energy Institute [NEI], 2014, p. 1).

A key element for achieving consistent, high levels of performance in a nuclear organization is its safety culture. Nuclear safety culture is for an organization what character and personality is for an individual: a feature that …


A Market-Oriented Analysis Of The 'Terminating Access Monopoly' Concept, Jonathan E. Nuechterlein, Christopher S. Yoo Jan 2015

A Market-Oriented Analysis Of The 'Terminating Access Monopoly' Concept, Jonathan E. Nuechterlein, Christopher S. Yoo

All Faculty Scholarship

Policymakers have long invoked the concept of a “terminating access monopoly” to inform communications policy. Roughly speaking, the concept holds that a consumer-facing network provider, no matter how small or how subject to retail competition, generally possesses monopoly power vis-à-vis third-party senders of communications traffic to its customers. Regulators and advocates have routinely cited that concern to justify regulatory intervention in a variety of contexts where the regulated party may or may not have possessed market power in any relevant retail market.

Despite the centrality of the terminating access monopoly to modern communications policy, there is surprisingly little academic literature …


Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo Jan 2015

Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo

All Faculty Scholarship

Many observers attribute the Internet’s success to two principles: Moore’s Law and Metcalfe’s Law. These precepts are often cited to support claims that larger networks are inevitably more valuable and that costs in a digital environment always decrease. This Article offers both a systematic description of both laws and then challenges the conventional wisdom by exploring their conceptual limitations. It also explores how alternative mechanisms, such as gateways and competition, can permit the realization benefits typically attributed to Moore’s Law and Metcalfe’s Law without requiring increases in network size.


Unknown Exception Handling Tool Using Humans As Agents, Mwaka Mahanga Jan 2015

Unknown Exception Handling Tool Using Humans As Agents, Mwaka Mahanga

UNF Graduate Theses and Dissertations

In a typical workflow process, exceptions are the norm. Exceptions are defined as deviations from the normal sequence of activities and events. Exceptions can be divided into two broad categories: known exceptions (i.e., expected and predefined deviations) and unknown exceptions (i.e., unexpected and undefined deviations). Business Process Execution Language (BPEL) has become the de facto standard for executing business workflows with the use of web services. BPEL includes exception handling methods that are sufficient for known exception scenarios. Depending on the exception and the specifics of the exception handling tools, processes may either halt or move to completion. Instances of …


Life Cycle Assessment (Lca) Of Tourism Activities, Kayla Santello Jan 2015

Life Cycle Assessment (Lca) Of Tourism Activities, Kayla Santello

Honors Theses and Capstones

Abstract— Tourism, like other developed industries is a commerce that requires energy inputs and yields outputs with significant effects on the environment. However a comprehensive study examining the life cycle impact associated with each tourism component including transportation, accommodation, food services, and recreation is still lacking. Therefore a search of previous tourism life cycle studies was carried out and ten studies were further investigated. Indicators, assessment approaches, and system boundaries of these previous studies were assessed. Then the outcomes were normalized and compared in order to obtain ranges for the four components of tourism. It was found that energy intensity …


A Simulation-Based Approach To Risk Assessment And Mitigation In Supply Chain Networks, Mamadou Seck, Ghaith Rabadi, Christian Koestler Jan 2015

A Simulation-Based Approach To Risk Assessment And Mitigation In Supply Chain Networks, Mamadou Seck, Ghaith Rabadi, Christian Koestler

Engineering Management & Systems Engineering Faculty Publications

We present in this paper a simulation-based approach to evaluate the risk associated with supply chain disruptions caused by failures in some supply chains nodes and measure the impact of such disruptions on supply chain key performance measures (KPIs) of interest. The proposed framework enables analysts and managers to repeatedly assess the risk to their supply chains based on various simulated scenarios and identify the most critical nodes whose disruption will have the highest impact on the KPIs of interest. As a result, companies can focus on the most critical supply chain assets and develop targeted mitigation plans that minimize …


Analyzing Stakeholders Using Fuzzy Cognitive Mapping, Patrick T. Hester Jan 2015

Analyzing Stakeholders Using Fuzzy Cognitive Mapping, Patrick T. Hester

Engineering Management & Systems Engineering Faculty Publications

Stakeholder analysis was first explored as a methodology to assist business leaders with their strategic management functions. Stakeholder analysis has since expanded beyond the corporate arena. Stakeholders are a vital element in all complex systems problems; they are the customers, users, clients, suppliers, employees, regulators, and team members of a system. They fund a system, design it, build it, operate it, maintain it, and dispose of it. Each stakeholder contributes their own value-added perspective, as described by the systems principle known as complementarity. While many approaches exist for classifying and determining their attitudes, these approaches stop short of evaluating stakeholders …


Air Service Liberalization: China And Its Top Destinations, Tamilla Curtis, John Ledgerwood, Blaise Waguespack Dec 2014

Air Service Liberalization: China And Its Top Destinations, Tamilla Curtis, John Ledgerwood, Blaise Waguespack

Dr. Tamilla Curtis

Since the early days of aviation, different countries have been concerned with the rights of the air carriers. The Convention on International Civil Aviation, or the Chicago Convention, was signed by 52 countries in 1944 to promote the future development of international civil aviation, co-operation and the peace between nations.  It required governments to negotiate air transport key areas including routes, capacity, and pricing.  The purpose of this research is to present the air service liberalization on the example of China and its top destinations. The top destinations were selected based on the outbound passenger traffic of Chinese nationals. A …


Project Management Decisions With Uncertain Targets, Jeffrey Keisler, Robert Bordley Dec 2014

Project Management Decisions With Uncertain Targets, Jeffrey Keisler, Robert Bordley

Jeffrey Keisler

Project management decision rules presume that fixed and inflexible targets have been defined for the project. If a project's slack is defined as the difference between actual project performance and these targets, then these decision rules can be characterized as maximizing the probability that slack is non-negative (i.e., maximizing the probability of meeting the targets). These rules rely on z-scores to compare uncertain performance to target levels. Following these decision rules will not always suffice for the project manager to act consistently with customer preferences. In particular, actual requirements may be uncertain or subject to change, and customers may have …


Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar Dec 2014

Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar

Maurice Dawson

Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …


Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim Dec 2014

Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim

Maurice Dawson

As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other software-based design methodologies. These methodologies include looking at software-based alternatives that could save a significant amount of money by reducing the amount of proprietary software. This chapter explores the use and integration of Open Source Software (OSS) in software-driven projects to include in enterprise organizations. Additionally, the legalities of the GNU General Public License (GPL), Lesser General Public License (LGPL), Berkeley Software Distribution (BSD), and Creative Commons are explored with the integration of these OSS solutions into organizations. …


A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson Dec 2014

A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson

Maurice Dawson

Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including utilities, regulators, energy markets, government entities, and even those that wish to exploit the cyber infrastructure. Cyber warfare is quickly becoming the method of warfare and the tool of military strategists. Additionally, it is has become a tool for governments to aid or exploit for their own personal benefits. For cyber terrorists there has been an overwhelmingly abundance of new tools and technologies available that have allowed criminal acts to occur virtually anywhere in the …


Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson Dec 2014

Understanding The Methods Behind Cyber Terrorism, Maurice E. Dawson Jr., Marwan Omar, Jonathan Abramson

Maurice Dawson

Cyber security has become a matter of national, international, economic, and societal importance that affects multiple nations (Walker, 2012). Since the 1990s users have exploited vulnerabilities to gain access to networks for malicious purposes. In recent years the number of attacks on U.S. networks has continued to grow at an exponential rate. This includes malicious embedded code, exploitation of backdoors, and more. These attacks can be initiated from anywhere in the world from behind a computer with a masked Internet Protocol (IP) address. This type of warfare, cyber warfare, changes the landscape of war itself (Beidleman, 2009). This type of …


Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim Dec 2014

Advances In Technology Project Management: Review Of Open Source Software Integration, Maurice Dawson, Brian Leonard, Emad Rahim

Maurice Dawson

As organizations must continually drive down costs of software-driven projects, they need to evaluate the Systems Development Life Cycle (SDLC) and other software-based design methodologies. These methodologies include looking at software-based alternatives that could save a significant amount of money by reducing the amount of proprietary software. This chapter explores the use and integration of Open Source Software (OSS) in software-driven projects to include in enterprise organizations. Additionally, the legalities of the GNU General Public License (GPL), Lesser General Public License (LGPL), Berkeley Software Distribution (BSD), and Creative Commons are explored with the integration of these OSS solutions into organizations. …