Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Colorado Law School (39)
- Old Dominion University (23)
- Selected Works (23)
- SelectedWorks (22)
- World Maritime University (18)
-
- Air Force Institute of Technology (10)
- City University of New York (CUNY) (6)
- University of Southern Maine (6)
- The University of Maine (5)
- University of Kentucky (5)
- University of New Hampshire (5)
- California Polytechnic State University, San Luis Obispo (4)
- University of Tennessee, Knoxville (4)
- Embry-Riddle Aeronautical University (3)
- Southern Methodist University (3)
- Universitas Indonesia (3)
- University of Nebraska - Lincoln (3)
- Western University (3)
- Clemson University (2)
- East Tennessee State University (2)
- Kennesaw State University (2)
- Purdue University (2)
- University of Arkansas, Fayetteville (2)
- University of Nevada, Las Vegas (2)
- University of New Orleans (2)
- University of Pennsylvania Carey Law School (2)
- West Virginia University (2)
- American University in Cairo (1)
- Brigham Young University (1)
- California State University, San Bernardino (1)
- Keyword
-
- Water law (23)
- West (23)
- Western water law (23)
- Water policy (22)
- Colorado River (19)
-
- California (18)
- Climate change (18)
- Colorado (16)
- Arizona (15)
- New Mexico (15)
- Drought (12)
- Nevada (11)
- Utah (11)
- Water supply (11)
- Colorado River Basin (10)
- Agriculture (9)
- Risk management (9)
- Water management (9)
- Water quality (9)
- Global warming (8)
- Irrigation (8)
- Lake Mead (8)
- Wyoming (8)
- Mexico (7)
- U.S. Bureau of Reclamation (7)
- Water conservation (7)
- Water resource management (7)
- Austerity (6)
- BOR (6)
- Challenges (6)
- Publication Year
- Publication
-
- Western Water Law, Policy and Management: Ripples, Currents, and New Channels for Inquiry (Martz Summer Conference, June 3-5) (26)
- Confluence Journal Environmental Studies (CJES), Kogi State University, Nigeria (14)
- Jan Kallberg (14)
- Navigating the Future of the Colorado River (Martz Summer Conference, June 8-10) (13)
- Maritime Safety & Environment Management Dissertations (Dalian) (12)
-
- Theses and Dissertations (12)
- Jordan Hristov (7)
- Engineering Management & Systems Engineering Theses & Dissertations (6)
- Computer Ethics - Philosophical Enquiry (CEPE) Proceedings (5)
- Progress in Scale Modeling, an International Journal (5)
- RISK: Health, Safety & Environment (1990-2002) (5)
- World Maritime University Dissertations (5)
- Dickey-Lincoln School Lakes Project (4)
- Electronic Theses and Dissertations (4)
- George H Baker (4)
- Publications and Research (4)
- Economics and Finance (3)
- Electronic Thesis and Dissertation Repository (3)
- Journal of Materials Exploration and Findings (JMEF) (3)
- Master's Theses (3)
- Publications (3)
- SMU Data Science Review (3)
- All Dissertations (2)
- Cybersecurity Undergraduate Research Showcase (2)
- Dissertations, Theses, and Capstone Projects (2)
- Doctoral Dissertations (2)
- Engineering Management & Systems Engineering Faculty Publications (2)
- Faculty Publications (2)
- Graduate Theses, Dissertations, and Problem Reports (2)
- Karim Hardy (2)
- Publication Type
- File Type
Articles 1 - 30 of 224
Full-Text Articles in Risk Analysis
Containerization Of Seafarers In The International Shipping Industry: Contemporary Seamanship, Maritime Social Infrastructures, And Mobility Politics Of Global Logistics, Liang Wu
Dissertations, Theses, and Capstone Projects
This dissertation discusses the mobility politics of container shipping and argues that technological development, political-economic order, and social infrastructure co-produce one another. Containerization, the use of standardized containers to carry cargo across modes of transportation that is said to have revolutionized and globalized international trade since the late 1950s, has served to expand and extend the power of international coalitions of states and corporations to control the movements of commodities (shipments) and labor (seafarers). The advent and development of containerization was driven by a sociotechnical imaginary and international social contract of seamless shipping and cargo flows. In practice, this liberal, …
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia
Journal of Nonprofit Innovation
Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.
Imagine Doris, who is …
Combined Risk Based Inspection And Fault Tree Analysis For Repetitive 3-Phase Line Piping Leakage At West Java Offshore Topside Facility, Dona Yuliati, Akhmad Herman Yuwono, Datu Rizal Asral, Donanta Dhaneswara
Combined Risk Based Inspection And Fault Tree Analysis For Repetitive 3-Phase Line Piping Leakage At West Java Offshore Topside Facility, Dona Yuliati, Akhmad Herman Yuwono, Datu Rizal Asral, Donanta Dhaneswara
Journal of Materials Exploration and Findings (JMEF)
Hydrocarbon releases might result in serious consequences in various aspects. In addition to the contribution to environmental pollution, repetitive leakages need high repair costs. This study aim is to minimize potential repetitive leakage for other typical 3-phase piping systems. We conducted the risk assessment by adopting Risk Based Inspection (RBI) API 581 to identify risk level, calculating piping lifetime, recommended inspection plan and mitigations. The most relevant root causes can be obtained through quantitative Fault Tree Analysis (FTA). Observation and investigation was taken from eight 3-phase piping systems that experienced repetitive leakages. It has been found that the risk level …
Nitrogen Gas Quenching Pressure Effect On Bs S155 Alloy Steel In Vacuum Furnace, Agus Mulyadi Hasanudin, Eddy Sumarno Siradj
Nitrogen Gas Quenching Pressure Effect On Bs S155 Alloy Steel In Vacuum Furnace, Agus Mulyadi Hasanudin, Eddy Sumarno Siradj
Journal of Materials Exploration and Findings (JMEF)
The production of metal and alloy products requires the use of heat treatment, when during the heat treatment process, quenching is a crucial step. The quenching medium can be anything from water, a salt bath, oil, air and gas. In a vacuum furnace, pressurized gas, most frequently nitrogen (N2) gas, serves as one of the quenching mediums. One of the drawbacks of the quenching process is the distortion and dimensional change of the parts. This paper aims to investigate the influence of nitrogen gas quenching pressure on the distortion and dimensional change of aerospace actuator gear planet parts …
The Transformative Integration Of Artificial Intelligence With Cmmc And Nist 800-171 For Advanced Risk Management And Compliance, Mia Lunati
Cybersecurity Undergraduate Research Showcase
This paper explores the transformative potential of integrating Artificial Intelligence (AI) with established cybersecurity frameworks such as the Cybersecurity Maturity Model Certification (CMMC) and the National Institute of Standards and Technology (NIST) Special Publication 800-171. The thesis argues that the relationship between AI and these frameworks has the capacity to transform risk management in cybersecurity, where it could serve as a critical element in threat mitigation. In addition to addressing AI’s capabilities, this paper acknowledges the risks and limitations of these systems, highlighting the need for extensive research and monitoring when relying on AI. One must understand boundaries when integrating …
Climate Change Impact On Bridge Scour Risk In Ny State: A Gis-Based Risk Analysis Model, Muhammad Hassan Butt
Climate Change Impact On Bridge Scour Risk In Ny State: A Gis-Based Risk Analysis Model, Muhammad Hassan Butt
Publications and Research
Bridge scour, the primary cause of bridge failure in the United States, escalates post-severe storms, necessitating effective mitigation. This study employs a GIS-based risk analysis model to assess climate change's impact on bridge scour and associated risks in New York State. Data from the National Bridge Inventory, climate hazard maps, and geospatial data are integrated.
Static Malware Family Clustering Via Structural And Functional Characteristics, David George, Andre Mauldin, Josh Mitchell, Sufiyan Mohammed, Robert Slater
Static Malware Family Clustering Via Structural And Functional Characteristics, David George, Andre Mauldin, Josh Mitchell, Sufiyan Mohammed, Robert Slater
SMU Data Science Review
Static and dynamic analyses are the two primary approaches to analyzing malicious applications. The primary distinction between the two is that the application is analyzed without execution in static analysis, whereas the dynamic approach executes the malware and records the behavior exhibited during execution. Although each approach has advantages and disadvantages, dynamic analysis has been more widely accepted and utilized by the research community whereas static analysis has not seen the same attention. This study aims to apply advancements in static analysis techniques to demonstrate the identification of fine-grained functionality, and show, through clustering, how malicious applications may be grouped …
Mechanisms To Reduce Cyber Threats And Risks, Saad Alsuwaileh
Mechanisms To Reduce Cyber Threats And Risks, Saad Alsuwaileh
Journal of Police and Legal Sciences
Addressing the mechanisms of reducing cyber threats and risks Research Because cyberspace is an important arena for various international interactions, especially in recent times in light of the increase in cyber-attacks between some countries, which affects their national security. In this context, many countries are trying to make an effort to develop their capabilities to be used in any cyber-attack, or to take adequate preventive measures to protect them from any possible cyberattacks, especially in light of the impact of these attacks on vital places and institutions such as banks and ministries or on important facilities such as water and …
Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani
Framework For Assessing Information System Security Posture Risks, Syed Waqas Hamdani
Electronic Thesis and Dissertation Repository
In today’s data-driven world, Information Systems, particularly the ones operating in regulated industries, require comprehensive security frameworks to protect against loss of confidentiality, integrity, or availability of data, whether due to malice, accident or otherwise. Once such a security framework is in place, an organization must constantly monitor and assess the overall compliance of its systems to detect and rectify any issues found. This thesis presents a technique and a supporting toolkit to first model dependencies between security policies (referred to as controls) and, second, devise models that associate risk with policy violations. Third, devise algorithms that propagate risk when …
Machine Learning-Based Data And Model Driven Bayesian Uncertanity Quantification Of Inverse Problems For Suspended Non-Structural System, Zhiyuan Qin
All Dissertations
Inverse problems involve extracting the internal structure of a physical system from noisy measurement data. In many fields, the Bayesian inference is used to address the ill-conditioned nature of the inverse problem by incorporating prior information through an initial distribution. In the nonparametric Bayesian framework, surrogate models such as Gaussian Processes or Deep Neural Networks are used as flexible and effective probabilistic modeling tools to overcome the high-dimensional curse and reduce computational costs. In practical systems and computer models, uncertainties can be addressed through parameter calibration, sensitivity analysis, and uncertainty quantification, leading to improved reliability and robustness of decision and …
Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn
Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn
SMU Data Science Review
Today, there is an increased risk to data privacy and information security due to cyberattacks that compromise data reliability and accessibility. New machine learning models are needed to detect and prevent these cyberattacks. One application of these models is cybersecurity threat detection and prevention systems that can create a baseline of a network's traffic patterns to detect anomalies without needing pre-labeled data; thus, enabling the identification of abnormal network events as threats. This research explored algorithms that can help automate anomaly detection on an enterprise network using Canadian Institute for Cybersecurity data. This study demonstrates that Neural Networks with Bayesian …
Improving The Health And Safety Of Manufacturing Workers By Detecting And Addressing Personal Protective Equipment (Ppe) Violations In Real-Time With The Use Of Automated Ppe Detection Technology, Joseph Olufemi Fasinu
Improving The Health And Safety Of Manufacturing Workers By Detecting And Addressing Personal Protective Equipment (Ppe) Violations In Real-Time With The Use Of Automated Ppe Detection Technology, Joseph Olufemi Fasinu
Graduate Theses, Dissertations, and Problem Reports
The Centers for Disease Control and Prevention (CDC) emphasized that Personal Protective Equipment (PPE) can significantly reduce the risk of occupational injuries and illnesses. However, improper use, failure to use, and other PPE-related violations can still result in injuries and fatalities. Eye and face protection violation has been one of the top 10 most frequently violated OSHA standards in fiscal years 2018, 2019, 2020, 2021 and 2022 consecutively. A common practice among safety professionals to ensure PPE compliance has been to physically inspect or monitor PPE usage among workers, which has been found to be unsustainable on a continuous real-time …
Application Of Big Data Technology, Text Classification, And Azure Machine Learning For Financial Risk Management Using Data Science Methodology, Oluwaseyi A. Ijogun
Application Of Big Data Technology, Text Classification, And Azure Machine Learning For Financial Risk Management Using Data Science Methodology, Oluwaseyi A. Ijogun
Electronic Theses and Dissertations
Data science plays a crucial role in enabling organizations to optimize data-driven opportunities within financial risk management. It involves identifying, assessing, and mitigating risks, ultimately safeguarding investments, reducing uncertainty, ensuring regulatory compliance, enhancing decision-making, and fostering long-term sustainability. This thesis explores three facets of Data Science projects: enhancing customer understanding, fraud prevention, and predictive analysis, with the goal of improving existing tools and enabling more informed decision-making. The first project examined leveraged big data technologies, such as Hadoop and Spark, to enhance financial risk management by accurately predicting loan defaulters and their repayment likelihood. In the second project, we investigated …
Dynamic Rbi With Central Difference Method Approach In Calculation Of Uniform Corrosion Rate: A Casestudy On Gas Pipelines, M.Riefqi Dwi Alviansyah, Fernanda Hartoyo, Zahra Nadia Nurullia, Ari Kurniawan
Dynamic Rbi With Central Difference Method Approach In Calculation Of Uniform Corrosion Rate: A Casestudy On Gas Pipelines, M.Riefqi Dwi Alviansyah, Fernanda Hartoyo, Zahra Nadia Nurullia, Ari Kurniawan
Journal of Materials Exploration and Findings (JMEF)
The oil and gas industry generally uses a piping system to drain fluids. Even though the pipes used have been well designed, the use of pipes as a means of fluid transportation still provides the possibility of failure that can occur at any time, one of which is due to uniform corrosion. The use of standard Risk Based Inspection (RBI) according to the API RBI 581 document has been widely used to anticipate potential failures to pipe components. The use of standard RBI can reduce the risk of failure significantly. Because the standard RBI considers the component risk value to …
Towards Structured Planning And Learning At The State Fisheries Agency Scale, Caleb A. Aldridge
Towards Structured Planning And Learning At The State Fisheries Agency Scale, Caleb A. Aldridge
Theses and Dissertations
Inland recreational fisheries has grown philosophically and scientifically to consider economic and sociopolitical aspects (non-biological) in addition to the biological. However, integrating biological and non-biological aspects of inland fisheries has been challenging. Thus, an opportunity exists to develop approaches and tools which operationalize planning and decision-making processes which include biological and non-biological aspects of a fishery. This dissertation expands the idea that a core set of goals and objectives is shared among and within inland fisheries agencies; that many routine operations of inland fisheries managers can be regimented or standardized; and the novel concept that current information and operations can …
Scale Modeling Of An Appearance Of Downwash Pattern Of Hot Smoke Ejected From Chimney In The Turbulent Cross Flow, Xangpheuak Inthavideth, Nobumasa Sekishita, Sounthisack Phommachanh, Yuji Nakamura
Scale Modeling Of An Appearance Of Downwash Pattern Of Hot Smoke Ejected From Chimney In The Turbulent Cross Flow, Xangpheuak Inthavideth, Nobumasa Sekishita, Sounthisack Phommachanh, Yuji Nakamura
Progress in Scale Modeling, an International Journal
This study aims to elucidate the scaling law to provide the critical condition on appearance of the downwash pattern of the hot smoke ejected from a chimney in a turbulent cross flow. A specially designed wind tunnel with an active turbulence generator developed by Makita was adopted to offer a quasi-isotropic turbulence field in a lab-scale test facility. A heated jet with smoke is issued into the cross flow from the vertically oriented chimney placed in the test section of the wind tunnel. In this study, the experimental parameters considered are temperature of the heated jet (smoke), jet ejected velocity, …
Adaptive Risk Network Dependency Analysis Of Complex Hierarchical Systems, Katherine L. Smith
Adaptive Risk Network Dependency Analysis Of Complex Hierarchical Systems, Katherine L. Smith
Computational Modeling & Simulation Engineering Theses & Dissertations
Recently the number, variety, and complexity of interconnected systems have been increasing while the resources available to increase resilience of those systems have been decreasing. Therefore, it has become increasingly important to quantify the effects of risks and the resulting disruptions over time as they ripple through networks of systems. This dissertation presents a novel modeling and simulation methodology which quantifies resilience, as impact on performance over time, and risk, as the impact of probabilistic disruptions. This work includes four major contributions over the state-of-the-art which are: (1) cyclic dependencies are captured by separation of performance variables into layers which …
Evaluating A Statistical-Based Assessment Tool For Stratifying Risk Among U.S. Air Force Organizations, Tiffany A. Low
Evaluating A Statistical-Based Assessment Tool For Stratifying Risk Among U.S. Air Force Organizations, Tiffany A. Low
Theses and Dissertations
The Air Force Inspection System is a proponent of utilizing a risk-based sampling strategy (RBSS) for conducting inspections from major command levels down to the unit level. The strategy identifies areas deemed most important or risky by commanders and prioritizes them accordingly for an independent assessment by the Inspector General. While Air Force regulation specifies the need to use a RBSS for inspection, the implementation process is delegated to individual commands and, subsequently, wings. The 23rd Wing, the sponsor for this research, directed us to analyze a RBSS tool highlighted as an example from which to adopt for those units …
Wetland Uranium Transport Via Iron-Organic Matter Flocs And Hyporheic Exchange, Connor J. Parker
Wetland Uranium Transport Via Iron-Organic Matter Flocs And Hyporheic Exchange, Connor J. Parker
All Dissertations
Uranium (U) released from the M-Area at the Department of Energy Savannah River Site into Tims Branch, a seasonal wetland and braided stream system, is estimated to be 43,500 kg between 1965 and 1984. The motivation for this work is the uranium’s persistence in the wetland for decades, where it is estimated that 80% of the U currently remains in the Tims Branch wetland. U has begun to incorporate into wetland iron (Fe) and carbon cycles, associating with local Fe mineralogy and deposits of rich wetland organic matter (OM). The objective of this work is to characterize the chemical phases …
The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He
The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He
Information Technology & Decision Sciences Faculty Publications
This paper identifies opportunities for potential theoretical and practical improvements in employees' awareness of cybersecurity and their motivational behavior to protect themselves and their organizations from cyberattacks using the protection motivation theory. In addition, it contributes to the literature by examining additional variables and mediators besides the core constructs of the Protection Motivation Model (PMT). This article uses empirical data and structural equation modeling to test the antecedents and mediators of employees' cybersecurity motivational behavior. The study offers theoretical and pragmatic guidance for cybersecurity programs. First, the model developed in this study can partially explain how people may change their …
Development Of A Framework To Support Informed Shipbuilding Based On Supply Chain Disruptions, Katherine Smith, Rafael Diaz, Yuzhong Shen
Development Of A Framework To Support Informed Shipbuilding Based On Supply Chain Disruptions, Katherine Smith, Rafael Diaz, Yuzhong Shen
VMASC Publications
In addition to stresses induced by the Covid-19 pandemic, supply chains worldwide have been growing more complex while facing a continuous onslaught of disruptions. This paper presents an analysis and extension of a graph based model for modeling and simulating the effects of such disruptions. The graph based model combines a Bayesian network approach for simulating risks with a network dependency analysis approach for simulating the propagation of disruptions through the network over time. The initial analysis provides evidence supporting extension to for using a multi-layered approach allowing for the inclusion of cyclic features in supply chain models. Initial results …
Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim
Integration Of Blockchain Technology Into Automobiles To Prevent And Study The Causes Of Accidents, John Kim
Electronic Theses, Projects, and Dissertations
Automobile collisions occur daily. We now live in an information-driven world, one where technology is quickly evolving. Blockchain technology can change the automotive industry, the safety of the motoring public and its surrounding environment by incorporating this vast array of information. It can place safety and efficiency at the forefront to pedestrians, public establishments, and provide public agencies with pertinent information securely and efficiently. Other industries where Blockchain technology has been effective in are as follows: supply chain management, logistics, and banking. This paper reviews some statistical information regarding automobile collisions, Blockchain technology, Smart Contracts, Smart Cities; assesses the feasibility …
Risk Management And Biases In How Drivers Respond To Nuisance Flooding, Saige Hill, Juita-Elena (Wie) Yusuf, Burton St. John Iii, Pragati Rawat, Carol Considine
Risk Management And Biases In How Drivers Respond To Nuisance Flooding, Saige Hill, Juita-Elena (Wie) Yusuf, Burton St. John Iii, Pragati Rawat, Carol Considine
School of Public Service Faculty Publications
Nuisance flooding, or recurrent flooding, occurs during high tide and may be exacerbated when combined with other events such as heavy precipitation, strong winds, or storm surge. Sea level rise has contributed to increased frequency and duration of nuisance flooding in low-lying coastal areas and is causing community-specific impacts such as transportation disruption, road closures, compromises to life and property, overwhelmed storm water systems, and infrastructure damage. This chapter focuses on how drivers respond during nuisance flooding events. Specifically, we discuss how drivers in the Hampton Roads region of southeastern coastal Virginia obtain information about road flooding, how they respond, …
Cybersecurity Maturity Model Certification (Cmmc) Compliance For Dod Contractors, Sierra Burnett
Cybersecurity Maturity Model Certification (Cmmc) Compliance For Dod Contractors, Sierra Burnett
Cybersecurity Undergraduate Research Showcase
The DoD is currently taking a supply-chain risk management strategy to foster cybersecurity. This unique strategy is often referred to as CMMC which stands for “Cybersecurity Maturity Model Certification”. The approach requires that all the 300,000 DoD contractors acquire third-party authentication that may attain the requirements for the CMMC maturity level suitable to the work they desire to do for the DoD. CMMC typically examines the organization's capability to safeguard Federal Contract Information as well as CUI. It integrates various cybersecurity standards already in place and plots the best practices alongside processes to five maturity levels that range from the …
Using An Inventory Of Unstable Slopes To Prioritize Probabilistic Rockfall Modeling And Acid Base Accounting In Great Smoky Mountains National Park, Thomas A. O'Shea
Using An Inventory Of Unstable Slopes To Prioritize Probabilistic Rockfall Modeling And Acid Base Accounting In Great Smoky Mountains National Park, Thomas A. O'Shea
Electronic Theses and Dissertations
An inventory of unstable slopes along transportation corridors and performance modeling are important components of geotechnical asset management in Great Smoky Mountains National Park (GRSM). Hazards and risk were assessed for 285 unstable slopes along 151 miles of roadway. A multi-criteria model was created to select fourteen sites for two-dimensional probabilistic rockfall simulations and Acid Base Accounting (ABA) tests. Simulations indicate that rock material would likely enter the roadway at all fourteen sites. ABA test results indicate that influence of significant acid-producing potential is generally confined to slaty rocks of the Anakeesta Formation and graphitic schist of the Wehutty Formation. …
Modernization Of Scienttific Mathematics Formula In Technology, Iwasan D. Kejawa Ed.D, Prof. Iwasan D. Kejawa Ed.D
Modernization Of Scienttific Mathematics Formula In Technology, Iwasan D. Kejawa Ed.D, Prof. Iwasan D. Kejawa Ed.D
Department of Mathematics: Faculty Publications
Abstract
Is it true that we solve problem using techniques in form of formula? Mathematical formulas can be derived through thinking of a problem or situation. Research has shown that we can create formulas by applying theoretical, technical, and applied knowledge. The knowledge derives from brainstorming and actual experience can be represented by formulas. It is intended that this research article is geared by an audience of average knowledge level of solving mathematics and scientific intricacies. This work details an introductory level of simple, at times complex problems in a mathematical epidermis and computability and solvability in a Computer Science. …
Quantifying Cyber Risk By Integrating Attack Graph And Impact Graph, Omer F. Keskin
Quantifying Cyber Risk By Integrating Attack Graph And Impact Graph, Omer F. Keskin
Engineering Management & Systems Engineering Theses & Dissertations
Being a relatively new risk source, models to quantify cyber risks are not well developed; therefore, cyber risk management in most businesses depends on qualitative assessments. With the increase in the economic consequences of cyber incidents, the importance of quantifying cyber risks has increased. Cyber risk quantification is also needed to establish communication among decision-makers of different levels of an enterprise, from technical personnel to top management.
The goal of this research is to build a probabilistic cybersecurity risk analysis model that relates attack propagation with impact propagation through internal dependencies and allows temporal analysis.
The contributions of the developed …
Modeling And Solving The Outsourcing Risk Management Problem In Multi-Echelon Supply Chains, Arian A. Nahangi
Modeling And Solving The Outsourcing Risk Management Problem In Multi-Echelon Supply Chains, Arian A. Nahangi
Master's Theses
Worldwide globalization has made supply chains more vulnerable to risk factors, increasing the associated costs of outsourcing goods. Outsourcing is highly beneficial for any company that values building upon its core competencies, but the emergence of the COVID-19 pandemic and other crises have exposed significant vulnerabilities within supply chains. These disruptions forced a shift in the production of goods from outsourcing to domestic methods.
This paper considers a multi-echelon supply chain model with global and domestic raw material suppliers, manufacturing plants, warehouses, and markets. All levels within the supply chain network are evaluated from a holistic perspective, calculating a total …
Stock Markets Performance During A Pandemic: How Contagious Is Covid-19?, Yara Abushahba
Stock Markets Performance During A Pandemic: How Contagious Is Covid-19?, Yara Abushahba
Theses and Dissertations
Background and Motivation: The coronavirus (“COVID-19”) pandemic, the subsequent policies and lockdowns have unarguably led to an unprecedented fluid circumstance worldwide. The panic and fluctuations in the stock markets were unparalleled. It is inarguable that real-time availability of news and social media platforms like Twitter played a vital role in driving the investors’ sentiment during such global shock.
Purpose:The purpose of this thesis is to study how the investor sentiment in relation to COVID-19 pandemic influenced stock markets globally and how stock markets globally are integrated and contagious. We analyze COVID-19 sentiment through the Twitter posts and investigate its …
Human Fatigue Predictions In Complex Aviation Crew Operational Impact Conditions, Suresh Rangan
Human Fatigue Predictions In Complex Aviation Crew Operational Impact Conditions, Suresh Rangan
Doctoral Dissertations
In this last decade, several regulatory frameworks across the world in all modes of transportation had brought fatigue and its risk management in operations to the forefront. Of all transportation modes air travel has been the safest means of transportation. Still as part of continuous improvement efforts, regulators are insisting the operators to adopt strong fatigue science and its foundational principles to reinforce safety risk assessment and management. Fatigue risk management is a data driven system that finds a realistic balance between safety and productivity in an organization. This work discusses the effects of mathematical modeling of fatigue and its …