Open Access. Powered by Scholars. Published by Universities.®

Risk Analysis Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Risk Analysis

Assessing The Alignment Of Social Robots With Trustworthy Ai Design Guidelines: A Preliminary Research Study, Abdikadar Ali, Danielle Thaxton, Ankur Chattopadhyay Dec 2021

Assessing The Alignment Of Social Robots With Trustworthy Ai Design Guidelines: A Preliminary Research Study, Abdikadar Ali, Danielle Thaxton, Ankur Chattopadhyay

Posters-at-the-Capitol

The last couple of years have seen a strong movement supporting the need of having intelligent consumer products align with specific design guidelines for trustworthy artificial intelligence (AI). This global movement has led to multiple institutional recommendations for ethically aligned trustworthy design of the AI driven technologies, like consumer robots and autonomous vehicles. There has been prior research towards finding security and privacy related vulnerabilities within various types of social robots. However, none of these previous works has studied the implications of these vulnerabilities in terms of the robot design aligning with trustworthy AI. In an attempt to address this …


Cybersecurity Maturity Model Certification (Cmmc) Compliance For Dod Contractors, Sierra Burnett Nov 2021

Cybersecurity Maturity Model Certification (Cmmc) Compliance For Dod Contractors, Sierra Burnett

Cybersecurity Undergraduate Research Showcase

The DoD is currently taking a supply-chain risk management strategy to foster cybersecurity. This unique strategy is often referred to as CMMC which stands for “Cybersecurity Maturity Model Certification”. The approach requires that all the 300,000 DoD contractors acquire third-party authentication that may attain the requirements for the CMMC maturity level suitable to the work they desire to do for the DoD. CMMC typically examines the organization's capability to safeguard Federal Contract Information as well as CUI. It integrates various cybersecurity standards already in place and plots the best practices alongside processes to five maturity levels that range from the …


Security And Privacy Analysis Of Wearable Health Device, Abm Kamrul Islam Riad Aug 2021

Security And Privacy Analysis Of Wearable Health Device, Abm Kamrul Islam Riad

Symposium of Student Scholars

Wearable technology allows for consumers to record their healthcare data for either personal or clinical use via portable devices. As advancements in this technology continue to rise, the use of these devices has become more widespread. In this paper, we examine the significant security and privacy features of three health tracker devices: Fitbit, Jawbone and Google Glass. We also analyze the devices' strength and how the devices communicate via its Bluetooth pairing process with mobile devices. We explore possible malicious attacks through Bluetooth networking. The outcomes of this analysis illustrate how these devices allow third parties to access sensitive information, …


Diversifying Nuclear Technology: A Technical Analysis On Small Modular Reactors And Its Impact On Nuclear Energy Policy, Carolina Lugo Mejia, Marcos Lugo May 2021

Diversifying Nuclear Technology: A Technical Analysis On Small Modular Reactors And Its Impact On Nuclear Energy Policy, Carolina Lugo Mejia, Marcos Lugo

Helm's School of Government Conference - American Revival: Citizenship & Virtue

The energy policy debate in the United States has revolved around the diversification of energy sources while promoting advantageous economic profits. One drive for this has been the discussion of anthropogenic, environmental endangerment concerns (Vlassopoulous 2011, 104). However, despite the environmental concerns, the U.S. has for some time only relied on one type of energy source—fossil fuels. Fossil fuels are categorized as natural gas, coal, petroleum, and other gases responsible (U.S. Energy Administration 2019). Natural gas is responsible for 38.4%, coal for 23.4%, petroleum for 0.4%, and other gases for 0.3% of the U.S.’s electrical generation (U.S. Energy Administration 2019). …


Risk Management Decision Making For Security And Trust In Hardware Supply Chains, Zachary A. Collier, Thomas L. Polmateer, James H. Lambert Feb 2021

Risk Management Decision Making For Security And Trust In Hardware Supply Chains, Zachary A. Collier, Thomas L. Polmateer, James H. Lambert

CESUN Conference

Modern cyber-physical systems are enabled by electronic hardware and embedded systems. The security of these sub-components is a concern during the design and operational phases of cyber-physical system life cycles. Compromised electronics can result in mission-critical failures, unauthorized access, and other severe consequences. As systems become more complex and feature greater connectivity, system owners must make decisions regarding how to mitigate risks and ensure resilience and trust. This paper provides an overview of research efforts related to assessing and managing risks, resilience, and trust with an emphasis on electronic hardware and embedded systems. The research takes a decision-oriented perspective, drawing …