Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Operations Research, Systems Engineering and Industrial Engineering (6)
- Public Affairs, Public Policy and Public Administration (5)
- Business (3)
- Industrial Engineering (3)
- Military and Veterans Studies (3)
-
- Business Administration, Management, and Operations (2)
- Defense and Security Studies (2)
- Operational Research (2)
- Psychology (2)
- Risk Analysis (2)
- Aerospace Engineering (1)
- Applied Behavior Analysis (1)
- Industrial and Organizational Psychology (1)
- Organizational Behavior and Theory (1)
- Public Administration (1)
- Public Policy (1)
- Systems Engineering (1)
- Transportation (1)
- Keyword
-
- Knowledge management (3)
- Agility (1)
- Air traffic management (1)
- Airline schedules (1)
- C-IED (1)
-
- Conceptual background (1)
- Counter improvised explosive device (1)
- Counterinsurgency (1)
- Creativity (1)
- Employee initiative (1)
- Engineering managers (1)
- Homeland security (1)
- Knowledge transfer (1)
- Military (1)
- Motivation (1)
- Organizational capabilities (1)
- Project management (1)
- Purpose-seeking (1)
- Risk management (1)
- Risk perception (1)
- Schedule stability (1)
- System science (1)
- Terrorism risk (1)
- Threat assessment (1)
- Underwater attacks (1)
- Vulnerability (1)
Articles 1 - 7 of 7
Full-Text Articles in Social and Behavioral Sciences
Towards Managing And Understanding The Risk Of Underwater Terrorism, Richard J. Gay
Towards Managing And Understanding The Risk Of Underwater Terrorism, Richard J. Gay
Engineering Management & Systems Engineering Theses & Dissertations
This dissertation proposes a methodology to manage and understand the risk of underwater terrorism to critical infrastructures utilizing the parameters of the risk equation. Current methods frequently rely on statistical methods, which suffer from a lack of appropriate historical data to produce distributions and do not integrate epistemic uncertainty. Other methods rely on locating subject matter experts who can provide judgment and then undertaking an associated validation of these judgments.
Using experimentation, data from unclassified successful, or near successful, underwater attacks are analyzed and instantiated as a network graph with the key characteristics of the risk of terrorism represented as …
Establishing Relationships Between Risk Management And Knowledge Transfer, Garrett S. Haltiwanger
Establishing Relationships Between Risk Management And Knowledge Transfer, Garrett S. Haltiwanger
Engineering Management & Systems Engineering Theses & Dissertations
Risk management (RM) and Knowledge management (KM) have mostly been treated as separate management philosophies. Risk management is a widely taught topic in academia and is practiced in industry. Knowledge management is being taught at increasingly more colleges and many companies are discovering a need for managing knowledge. This dissertation shows that some research has been conducted to apply the principles of knowledge management in establishing risk management plans. To a lesser extent there has been research conducted to apply the philosophies of risk management to identifying knowledge gaps and maintaining corporate knowledge. Both risk management and knowledge management are …
An Investigation Into The Relationship Between An Engineering Manager's Purpose-Seeking Beliefs And Behaviors And The Engineering Manager's Perception Of Employee Creativity, Initiative And Purpose-Seeking Behavior, Charles Burton Daniels
An Investigation Into The Relationship Between An Engineering Manager's Purpose-Seeking Beliefs And Behaviors And The Engineering Manager's Perception Of Employee Creativity, Initiative And Purpose-Seeking Behavior, Charles Burton Daniels
Engineering Management & Systems Engineering Theses & Dissertations
Organizations have placed an overwhelming emphasis on extrinsic motivation of its workforce, normally in the form of financial incentives, in an attempt to assure individual and organizational high performance. While a significant level of financial resources is expended in this attempt to predict and influence employee behavior, no objective evidence exists of a favorable return of investment. In fact, the primary impact of most extrinsic motivation might actually be demotivation – the opposite of the intended use.
In this research the prevailing literature was examined and a conclusion about the power of both extrinsic and intrinsic motivation was synthesized to …
An Analysis Of Factors Affecting The Effective Use Of Knowledge Management In Counter Improvised Explosive Device (C-Ied) Operations, Umit Gencer
Engineering Management & Systems Engineering Theses & Dissertations
This dissertation investigates factors that influence effective use of Knowledge Management (KM) in Counter Improvised Explosive Device (C-IED) operations in the military.
The study suggests that effective KM program is determined by the interaction of three organizational capabilities: knowledge infrastructure, knowledge process, and leadership orientation.
A self-administrated survey was conducted on 300 NATO staff officers who have served in C-IED environments. A structural equation modeling technique was used to test a set of hypotheses using 118 completed responses collected from the survey.
The results suggest that out of the 11 constructs within the model; two are rated as 'attribute needs …
Risk Quadruplet: Integrating Assessments Of Threat, Vulnerability, Consequence, And Perception For Homeland Security And Homeland Defense, Kara Norman Hill
Risk Quadruplet: Integrating Assessments Of Threat, Vulnerability, Consequence, And Perception For Homeland Security And Homeland Defense, Kara Norman Hill
Engineering Management & Systems Engineering Theses & Dissertations
Risk for homeland security and homeland defense is often considered to be a function of threat, vulnerability, and consequence. But what is that function? And are we defining and measuring these terms consistently? Threat, vulnerability, and consequence assessments are conducted, often separately, and data from one assessment could be drastically different from that of another due to inconsistent definitions of terms and measurements, differing data collection methods, or varying data sources. It has also long been a challenge to integrate these three disparate assessments to establish an overall picture of risk to a given asset. Further, many agencies conduct these …
Evaluating Network Analysis And Agent Based Modeling For Investigating The Stability Of Commercial Air Carrier Schedules, Sheila Ruth Conway
Evaluating Network Analysis And Agent Based Modeling For Investigating The Stability Of Commercial Air Carrier Schedules, Sheila Ruth Conway
Engineering Management & Systems Engineering Theses & Dissertations
For a number of years, the United States Federal Government has been formulating the Next Generation Air Transportation System plans for National Airspace System improvement. These improvements attempt to address air transportation holistically, but often address individual improvements in one arena such as ground or in-flight equipment.
In fact, air transportation system designers have had only limited success using traditional Operations Research and parametric modeling approaches in their analyses of innovative operations. They need a systemic methodology for modeling of safety-critical infrastructure that is comprehensive, objective, and sufficiently concrete, yet simple enough to be deployed with reasonable investment. The methodology …
Agile Knowledge Management; A Review, Reconceptualization, And Extension To Military Applications, Dogan Ozturk
Agile Knowledge Management; A Review, Reconceptualization, And Extension To Military Applications, Dogan Ozturk
Engineering Management & Systems Engineering Theses & Dissertations
The purpose of this research is to explore the conceptual background of agility in knowledge management, re-conceptualize it and extend it to military applications with a special focus on Counterinsurgency (COIN).
An initial qualitative exploration of agility in knowledge management was performed. Three different concepts and their interrelationships were analyzed: (1) knowledge management, (2) agility in operations, and (3) military organizations in the COIN environment. Findings from this initial qualitative analysis were used to inductively redefine, re-conceptualize and extend the concept of Agile Knowledge Management (AKM), as well as, to compare and adapt the AKM concept to the military environment …