2,199 research outputs found

    Design of Optimum Ducts Using an Efficient 3-D Viscous Computational Flow Analysis

    Get PDF
    Design of fluid dynamically efficient ducts is addressed through the combination of an optimization analysis with a three-dimensional viscous fluid dynamic analysis code. For efficiency, a parabolic fluid dynamic analysis was used. Since each function evaluation in an optimization analysis is a full three-dimensional viscous flow analysis requiring 200,000 grid points, it is important to use both an efficient fluid dynamic analysis and an efficient optimization technique. Three optimization techniques are evaluated on a series of test functions. The Quasi-Newton (BFGS, eta = .9) technique was selected as the preferred technique. A series of basic duct design problems are performed. On a two-parameter optimization problem, the BFGS technique is demonstrated to require half as many function evaluations as a steepest descent technique

    Institutional Perspectives on the Allocation of Space Orbital Resources: The ITU, Common User Satellite Systems and Beyond

    Get PDF

    Organizational Stress in Financial Aid Offices (II): How to Apply the Tourniquet

    Get PDF
    For each of the 11 most critical sources of organizational stress in Financial Aid Offices (reported in the Spring 1988 issue of this Journal), a variety of countermeasures are described and discussed. Countermeasures were identified by focus groups comprising personnel from all employer segments in California, and all job classifications typical of Financial Aid Offices

    Identifying Sources of Stress in Financial Aid Offices: Where to Apply the Tourniquet

    Get PDF
    The authors attempt to identify organizational stressors in the Financial Aid Office and base their research on a survey conducted in March 1987 under the California Association of Student Financial Aid Administrators

    Assessing Relative Weights of Authentication Components: An Expert Panel Approach

    Get PDF
    Organizations rely on password-based authentication methods to control access to many Web-based systems. In a recent study, we developed a benchmarking instrument to assess the authentication methods used in these contexts. Our instrument developed included extensive literature foundation and an expert panel assessment. This paper reports on the development of the instrument and the expert panel assessment. The initial draft of the instrument was derived from literature to assess 1) password strength requirements, 2) password usage methods, and 3) password reset requirements. Following, the criteria within the index were evaluated by an expert panel and the same panel provided opinions on the relative weights of the criteria and the measures. The expert panel results were collected and analyzed using Multi-Criteria Decision Analysis (MCDA) techniques. We conclude with discussions on how the criteria were assembled, how the expert panel was conducted, and reporting the results from the panel. The results reported include the relative weights within te password usage and password reset measures as well as the relative weights of the three measures within the index

    Systems Analysis from a Qualitative Perspective: An Emerging Skills Set For Information Systems Professionals

    Get PDF
    “Effective systems analysis is at the core of the design, development and operation of a modern information system. As part of their analysis and design work, information technology (IT) professionals are called upon to interview clients, observe daily operations and interpret and evaluate existing or proposed solutions. These practitioners must understand and situate themselves in the context of multiple stakeholder organizations and remain cognizant of organizational goals. Unfortunately many of these interaction skills, critical to effective application development and delivery, are not taught in a university setting, Fortunately, many of these needed skills are the focus of effective qualitative research.

    A Developmental Study on Assessing the Cybersecurity Competency of Organizational Information System Users

    Get PDF
    Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and validating OISU: (a) KSAs, (b) KSA measures, (c) KSA measure weights, and (d) cybersecurity competency threshold. A fifth phase of data collection occurred measuring the cybersecurity competency of 54 participants. Phase 1 proposed and validated three OISU cybersecurity abilities, 23 OISU cybersecurity knowledge units (KU), and 22 OISU cybersecurity skill areas (SA). Phase 2 proposed and validated 90 KSA measures for 47 knowledge topics (KT) and 43 skill tasks (ST). Phase 3 proposed and validated the weights for four knowledge categories (KC) and four skill categories (SC). Phase 4 proposed and validated an OISU cybersecurity competency threshold (index score) of 80%. Phase 5 of this study measured the cybersecurity competency of 54 OISUs using the MyCyberKSAsTM prototype cybersecurity competency assessment tool. Phase 5 conducted data analysis by computing levels of dispersion and one-way analysis of variance (ANOVA), which indicated that annual cybersecurity training and job function are significant, providing evidences for significant differences in OISU cybersecurity competency

    Development of the MyCyberSkills™ iPad App: A Scenarios-Based, Hands-On Measure of Non-IT Professionals’ Cybersecurity Skills

    Get PDF
    Although advances in Information Technology (IT) have been significant over the past several decades when it comes to protection of corporate information systems (IS), human errors and social engineering appear to prevail in circumventing such IT protections. While most employees may have the best of intentions, without cybersecurity skills they represent the weakest link in an organization’s IS security. Skills are defined as the combination of knowledge, experience, and ability to do something well. Cybersecurity skills correspond to the skills surrounding the hardware and software required to execute IS security to mitigate cyber-attacks. However, the current measures of end-user cybersecurity skills are based on self-reported surveys. This study is the second phase of a larger research project that is aimed to develop a scenario-based iPad application to measure cybersecurity skills based on actual scenarios with hands-on tasks that the participants complete in demonstrating their skills. To design a measure that has both high validity and reliability, subject matter experts’ (SMEs) opinion of the top nine cybersecurity skills and their skill importance weight were identified in the first phase of the study following the Delphi method. This phase of the research in progress involves the design and development of the MyCyberSkills™ iPad application (app) using scenario-based, hands-on tasks related to each of the nine SMEs identified cybersecurity skills

    Knowledge Management Culture Audit: Capturing Tacit Perceptions and Barriers

    Get PDF
    A firm’s capacity to efficiently create value from knowledge held by employees and embedded in processes is a key strategic resource. Knowledge Management (KM) seeks to systematically improve that capacity. The first critical step for implementing KM in organizations is the Knowledge Audit. Current audit practices use interviews and questionnaires to understand the KM processes that the organization holds and improved KM processes it wishes to implement, and to explore the organizational culture. In this paper we introduce the concept of capturing tacit cultural perceptions to identify cultural barriers that may interfere with a KM initiative. For this purpose, an analysis instrument was developed and used during the KM audit in a large international software development organization
    • …
    corecore