12 research outputs found

    Exploring Blockchain Adoption Supply Chains: Opportunities and Challenges

    Get PDF
    Acquisition Management / Grant technical reportAcquisition Research Program Sponsored Report SeriesSponsored Acquisition Research & Technical ReportsIn modern supply chains, acquisition often occurs with the involvement of a network of organizations. The resilience, efficiency, and effectiveness of supply networks are crucial for the viability of acquisition. Disruptions in the supply chain require adequate communication infrastructure to ensure resilience. However, supply networks do not have a shared information technology infrastructure that ensures effective communication. Therefore decision-makers seek new methodologies for supply chain management resilience. Blockchain technology offers new decentralization and service delegation methods that can transform supply chains and result in a more flexible, efficient, and effective supply chain. This report presents a framework for the application of Blockchain technology in supply chain management to improve resilience. In the first part of this study, we discuss the limitations and challenges of the supply chain system that can be addressed by integrating Blockchain technology. In the second part, the report provides a comprehensive Blockchain-based supply chain network management framework. The application of the proposed framework is demonstrated using modeling and simulation. The differences in the simulation scenarios can provide guidance for decision-makers who consider using the developed framework during the acquisition process.Approved for public release; distribution is unlimited

    Cyber Third-Party Risk Management: A Comparison of Non-Intrusive Risk Scoring Reports

    Get PDF
    Cybersecurity is a concern for organizations in this era. However, strengthening the security of an organization’s internal network may not be sufficient since modern organizations depend on third parties, and these dependencies may open new attack paths to cybercriminals. Cyber Third-Party Risk Management (C-TPRM) is a relatively new concept in the business world. All vendors or partners possess a potential security vulnerability and threat. Even if an organization has the best cybersecurity practice, its data, customers, and reputation may be at risk because of a third party. Organizations seek effective and efficient methods to assess their partners’ cybersecurity risks. In addition to intrusive methods to assess an organization’s cybersecurity risks, such as penetration testing, non-intrusive methods are emerging to conduct C-TPRM more easily by synthesizing the publicly available information without requiring any involvement of the subject organization. In this study, the existing methods for C-TPRM built by different companies are presented and compared to discover the commonly used indicators and criteria for the assessments. Additionally, the results of different methods assessing the cybersecurity risks of a specific organization were compared to examine reliability and consistency. The results showed that even if there is a similarity among the results, the provided security scores do not entirely converge

    The Impact of Human Assurance on Satellite Operations

    Get PDF
    Mission assurance is a method to guarantee mission success against a known set of risks; mission assurance is generally represented as a probability against a threshold of acceptable performance. Human assurance can be considered as the likelihood of acceptable operator performance given a set of conditions that include the operator, the system, and the environment. Standard mission assurance models tend to assume a qualified crew, but do not include other aspects of the internal or external environment that may impact the reliability of the human operator. A human assurance model can be created that allows the exploration of the variability in operator performance due to the likelihood of different risks. An example human assurance model has been created for the detection of adverse trending satellite data and the need to modify the existing mission schedule to address the satellite emergency. The model leverages the Human Viewpoint framework to capture the human-focused data within the mission context. From this data, sources of risk can be identified for the socio-technical system and a risk framework developed. The resulting risk model allows exploration of the characteristics of both the operator and the operating environment, as well as the impact of organizational mitigations, on the likelihood that the socio-technical system will meet mission assurance thresholds. The method provided can be used to identify the limitations of human system performance against the established criteria

    Impact of opioid-free analgesia on pain severity and patient satisfaction after discharge from surgery: multispecialty, prospective cohort study in 25 countries

    Get PDF
    Background: Balancing opioid stewardship and the need for adequate analgesia following discharge after surgery is challenging. This study aimed to compare the outcomes for patients discharged with opioid versus opioid-free analgesia after common surgical procedures.Methods: This international, multicentre, prospective cohort study collected data from patients undergoing common acute and elective general surgical, urological, gynaecological, and orthopaedic procedures. The primary outcomes were patient-reported time in severe pain measured on a numerical analogue scale from 0 to 100% and patient-reported satisfaction with pain relief during the first week following discharge. Data were collected by in-hospital chart review and patient telephone interview 1 week after discharge.Results: The study recruited 4273 patients from 144 centres in 25 countries; 1311 patients (30.7%) were prescribed opioid analgesia at discharge. Patients reported being in severe pain for 10 (i.q.r. 1-30)% of the first week after discharge and rated satisfaction with analgesia as 90 (i.q.r. 80-100) of 100. After adjustment for confounders, opioid analgesia on discharge was independently associated with increased pain severity (risk ratio 1.52, 95% c.i. 1.31 to 1.76; P < 0.001) and re-presentation to healthcare providers owing to side-effects of medication (OR 2.38, 95% c.i. 1.36 to 4.17; P = 0.004), but not with satisfaction with analgesia (beta coefficient 0.92, 95% c.i. -1.52 to 3.36; P = 0.468) compared with opioid-free analgesia. Although opioid prescribing varied greatly between high-income and low- and middle-income countries, patient-reported outcomes did not.Conclusion: Opioid analgesia prescription on surgical discharge is associated with a higher risk of re-presentation owing to side-effects of medication and increased patient-reported pain, but not with changes in patient-reported satisfaction. Opioid-free discharge analgesia should be adopted routinely

    Quantifying Cyber Risk by Integrating Attack Graph and Impact Graph

    No full text
    Being a relatively new risk source, models to quantify cyber risks are not well developed; therefore, cyber risk management in most businesses depends on qualitative assessments. With the increase in the economic consequences of cyber incidents, the importance of quantifying cyber risks has increased. Cyber risk quantification is also needed to establish communication among decision-makers of different levels of an enterprise, from technical personnel to top management. The goal of this research is to build a probabilistic cybersecurity risk analysis model that relates attack propagation with impact propagation through internal dependencies and allows temporal analysis. The contributions of the developed research are (1) attack propagation model that adapts vulnerability scoring that is customizable for organization, and that considers temporal aspect, (2) impact propagation assessment model that is probabilistic and that allows temporal aspect (3) integrating attack propagation and business impact propagation assessment to calculate economic impacts of cyber risks

    Exploring Blockchain Adoption Supply Chains: Opportunities and Challenges

    Get PDF
    In modern supply chains, acquisition often occurs with the involvement of a network of organizations. The resilience, efficiency, and effectiveness of supply networks are crucial for the viability of acquisition. Disruptions in the supply chain require adequate communication infrastructure to ensure resilience. However, supply networks do not have a shared information technology infrastructure that ensures effective communication. Therefore decision-makers seek new methodologies for supply chain management resilience. Blockchain technology offers new decentralization and service delegation methods that can transform supply chains and result in a more flexible, efficient, and effective supply chain. This report presents a framework for the application of Blockchain technology in supply chain management to improve resilience. In the first part of this study, we discuss the limitations and challenges of the supply chain system that can be addressed by integrating Blockchain technology. In the second part, the report provides a comprehensive Blockchain-based supply chain network management framework. The application of the proposed framework is demonstrated using modeling and simulation. The differences in the simulation scenarios can provide guidance for decision-makers who consider using the developed framework during the acquisition process

    Space Infrastructures: From Risk to Resilience Governance

    No full text
    Space-critical infrastructures represent an interdependent system of systems consisting of workforce, environment, facilities, and multidirectional interactions. These are essential for the maintenance of vital societal functions such as health, safety, security, mobility, and the economic and social well-being of people, and their destruction or disruption would have a significant impact on society as a whole. In all, 79 nations and government consortia currently operate satellites, with 11 countries operating 22 launch sites. Despite creating new challenges, this multi-actor environment offers opportunities for international cooperation, but making the most of these opportunities requires a holistic approach to space-critical infrastructure, away from strictly defined space technologies and towards understanding the resilience of complex systems and how they are intertwined in reality. This book presents papers from the NATO Advanced Research Workshop (ARW), entitled Critical Space Infrastructure: From Vulnerabilities and Threats to Resilience, held in Norfolk, Virginia, USA from 21-22 May 2019. The ARW brought together representatives from academia, industry, and international organizations in an effort to deepen scientific and technological understanding of space-critical infrastructures and explore the implications for national and international space security and resilience. It examined space as a critical infrastructure from a multidisciplinary perspective in accordance with NATO s Strategic Concept. The 29 chapters in the book are divided into six sections covering space infrastructure: governance; cybersecurity; risk, resiliency and complexity; emerging technologies such as block chain, artificial intelligence and quantum computing; application domains; and national approaches and applications. [Amazon.com]https://digitalcommons.odu.edu/emse_books/1019/thumbnail.jp

    Neogene shortening and exhumation of the Zagros fold-thrust belt and foreland basin in the Kurdistan region of northern Iraq

    No full text
    corecore