21 results on '"Natalie M. Scala"'
Search Results
2. Prioritizing collaborative scheduling practices based on their impact on project performance
- Author
-
Chuanni He, Min Liu, Thais da C. L. Alves, Natalie M. Scala, and Simon M. Hsiang
- Subjects
Building and Construction ,Industrial and Manufacturing Engineering ,Management Information Systems - Published
- 2022
- Full Text
- View/download PDF
3. The gold standard: developing a maturity model to assess collaborative scheduling
- Author
-
Natalie M. Scala, Min Liu, Thais da Costa Lago Alves, Vincent Schiavone, and Dominique Hawkins
- Subjects
Architecture ,Building and Construction ,General Business, Management and Accounting ,Civil and Structural Engineering - Abstract
PurposeThe overall contribution of this work is to provide a usable maturity model for collaborative scheduling (CS) that extends the literature, identifies inconsistencies in schedule development, and improves collaboration in the construction industry.Design/methodology/approachVia subject matter expert elicitation and focus groups, the maturity model establishes five pillars of collaboration—scheduling significance, planners and schedulers, scheduling representation, goal alignment with owner, and communication. The maturity model is then validated through iterative feedback and chi-squared statistical analysis of data obtained from a survey. The five pillars are tied to the literature and previous work in CS.FindingsThe analysis shows that current industry projects are not consistent in collaboration practice implementation, and the maturity model identifies areas for collaboration improvement. The study's contributions to the body of knowledge are (1) developing a maturity model-based approach to define and measure the current level of collaboration and (2) discovering the level of consistency in scheduling collaboration practice implementation.Practical implicationsThe findings provide a benchmark for self-evaluation and peer-to-peer comparison for project managers. The model is also useful for project managers to develop effective strategies for improvement on targeted dimensions and metrics.Originality/valueThe construction engineering and management (CEM) literature does not contain targeted models for scheduling collaboration in the context of maturity and, broadly speaking, neither does the literature at large. The literature also lacks actionable items as presented for the maturity model for collaborative scheduling (MMCS).
- Published
- 2022
- Full Text
- View/download PDF
4. Motivation and Analytics: Comparing Business and Engineering Students.
- Author
-
Natalie M. Scala, Stella Tomasi, Andrea M. Goncher, and Karen M. Bursic
- Published
- 2018
- Full Text
- View/download PDF
5. Managing Nuclear Spare Parts Inventories: A Data Driven Methodology.
- Author
-
Natalie M. Scala, Jayant Rajgopal, and Kim LaScola Needy
- Published
- 2014
- Full Text
- View/download PDF
6. Comparative Analysis of Planning with the Critical Path Method, Last Planner System, and Location-Based Techniques in Brazil, Finland, and the United States
- Author
-
Natalie M. Scala, Vincent Schiavone, Hylton Olivieri, Olli Seppänen, Thais da C. L. Alves, Min Liu, Ariovaldo Denis Granja, Towson University, Institute for Technological Research, Department of Civil Engineering, San Diego State University, Syracuse University, Universidade Estadual de Campinas, Aalto-yliopisto, and Aalto University
- Subjects
Scheduling ,Critical Path Method ,General Engineering ,Last Planner System ,location-based scheduling ,Program & Project Management - Abstract
Publisher Copyright: © 2022 American Society for Engineering Management. The Critical Path Method (CPM), the Last Planner System (LPS) and location-based methods, such as the Line of Balance (LB), are discussed extensively in the technical literature about schedules. However, no discussion exists focusing on the differences and similarities of these methods in terms of their use in different countries. Using chi-squared and Fisher’s exact tests, this research compared three countries (Brazil, Finland, and United States) and the methods to evaluate both intra- and inter-country implementation to gain additional insights about their use. Results suggest statistically significant intra- and inter-country differences regarding how these methods are used, with a specific focus on mechanics in the countries, offering important information to address their various scheduling needs. The results reflect the current state of practice; engineering and construction managers should understand different ways of understanding scheduling. Such understanding can lead to more efficient communication with collaborators and when incorporating foreign teams in projects. The study identifies the need for further scientific explanation as to why these methods are used in the manner they are intra-country as well as adaptions made in inter-country relationships.
- Published
- 2022
7. Schedules and Schedulers: A Study in the U.S. Construction Industry
- Author
-
Ashtad Javanmardi, Min Liu, Natalie M. Scala, and Thais da C. L. Alves
- Subjects
Operations research ,Computer science ,business.industry ,05 social sciences ,0211 other engineering and technologies ,General Engineering ,Scheduling (production processes) ,02 engineering and technology ,Construction industry ,021105 building & construction ,0502 economics and business ,Project management ,business ,050203 business & management - Abstract
This research examines how the construction industry addresses the roles of schedulers and schedules, with the goal of improving current practices. We use a mixed-mode approach of qualitative and q...
- Published
- 2020
- Full Text
- View/download PDF
8. Operations Research
- Author
-
Paul L. Goethals, Natalie M. Scala, and Nathaniel D. Bastian
- Published
- 2022
- Full Text
- View/download PDF
9. Mathematics in Cyber Research
- Author
-
Paul L. Goethals, Natalie M. Scala, and Daniel T. Bennett
- Published
- 2022
- Full Text
- View/download PDF
10. Risk and the Five Hard Problems of Cybersecurity
- Author
-
Allison C. Reilly, Paul L. Goethals, Michel Cukier, and Natalie M. Scala
- Subjects
Risk analysis ,021110 strategic, defence & security studies ,Computer science ,business.industry ,0211 other engineering and technologies ,02 engineering and technology ,010501 environmental sciences ,Computer security ,computer.software_genre ,United States National Security Agency ,01 natural sciences ,Field (computer science) ,Software deployment ,Composability ,Physiology (medical) ,Scalability ,Business intelligence ,Realm ,Safety, Risk, Reliability and Quality ,business ,computer ,0105 earth and related environmental sciences - Abstract
This perspectives article addresses risk in cyber defense and identifies opportunities to incorporate risk analysis principles into the cybersecurity field. The Science of Security (SoS) initiative at the National Security Agency seeks to further and promote interdisciplinary research in cybersecurity. SoS organizes its research into the Five Hard Problems (5HP): (1) scalability and composability; (2) policy-governed secure collaboration; (3) security-metrics-driven evaluation, design, development, and deployment; (4) resilient architectures; and (5) understanding and accounting for human behavior. However, a vast majority of the research sponsored by SoS does not consider risk and when it does so, only implicitly. Therefore, we identify opportunities for risk analysis in each hard problem and propose approaches to address these objectives. Such collaborations between risk and cybersecurity researchers will enable growth and insight in both fields, as risk analysts may apply existing methodology in a new realm, while the cybersecurity community benefits from accepted practices for describing, quantifying, working with, and mitigating risk.
- Published
- 2019
- Full Text
- View/download PDF
11. Mathematics in Cyber Research
- Author
-
Paul L. Goethals, Natalie M. Scala, Daniel T. Bennett, Paul L. Goethals, Natalie M. Scala, and Daniel T. Bennett
- Subjects
- Cyberspace--Mathematics, Computer science--Mathematics, Operations research--Mathematics
- Abstract
In the last decade, both scholars and practitioners have sought novel ways to address the problem of cybersecurity. Innovative outcomes have included applications such as blockchain as well as creative methods for cyber forensics, software development, and intrusion prevention. Accompanying these technological advancements, discussion on cyber matters at national and international levels has focused primarily on the topics of law, policy, and strategy. The objective of these efforts is typically to promote security by establishing agreements among stakeholders on regulatory activities. Varying levels of investment in cyberspace, however, comes with varying levels of risk; in some ways, this can translate directly to the degree of emphasis for pushing substantial change. At the very foundation or root of cyberspace systems and processes are tenets and rules governed by principles in mathematics. Topics such as encrypting or decrypting file transmissions, modeling networks, performing data analysis, quantifying uncertainty, measuring risk, and weighing decisions or adversarial courses of action represent a very small subset of activities highlighted by mathematics. To facilitate education and a greater awareness of the role of mathematics in cyber systems and processes, a description of research in this area is needed. Mathematics in Cyber Research aims to familiarize educators and young researchers with the breadth of mathematics in cyber-related research. Each chapter introduces a mathematical sub-field, describes relevant work in this field associated with the cyber domain, provides methods and tools, as well as details cyber research examples or case studies. Features One of the only books to bring together such a diverse and comprehensive range of topics within mathematics and apply them to cyber research. Suitable for college undergraduate students or educators that are either interested in learning about cyber-related mathematics or intend to perform research within the cyber domain. The book may also appeal to practitioners within the commercial or government industry sectors. Most national and international venues for collaboration and discussion on cyber matters have focused primarily on the topics of law, policy, strategy, and technology. This book is among the first to address the underpinning mathematics.
- Published
- 2022
12. Handbook of Military and Defense Operations Research
- Author
-
Natalie M. Scala, James P. Howard, II, Natalie M. Scala, and James P. Howard, II
- Subjects
- Operations research, Military art and science
- Abstract
Tracing its roots back to World War II, operations research (OR) has become a vital tool in military and defense strategy. The second edition of the Handbook of Military and Defense Operations Research highlights this evolution, showcasing how OR integrates with cutting-edge areas like artificial intelligence, cybersecurity, and big data analytics.This volume is more than a historical account; it is a practical guide. The volume features expert voices and offers insights into OR applications in modern security challenges. Readers will discover a blend of theory and real-world case studies, making it an essential resource for both newcomers and seasoned defense analysis professionals.Dive into this handbook to explore the rich, dynamic field of military and defense operations research, a discipline at the heart of global security and strategic decision-making.New to the second edition: Reorganized into a three-part structure Extensive revisions throughout Numerous new exercises, examples, and case studies Several new chapters
- Published
- 2021
13. A Model for and Inventory of Cybersecurity Values: Metrics and Best Practices
- Author
-
Paul L. Goethals and Natalie M. Scala
- Subjects
Risk analysis ,Subject-matter expert ,Decision support system ,Work (electrical) ,Computer science ,Best practice ,Threat model ,Notional amount ,Computer security ,computer.software_genre ,computer ,Domain (software engineering) - Abstract
The practice of threat modeling to identify and mitigate, or eliminate, vulnerabilities, has a long history in military operations research. More recently, these practices are applied to the cyber domain to give a defender an increased advantage. Most cybersecurity research, however, is performed in the computer science and network infrastructure fields where the focus is on theory and infrastructure management. Consequently, the work is lacking traditional operations research perspectives in risk analysis, assessment, and decision support that may lead to a greater overall defensive posture. This chapter outlines several operations research techniques used in modeling cybersecurity threats and proposes a value model framework for security metrics and best practices that is supported by data and interviews with subject matter experts. The value model, which includes a framework that can be customized for any organization, is illustrated using notional data. Finally, through a survey of cyber professionals with both military and corporate industry experience, an inventory of valued attributes for a secure cyber system is provided, along with potential differences in values based on an organization’s history of attacks and/or breaches. This model, grounded in the principles of military operations research, will enable organizations to assess the performance of their respective cyber systems, manage risk, and continuously improve their processes.
- Published
- 2020
- Full Text
- View/download PDF
14. Handbook of Military and Defense Operations Research
- Author
-
II James P. Howard and Natalie M. Scala
- Subjects
Engineering ,Aeronautics ,business.industry ,business - Published
- 2020
- Full Text
- View/download PDF
15. Handbook of Military and Defense Operations Research
- Author
-
Natalie M. Scala, James P. Howard, II, Natalie M. Scala, and James P. Howard, II
- Subjects
- Military art and science, Operations research
- Abstract
Operations research (OR) is a core discipline in military and defense management. Coming to the forefront initially during World War II, OR provided critical contributions to logistics, supply chains, and strategic simulation, while enabling superior decision-making for Allied forces. OR has grown to include analytics and many applications, including artificial intelligence, cybersecurity, and big data, and is the cornerstone of management science in manufacturing, marketing, telecommunications, and many other fields. The Handbook of Military and Defense Operations Research presents the voices leading OR and analytics to new heights in security through research, practical applications, case studies, and lessons learned in the field. Features Applies the experiences of educators and practitioners working in the field Employs the latest technology developments in case studies and applications Identifies best practices unique to the military, security, and national defense problem space Highlights similarities and dichotomies between analyses and trends that are unique to military, security, and defense problems.
- Published
- 2020
16. A Value Model for Asset Tracking Technology to Support Naval Sea-Based Resupply
- Author
-
Natalie M. Scala and Jennifer A. Pazour
- Subjects
Engineering ,021103 operations research ,Military logistics ,business.industry ,Asset tracking ,05 social sciences ,0211 other engineering and technologies ,General Engineering ,02 engineering and technology ,Stowage factor ,Technology management ,Subject-matter expert ,Value focused thinking ,0502 economics and business ,Systems engineering ,Radio-frequency identification ,business ,Decision model ,050203 business & management ,Simulation - Abstract
A value model is developed for military logistics that fulfill emergent requests for tailored resupply packages from the sea. Asset tracking technologies, including radio frequency identification, barcoding, internal positioning systems (IPS), and camera-aided technology, are considered as alternatives to a multi-objective decision model. Model measures include registration of inventory in the system, stowage factor enablement, storage location precision, retrieval identification accuracy, system compatibility, and security. The decision model is presented using insights from subject matter experts. Given the requirements of selective offloading in dense storage environments, IPS is the preferred asset tracking technology. Sensitivity analysis and recommendations for engineering managers are provided.
- Published
- 2016
- Full Text
- View/download PDF
17. Analyzing supplier quality management practices in the construction industry
- Author
-
Rufaidah Y. AlMaian, Kenneth Walsh, Kim LaScola Needy, Thais da C. L. Alves, and Natalie M. Scala
- Subjects
0301 basic medicine ,Quality management ,Process (engineering) ,Computer science ,media_common.quotation_subject ,Analytic hierarchy process ,01 natural sciences ,Industrial and Manufacturing Engineering ,Reliability engineering ,010104 statistics & probability ,03 medical and health sciences ,Subject-matter expert ,Engineering management ,030104 developmental biology ,Quantitative analysis (finance) ,Quality (business) ,0101 mathematics ,Safety, Risk, Reliability and Quality ,Function (engineering) ,Performance rating ,media_common - Abstract
Supplier quality management (SQM) is an important function in the construction industry. Many construction organizations place high importance on using quantitative analyses to select effective SQM practices that ensure that materials, assemblies, and fabricated equipment for the construction project are within quality specifications. However, traditional quantitative analysis methods may be limited because the process of acquiring enough data to conduct the analyses is time consuming and costly. This article discusses the use of principal component analysis (PCA) to analyze a number of SQM practices from construction organizations known for their effective SQM. PCA is useful in this study because the data available for analysis are small in size and multivariate. SQM practices are discussed extensively and validated with subject matter experts (SMEs) using the analytical hierarchy process (AHP). We show that supplier's work observation, supplier performance rating, inspection effort tracking, and...
- Published
- 2015
- Full Text
- View/download PDF
18. Group Decision Making with Dispersion in the Analytic Hierarchy Process
- Author
-
Kim LaScola Needy, Luis G. Vargas, Natalie M. Scala, and Jayant Rajgopal
- Subjects
Mathematical optimization ,021103 operations research ,Strategy and Management ,Supply chain ,0211 other engineering and technologies ,Pareto principle ,General Social Sciences ,General Decision Sciences ,Analytic hierarchy process ,Context (language use) ,02 engineering and technology ,Weighted geometric mean ,Group decision-making ,Arts and Humanities (miscellaneous) ,Management of Technology and Innovation ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Pairwise comparison ,Statistical dispersion ,Mathematics - Abstract
With group judgments in the context of the Analytic Hierarchy Process (AHP) one would hope for broad consensus among the decision makers. However, in practice this will not always be the case, and significant dispersion may exist among the judgments. Too much dispersion violates the principle of Pareto Optimality at the comparison level and/or matrix level, and if this happens, then the group may be homogenous in some comparisons and heterogeneous in others. The question then arises as to what would be an appropriate aggregation scheme when a consensus cannot be reached and the decision makers are either unwilling or unable to revise their judgments. In particular, the traditional aggregation via the geometric mean has been shown to be inappropriate in such situations. In this paper, we propose a new method for aggregating judgments when the raw geometric mean cannot be used. Our work is motivated by a supply chain problem of managing spare parts in the nuclear power generation sector and can be applied whenever the AHP is used with judgments from multiple decision makers. The method makes use of principal components analysis (PCA) to combine the judgments into one aggregated value for each pairwise comparison. We show that this approach is equivalent to using a weighted geometric mean with the weights obtained from the PCA.
- Published
- 2015
- Full Text
- View/download PDF
19. Managing Nuclear Spare Parts Inventories: A Data Driven Methodology
- Author
-
Jayant Rajgopal, Natalie M. Scala, and Kim LaScola Needy
- Subjects
Engineering ,business.industry ,Strategy and Management ,Analytic hierarchy process ,Nuclear power ,Industrial engineering ,Data-driven ,Criticality ,Spare part ,Systems engineering ,Inventory theory ,Influence diagram ,Electrical and Electronic Engineering ,business ,Spare parts management - Abstract
This paper presents a methodology for developing a spare parts inventory management system with a focus on the nuclear power sector. Often, demand for spare parts is highly intermittent and cannot be accurately forecasted through traditional methods. Examples include nuclear power generation equipment, ground space systems, and aircraft engine parts. We take a data-driven engineering management approach and develop a four-step methodology for spare parts management in such environments. These steps comprise an influence diagram for identifying relevant factors, weighting of influences through the analytic hierarchy process, grouping parts according to inventory criticality indices, and the development of base stock inventory policies for each group. This approach allows the system to be actively managed within a continuous improvement framework through employee engagement and input, and mathematical assumptions are not made in the models. To our knowledge, no such integrated, comprehensive methodology for spare parts has been developed. The techniques employed in this research can be effectively used together to holistically manage the entire spare parts process, or they may be used separately to manage portions of the process. This paper provides an overview of the methodology, and the entire approach is illustrated via a test bed nuclear power generation facility.
- Published
- 2014
- Full Text
- View/download PDF
20. A Base Stock Inventory Management System for Intermittent Spare Parts
- Author
-
Kim LaScola Needy, Natalie M. Scala, and Jayant Rajgopal
- Subjects
Inventory management system ,Spare part ,Operations management ,Business ,Stock (geology) - Published
- 2013
- Full Text
- View/download PDF
21. Using Principal Components Analysis for Aggregating Judgments in the Analytic Hierarchy Process
- Author
-
Kim LaScola Needy, Natalie M. Scala, Jayant Rajgopal, and Luis G. Vargas
- Subjects
Computer science ,Principal component analysis ,Analytic hierarchy process ,Data mining ,computer.software_genre ,computer - Published
- 2014
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.