摘要 :
Sustainment Investment: the Problem. How do we make decisions about the allocation of funds between areas? (1) Operations: Supplying the fleet, customer supports, etc. (2) Improving the product: Engineering. (3) Improving the Orga...
展开
Sustainment Investment: the Problem. How do we make decisions about the allocation of funds between areas? (1) Operations: Supplying the fleet, customer supports, etc. (2) Improving the product: Engineering. (3) Improving the Organization: Capability and capacity. What are the consequences of poor and delayed decisions? How can we forecast the consequences of various alternatives? Agenda: Sustainment Overview. Understanding Our Simulation. Using Scenarios to Apply the Tool. Results and Challenges.
收起
摘要 :
This document provides a scalable tool that airport operators, terminal managers, emergency managers, and planners can use to create and maintain integrated incident response plans that address hazards in and around airport termin...
展开
This document provides a scalable tool that airport operators, terminal managers, emergency managers, and planners can use to create and maintain integrated incident response plans that address hazards in and around airport terminals. The Airport Terminal Incident Response Plan (TIRP) tool (available on the CD-ROM that accompanies this report) assists in the development of a response plan that, when implemented, would mitigate the impact of these events on the terminal users. These response plans cover natural and manmade incidents such as hurricanes, snowstorms, tornados, earthquakes, structural fires, electrical outages/power failures, bomb threats, security breaches, and active shooter situations for evacuation, sheltering in place, relocation, and repopulation/recovery and are applicable to a variety of sizes and types of airports and airport terminals. In addition to the TIRP tool, the report contains a users guide that provides a step-by-step process of generating incident response plans. The report also contains an output example that demonstrates completed terminal incident response plans using the TIRP tool.
收起
摘要 :
The Sydney Coordinated Adaptive Traffic System (SCATS) is used to mitigate traffic congestion along urban arterial corridors. Although there has been research on SCATS performance, this report combines three different areas of res...
展开
The Sydney Coordinated Adaptive Traffic System (SCATS) is used to mitigate traffic congestion along urban arterial corridors. Although there has been research on SCATS performance, this report combines three different areas of research about SCATS that are not known to be represented in any research literature. These include: (a) the relationship between SCATS, traffic volumes, and Transit Signal Priority (TSP); (b) between TSP and traffic conditions; and (c) the correlation between signal timing and air quality; in particular, human exposure to the air pollutant PM2.5 at intersections. In addition, this research looked at the key factors affecting transit user exposure to traffic-related pollutants at bus shelters. All areas of study present the results of statistical tests and regressions to determine SCATS or traffic variables impacts. SCATS did show statistically significant improvements regarding traffic speeds at one minor intersection, even when traffic volumes showed a statistically significant improvement. At a major intersection, results were mixed and not conclusive. Overall, it was determined that the improvements available through SCATS vary depending on the time of day and the direction of travel. TSP was not negatively affected by SCATS. In controlling for both priority and traffic conditions, each were shown to have a distinguished and significant impact on bus travel time. Non-priority signals had a much greater impact on travel time than priority signals (11.0 and 0.6 seconds for the corridor model, respectively).
收起
摘要 :
Organizations that are using the CERT. Resilience Management Model and organizations that are considering using it want information about the business value of implementing resilience processes and practices, and how to determine ...
展开
Organizations that are using the CERT. Resilience Management Model and organizations that are considering using it want information about the business value of implementing resilience processes and practices, and how to determine which ones to implement. This report describes the SEI research study that begins to address this need. It includes a discussion of the completed phase 1 study and a proposed phase 2 project. Phase 1 included forming a hypothesis and set of research questions and using a variety of techniques to collect data and evaluate whether resilience practices have a discernible (measurable) effect on operational resilience--that is, an organization's ability to continue to carry out its mission (provide critical services) in the presence of operational stress and disruption. The outcomes of phase 1 provide the foundation for the proposed phase 2. The longer term goal includes developing a quantitative, validated business case for prioritizing and implementing specific resilience practices, including decision criteria for selecting and measuring investments in improved resilience.
收起
摘要 :
This fourth edition of the Common Sense Guide to Mitigating Insider Threats provides the most current recommendations of the CERT Program (part of Carnegie Mellon University's Software Engineering Institute), based on an expanded ...
展开
This fourth edition of the Common Sense Guide to Mitigating Insider Threats provides the most current recommendations of the CERT Program (part of Carnegie Mellon University's Software Engineering Institute), based on an expanded database of more than 700 insider threat cases and continued research and analysis. It introduces the topic of insider threats, explains its intended audience and how this guide differs from previous editions, defines insider threats, and outlines current patterns and trends. The guide then describes 19 practices that organizations should implement across the enterprise to prevent and detect insider threats, as well as case studies of organizations that failed to do so. Each practice includes features new to this edition: challenges to implementation, quick wins and highimpact solutions for small and large organizations, and relevant security standards. This edition also focuses on six groups within an organization - human resources, legal, physical security, data owners, information technology, and software engineering - and maps the relevant groups to each practice. The appendices provide a revised list of information security best practices, a new mapping of the guide's practices to established security standards, a new breakdown of the practices by organizational group, and new checklists of activities for each practice.
收起
摘要 :
Air quality information is increasingly becoming a public health concern, since some of the aerosol particles pose harmful effects to peoples health. One widely available metric of aerosol abundance is the aerosol optical depth (A...
展开
Air quality information is increasingly becoming a public health concern, since some of the aerosol particles pose harmful effects to peoples health. One widely available metric of aerosol abundance is the aerosol optical depth (AOD). The AOD is the integrated light extinction coefficient over a vertical atmospheric column of unit cross section, which represents the extent to which the aerosols in that vertical profile prevent the transmission of light by absorption or scattering. The comparison between the AOD measured from the ground-based Aerosol Robotic Network (AERONET) system and the satellite MODIS instruments at 550 nm shows that there is a bias between the two data products. We performed a comprehensive analysis exploring possible factors which may be contributing to the inter-instrumental bias between MODIS and AERONET. The analysis used several measured variables, including the MODIS AOD, as input in order to train a neural network in regression mode to predict the AERONET AOD values. This not only allowed us to obtain an estimate, but also allowed us to infer the optimal sets of variables that played an important role in the prediction. In addition, we applied machine learning to infer the global abundance of ground level PM2.5 from the AOD data and other ancillary satellite and meteorology products. This research is part of our goal to provide air quality information, which can also be useful for global epidemiology studies.
收起
摘要 :
We examine whether reasoning is improved by evaluative feedback, i.e., the information of whether a reasoner's answer was correct or incorrect, and report two studies that show that evaluative feedback increases the chances that p...
展开
We examine whether reasoning is improved by evaluative feedback, i.e., the information of whether a reasoner's answer was correct or incorrect, and report two studies that show that evaluative feedback increases the chances that participants will produce normatively correct responses for deductive reasoning problems. In Experiment 1, participants who were given feedback about their performance did better on problems based on disjunctions that were designed to elicit illusory inferences. In Experiment 2, participants answered difficult syllogisms with more accuracy when they were provided with feedback. We conclude by contrasting the rule- , heuristics-, and model-based accounts of deduction on their ability to explain the effects of evaluative feedback.
收起
摘要 :
The Insider Threat Security Reference Architecture (ITSRA) provides an enterprise-wide solution to insider threat. The architecture consists of four security layers: Business, Information, Data, and Application. Organizations shou...
展开
The Insider Threat Security Reference Architecture (ITSRA) provides an enterprise-wide solution to insider threat. The architecture consists of four security layers: Business, Information, Data, and Application. Organizations should deploy and enforce controls at each layer to address insider attacks. None of the layers function in isolation or independently of other layers. Rather, the correlation of indicators and application of controls across all four layers form the crux of this approach. Empirical data consisting of more than 700 cases of insider crimes show that insider attacks proved successful in inflicting damage when an organization failed to implement adequate controls in any of three security principles: authorized access, acceptable use, and continuous monitoring. The ITSRA draws from existing best practices and standards as well as from analysis of these cases to provide actionable guidance for organizations to improve their posture against the insider threat.
收起
摘要 :
This report summarizes the findings of a national project to examine the travel behavior, social capital, health, and lifestyle preferences of residents of neotraditional developments (NTD) compared to more standard suburban devel...
展开
This report summarizes the findings of a national project to examine the travel behavior, social capital, health, and lifestyle preferences of residents of neotraditional developments (NTD) compared to more standard suburban developments. We compare survey results from residents of matched pairs of neighborhoods in seventeen U.S. cities and towns, with each pair comprised of one NTD and one typical suburban neighborhood of similar size, age, and socio-demographic composition. The study addresses salient themes in the transportation, planning and health literatures: a national study, surveying populations of diverse incomes, collecting resident information on preferences for and attitudes towards neighborhood qualities, and addressing transportation and health outcomes for diverse community designs.
收起