Open Access. Powered by Scholars. Published by Universities.®

Risk Analysis Commons

Open Access. Powered by Scholars. Published by Universities.®

466 Full-Text Articles 752 Authors 113,205 Downloads 74 Institutions

All Articles in Risk Analysis

Faceted Search

466 full-text articles. Page 3 of 19.

A Metacognitive Approach To Trust And A Case Study: Artificial Agency, Ioan Muntean 2019 UNC Asheville

A Metacognitive Approach To Trust And A Case Study: Artificial Agency, Ioan Muntean

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

Trust is defined as a belief of a human H (`the trustor') about the ability of an agent A (the `trustee') to perform future action(s). We adopt here dispositionalism and internalism about trust: H trusts A iff A has some internal dispositions as competences. The dispositional competences of A are high-level metacognitive requirements, in the line of a naturalized virtue epistemology. (Sosa, Carter) We advance a Bayesian model of two (i) confidence in the decision and (ii) model uncertainty. To trust A, H demands A to be self-assertive about confidence and able to self-correct its own models. In the ...


Responding To Some Challenges Posed By The Re-Identification Of Anonymized Personal Data, Herman T. Tavani, Frances S. Grodzinsky 2019 Rivier University

Responding To Some Challenges Posed By The Re-Identification Of Anonymized Personal Data, Herman T. Tavani, Frances S. Grodzinsky

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

In this paper, we examine a cluster of ethical controversies generated by the re-identification of anonymized personal data in the context of big data analytics, with particular attention to the implications for personal privacy. Our paper is organized into two main parts. Part One examines some ethical problems involving re-identification of personally identifiable information (PII) in large data sets. Part Two begins with a brief description of Moor and Weckert’s Dynamic Ethics (DE) and Nissenbaum’s Contextual Integrity (CI) Frameworks. We then investigate whether these frameworks, used together, can provide us with a more robust scheme for analyzing privacy ...


A Ulysses Pact With Artificial Systems. How To Deliberately Change The Objective Spirit With Cultured Ai, Bruno Gransche 2019 University of Siegen, Germany

A Ulysses Pact With Artificial Systems. How To Deliberately Change The Objective Spirit With Cultured Ai, Bruno Gransche

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

The article introduces a concept of cultured technology, i.e. intelligent systems capable of interacting with humans and showing (or simulating) manners, of following customs and of socio-sensitive considerations. Such technologies might, when deployed on a large scale, influence and change the realm of human customs, traditions, standards of acceptable behavior, etc. This realm is known as the "objective spirit" (Hegel), which usually is thought of as being historically changing but not subject to deliberate human design. The article investigates the question of whether the purposeful design of interactive technologies (as cultured technologies) could enable us to shape modes of ...


Legal And Technical Issues For Text And Data Mining In Greece, Maria Kanellopoulou - Botti, Marinos Papadopoulos, Christos Zampakolas, Paraskevi Ganatsiou 2019 Department of Archives, Library Science and Museology, Ionian University, Greece

Legal And Technical Issues For Text And Data Mining In Greece, Maria Kanellopoulou - Botti, Marinos Papadopoulos, Christos Zampakolas, Paraskevi Ganatsiou

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

Web harvesting and archiving pertains to the processes of collecting from the web and archiving of works that reside on the Web. Web harvesting and archiving is one of the most attractive applications for libraries which plan ahead for their future operation. When works retrieved from the Web are turned into archived and documented material to be found in a library, the amount of works that can be found in said library can be far greater than the number of works harvested from the Web. The proposed participation in the 2019 CEPE Conference aims at presenting certain issues related to ...


On The Responsibility For Uses Of Downstream Software, Marty J. Wolf, Keith W. Miller, Frances S. Grodzinsky 2019 Bemidji State University

On The Responsibility For Uses Of Downstream Software, Marty J. Wolf, Keith W. Miller, Frances S. Grodzinsky

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

In this paper we explore an issue that is different from whether developers are responsible for the direct impact of the software they write. We examine, instead, in what ways, and to what degree, developers are responsible for the way their software is used “downstream.” We review some key scholarship analyzing responsibility in computing ethics, including some recent work by Floridi. We use an adaptation of a mechanism developed by Floridi to argue that there are features of software that can be used as guides to better distinguish situations where a software developer might share in responsibility for the software ...


Keeping Anonymity At The Consumer Behavior On The Internet: Proof Of Sacrifice, Sachio Horie 2019 Graduate School of Informatics Nagoya University

Keeping Anonymity At The Consumer Behavior On The Internet: Proof Of Sacrifice, Sachio Horie

Computer Ethics - Philosophical Enquiry (CEPE) Proceedings

The evolution of the Internet and AI technology has made it possible for the government and the businesses to keep track of their personal lives. GAFA continues to collect information unintended by the individuals. It is a threat that our privacy is violated in this way. In order to solute such problems, it is important to consider a mechanism that enables us to be peaceful lives while protecting privacy in the Internet society.

This paper focuses on the consumption behavior on the Internet and addresses anonymity. We consider some network protocols that enable sustainable consensus by combining anonymity methods such ...


Understanding The Privacy Methods, Implications, And Challenges Of Educational Data Mining., Tyler Blanco, Liam Smith 2019 University at Albany, State University of New York

Understanding The Privacy Methods, Implications, And Challenges Of Educational Data Mining., Tyler Blanco, Liam Smith

CURCE Annual Undergraduate Conference

Studies on educational data mining have massively advanced the analytical understanding of student learning, outcome predictions, student modeling, and better evaluation. While the information retrieved can improve educational outcomes, such studies must not break the wall of trust or compromise student privacy. To this end, it’s imperative to understand the methods of how privacy is ensured in the field of educational data mining and learning analytics, the limitations of these strategies, the complications that may follow, and the possible resolutions. In this project, we take a systematic approach to review studies in the educational data mining field. Initially, we ...


Analysis Of Computer Audit Data To Create Indicators Of Compromise For Intrusion Detection, Steven Millett, Michael Toolin, Justin Bates 2019 Southern Methodist University

Analysis Of Computer Audit Data To Create Indicators Of Compromise For Intrusion Detection, Steven Millett, Michael Toolin, Justin Bates

SMU Data Science Review

Network security systems are designed to identify and, if possible, prevent unauthorized access to computer and network resources. Today most network security systems consist of hardware and software components that work in conjunction with one another to present a layered line of defense against unauthorized intrusions. Software provides user interactive layers such as password authentication, and system level layers for monitoring network activity. This paper examines an application monitoring network traffic that attempts to identify Indicators of Compromise (IOC) by extracting patterns in the network traffic which likely corresponds to unauthorized access. Typical network log data and construct indicators are ...


A Unified Risk-Based Framework For Assessing Sustainability And Resiliency Of Civil Infrastructure, Thomas Adam Robbins 2019 Boise State University

A Unified Risk-Based Framework For Assessing Sustainability And Resiliency Of Civil Infrastructure, Thomas Adam Robbins

Boise State University Theses and Dissertations

As of February 2019, the National Aeronautics and Space Administration (NASA) has reported since 1880 the average global temperature has increased 1°C, with the warmest year on record being 2016. As the years continue to pass, it is becoming more evident that climate change is occurring, which is known to be a catalyst for climatic weather events. Statistically speaking, these events are more prevalent, and catastrophic exemplified as hurricanes, earthquakes, flooding, and fires. In addition to the increase of potentially catastrophic events, society as a whole has become more conscientious in the use and preservation of natural resources, waste ...


Underground Storage Tank Impact Model, Amy Telck 2019 Carroll College

Underground Storage Tank Impact Model, Amy Telck

Carroll College Student Undergraduate Research Festival

Leaking underground storage tanks (UST) pose a threat to the surround- ing environment and population. The Montana Department of Environmental Quality has completed two phases of a risk analysis with the purpose of identifying the USTs at the greatest risk of leaking in order to reallocate department resources. This analysis builds upon prior analyses in three ways: (1) identify how UST upgrades can reduce the risk of UST leaking, (2) how UST characteristics and upgrades relate to the cost of remediation, and (3) estimating the environmental impact of a release.


Seismic Performance Of Earth Slopes Subjected To Earthquake Mainshock – Aftershock Sequences, alisha khanal 2019 University of Texas at Tyler

Seismic Performance Of Earth Slopes Subjected To Earthquake Mainshock – Aftershock Sequences, Alisha Khanal

Civil Engineering Theses

Mainshocks are usually followed by aftershocks. Aftershocks continue over a period of time with a decreasing frequency and there is not sufficient time for repair and retrofit between a mainshock – aftershock sequence. Typically, aftershocks are smaller in magnitude; however, aftershock ground motion characteristics such as the intensity and duration can be greater than the mainshock due to the changes in the earthquake mechanism and location with respect to the site. The seismic performance of slopes is typically evaluated based on the sliding displacement predicted to occur along a critical sliding surface. Various empirical models are available that predict sliding displacement ...


An Investigation Of General Criteria For Assessing Space Flight Systems Of Diverse Mission Concept Designs, Cindy L. Daniels 2019 Old Dominion University

An Investigation Of General Criteria For Assessing Space Flight Systems Of Diverse Mission Concept Designs, Cindy L. Daniels

Engineering Management & Systems Engineering Theses & Dissertations

The purpose of this research is to investigate the general criteria for assessing the technical implementation risk factors of proposed space science missions at the mission concept stage. According to the National Aeronautics and Space Administration (NASA) Space Flight Program and Project Management Handbook (NASA, 2012), the mission concept review objectives are “To evaluate the feasibility of the proposed mission concept(s) and its fulfillment of the program's needs and objectives. To determine whether the maturity of the concept and associated planning are sufficient to begin Phase A” (p.33). Experts previously defined two technical risk factors, to assess ...


Left Turn Safety: Preventing Injury And Death Through Signs And Signaling, Elizabeth Webb 2019 Germanna Community College

Left Turn Safety: Preventing Injury And Death Through Signs And Signaling, Elizabeth Webb

Student Writing

Thousands of accidents each year are precipitated by drivers making a left turn within an intersection. These accidents tend to be caused primarily by driver error, confusing signaling or high rates of speed by through traffic. Extensive research suggests that reducing the rate of speed of through traffic, implementing warning signs with flashers along a roadway, adjusting the traffic signal phasing at an intersection, and utilizing creative intersection designs are all options which are available to combat these concerns and substantially minimize risks to all drivers. A recent fatal accident in Spotsylvania County highlights the need for intersection improvement at ...


Hazard And Operability Analysis Of An Ethylene Oxide Production Plant, Samantha Ciricillo 2019 University of South Carolina

Hazard And Operability Analysis Of An Ethylene Oxide Production Plant, Samantha Ciricillo

Senior Theses

The purpose of this work was to evaluate potential hazards and failures as part of the design and economic analysis for a chemical plant that would produce 150,000 tons of ethylene oxide per year. The Hazard and Operability (HAZOP) method of analysis was used to accomplish this goal. This method of hazard analysis involves brainstorming potential errors in a system by examining each element of each process unit in full detail. This project was focused on the reactor unit because the reactor has several important parameters that could fail, resulting in safety issues within the system. Input for this ...


Latex Modified Concrete - Very Early Strength, Bobby Steele 2019 Purdue University

Latex Modified Concrete - Very Early Strength, Bobby Steele

Purdue Road School

INDOT came out with specifications for a very early strength concrete to use on bridge deck overlays. This concrete is fast setting, which allows overlays to be performed over a weekend and benefits the traveling public with a short duration of traffic interference. Cure time to reach the strength requirement is 3 hours. E&B Paving performed the first application with the new spec on August 26, 2018. Many changes were also made to the INDOT Specification Section 722.


Standardisation In Construction Cost Control, Charles Mitchell 2019 Technological University Dublin

Standardisation In Construction Cost Control, Charles Mitchell

Other Resources

Poster presentation submitted as to the School of Surveying and Construction Management Research and Innovation Industry Evening, March 2019.


Fico® Scores Through The Economic Cycle And Understanding Consumer Sensitivities To Economic Fluctuations, Gerald Fahner 2019 South Dakota State University

Fico® Scores Through The Economic Cycle And Understanding Consumer Sensitivities To Economic Fluctuations, Gerald Fahner

SDSU Data Science Symposium

FICO® Scores assess default likelihood under “normal” conditions. Additional risk emanates from economic variability and manifests itself in changes to the score distribution as well as changes to the Odds-to-Score relationship. In this session we will examine credit bureau data from the Great Recession in the United States as compared to a stable economic period. We’ll share a framework that provides new and actionable insights into consumers’ sensitivities to such economic fluctuations such as:

  • Application of counterfactual analysis, machine learning, and scorecards, to rank-order consumers’ sensitivities

  • Consumer segmentation by economic sensitivities

  • Sensitivity profiling reveals interesting differences between the most ...


Project Insight: A Granular Approach To Enterprise Cybersecurity, Sunna Quazi, Adam Baca, Sam Darsche 2019 Southern Methodist University

Project Insight: A Granular Approach To Enterprise Cybersecurity, Sunna Quazi, Adam Baca, Sam Darsche

SMU Data Science Review

In this paper, we disambiguate risky activity corporate users are propagating with their software in real time by creating an enterprise security visualization solution for system administrators. The current problem in this domain is the lag in cyber intelligence that inhibits preventative security measure execution. This is partially due to the overemphasis of network activity, which is a nonfinite dataset and is difficult to comprehensively ingest with analytics. We address these concerns by elaborating on the beta of a software called "Insight" created by Felix Security. The overall solution leverages endpoint data along with preexisting whitelist/blacklist designations to unambiguously ...


Ce 5500: Stochastic Hydrology, University Of Virginia, Julianne Quinn 2019 Utah State University

Ce 5500: Stochastic Hydrology, University Of Virginia, Julianne Quinn

All ECSTATIC Materials

This document is the syllabus for CE 5500: Stochastic Hydrology by instructor Julianne D. Quinn at the University of Virginia. The course is an elective class, open to upper-level undergraduate and graduate students.


Lecture 1: Stochastic Hydrology, Julianne Quinn 2019 Utah State University

Lecture 1: Stochastic Hydrology, Julianne Quinn

All ECSTATIC Materials

This is the first lecture of CE 5500: Stochastic Hydrology, taught by Julianne Quinn at the University of Virginia.


Digital Commons powered by bepress