Strategic Decision Support using Computerised Morphological Analysis
|
|
|
- Alaina Wiggins
- 10 years ago
- Views:
Transcription
1 Strategic Decision Support using Computerised Morphological Analysis Adapted from a paper presented at the 9th International Command and Control Research and Technology Symposium, Copenhagen September 14-16, 2004 Tom Ritchey Former Research Director Department for Technology Foresight and Assessment Swedish Defence Research Agency (Contact: [email protected]) (Downloaded from the Swedish Morphological Society) ( Abstract General Morphological Analysis (GMA), pioneered by Fritz Zwicky at the California Institute of Technology in the 1930s and 40s, was developed as a method for structuring and investigating the total set of relationships contained in multi-dimensional, non-quantifiable, problem complexes. During the past 15 years, GMA has been extended, computerized and applied in developing futures scenarios, structuring and analyzing complex policy spaces, and modeling strategy alternatives. This article outlines the fundamentals of the morphological approach and describes recent applications in developing threat scenarios and strategy models. 1. INTRODUCTION General Morphological Analysis (GMA) was developed by Fritz Zwicky the Swiss-American astrophysicist and aerospace scientist based at the California Institute of Technology (Caltech) as a method for structuring and investigating the total set of relationships contained in multidimensional, non-quantifiable, problem complexes [Zwicky 1969, Zwicky & Wilson, 1967]. Zwicky applied this method to such diverse tasks as the classification of astrophysical objects, the development of jet and rocket propulsion systems and the legal aspects of space travel [Greenstein and Wilson, 1974]. More recently, morphological analysis has been extended and applied by a number of researchers in the U.S.A and Europe in the field of futures studies, policy analysis and strategy modeling [Coyle et.al., 1994; Rhyne 1995; Ritchey 1997). In 1995, advanced computer support for GMA was developed at the Swedish Defence Research Agency (for a description, see Ritchey, 2003b). This has made it possible to create interactive, nonquantified inference models, which significantly extends GMA's functionality and areas of application (Ritchey ). Since then, more than 100 projects have been carried out using computer aided morphological analysis, for structuring complex policy and planning issues, developing scenario and strategy laboratories, and analyzing organizational and stakeholder structures. 1
2 This paper will begin with a discussion of some of the methodological problems confronting complex, non-quantified modeling as applied to scenario development and strategy analysis. This is followed by a presentation of the fundamentals of the morphological approach along with reference to three recent applications: the development of a threat scenario laboratory for the Swedish Nuclear Power Inspectorate; the development of an instrument for evaluating preparedness for terrorist actions involving chemical releases for the Swedish Rescue Services; and a tactical scenario laboratory for evaluating requirements for future ground target systems, for the Army Tactical Command. 2. METHODOLOGICAL BACKGROUND Developing threat scenarios and modeling complex socio-technical and organization systems presents us with a number of difficult methodological problems. Firstly, many of the factors involved are not meaningfully quantifiable, since they contain strong social, political and cognitive dimensions. This means that traditional quantitative methods, mathematical modeling and simulation are relatively useless. Secondly, the uncertainties inherent in such problem complexes are in principle non-reducible, and often cannot be fully described or delineated. This includes both antagonistic uncertainty (conscious, willful actions among actors) and so-called non-specified uncertainty (e.g. uncertainties concerning what types of scientific and technological discoveries will be made in the future). This represents even a greater blow to the idea of causal modeling and simulation. Finally, the creative process involved in such studies is often difficult to trace i.e. we seldom have an adequate audit trail describing the iterative process from problem formulation, through alternative generation to specific solutions or conclusions. Without some form of traceability, we have little possibility of scientific control over results, let alone reproducibility. An alternative to mathematical modeling is a form of non-quantified modeling relying on judgmental processes and internal consistency, rather than causality. Causal modeling, when applicable, can and should be used as an aid to judgment. However, at a certain level of complexity (e.g. at the social, political and cognitive level), judgment must often be used, and worked with, more or less directly. The question is: How can judgmental processes be put on a sound methodological basis? Historically, scientific knowledge develops through cycles of analysis and synthesis: every synthesis is built upon the results of a proceeding analysis, and every analysis requires a subsequent synthesis in order to verify and correct its results [Ritchey, 1991]. However, analysis and synthesis as basic scientific methods say nothing about a problem having to be quantifiable. Complex social-political systems and policy fields can be analyzed into any number of nonquantified variables and ranges of conditions. Similarly, sets of non-quantified conditions can be synthesized into well-defined relationships or configurations, which represent solution spaces. In this context, there is no fundamental difference between quantified and non-quantified modeling. 2
3 Morphological analysis extended by the technique of internal "cross consistency assessment (CCA, see below) is a method for rigorously structuring and investigating the internal properties of inherently non-quantifiable problem complexes, which contain any number of disparate parameters. It encourages the investigation of boundary conditions and it virtually compels practitioners to examine numbers of contrasting configurations and policy solutions. Finally, although judgmental processes will never be traceable in the way, for example, a mathematician formally derives a proof, GMA goes a long way in providing as good an audit trail as one can hope for. 3. THE MORPHOLOGICAL APPROACH Essentially, GMA is a method for identifying and investigating the total set of possible relationships contained in any given, multi-dimensional problem complex that can be parameterized. The method begins by identifying and defining the most important parameters (dimensions) of the problem complex to be investigated, and assigning each parameter a range of relevant values or conditions. This is done in natural language. A morphological field also fittingly known as a Zwicky box is constructed by setting the parameters against each other in an n- dimensional configuration space (Figure 1). Each configuration contains one particular value or condition from each of the parameters, and thus marks out a particular state or (formal) solution within the problem complex. Figure 1: One of the morphological models used to generate nuclear threat scenarios for the Swedish Nuclear Power Inspectorate. 3
4 If a morphological field is small enough, one can examine all of the configurations in the field, in order to establish which of them are possible, viable, practical, interesting, etc., and which are not. In doing so, we mark out in the field a relevant solution space". The solution space of a Zwickian morphological field consists of the subset of configurations, which satisfy some criteria -- usually the criteria of internal consistency. However, a typical morphological field can contain between 50,000 and 5,000,000 formal configurations, far too many to inspect by hand. Thus, the next step in the analysis-synthesis process is to examine the internal relationships between the field parameters and "reduce" the field by weeding out all mutually contradictory conditions. This is achieved by a process of cross-consistency assessment: all of the parameter values in the morphological field are compared with one another, pair-wise, in the manner of a cross-impact matrix (Figure 2). As each pair of conditions is examined, a judgment is made as to whether or to what extent the pair can coexist, i.e. represent a consistent relationship. Note that there is no reference here to causality, but only to internal consistency. There are two types of inconsistencies involved here: purely logical contradictions (i.e. those based on the nature of the concepts involved); and empirical constraints (i.e. relationships judged be highly improbable or implausible on empirical grounds). (Normative constraints can also be applied, although these must be used with great care.) This technique of using pair-wise consistency relationships between conditions, in order to weed out internally inconsistent configurations, is made possible by a principle of dimensionally inherent in the morphological approach. While the number of configurations in a morphological field grows exponentially with each new parameter, the number of pair-wise relationships between conditions grows only as a quadratic polynomial more specifically, in proportion to the triangular number series. Naturally, there are practical limits reached even with quadratic growth. The point, however, is that a morphological field involving as many as 100,000 formal configurations can require no more than few hundred pair-wise evaluations in order to create a solution space. When this solution space (or outcome space) is synthesized, the resultant morphological field becomes a flexible model, in which anything can be "input" and anything "output". Thus, with computer support, the field can be turned into a laboratory with which one can designate one or more variables as inputs, in order to examine outputs or solution alternatives (see Figure 3, below). The morphological approach has several advantages over less structured approaches. It seeks to be integrative and to help discover new relationships or configurations. Importantly, it encourages the identification and investigation of boundary conditions, i.e. the limits and extremes of different parameters within the problem space. The method also has definite advantages for scientific communication and notably for group work. As a process, the method demands that parameters, conditions and the issues underlying these be clearly defined. Poorly defined parameters become immediately (and embarrassingly) evident when they are cross-referenced and assessed for internal consistency. The method does, however, require strong, experienced facilitation. 4
5 Figure 2: Portion of the assessed Cross Consistency Matrix for the Nuclear Threat Scenario study (altered somewhat from the original). 4. COMPUTER AIDED GENERAL MORPHOLOGY Computer-aided GMA has been employed in more than 100 projects during the past 15 years. GMA-projects typically involve developing computerized laboratories for generating scenarios, identifying alternative strategies and modeling complex systems involving a wide range of disparate, non-quantified variables. Such laboratories have been developed as instruments for inter alia: generating threat scenarios and strategy alternatives for the Swedish Armed Forces; identifying alternative long-term social evolutionary trends for the Swedish Nuclear Waste Management Agency; evaluating the Swedish bomb shelter program and studying the structure of organized crime. (More information on GMA-projects is available at: Figure 1, above, is one of the morphological models developed for the Swedish Nuclear Power Inspectorate in order to generate threat scenarios. The field contains over one million possible formal configurations, which were reduced (by internal consistency assessment) to 2154 specific or designated scenarios. The highlighted scenario is one of 24, which have the designated input of One person/insider and Stop operations. 5
6 We have found GMA especially suitable in pitting strategy models against scenarios. In such cases, we develop two complementary morphological fields: one for generating different possible scenarios based on factors that cannot be directly controlled (an "external world" field); and one for modeling strategy or system variables, which can -- more or less -- be, controlled (an "internal world" field). The fields are then linked by cross-consistency assessments in order to establish which strategies would be most effective and flexible for different ranges of scenarios. Two examples of this technique are given below. Figure 3 represents part of an instrument currently being delivered to Sweden's Emergency Rescue Services. It will be used to assess preparedness for both chemical accidents and (in the case shown here) terrorist actions involving the release of chemical agents. RESOURCE FIELD >< SCENARIO RESPONSE FIELD Figure 3: Linked morphological fields for accessing preparedness for terrorist actions involving the release of chemical agents. The morphological model is made up of a 5-parameter Preparedness Resource field on the left, linked to a 5-parameter, scenario-defined Response field on the right. The scenario in question concerns a sarin release in a department store. The red configuration in the Resource field is the designated input, and the dark blue configuration in the Response field the generated output. The light blue portion field shows what improvements in response would be generated by improvements in resources in this case, better Planning and Training Figure 4 (below) is a so-called overlay model, which pits a set of tactical scenarios against a range of ground target systems. From the left, tactical scenarios are expressed as demands placed on the systems. From the right, current and planed ground target systems are expressed in terms of their system properties. Thus, demands and properties are expressed in the same terms, overlaid and assessed for internal consistency. 6
7 The marked configuration shows a designated scenario (scenario 3) as input and the designated demands on system properties as "output". DEMANDS ON SYSTEMS SYSTEM PROPERTIES Figure 4: Two superimposed fields: tactical scenarios (demands) vs. system configurations (properties). 5. CONCLUSIONS Morphological analysis, extended by the technique of cross-consistency assessment, is based on the fundamental scientific method of analysis synthesis cycles. For this reason, it can be trusted as a useful, conceptual modeling method for investigating non-quantified problem complexes, which cannot be treated by formal mathematical methods, causal modeling and simulation. As is the case with all modeling methods, the output of a morphological analysis is no better than the quality of its input. However, even here the morphological approach has some advantages. It expressly provides for a good deal of in-built garbage detection, since poorly defined parameters and incomplete ranges of conditions are immediately revealed when one begins the task of cross-consistency assessment. These assessments simply cannot be made until the morphological field is well defined and the working group is in agreement about what these definitions mean. This type of garbage detection is something that strategy analysis and futures studies certainly need more of. The Author: Dr. Tom Ritchey is a former Research Director for the Institution for Technology Foresight and Assessment at the Swedish National Defence Research Agency (FOI) in Stockholm. Since 1995 he has directed more than 100 projects involving computer aided MA for Swedish government agencies, national and international NGO:s and private companies. He is the founder of the Swedish Morphological Society, Director of Ritchey Consulting and a founding partner of the U.K. based Strategy Foresight Partnership. 7
8 REFERENCES AND FURTHER READING Coyle, R. G., Crawshay, R. and Sutton, L Futures Assessments by Field Anomaly Relaxation. Futures 26(1), Greenstein J. and Wilson A Remembering Zwicky. Engineering and Science 37: Rhyne, R. (1995) "Evaluating Alternative Indonesian Sea-Sovereignty Systems", Informs: Institute for Operations Research and the Management Sciences. Ritchey, T. (1991) "Analysis and Synthesis - On Scientific Method based on a Study by Bernhard Riemann" Systems Research 8(4), (Available for download as REPRINT at: Ritchey, T. (1997) "Scenario Development and Risk Management using Morphological Field Analysis", Proceedings of the 5th European Conference on Information Systems (Cork: Cork Publishing Company) Vol. 3: Ritchey, T. (1998) Fritz Zwicky, 'Morphologie' and Policy Analysis, Presented at the 16 th Conference on Operational Analysis, Brussels Euro Ritchey, T. (2002a) "Modeling Complex Socio-Technical Systems using Morphological Analysis", Adapted from an address to the Swedish Parliamentary IT Commission, Stockholm, December (Available for download at: Ritchey, T, Stenström, M. & Eriksson, H. (2002b). Using Morphological Analysis to Evaluate Preparedness for Accidents Involving Hazardous Materials. In Proceedings of the 4th International Conference on Local Authorities Confronting Disasters and Emergencies (Shanghai, November 20-24). (Download available at: Ritchey, T. (2003a) "Nuclear Facilities and Sabotage: Using Morphological Analysis as a Scenario and Strategy Development Laboratory". Adapted from a Study for the Swedish Nuclear Power Inspectorate, and presented to the 44th Annual Meeting of the Institute of Nuclear Materials Management - Phoenix, Arizona, July (Available for download at: Ritchey, T. (2003b) MA/Carma Advanced Computer Support for Morphological Analysis. (Available for download at: Ritchey, T. (2004) "Strategic Decision Support using Computerised Morphological Analysis", Presented at the 9th International Command and Control Research and Technology Symposium, Copenhagen, September 2004, (Available for download at: Ritchey, T. (2005a) "Wicked Problems. Structuring Social Messes with Morphological Analysis". Adapted from a lecture given at the Royal Institute of Technology in Stockholm, 2004 (Available for download at: Ritchey, T. (2005b) "Futures Studies using Morphological Analysis". Adapted from an article for the UN University Millennium Project: Futures Research Methodology Series (Available for download at: 8
9 Ritchey, T. (2006a) "Problem Structuring using Computer-Aided Morphological Analysis". Journal of the Operational Research Society, Special Issue on Problem Structuring Methods, (2006) 57, (Available for download at: Ritchey, T. (2006b) "Modelling Multi-Hazard Disaster Reduction Strategies with Computer- Aided Morphological Analysis". Reprint from the Proceedings of the 3rd International ISCRAM Conference, Newark, May (Available for download at: Ritchey, T. (2007) "Threat Analysis for the Transport of Radioactive Material using Morphological Analysis". Adapted from a paper presented at the 15th International Symposium on the Packaging and Transportation of Radioactive Materials, PATRAM 2007, Miami, Florida. (Available for download at: Ritchey, T. (2009) Developing Scenario Laboratories with Computer-Aided Morphological Analysis Presented at the 14th International Command and Control Research and Technology Symposium, Washington DC. (Available for download at: Ritchey, T. (2010) "Specifying Training and Instruction Requirements using Morphological Analysis". Paper presented at ICELW 2010, Columbia University, New York. (Available for download at: Ritchey, T. (2011) Wicked Problems Social Messes: Decision support Modelling with Morphological Analysis. Springer. (First dedicated book on GMA. See description at: Zwicky, F Discovery, Invention, Research - Through the Morphological Approach. The Macmillan Company, Toronto. Zwicky, F. and Wilson A. (editors) New Methods of Thought and Procedure: Contributions to the Symposium on Methodologies. Springer, Berlin. 9
General Morphological Analysis * A general method for non-quantified modelling
Swedish Morphological Society 1998 (revised 2013) General Morphological Analysis * A general method for non-quantified modelling Tom Ritchey Swedish Morphological Society Fritz Zwicky pioneered the development
Wicked Problems. Modelling Social Messes with Morphological Analysis. Tom Ritchey Swedish Morphological Society ( 2005, revised 2013)
Acta Morphologica Generalis AMG Vol.2 No.1 (2013) Swedish Morphological Society ISSN 2001-2241 Wicked Problems Modelling Social Messes with Morphological Analysis Tom Ritchey Swedish Morphological Society
Problem structuring using computer-aided morphological analysis
Problem structuring using computer-aided morphological analysis Tom Ritchey* Swedish Morphological Society SE-118 69 Stockholm, Sweden. General morphological analysis (GMA) is a method for structuring
Applying Digital Library Technologies to Nuclear Forensics
Applying Digital Library Technologies to Nuclear Forensics Electra Sutton, Chloe Reynolds, Fredric C. Gey, Ray R. Larson School of Information and UC Data University of California, Berkeley Berkeley, California,
MIDLAND ISD ADVANCED PLACEMENT CURRICULUM STANDARDS AP ENVIRONMENTAL SCIENCE
Science Practices Standard SP.1: Scientific Questions and Predictions Asking scientific questions that can be tested empirically and structuring these questions in the form of testable predictions SP.1.1
INDEPENDENT VERIFICATION AND VALIDATION OF EMBEDDED SOFTWARE
PREFERRED RELIABILITY PRACTICES PRACTICE NO. PD-ED-1228 PAGE 1 OF 6 INDEPENDENT VERIFICATION AND VALIDATION OF EMBEDDED SOFTWARE Practice: To produce high quality, reliable software, use Independent Verification
Systems Engineering Complexity & Project Management
Systems Engineering Complexity & Project Management Bob Ferguson, PMP NDIA: CMMI Technology Conference November 2007 Outline A conversation Defining complexity and its effects on projects Research into
Information Visualization WS 2013/14 11 Visual Analytics
1 11.1 Definitions and Motivation Lot of research and papers in this emerging field: Visual Analytics: Scope and Challenges of Keim et al. Illuminating the path of Thomas and Cook 2 11.1 Definitions and
Monte Carlo Simulations for Patient Recruitment: A Better Way to Forecast Enrollment
Monte Carlo Simulations for Patient Recruitment: A Better Way to Forecast Enrollment Introduction The clinical phases of drug development represent the eagerly awaited period where, after several years
Software Engineering Reference Framework
Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of
PMI Risk Management Professional (PMI-RMP ) - Practice Standard and Certification Overview
PMI Risk Management Professional (PMI-RMP ) - Practice Standard and Certification Overview Sante Torino PMI-RMP, IPMA Level B Head of Risk Management Major Programmes, Selex ES / Land&Naval Systems Division
Science, Technology, Engineering & Mathematics Career Cluster
Science, Technology, Engineering & Mathematics Career Cluster 1. Apply engineering skills in a project that requires project management, process control and quality assurance. ST 1.1: Apply the skills
Project Decision Analysis Process
Copyright Notice: Materials published by Intaver Institute Inc. may not be published elsewhere without prior written consent of Intaver Institute Inc. Requests for permission to reproduce published materials
Designing Law Enforcement: Adaptive Strategies for the Complex Environment
Designing Law Enforcement: Adaptive Strategies for the Complex Environment John A. Bertetto, Police Officer, Chicago Police Department Crime Control Strategies As law enforcement professionals, we often
The Design and Improvement of a Software Project Management System Based on CMMI
Intelligent Information Management, 2012, 4, 330-337 http://dx.doi.org/10.4236/iim.2012.46037 Published Online November 2012 (http://www.scirp.org/journal/iim) The Design and Improvement of a Software
Master of Science in Risk Management and Safety Engineering at Lund University, Sweden. Johan Lundin & Robert Jönsson
The Risk Management and Safety Engineering Programme Johan Lundin Master of Science in Risk Management and Safety Engineering at Lund University, Sweden Johan Lundin & Robert Jönsson The Risk Management
Requirements Traceability. Mirka Palo
Requirements Traceability Mirka Palo Seminar Report Department of Computer Science University of Helsinki 30 th October 2003 Table of Contents 1 INTRODUCTION... 1 2 DEFINITION... 1 3 REASONS FOR REQUIREMENTS
Introduction to Engineering System Dynamics
CHAPTER 0 Introduction to Engineering System Dynamics 0.1 INTRODUCTION The objective of an engineering analysis of a dynamic system is prediction of its behaviour or performance. Real dynamic systems are
Integrated Emergency Management and the Prior Notification of the Transportation of Radioactive Material
Integrated Emergency Management and the Prior Notification of the Transportation of Radioactive Material M. Fox International Transport, British Nuclear Fuels plc, Warrington, Cheshire, United Kingdom
GAO. Assessing the Reliability of Computer-Processed Data. Applied Research and Methods. United States Government Accountability Office GAO-09-680G
GAO United States Government Accountability Office Applied Research and Methods July 2009 External Version I Assessing the Reliability of Computer-Processed Data GAO-09-680G Contents Preface 1 Section
Analysis of Appropriate Methods for Assessment of Safety in Aviation
Analysis of Appropriate Methods for Assessment of Safety in Aviation Jakub Kraus ATM Systems Laboratory, Department of Air Transport, Faculty of Transportation Sciences, Czech Technical University Horská
Research competences in University education: profile of Master's Programs
Research competences in University education: profile of Master's Programs V. Bishimbayev, I. Yefimova M.Auezov South Kazakhstan State University (Kazakhstan) [email protected], [email protected] 1. To the
Stephen M. Fiore, Ph.D. University of Central Florida Cognitive Sciences, Department of Philosophy and Institute for Simulation & Training
Stephen M. Fiore, Ph.D. University of Central Florida Cognitive Sciences, Department of Philosophy and Institute for Simulation & Training Fiore, S. M. (2015). Collaboration Technologies and the Science
INTOSAI. Performance Audit Subcommittee - PAS. Designing performance audits: setting the audit questions and criteria
INTOSAI Performance Audit Subcommittee - PAS Designing performance audits: setting the audit questions and criteria 1 Introduction A difficult phase in performance auditing is planning and designing. In
Utah State Office of Education Elementary STEM Endorsement Course Framework Nature of Science and Engineering
Course Description: Utah State Office of Education Elementary STEM Endorsement Course Framework Nature of Science and Engineering In this course participants will experience introductory explorations of
HAMPTON UNIVERSITY ONLINE Hampton University School of Business PhD in Business Administration
Program Overview The PhD in Business Leadership and Administration is designed for professionals located nation wide who desire an advanced degree in business to excel in their careers. In addition, the
USING THE ANALYTIC HIERARCHY PROCESS (AHP) TO SELECT AND PRIORITIZE PROJECTS IN A PORTFOLIO
USING THE ANALYTIC HIERARCHY PROCESS (AHP) TO SELECT AND PRIORIZE PROJECTS IN A PORTFOLIO Ricardo Viana Vargas, MSc, IPMA-B, PMP Professor Fundação Getúlio Vargas (FGV) Brasil Professor Fundação Instituto
Edwin Lindsay Principal Consultant. Compliance Solutions (Life Sciences) Ltd, Tel: + 44 (0) 7917134922 E-Mail: [email protected].
Edwin Lindsay Principal Consultant, Tel: + 44 (0) 7917134922 E-Mail: [email protected] There were no guidelines/ regulations There was no training No Procedures No Inspectors Inform All staff of
Risk Knowledge Capture in the Riskit Method
Risk Knowledge Capture in the Riskit Method Jyrki Kontio and Victor R. Basili [email protected] / [email protected] University of Maryland Department of Computer Science A.V.Williams Building
STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE EADM 220 DISASTER MANAGEMENT AND PREPAREDNESS
STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE EADM 220 DISASTER MANAGEMENT AND PREPAREDNESS Prepared By: Dr. Michael J. O Connor Jr. SCHOOL OF BUSINSS AND LIBERAL ARTS
Human Dimension in Cyber Operations Research and Development Priorities
Human Dimension in Cyber Operations Research and Development Priorities Chris Forsythe a, Austin Silva a, Susan Stevens-Adams a, Jeffrey Bradshaw b a Sandia National Laboratories, Albuquerque, NM, USA,
Information Systems and Tech (IST)
California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey
How To Write Software
1 Medical Device Software - Software Life Cycle Processes IEC 62304 2 Credits John F. Murray Software Compliance Expert U.S. Food and Drug Administration Marcie R. Williams Medical Device Fellow Ph.D.
An Automated Development Process for Interlocking Software that. Cuts Costs and Provides Improved Methods for Checking Quality.
An Automated Development Process for Interlocking Software that Cuts Costs and Provides Improved Methods for Checking Quality and Safety Authors: Claes Malmnäs Prover Technology Rosenlundsgatan 54 118
DANSE Software Quality Assurance
DANSE Software Quality Assurance Tom Swain Software Quality Research Laboratory University of Tennessee Department of Computer Science DANSE Objectives Extensible open source framework Modular interoperability
I N S T I T U T E F O R D E FE N S E A N A L Y S E S NSD-5216
I N S T I T U T E F O R D E FE N S E A N A L Y S E S NSD-5216 A Consistent Approach for Security Risk Assessments of Dams and Related Critical Infrastructure J. Darrell Morgeson Jason A. Dechant Yev Kirpichevsky
A Guide To The Project Management Body of Knowledge (PMBOK) Significant Changes from the 3 rd edition to the 4 th edition
A Guide To The Project Body of Knowledge (PMBOK) Significant Changes from the 3 rd edition to the 4 th edition Major Changes The adoption of the verb-noun format for process names Amplification as to Enterprise
R&D Strategy and Forecasting
R&D Strategy and Forecasting R&D Strategy in Companies Karel Mulder January 7, 2010 http://www.physics.udel.edu/~watson/scen103/intel-new.gif 1 R&D Strategy in Companies Development Before 1880: no large
RAMS, Systems Engineering and Systems Thinking
RAMS, Systems Engineering and Systems Thinking Presentation for The Joint Electrical Institutions Lecture Programme Ravindra K Bagia About Me Ravindra Bagia UTS Faculty of Engineering and IT Teaching:
Process Models and Metrics
Process Models and Metrics PROCESS MODELS AND METRICS These models and metrics capture information about the processes being performed We can model and measure the definition of the process process performers
RC-17. Alejandro V. Nader National Regulatory Authority Montevideo - Uruguay
RC-17 Radiation Protection in Waste Management and Disposal Implementing the Joint Convention on the Safety of Spent Fuel Management and on the Safety of Radioactive Waste Management Alejandro V. Nader
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful
Project Management for IT/IS Projects
Project Management for IT/IS Projects The Course Design, Outline and Behavior Objectives: Project Management for IT/IS Projects is consistent with the PMI Project Management Body of Knowledge, PMBOK. To
Scope and Standards of Practice for The Acute Care Nurse Practitioner. American Association of Critical-Care Nurses
Scope and Standards of Practice for The Acute Care Nurse Practitioner American Association of Critical-Care Nurses Editor: Linda Bell, RN MSN Copy Editor: Anne Bernard Designer: Derek Bennett An AACN Critical
Measuring the Maturity of Robotic Planetary Mission Concepts II
SpaceOps 2010 ConferenceDelivering on the DreamHosted by NASA Mars 25-30 April 2010, Huntsville, Alabama AIAA 2010-2034 Measuring the Maturity of Robotic Planetary Mission Concepts
INFORMATION SYSTEM AUDITING AND ASSURANCE
CHAPTER INFORMATION SYSTEM AUDITING AND ASSURANCE As more and more accounting and business systems were automated, it became more and more evident that the field of auditing had to change. As the systems
Emergency Management in Turkey Adil Özdemir
Adil Özdemir Turkey has been exposed to natural disasters throughout history. The main sources of these natural disasters have been earthquakes, floods, erosion and avalanches. Disaster response policies
CREATING LEARNING OUTCOMES
CREATING LEARNING OUTCOMES What Are Student Learning Outcomes? Learning outcomes are statements of the knowledge, skills and abilities individual students should possess and can demonstrate upon completion
Operating Performance: Accident Management: Severe Accident Management Programs for Nuclear Reactors REGDOC-2.3.2
Operating Performance: Accident Management: Severe Accident Management Programs for Nuclear Reactors REGDOC-2.3.2 September 2013 Accident Management: Severe Accident Regulatory Document REGDOC-2.3.2 Canadian
PROJECT RISK MANAGEMENT - ADVANTAGES AND PITFALLS
1 PROJECT RISK MANAGEMENT - ADVANTAGES AND PITFALLS Kenneth K. Humphreys 1, PE CCE DIF 1 Past Secretary-Treasurer, ICEC, Granite Falls, NC, United States Abstract Proper project decision-making requires
OWN RISK AND SOLVENCY ASSESSMENT AND ENTERPRISE RISK MANAGEMENT
OWN RISK AND SOLVENCY ASSESSMENT AND ENTERPRISE RISK MANAGEMENT ERM as the foundation for regulatory compliance and strategic business decision making CONTENTS Introduction... 3 Steps to developing an
CASE STUDIES OF USING THE ANALYTIC HIERARCHY PROCESS METHOD IN CORPORATE SOCIAL RESPONSIBILITY AND ENVIRONMENTAL RISK MANAGEMENT
CASE STUDIES OF USING THE ANALYTIC HIERARCHY PROCESS METHOD IN CORPORATE SOCIAL RESPONSIBILITY AND ENVIRONMENTAL RISK MANAGEMENT Katarína DRIENIKOVÁ, Gabriela HRDINOVÁ, Tomáš NAŇO, Peter SAKÁL Authors:
Models of Dissertation Research in Design
Models of Dissertation Research in Design S. Poggenpohl Illinois Institute of Technology, USA K. Sato Illinois Institute of Technology, USA Abstract This paper is a meta-level reflection of actual experience
The Battle for the Right Features or: How to Improve Product Release Decisions? 1
The Battle for the Right Features or: How to Improve Product Release Decisions? 1 Guenther Ruhe Expert Decisions Inc. [email protected] Abstract: A release is a major (new or upgraded) version of
The Cyber Threat Profiler
Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are
AP1000 European 18. Human Factors Engineering Design Control Document
18.2 Human Factors Engineering Program Management The purpose of this section is to describe the goals of the AP1000 human factors engineering program, the technical program to accomplish these goals,
Assessment Profile: Establishing Curricular Categories for Homeland Security Education
Assessment Profile: Establishing Curricular Categories for Homeland Security Education During any examination or assessment of the subject, homeland security, it becomes quite evident that by the definition(s)
Theoretical Perspective
Preface Motivation Manufacturer of digital products become a driver of the world s economy. This claim is confirmed by the data of the European and the American stock markets. Digital products are distributed
Executive Summary. Summary - 1
Executive Summary For as long as human beings have deceived one another, people have tried to develop techniques for detecting deception and finding truth. Lie detection took on aspects of modern science
PERFORMANCE MEASUREMENT TOOLS IN BUSINESS PROCESS MANAGEMENT A CONTEMPORARY APPROACH
PERFORMANCE MEASUREMENT TOOLS IN BUSINESS PROCESS MANAGEMENT A CONTEMPORARY APPROACH Associate Professor PhD. VERONICA ADRIANA POPESCU 1, Professor PhD. GHEORGHE N. POPESCU 2, Lecturer PhD. Cristina Raluca
Requirements Engineering Process
Software Engineering Requirements Engineering Process Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To describe the principal requirements engineering activities and d their
Software Metrics & Software Metrology. Alain Abran. Chapter 4 Quantification and Measurement are Not the Same!
Software Metrics & Software Metrology Alain Abran Chapter 4 Quantification and Measurement are Not the Same! 1 Agenda This chapter covers: The difference between a number & an analysis model. The Measurement
Visualization of large data sets using MDS combined with LVQ.
Visualization of large data sets using MDS combined with LVQ. Antoine Naud and Włodzisław Duch Department of Informatics, Nicholas Copernicus University, Grudziądzka 5, 87-100 Toruń, Poland. www.phys.uni.torun.pl/kmk
QUALITATIVE COMPARATIVE ANALYSIS. Charles C. Ragin Department of Sociology University of Arizona Tucson, AZ 85718. http://www.fsqca.
QUALITATIVE COMPARATIVE ANALYSIS Charles C. Ragin Department of Sociology University of Arizona Tucson, AZ 85718 http://www.fsqca.com http://www.compasss.org http://www.u.arizona.edu/~cragin Why the U-Shaped
Title: Decision Making and Software Tools for Product Development Based on Axiomatic Design Theory
Title: Decision Making and Software Tools for Product Development Based on Axiomatic Design Theory Authors: Vigain Harutunian, Mats Nordlund, Derrick Tate, and Nam P. Suh (1) Mr. Harutunian, Mr. Tate,
Methods for Assessing Vulnerability of Critical Infrastructure
March 2010 Methods for Assessing Vulnerability of Critical Infrastructure Project Leads Eric Solano, PhD, PE, RTI International Statement of Problem Several events in the recent past, including the attacks
Visual Sample Plan (VSP): A Tool for Balancing Sampling Requirements Against Decision Error Risk
Visual Sample Plan (VSP): A Tool for Balancing Sampling Requirements Against Decision Error Risk B.A. Pulsipher, R.O. Gilbert, and J.E. Wilson Pacific Northwest National Laboratory, Richland, Washington,
Test Data Management Best Practice
Test Data Management Best Practice, Inc. 5210 Belfort Parkway, Suite 400 Author: Stephanie Chace Quality Practice Lead [email protected], Inc. 2011 www.meridiantechnologies.net Table of
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
Project Management Professional (PMP)
Project Management Professional (PMP) Duration: 5 days Course Objectives: PMI s Project Management Professional (PMP) credential is the most important industry-recognized certification for project managers.
NEEDS IMPROVEMENT EXAMPLE
NEEDS IMPROVEMENT EXAMPLE Name William Worksafe Manager Linda Laboratory Title Manager- Health & Safety Grade 12 Review Period 07/01/2007 to 06/30/2008 School/Department Health & Safety Review period is
Project Management connected to Creativity and Entrepreneurship
Project Management connected to Creativity and Entrepreneurship [email protected] Department of Business Administration School of Management and Economics University of Lund, Sweden Interaction
Disaster Recovery Plan. NGO Emergency Operations
Disaster Recovery Plan NGO Emergency Operations When a disaster happens there is a natural tendency to optimize the capacity to respond quickly in order to find the best solutions to reduce the effect
SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT
SOFTWARE DEVELOPMENT STANDARD FOR SPACECRAFT Mar 31, 2014 Japan Aerospace Exploration Agency This is an English translation of JERG-2-610. Whenever there is anything ambiguous in this document, the original
School of Public Health. Academic Certificate Student Handbook 2012-2013
School of Public Health Academic Certificate Student Handbook 2012-2013 Revised August 2012 Page 2 TABLE OF CONTENTS ACADEMIC CERTIFICATE PROGRAM OVERVIEW... 3 BASIC COMMUNITY PUBLIC HEALTH PRACTICE...
4 PROJECT PLAN DOCUMENTS
1 4 PROJECT PLAN DOCUMENTS 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 4.1 Introduction The project plan documents are a blueprint for how a particular project
Cognitive Domain (Bloom)
Bloom s Taxonomy So what exactly is this thing called Bloom s Taxonomy, and why do education people keep talking about it? Well, Bloom was the head of a group in the 1950 s and 1960 s that created the
Disaster Recovery and Business Continuity Plan
Disaster Recovery and Business Continuity Plan Table of Contents 1. Introduction... 3 2. Objectives... 3 3. Risks... 3 4. Steps of Disaster Recovery Plan formulation... 3 5. Audit Procedure.... 5 Appendix
3SL. Requirements Definition and Management Using Cradle
3SL Requirements Definition and Management Using Cradle November 2014 1 1 Introduction This white paper describes Requirements Definition and Management activities for system/product development and modification
How To Develop Software
Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which
Review Protocol Agile Software Development
Review Protocol Agile Software Development Tore Dybå 1. Background The concept of Agile Software Development has sparked a lot of interest in both industry and academia. Advocates of agile methods consider
NEW ALARMS AND ALERTS FROM OPERATING ENVELOPES DRIVE ECONOMIC BENEFITS AS WELL AS SAFER PROCESSES
NEW ALARMS AND ALERTS FROM OPERATING ENVELOPES DRIVE ECONOMIC BENEFITS AS WELL AS SAFER PROCESSES Robin W. Brooks, Alan Mahoney, John Wilson, and Na Zhao Process Plant Computing Limited (PPCL), Gerrards
Department of Social Work Florida Gulf Coast University. Generalist Practice Field Placement Learning Plan. Task Supervisor (if applicable):
Department of Social Work Florida Gulf Coast University Generalist Practice Field Placement Learning Plan Student: Student Email: Agency: Agency Phone: Field Instructor: Faculty Liaison: Task Supervisor
School of Public Health
School of Public Health Academic Certificate Student Handbook 2014-2015 Revised August 2014 TABLE OF CONTENTS P a g e 2 TABLE OF CONTENTS ACADEMIC CERTIFICATE PROGRAM OVERVIEW... 3 BASIC COMMUNITY PUBLIC
Environment, Health And Safety. Ensuring Your Company s European Operations are Compliant with New EU Regulations and Enforcement Measures
Environment, Health And Safety Ensuring Your Company s European Operations are Compliant with New EU Regulations and Enforcement Measures WHAT IS THE THREAT TO YOUR COMPANY S COMPLIANCE RECORD AND GOOD
DISASTER RECOVERY PLANNING FOR CITY COMPUTER FACILITIES
APPENDIX 1 DISASTER RECOVERY PLANNING FOR CITY COMPUTER FACILITIES March 2008 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto TABLE OF CONTENTS EXECUTIVE SUMMARY...1
Model-based Synthesis. Tony O Hagan
Model-based Synthesis Tony O Hagan Stochastic models Synthesising evidence through a statistical model 2 Evidence Synthesis (Session 3), Helsinki, 28/10/11 Graphical modelling The kinds of models that
Master s Programme in International Administration and Global Governance
Programme syllabus for the Master s Programme in International Administration and Global Governance 120 higher education credits Second Cycle Confirmed by the Faculty Board of Social Sciences 2015-05-11
