Publications

Results 1–25 of 99

Search results

Jump to search filters

Organizational System Resilience to Disinformation: A Viable Systems Model Exploration

INCOSE International Symposium

Caskey, Susan A.; Gunda, Thushara G.

This paper explores the utility of organizational system modeling frameworks to provide valuable insight into information flows within organizations and subsequently the opportunities for increasing resilience against disinformation campaigns targeting the system's ability to utilize information within its decision making. Disinformation is a growing challenge for many organizations and in recent years has created delay in decision making. Here the paper has utilized the viable systems model (VSM) to characterize organizational systems and used this approach to outline potential subsystem requirements to promote resilience of the system. The results of this paper can support the development of simulations and models considering the human elements within the system as well as support the development of quantitative measures of resilience.

More Details

Computational Fluid Dynamics Simulations to Assess Spatial Variability and Optimal Ventilation Scenarios for Biological Laboratory Exposures

Applied Biosafety

Caskey, Susan A.; Ho, Clifford K.; Burnett, LouAnn C.; Jouravel, Natalia J.; Branda, Catherine B.; Fruetel, Julia A.

A significant amount of uncertainty exists regarding potential human exposure to laboratory biomaterials and organisms in Biosafety Level 2 (BSL-2) research laboratories. Computational fluid dynamics (CFD) modeling is proposed as a way to better understand potential impacts of different combinations of biomaterials, laboratory manipulations, and exposure routes on risks to laboratory workers. Here, in this study, we use CFD models to simulate airborne concentrations of contaminants in an actual BSL-2 laboratory under different configurations. Results show that ventilation configuration, sampling location, and contaminant source location can significantly impact airborne concentrations and exposures. Depending on the source location and airflow patterns, the transient and time-integrated concentrations varied by several orders of magnitude. Contaminant plumes from sources located near a return vent (or exhaust like a fume hood or ventilated biosafety cabinet) are likely to be more contained than sources that are further from the exhaust. Having a direct flow between the source and the exhaust (through-flow condition) may reduce potential exposures to individuals outside the air flow path. Designing a BSL-2 room with ventilation and airflow patterns that maximize through-flow conditions to the return/exhaust vents and minimize dispersion and mixing throughout the room is, therefore, recommended. CFD simulations can also be used to assist in characterizing the impacts of supply and return vent locations, room layout, and source locations on spatial and temporal contaminant concentrations. In addition, proper placement of particle sensors can also be informed by CFD simulations to provide additional characterization and monitoring of potential exposures in BSL-2 facilities.

More Details

Revisiting Current Paradigms: Subject Matter Expert Views on High Consequence Facility Security Assessments

Journal of Nuclear Materials Management

Gunda, Thushara G.; Caskey, Susan A.; Williams, Adam D.; Birch, Gabriel C.

Security assessments support decision-makers' ability to evaluate current capabilities of high consequence facilities (HCF) to respond to possible attacks. However, increasing complexity of today's operational environment requires a critical review of traditional approaches to ensure that implemented assessments are providing relevant and timely insights into security of HCFs. Using interviews and focus groups with diverse subject matter experts (SMEs), this study evaluated the current state of security assessments and identified opportunities to achieve a more "ideal" state. The SME-based data underscored the value of a systems approach for understanding the impacts of changing operational designs and contexts (as well as cultural influences) on security to address methodological shortcomings of traditional assessment processes. These findings can be used to inform the development of new approaches to HCF security assessments that are able to more accurately reflect changing operational environments and effectively mitigate concerns arising from new adversary capabilities.

More Details

Application of Resilience Theory to Organizations Subject to Disinformation Campaigns

2022 Resilience Week, RWS 2022 - Proceedings

Wachtel, Amanda; Caskey, Susan A.; Gunda, Thushara G.; Keller, Elizabeth J.

Community, corporate, and government organizations are being targeted by disinformation attacks at an unprecedented rate. These attacks interrupt the ability of organizations to make high-consequence decisions and can lower their confidence in datasets and analytics. New interdisciplinary research approaches are being actively developed to expand resilience theory applications to organizations, and to determine the metrics and mitigations needed to increase resilience against disinformation. This paper presents initial ideas on adapting resilience methodologies for organizations and disinformation, highlighting key areas that require further exploration in this emerging field of research.

More Details

Prioritizing Countries by Concern Regarding Access to Weapons of Mass Destruction Materials

Journal of Bioterrorism & Biodefense

Caskey, Susan A.; Ezell, Barry

This article presents a global prioritization methodology that evaluates the relative risks of non-state actor acquisition of materials that could be used in chemical, biological, radiological, nuclear and high explosive Weapons of Mass Destruction (WMD) from the country’s relevant infrastructure. Prioritization is based on three domains: 1. Assessing relative scale of materials in each country, 2. The country’s corresponding security posture, and 3. The presence of threat actors. The output is a list of countries prioritized from greatest risk to least. Rather than providing an overall 1 to N ranking, however, the results are placed into tiers based upon their natural groupings within the three domains. The countries in the highest tiers are flagged as potential US national security concern; those scoring in the middle and at the bottom are flagged as posing lower US national security concern. A systematic approach assesses each country by leveraging many disciplines, such as risk and decision analysis, as well as expert judgement. A quantitative value model based on Multi-Attribute Value Theory (MAVT) organizes the objectives scoring criteria into a value tree using lessons learned from previous studies, published literature, and expert judgement. The article presents the prioritization categories and corresponding value model scoring criteria to include measurement type, weight, range, and value preference. Country names and data are notional in order to share the details on the underlying methodology and model without identification of actual security risks. A deliberative process addresses factors external to the model and scrutinizes inputs, methodology, model, and results.

More Details
Results 1–25 of 99
Results 1–25 of 99