Browsing Technology Systems by Title
Now showing items 17-36 of 52
-
Evaluating effectiveness of the application of the new perspective in safety, Safety-II: by Functional Resonance Analysis Method (FRAM) in a manufacturing environment
(East Carolina University, 2017-07-25)The risk matrix has been used by safety professionals for many years as a significant tool for hazard management, risk assessment and prioritization, and to aid in offering a proactive approach to prevent negative outcomes. ... -
EVALUATION OF PHISHING ATTACKS AGAINST A HIGHER EDUCATION PUBLIC INSTITUTION
(East Carolina University, 2022-04-22)While security vendors have documented trends in phishing attacks across numerous industries, there remains a gap in available data for phishing attacks against higher education institutions. This researcher studied ... -
Evaluation of Underreporting of Work-Related Injuries and Illnesses in the United States Military
(East Carolina University, 2020-06-22)The purpose of the research was to characterize underreporting of occupational illnesses and injuries among the United States (U.S.) military veterans. The researcher interviewed 100 U.S. veterans and 100 U.S. civilians. ... -
GOAL SETTING AND UNETHICAL BEHAVIOR: IMPLICATIONS FOR OCCUPATIONAL SAFETY AND HEALTH AND THE SAFETY INCENTIVE PROGRAM
(East Carolina University, 2020-06-22)Goal setting is a popular and often beneficial tool used to motivate workers worldwide. Recent research has revealed that negative side-effects including unethical behavior are associated with goal setting. In occupational ... -
Implementation of a System for Monitoring Overall Equipment Effectiveness (OEE) and Exploring Correlation Between OEE and Process Capability
(East Carolina University, 2011)An effective process equipment monitoring tool widely accepted in manufacturing units today is overall equipment effectiveness (OEE). OEE began its debut as a pillar of the total productive maintenance (TPM) system, where ... -
Incidents in Educational and Academic Chemistry Laboratories: A Comparative Case Study Project
(East Carolina University, 2019-12-10)For this thesis, eleven published case studies of laboratory incidents that involved hazardous chemicals and occurred at primary educational and academic institutions were compared. The important information on the incident ... -
Is Digital Piracy a Crime?
(2022-04-19)Digital piracy is the unauthorized illegal copying and distribution of digital copyrighted content. Copyrighted content refers to Intellectual Property. Property that consist of intangible creations of the human intellect. ... -
Knowledge-Based Competencies Necessary for the Frontline Construction Supervisor : Improving Safety through Knowledge
(East Carolina University, 2012)Evaluating supervisor competency levels has been a management challenge since the beginning of supervisory roles in the construction process. Supervisors perform a critical role in the workplace with respect to workplace ... -
MEASURING LEADERSHIP ROUNDING PERFORMANCE IN A HOSPITAL ENVIRONMENT USING REAL TIME LOCATION SYSTEMS
(East Carolina University, 2015)Among the major industries, healthcare accounts for over ten percent of jobs today and is continuing to grow per the surges of baby boomers requiring more care, rising costs in medicine and equipment, and current legislative ... -
Mobile Device Management Policy
(2022-04-08)The use of mobile devices in the workplace has grown significantly over the years. Most adults do not leave home without their phones, laptops, tablets, or other portable media devices. With this expansion, there needed ... -
MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN
(East Carolina University, 2012)Wireless local area networks (WLAN) are one of the most widely used technologies in our daily lives. Instead of being limited to the range of wired equipment, users can communicate freely. However, since wireless networks ... -
A New Approach to Communications Management Planning Through 3D Web and Semantic Web Technologies
(2011-09)Communication management plans are used to determine not only who needs what information but also how that information will be collected and transmitted. Now two evolving technologies are looking to drive project planners ... -
Protecting Yourself from Targeted Ransomware
(2022-04-19)In the Dynamic Environment we live in today, there are many devices that are becoming obsolete. They are becoming ancient with the times and many new technologies are trending in a rapid rate. However, some of these new ...