My research is mainly in decision analysis, with recent applications in cybersecurity, military, and defense.  I also have experience with inventory, especially spare parts.  I help organizations make better decisions, which extends to many application areas.


Cybersecurity

My published research in cybersecurity primarily addresses metrics, best practices, and human behavior. My main focus right now is cyber, physical, and insider threats to voting processes, especially at polling places. This includes a model insider threat risk management as well as training for poll workers.  Visit my Media for a profile of my student team’s work in cybersecurity and for news articles related to my work in elections security.

Elections Security

Enhancing Election Integrity Through Data-driven Poll Worker Training

Hao Nguyen, Navya Gautam, Shreenidhi Ayinala, Natalie M. Scala, Josh Dehlinger

SIAM News, October 2024

Election equipment is critical infrastructure in the U.S., and the highly seasonal (and often volunteer) poll workers have access to all of the necessary apparatuses to effectively oversee election processes at polling places. The use of analytics—such as foundational artificial intelligence (AI) and data mining—can address poll workers’ specific needs and help to maintain the security and integrity of voting protocols. By understanding the unique backgrounds of different poll worker groups via cluster analysis, election administrators can develop targeted training programs and implement proactive measures that mitigate insider risks, optimize resources, and enhance the effectiveness of efforts to safeguard election integrity.

Influence Of Election Misinformation On Voter Perceptions: Lessons For The 2024 United States Elections And Beyond

Jada Riley, Vanessa Gregorio, Navya Gautam, Marie Kouassi, Natalie M. Scala, Josh Dehlinger

SSRN Preprint, October 2024

This research statistically examines how political mis/dis-information that spread via social media and news outlets during the 2020 U.S. General Election influenced perceptions of election security and integrity specific to in-person and mail-based voting, including influences to voting behavior.  We also convene a Delphi panel of election security and misinformation experts to develop mitigations and countermeasures to combat belief in mis/dis-information and disenfranchisement in voting.  This analysis extends the literature beyond just dissemination of mis/dis-information to provide novel, fundamental insight into how belief in political mis/dis-information impacts perceptions that influence voting behaviors.  This research is also the first to provide a systemic analysis of countermeasures, extending the literature beyond just basic recommendations to targeted, evaluated actions.

An Information-Theoretic Analysis of Security Behavior Intentions Amongst United States Poll Workers

Natalie M. Scala, Jayant Rajgopal, Yeabsira Mezgebe, Josh Dehlinger

Risk Analysis, accepted for publication, 2024

Elections equipment in the United States constitutes critical national infrastructure, and its operation relies on poll workers, who are trusted insiders.  However, those insiders may pose risks if they make mistakes with detrimental consequences or act with malice.  We analyze a large Security Behavior Intentions Scale (SeBIS) data set of poll workers and potential poll workers. We develop a novel model to examine potential weaknesses in security behaviors and identify poll worker security practices to improve to ensure the integrity of our elections.  We also recommend action items and security countermeasures for states and localities.

Securing democracy: threat mitigations for the Mail voting process

Vanessa Gregorio, Natalie M. Scala, Josh Dehlinger

ISE Magazine, p. 29-33, August 2024

The 2020 U.S. General Election saw record voter participation with 46% of all voters indicating that they voted by absentee or via a mail-in ballot. Evenso, public discourse continued to question the security and integrity of continuing to allow mail-based voting as a modality to vote in future elections. This article identifies threat countermeasures to general election processes to assess their suitability to mail voting to better understand how to: (1) protect this critical democratic process; (2) enhance the threat and mitigation training of the poll workers that administer this election process; and, (3) educate the public on the ways to reduce threats to the mail voting process to ensure its continued security and integrity. Link to magazine issue

The Spread of Voting Misinformation: (Un)intentionally Disenfranchising Voters in the United States 

Vanessa Gregorio, Josh Dehlinger, Natalie M. Scala

SSRN Preprint, July 2024

This paper examines the intersection of voting misinformation and the disenfranchisement of voters in the United States, highlighting how false narratives surrounding election security have led to restrictive policies that undermine democratic participation. We trace the historical progression of voting rights, showing how shifts in misinformation have been used to justify both explicit and implicit restrictions on the voting process, particularly affecting marginalized communities. Despite claims of protecting election integrity, modern voting laws disproportionately hinder access for historically underrepresented groups, contributing to a cycle of disenfranchisement driven by misinformation.

Protecting Maryland’s Mail Voting Processes through Poll Worker Training

Vanessa Gregorio, Josh Dehlinger, Natalie M. Scala

Baltimore Business Review: A Maryland Journal, p. 26-30, 2024

The COVID-19 pandemic necessitated the broadening of vote-by-mail opportunities to allow for safe and accessible access to cast a ballot. Maryland residents can also now choose to permanently vote by mail, receiving a ballot for each election.  The nearly 1 million poll workers needed nationwide to administer a General Election are oftentimes the first line of defense in maintaining the integrity and security of elections. This paper further contributes to improving the security and integrity of election infrastructure through cyber, physical, and insider threat training for poll workers explicitly for the vote-by-mail processes. Specifically, this paper details the design, validation, and dissemination of a vote-by-mail threat training module.

Understanding the Impact of Poll Worker Cybersecurity Behaviors on U.S. Election Integrity

Abigail Kassel, Isabella Bloomquist, Natalie M. Scala, Josh Dehlinger

Proceedings of the IISE Annual Conference & Expo 2024

Poll workers play a crucial role in safeguarding election security and integrity. We examine the benefits of training poll workers to mitigate potential cyber, physical, and insider threats that may emerge during U.S. elections through an analysis of the relationship between poll worker training performance and their individual cybersecurity practices, using the Security Behaviors and Intentions Scale (SeBIS). The results indicate that a poll worker’s personal security behaviors related to Device Securement, Password Generation, and Proactive Awareness have a positive relationship with poll workers' knowledge of the threats related to election equipment and processes. These findings have implications for election security policies, emphasizing needs for election officials and managers to prioritize in poll worker training initiatives to enhance election security.

Voting Perceptions and impact of misinformation

Jada Riley, Vanessa Gregorio, Natalie M. Scala, Josh Dehlinger

17th NATO Operations Research and Analysis Conference, 2023 (Presentation only)

This research examines how political misinformation that spread via social media and news outlets during the 2020 U.S. General Election may have influenced perceptions of threats regarding in-person and mail-based voting. We develop a survey to assess spread and acceptance of misinformation, contributing to the literature on how belief in political misinformation influences voting behavior. We also convene a Delphi panel of election security and misinformation experts to develop mitigations and countermeasures to combat belief in misinformation and disenfranchisement in voting. This analysis extends the literature beyond just spread to provide fundamental insight into how belief in political misinformation impacts perceptions that influence voting behaviors, ultimately supporting health of democracy and enabling voters to cast their ballots safely, securely, and confidently.

Preparing Poll Workers to Secure U.S. Elections

Natalie M. Scala, Josh Dehlinger, Lorraine Black

Proceedings of the American Society for Engineering Management 2023 International Annual Conference

With their pivotal role as the first line of defense on Election Day, poll workers bear the responsibility of identifying and thwarting any potential threats that may arise. However, despite their crucial role, poll workers receive minimal, if any, specific training on security threats prior to elections. To address this gap, this research investigates poll worker threat awareness through developing, piloting, and evaluating online threat training modules for poll workers. Through statistical analysis, we show the training modules are effective in increasing poll workers' understanding of cyber, physical, and insider threats and how to mitigate them.

Evaluating Mail-Based Security for Electoral Processes Using Attack Trees

Natalie M. Scala, Paul L. Goethals, Josh Dehlinger, Yeabsira Mezgebe, Betelhem Jilcha, Isabella Bloomquist

Risk Analysis, 42(10), p. 2327-2343, 2022

The objective of this research is to provide greater insight into potential threats to mail-based voting processes. Upon identifying an attack tree provided by the Elections Assistance Commission as an initial structure for evaluation, new threats are postulated, and an updated tree is proposed that accounts for more recent activities related to adaptive adversaries and COVID-19. Then, using an established assessment framework, the relative likelihood of each mail-based voting process attack scenario is identified. The results facilitate providing election officials and policy makers with greater knowledge of how mail-based voting system vulnerabilities develop as well as specific security measures that may be most beneficial. Additional info: Voting Methods by State During 2020 Elections; HotSoS Presentation, Author Accepted Manuscript

Securing Organizations from Within: Opportunities and Challenges of Trusted Insiders

Natalie M. Scala, Josh Dehlinger, Yeabsira Mezgebe

Baltimore Business Review: A Maryland Journal, p. 16-20, 2022

This paper discusses awareness of insider risk in organizations, identifying actions that can be taken to address and mitigate threat.  We also discuss the industry trend of shifting from reactive to proactive insider risk management, as well as the role AI and machine learning have had in identifying and managing risk.  Specifically, the Security Behaviors Intentions Scale (SeBIS) has been used to build AI models for insider risk, and we provide a high-level overview of one such model for elections poll workers, who are trusted insiders responsible for managing and executing an election, by having access to critical infrastructure and ballots. 

A PROCESS MAP AND RISK ASSESSMENT FOR MAIL-BASED VOTING

Natalie M. Scala, Isabella Bloomquist, Yeabsira Mezgebe, Betelhem Jilcha, Paul L. Goethals, Josh Dehlinger

Proceedings of the 2021 IISE Annual Conference

This paper develops a process model for mail-based voting and also identifies and maps cyber, physical, and insider threats to the process.  We apply a utility-based methodology for assessing threat to evaluate the process model scenarios and nodes.  We illustrate the model using Maryland’s mail-based voting process as a case study and identify nodes or activities of concern due to higher relative risk.  Results provide election officials insight on how voting system vulnerabilities develop and when and where to employ mitigating security measures. Mail Voting Process Node Descriptions

POLLWORKER SECURITY: ASSESSMENT AND DESIGN OF USABILITY AND PERFORMANCE

Josh Dehlinger, Saraubi Harrison, Natalie M. Scala

Proceedings of the 2021 IISE Annual Conference

This paper discusses improving the security of election infrastructure through intentional, targeted, cyber, physical, and insider threat training for poll workers. We detail the engineering design, pedagogy, and deployment of online, election-specific, threat training modules. Results of a System Usability Scale assessment indicate the content and online platform are easy to interact with and use. Further, the developed modules were piloted and then deployed in a mid-Atlantic state; participating counties include over 1,900 poll workers who serve nearly 750,000 voters.

Empowering election judges to secure our elections

Natalie M. Scala, Josh Dehlinger, Lorraine Black, Saraubi Harrison, Katerine Delgado Licona, Aikaterini Ieromonahos

Baltimore Business Review: A Maryland Journal, p. 8-12, 2020

This paper presents training modules for poll workers to identify and respond to potential cyber, physical, and insider threats that may emerge at polling places. We present the design of the modules and discuss the methods for deploying them as training. The modules are used by counties in Maryland during the 2020 Presidential Election cycle. PDF; Additional information: Questions used in pre-post-test

Protecting Maryland’s Voting processes

Megan Price, Natalie M. Scala, Paul L. Goethals

Baltimore Business Review: A Maryland Journal, p. 36-39, 2019

This paper outlines two research projects that specifically address the security of Maryland’s voting processes.  The first is a preliminary risk model for cyber, physical, and insider threats to polling places.  The model evaluates vulnerabilities in the voting process and recommends how the State of Maryland should focus resources to combat threat.  The second project involves creating training modules for poll workers so that they can identify and respond to cyber, physical, and insider threats. 

sources of risk in elections security

Hannah Locraft, Priya Gajendiran, Megan Price, Natalie M. Scala, Paul L. Goethals

Proceedings of the 2019 IISE Annual Conference

This research examines sources of risk in voting systems, identifies potential vulnerabilities in voting processes, and suggests a risk model framework to assess and mitigate vulnerabilities. We examine patterns and trends in a state’s elections security and the characteristics of its voting processes. We also present diagrams of sources of cyber, physical, and insider risk to voting processes and discuss an outline of a Markov model to assess evolving threat. Correlation Matrix Data

other applications

Analysis of security behaviors of supply chain professionals

Hao Nguyen, Natalie M. Scala, Josh Dehlinger

Proceedings of the IISE Annual Conference and Expo 2024

As supply chain professionals can pose an insider risk to supply chain cybersecurity, this research delves into their information security behaviors. The objective is to assess the security practices of supply chain professionals and identify strategies for improvement. Utilizing principles from information theory for analysis, results of this preliminary research reveal significant inconsistency in information security behaviors among supply chain professionals, particularly with the Password Generation, Device Securement, and Proactive Awareness from the Security Behaviors Intentions Scale. Ultimately, this research is part of a larger project that seeks to provide recommendations for training programs aimed at reducing the risk of incidents or breaches stemming from trusted insider professionals within the supply chain. Mutual information matrix

TRUSTED INSIDERS AND THE TEMPTATION TO TALK: PREVENTING UNAUTHORIZED DISCLOSURES

Sara Freedman, James Raymond, Taylor Seaman, Natalie M. Scala

Baltimore Business Review: A Maryland Journal, p. 14-18, 2023

External disclosures of an organization’s protected or proprietary information prior to authorization can cause incalculable damage.  This research explores the causes and motivations behind individuals’ decisions to disclose, which include negative work environments, shortcomings in security training, poor security attitudes and approaches, and lack of reporting. We develop four categories of recommendations to mitigate and prevent such events: modifications to training, shifts in work environment, implementation of leadership training, and development of more accessible reporting mechanisms. Within each of these four categories, corresponding recommendations and implementation strategies are summarized.

Operations Research

Paul L. Goethals, Natalie M. Scala, and Nathaniel D. Bastian

Chapter 7 of Mathematics in Cyber Research, CRC Press, p. 233-266, 2022

This chapter provides an overview of applications of operations research and prescriptive analytics techniques the cyber realm. In particular, the chapter focuses on decision analysis, mathematical optimization, and stochastic process modeling. Case studies in elections security (utility theory), network interdiction (optimization), and malware spread (stochastic process modeling) are included to illustrate the covered topics.

A model for and inventory of cybersecurity values: Metrics and best practices

Natalie M. Scala and Paul L. Goethals

Chapter 14 of the Handbook of Military and Defense Operations Research, CRC Press, p. 305-330, 2020

We propose a cybersecurity value model for security metrics and best practices that is supported by industry-based data and interviews with subject matter experts. We illustrate the value model using the supply chain as a case study, but propose an overall framework that can be customized for any organization or industry. We also contribute an inventory of valued components of a secure cyber system, identified through a survey of cyber professionals. This survey also examined potential differences in values based on an organization’s history of attacks and/or breaches. Results will enable organizations to assess the performance of their respective cyber systems, manage risk, and continuously improve their cybersecurity posture.

Risk and the Five hard problems of cybersecurity

Natalie M. Scala, Allison C. Reilly, Paul L. Goethals, Michel Cukier

Risk Analysis: An International Journal, 39(10), p. 2119-2126, 2019

We consider the Five Hard Problems (5HP) as defined by Science of Security (SoS) initiative at the National Security Agency and encourage the application of risk analysis principles to cybersecurity research. The 5HP are (1) scalability and composability; (2) policy‐governed secure collaboration; (3) security‐metrics–driven evaluation, design, development, and deployment; (4) resilient architectures; and (5) understanding and accounting for human behavior. We show how risk analysis can be applied to each hard problem to enable growth and insight in both cybersecurity and risk research. AAM via Wiley Self-Archiving Policy

Values and Trends in Cybersecurity

Lorraine Black, Natalie M. Scala, Paul L. Goethals, James P. Howard, II

Proceedings of the 2018 Industrial and Systems Engineering Research Conference

We survey information technology professionals as well as small legal firms and solo practitioners to understand what they value in a secure cyber system.  We identify differences in values between the two populations as well as how a previous attack or breach can affect value.  Finally, we provide an inventory of values, as identified by the survey respondents, which can be inputs to a value model.

 

Best Practices in Cybersecurity: Processes and Metrics

Jasmin Farahani, Natalie M. Scala, Paul Goethals, Adam Tagert

Baltimore Business Review: A Maryland Journal, p. 28-32, 2016

This paper draws attention to the nature and severity of cyberattacks, especially breaches that have occurred in the State of Maryland.  We identify a selection of metrics and best practices that can be implemented to increase cybersecurity posture as well as outline an agenda for research.

 

A Review of and Agenda for Cybersecurity Policy Models

Natalie M. Scala, Paul Goethals

Proceedings of the 2016 Industrial and Systems Engineering Research Conference

We review three cybersecurity policy models: the three tenets model, attack graph and attack surface models, and the cybersecurity heuristic model.  We also outline a value based research model for cyber metrics.


Military and Defense Applications

Decision analysis has a rich history in military and defense related applications, and it is important to utilize perspectives from academia and outside of the traditional service branches when solving these really complex and important problems.  My research uses value and decision modeling to quantify attributes and enable decision makers to select optimal and/or preferred alternatives.

 

Eliminating the Weakest Link Approach in Army Unit Readiness

Paul L. Goethals, Natalie M. Scala

Decision Analysis, 15(2), p. 110-130, 2018

We examine the United States Army’s readiness metrics, as outlined in AR-220-1, and propose an improvement in the composite metric, in order to evaluate units with greater precision, flexibility, and robustness.  Our desirability function approach measures readiness based upon a set of priorities, adapting for type of mission and unit.  Accurate assessments of readiness are crucial, as the level of Army readiness drives federal funding, defense policy, and deployment decisions.  AAM via INFORMS Green Option

This research was selected as a co-winner of Innovative Decisions, Inc.’s 2019 Bucky Award for contributions to the analytic community.

 

A Value Model for Asset Tracking Technology to Support Naval Sea-Based Resupply

Natalie M. Scala, Jennifer Pazour

Engineering Management Journal, 28(2), p. 120-130, 2016

Naval seabasing is a dense storage environment and requires specialized logistics to fulfill emergent requests for tailored resupply packages while at sea.  We develop a value model to identify the preferred technology to track inventory assets while stored in this dense environment.  Evaluated technologies include radio frequency identification, barcoding, internal positioning systems (IPS), and camera-aided technology.  We conclude that IPS is the preferred asset tracking technology in the seabasing environment.  An adapted version of this paper is available within the following Defense Technical Information Center report: link to report. AAM via Copyright Policy

 

Multi-objective Decision Analysis for Workforce Planning: A Case Study

Natalie M. Scala, Richard Kutzner, Dennis Buede, Christopher Ciminera, Alicia Bridges

Proceedings of the 2012 Industrial and Systems Engineering Research Conference

We create a value model to evaluate the preferred ratio of civilian, contractor, and military personnel for an engineering related work role in the defense environment.


Spare Parts

My dissertation studied spare parts at nuclear power plants.  Spares are particularly interesting in this environment, as many exhibit extremely intermittent demand while possibly having plant safety implications.  The overall research enabled the case study company to save 18% of its total spares inventory volume.

 

Managing Nuclear Spare Parts Inventories: A Data Driven Methodology

Natalie M. Scala, Jayant Rajgopal, Kim LaScola Needy

IEEE Transactions on Engineering Management, 61(1), p. 28-37, 2014

This paper outlines and summarizes a four part methodology for managing nuclear spare parts: (1) influence diagram of relevant factors, (2) weighting influences via the Analytic Hierarchy Process, (3) assigning parts to groups using inventory criticality indices, and (4) base stock inventory policy for each group of parts.  This is a data driven methodology that can be used to manage the entire nuclear spare parts process, or portions may be used to manage components of the overall process. AAM via IEEE Post-Publication Policy

 

Influence Diagram Modeling of Nuclear Spare Parts Process

Natalie M. Scala, Jayant Rajgopal, Kim LaScola Needy

Proceedings of the 2010 Industrial Engineering Research Conference

This paper details the first step in the nuclear spare parts methodology, and develops an influence diagram for the spare parts process.  Thirty-four influences were identified and grouped into seven themes, driving best practices for process continuous improvement.

 

Using the Analytic Hierarchy Process in Group Decision Making for Nuclear Spare Parts

Natalie M. Scala, Kim LaScola Needy, Jayant Rajgopal

31st ASEM National Conference, 2010

This paper details the second step in the nuclear spare parts methodology and specifically presents the interview protocol used for subject matter expert (SME) elicitation.  Examples of SME responses and data collection are also discussed.

 

An Inventory Criticality Classification Method for Nuclear Spare Parts: A Case Study

Natalie M. Scala, Jayant Rajgopal, Kim LaScola Needy

Chapter 15 of Decision Making in Service Industries: A Practical Approach, CRC Press, p. 365-392, 2012

This paper details the third step in the nuclear spare parts methodology and develops criticality indices for spare parts inventory.  Parts are then assigned to groups based on a criticality score, which is derived from part performance against the weighted influences.  Three overall groups of parts are defined.

 

A Base Stock Inventory Management System for Intermittent Spare Parts

Natalie M. Scala, Jayant Rajgopal, Kim LaScola Needy

Military Operations Research, 18(3), p. 63-77, 2013

This paper details the fourth step in the nuclear spare parts methodology and develops base stock inventory policies for each group of parts.  We use a historical numerical simulation to identify inventory levels that minimize the overall spare parts investment while following a user-defined risk tolerance profile.

 

Risk and Spare Parts Inventory in Electric Utilities

Natalie M. Scala, Jayant Rajgopal, Kim LaScola Needy

Proceedings of the 2009 Industrial Engineering Research Conference

We discuss risk in the context of nuclear power generation and utilities.  We also provide a research agenda for incorporating risk and costs into a quantitative decision analysis framework for controlling spare parts inventories.

 

Decision Making and Tradeoffs in the Management of Spare Parts Inventory at Utilities

Natalie M. Scala, Kim LaScola Needy, Jayant Rajgopal

30th ASEM National Conference, 2009

We discuss tradeoffs, in a deregulated generation environment, associated with holding large amounts of spare parts inventory versus the potential revenue losses if a nuclear generation plant were to go off-line.  We also explore potential forecasting methods for nuclear spare parts and establish that many parts exhibit highly intermittent demand patterns.

 

Spare Parts Management for Nuclear Power Generation Facilities

Natalie M. Scala

My dissertation discusses the four part inventory management methodology for nuclear spare parts, and includes details beyond my journal and conference papers.


Other Areas

My research can be broadly classified as decision analysis, so many of these papers examine applications of decision models in various contexts.  I’ve also done some work in post-secondary education, specifically examining how business and engineering students are motivated to learn analytics.

 

Group Decision Making with Dispersion in the Analytic Hierarchy Process

Natalie M. Scala, Jayant Rajgopal, Luis Vargas, Kim LaScola Needy

Group Decision and Negotiation, 25(2), p. 355-372, 2016

This is a theory paper that develops a method for aggregating a group of decision maker judgments in the Analytic Hierarchy Process (AHP).  This method should be used when the decision makers are dispersed and unwilling or unable to revise their judgments.  It can also be used to determine weights for homogeneous decision makers when using the weighted geometric mean for aggregation. AAM via Springer Policy

 

Motivation and Analytics: Comparing Business and Engineering Students

Natalie M. Scala, Stella Tomasi, Andrea Goncher, Karen Bursic

INFORMS Transactions on Education, 19(1), p. 1-11, 2018

This research examines differences between business and engineering students in motivation to learn analytics.  We find that effective approaches for teaching analytics vary by major. Business students can be influenced towards a positive attitude and thus be motivated to perform better. Caring instructors who demonstrate the relevance of the material in the classroom can help to influence positive attitudes among business students.  Visit my Media page for a profile of this article.

Scheduling and project Management

Application of the Maturity Model for Collaborative Scheduling for Construction Projects

Natalie M. Scala, Thais da Costa Lago Alves, Dominique Hawkins, Vincent Schiavone, Min Liu

Engineering, Construction and Architectural Management, article in advance 2024.

This paper introduces the weighting, analysis, and validation method used in the development of the Maturity Model for Collaborative Scheduling (MMCS). The ranking process can then be used during pre/post project execution to track collaborative scheduling in practice and provide the project team with constructive feedback and actionable steps for reaching the next highest level of collaboration. We offer recommendations and best practices for project improvement. In practice, project leaders can use this model to assess project performance, advance the project’s maturity, and guide continuous improvement efforts for enhanced collaboration. AAM Final Draft via Emerald’ Self-Archiving Policy

The Gold Standard: Developing a Maturity Model to Assess Collaborative Scheduling

Natalie M. Scala, Min Liu, Thais da Costa Lago Alves, Vincent Schiavone, Dominique Hawkins

Engineering, Construction and Architectural Management, 30(4), p. 1636-1656, 2023.

This research provides a usable maturity model for collaborative scheduling (CS), especially in the construction industry. Via subject matter expert elicitation and focus groups, the maturity model establishes five pillars of collaboration—scheduling significance, planners and schedulers, scheduling representation, goal alignment with owner, and communication. Statistical analysis shows that current industry projects are not consistent in collaboration practice implementation, and the maturity model identifies areas for collaboration improvement. The findings provide a benchmark for self-evaluation and peer-to-peer comparison for project managers. The model is also useful for project managers to develop effective strategies for improvement on targeted dimensions and metrics. AAM Final Draft via Emerald Open Research Policy

Comparative Analysis of Planning with the Critical Path Method, Last Planner System, and Location-Based Techniques in Brazil, Finland, and the United States

Natalie M. Scala, Vincent Schiavone, Hylton Olivieri, Olli Seppanen, Thais Alves, Min Liu, Ariovaldo Denis Granja

Engineering Management Journal, 35(3), p. 237-256, 2023.

We examine the Critical Path Method (CPM), Last Planner System (LPS) and Line of Balance (LB) for differences and similarities of these methods in terms of their use in different countries. The study compares three countries (Brazil, Finland, and United States) and the methods to evaluate both intra- and inter-country implementation to gain additional insights about their use. Results suggest statistically significant intra- and inter-country differences regarding how these methods are used, with a specific focus on mechanics in the countries. The results reflect the current state of practice; engineering and construction managers should understand different ways of understanding scheduling, especially when working with foreign teams. AM Final Draft via Taylor and Francis Publication Policy

Prioritizing Collaborative SCheduling Practices Based on Their impact on project Performance

Chuanni He, Min Liu, Thais da C. L. Alves, Natalie M. Scala, Simon M. Hsiang

Construction Management and Economics, 40(7-8), p. 618-637, 2022

The objectives of this research are to identify perceptions of collaborative scheduling (CS) practices that drive project performance, define CS practices used by industry that impact key performance indicators (KPIs), and establish practices that are more commonly implemented and have a higher potential to positively impact KPIs. Results show that meeting owners’ expectation throughout the life-cycle of the project from design through construction and commissioning, using the schedule to support a strong project culture, and an effective communication plan were the top CS practices for overall KPI improvement. Managers can then improve KPIs efficiently by prioritizing their CS practices according to their own project needs.

Breaking through to Collaborative Scheduling: Approaches and Obstacles

Research Team 362, PIs: Thais Alves, Min Liu, Natalie M. Scala

Construction Industry Institute; The University of Texas at Austin

This technical report developed for the research sponsor examines collaborative scheduling (CS) practices. After a high-level introduction to CS for organizations that are willing to adopt collaboration, the report offers a Maturity Model for Collaborative Scheduling (MMCS), which shows how projects can be improved by increasing collaboration across five pillars: scheduling significance, planners and schedulers, scheduling representation, goal alignment with owner, and communication. Finally, the report identifies collaboration improvement opportunities at the project level in terms of five key performance indicators (KPIs): cost, schedule, safety, quality, and teamwork. Link to CII Knowledge Base

Project Delivery Contract Language, Schedules, and Collaboration

Thais da C. L. Alves, Manuel Martinez, Min Liu, Natalie M. Scala

29th Annual Conference of the International Group for Lean Construction (IGLC)

The construction industry has a variety of project delivery methods, contractual arrangements, and scheduling methods used to facilitate collaboration of stakeholders to maximize project performance. We investigate how project delivery methods and contractual arrangements might influence collaboration during the scheduling practice to help managers choose and adapt project delivery methods to their needs. Because schedules are commonly used as contractual documents, collective knowledge needs to be applied to develop, review, and validate schedules for construction projects, regardless of the delivery method used.

Schedulers and Schedules: A Study in the U.S. Construction Industry

Thais da C. L. Alves, Min Liu, Natalie M. Scala, Ashtad Javanmardi

Engineering Management Journal, 32(3), p. 166-185, 2020

This research examines how the construction industry addresses the roles of schedulers and schedules, with the goal of improving current practices. We use influence diagrams and statistical analyses to discover seven themes in the data and also identify corresponding industry challenges related to each theme. Themes include the dynamic nature of schedules, changes in schedule level of detail throughout the life cycle, differences between planning and scheduling, and the evolving roles of schedulers. We propose recommendations to increase collaboration when developing schedules and to improve the roles of schedulers. AAM via Taylor and Francis Publication Policy

A Survey Comparing Critical Path Method, Last Planner System, and Location-Based Techniques

Hylton Olivieri, Olli Seppanen, Thais Alves, Natalie M. Scala, Vincent Schiavone, Min Liu, Ariovaldo Denis Granja

Journal of Construction Engineering and Management, 145(12), 2019

This article compares and contrasts the use of Critical Path Method (CPM), Last Planner System (LPS), and Location-Based Techniques (LB) in the planning and control phases of project management (PM), and project production management (PPM). We analyze a survey of construction professionals in Brazil, China, Finland, and the United States to clarify industry benefits of each method and eliminate potential misunderstandings regarding method use. We find benefits related to critical path analysis and managing contracts using CPM and improved production control with LB and LPS. We conclude that the construction industry can benefit from aligning project scheduling methods with project needs. Final Draft via ASCE Publication Policy

Other Areas

Examining Real Time Pricing in Electricity Usage

Natalie M. Scala, Samuel Henteleff, Christopher Rigatti

Proceedings of the 2010 Industrial Engineering Research Conference

Using a survey, we examine potential customer preferences to Real Time Pricing (RTP), or dynamic electricity prices based on time of day and weather. We consider potential residential customer willingness to shift usage to off-peak hours for 11 typical household appliances, identifying potential implications if RTP was broadly enacted in the United States.

This research was selected as “Best Paper in Engineering Economy” at the 2010 Industrial Engineering Research Conference.

 

Analyzing Supplier Quality Management Practices in the Construction Industry

Rufaidah AlMaian, Kim LaScola Needy, Kenneth D. Walsh, Thaís da CL Alves, Natalie M. Scala

Quality Engineering, 28(2), p. 175-183, 2016

This article uses principal component analysis (PCA) to analyze a number of supplier quality management (SQM) practices from construction organizations known for effective SQM.  Practices are validated by a decision model built from subject matter expert elicitation.  We show that supplier's work observation, supplier performance rating, inspection effort tracking, and inspection and testing plans are important practices. The analysis can be extended to a quantitative methodology that quality engineers can use to analyze small sample size data.

 

Decision Modeling and Applications to Major League Baseball Pitcher Substitution

Natalie M. Scala

29th ASEM National Conference, 2008

This research examines the influences that affect a manager’s decision to substitute a pitcher in Major League Baseball and presents a decision model to analytically determine the best choice of pitcher to face a given batting line-up.  Historical box scores are used to both illustrate and validate the model.

 

An Analytic Network Process (ANP) Approach to the Project Portfolio Management for Organizational Sustainability

Fikret K. Turan, Natalie M. Scala, Mary Besterfield-Sacre, Kim LaScola Needy

Proceedings of the 2009 Industrial Engineering Research Conference

This paper presents preliminary research that uses ANP and the Triple Bottom Line to evaluate and prioritize projects based on their potential contribution to an organization’s sustainability initiative.

 

Organizational Sustainability: A New Project Portfolio Management Approach that Integrates Financial and Non-Financial Performance Measures

Fikret Turan, Natalie M. Scala, Akram Kamrani, Kim LaScola Needy

Proceedings of the 2008 Industrial Engineering Research Conference

This paper presents preliminary research of a decision model that integrates financial and non-financial performance measures in project portfolio management via the Triple Bottom Line.  Projects are prioritized to align with the organization’s financial, environmental, and social strategy.