Security Policy Management Process Within Six Sigma Framework

Total Page:16

File Type:pdf, Size:1020Kb

Security Policy Management Process Within Six Sigma Framework Journal of Information Security, 2012, 3, 49-58 doi:10.4236/jis.2012.31006 Published Online January 2012 (http://www.SciRP.org/journal/jis) Security Policy Management Process within Six Sigma Framework Vijay Anand, Jafar Saniie, Erdal Oruklu Department of Electrical and Computer Engineering, Illinois Institute of Technology, Chicago, USA Email: [email protected] Received October 13, 2011; revised November 30, 2011; accepted December 16, 2011 ABSTRACT This paper presents a management process for creating adaptive, real-time security policies within the Six Sigma 6σ framework. A key challenge for the creation of a management process is the integration with models of known Indus- trial processes. One of the most used industrial process models is Six Sigma which is a business management model wherein customer centric needs are put in perspective with business data to create an efficient system. The security pol- icy creation and management process proposed in this paper is based on the Six Sigma model and presents a method to adapt security goals and risk management of a computing service. By formalizing a security policy management process within an industrial process model, the adaptability of this model to existing industrial tools is seamless and offers a clear risk based policy decision framework. In particular, this paper presents the necessary tools and procedures to map Six Sigma DMAIC (Define-Measure-Analyze-Improve-Control) methodology to security policy management. Keywords: Security Management; Security Process; Policy; Threat; Six Sigma 1. Introduction ment is generally referred to as a security policy process. A security policy process model given in [3] identifies A security policy [1] management process is necessary various phases of a security policy creation and updates. for refining existing policies or creating new policies as threats and computing services evolve. Security policy Most of the policy creation models have a clear security creation process gives an insight onto the quantification goal perspective of creating or enhancing security poli- of risk. For high level management where it is necessary cies. Some models [4] are created by taking into consid- to make risk based decisions, this process provides a way eration what security professionals had to say about the to manage risk as threats change. There is always a need various aspects of technology that needs to be addressed to maintain consumer trust for a successful computing before a policy is created. service. A measure of an effective security policy crea- We propose to adapt the security policy creation proc- tion process is the evaluation of risk. In this paper, we ess into a business management system wherein the effi- review existing policy creation models and propose our cacy of the policy management and risk based decisions model based on Six Sigma 6 [2] with quantification can be easily quantified in the current models. For a pol- of the risk factors. We contend that threats have a direct icy management model to be effective in an industrial implication on policies which are countermeasures to setting, it needs to be based on an industrial process. In- threats. Therefore, the efficacy of security policies needs stitutionalizing any process has inherent cost [5] on us- to be measured against the modeled and analyzed threats age of tools, learning curve to use the process effectively in the security policy management system. As threats and integrating the process into the system. Hence, an evolve so must the security policies since there is a direct effective integration of a security policy management correlation between threats and security policy. process into an existing industrial process allows other There have been various processes proposed to create processes to be integrated with security policy; thereby security policies for a secure system. The various aspects enhancing the effectiveness of the industrial system as a of the security policy creation models are 1) understand- whole. In this paper, we use the Six Sigma model to base ing threats for policy creation; 2) a monitoring process our security policy management process due to its wide- for existing internal or external threats; and 3) policy spread acceptance and effectiveness in an industrial set- operations in the system. ting. Our key contributions are: In the current literature, the security policy manage- Creation of a security policy management process Copyright © 2012 SciRes. JIS 50 V. ANAND ET AL. with an explicit feedback mechanism so as to control 5) Controls threat mitigation with security policy imple- the deployment of security policies with evolving mentation to guarantee the quality of service for gaining threats, customer trust. Using the Six Sigma process model for the security policy management process to ease integration with 3. Security Policy Management Process industrial processes, 3.1. Existing Security Policy Creation Quantification of risk in security policy management Processes for making decisions. Existing security policy creation processes identify the 2. Six Sigma in a Nutshell need to have a feedback mechanism in order to draft new policies. The two widely recognized processes are PFIRES The implementation of Six Sigma is generally done in (Policy Framework for Interpreting Risk in e-Business two different approaches either for improving a product Security [3]) and the organizational process model [4] or creating a new product. For making changes to exist- which initiate the following steps for security policy ing processes, the process used in Six Sigma is called creation: DMAIC (Define-Measure-Analyze-Improve-Control). The Assess: Assessment phase is a trigger to evaluate se- DMAIC project methodology has five phases: [6] curity policies which is initiated by either: 1) Creation Define: This step involves the quantification of high- of new model or addition of a new feature such that level project goals and the process used. the input/output characteristics of a computing service Measure: This step involves the quantification of im- is altered leading to changes in the risk factors; or 2) portant methods used in a current process from which Consequence of the review and management of ex- relevant data is collected. isting policies affecting the risk parameters of the Analyze: This step involves the identification of the computing service. For either of the above cases, the causality effect between the process and factors in- reference for policy changes are existing policies and fluencing the process. the assumptions made during the institutionalization Improve: This step involves the optimization of the of the policies. In the organizational process [4] model, current process. this phase is blended in the task of Policy Awareness, Control: This step involves the correction to any de- Policy Review and Risk Assessment. viation associated with a particular process before it Plan: Planning phase is where the requirements and results into defects. strategy of rolling out a new security policy is created. For new products, the DMADV (Define-Measure-Ana- This phase outlines the high level requirements of secu- lyze-Design-Verify) system is generally used. The DMADV rity policies for later implementation. In the organiza- project methodology features five phases: tional process [4] model this is primarily done in Pol- Define design goals that are consistent with customer icy Development. demands and the enterprise strategy. Deliver: Deliver phase is when the actual implemen- Measure and identify CTQs (characteristics that are tation of the policy is undertaken. The design of various Critical to Quality), product capabilities, production control structures based on requirements is deter- process capability, and risks. mined. The implementation part of the security policy Analyze to develop and design alternatives, create a updates is also integrated in this phase. high-level design and evaluate design capability to Operate: Operate phase is persistent in which various select the best design. external and internal businesses, regulatory and tech- Design details, optimize the design, and plan for de- nology trends affecting the security policies are moni- sign verification. tored and analyzed. Verify the design, set up pilot runs, implement the The above policy management mechanisms, although production process and hand it over to the process they are theoretically effective, do not integrate into owners. known business processes such that effective decision In our approach, the security policy management within making can be achieved from a management standpoint. the Six Sigma framework 1) Defines security goals and They also lack correlation with known security tools quantifies digital assets, 2) Measures and assesses vari- such that effectiveness of a policy mechanism can be ous threats to digital assets and quantifies risk, 3) Ana- quantified for risk analysis. In the proposed security lyzes the overall security goals with the identification of management framework we integrate security policy the diversity of external and internal factors affecting the management within Six Sigma processes and correlate assets of a computing service, 4) Improves designs and security tools with each phase of the management pro- optimizes the security policies with evolving threats, and cess. Copyright © 2012 SciRes. JIS V. ANAND ET AL. 51 3.2. Causality Framework for Security ξ ξ Policy Management Ѕ Г Г Ѕ Г Г Ѕ For a Six Sigma implementation, there is a need to estab- K K lish a causal analysis [7] which is true for other process improvement methodologies. We make a case for causal- ity with respect to security policy and threats. We pro- Where ξ = The set of all executions pose that the objective of a security policy creation is to Г = Set of threats, known and unknown counter threats as shown in Figure 1. ГK = Set of known Threats S = Set of security policies created to counter threats For any security policy creation process, the objective S ⋂ГK = ГK and Г⋃ГK = ГK for an ideal situation is to counter all known (real world and modeled) threats. Figure 1.
Recommended publications
  • Ruggles, Olivia, M Title: Standardized Work Instruction
    1 Author: Ruggles, Olivia, M Title: Standardized Work Instruction The accompanying research report is submitted to the University of Wisconsin-Stout, Graduate School in partial completion of the requirements for the Graduate Degree/ Major: MS Technology Management Research Adviser: Jim Keyes, Ph.D. Submission Term/Year: Summer, 2012 Number of Pages: 56 Style Manual Used: American Psychological Association, 6th edition I understand that this research report must be officially approved by the Graduate School and that an electronic copy of the approved version will be made available through the University Library website I attest that the research report is my original work (that any copyrightable materials have been used with the permission of the original authors), and as such, it is automatically protected by the laws, rules, and regulations of the U.S. Copyright Office. My research adviser has approved the content and quality of this paper. STUDENT: NAME Olivia Ruggles DATE: 8/3/2012 ADVISER: (Committee Chair if MS Plan A or EdS Thesis or Field Project/Problem): NAME Jim Keyes, Ph.D. DATE: 8/3/2012 --------------------------------------------------------------------------------------------------------------------------------- This section for MS Plan A Thesis or EdS Thesis/Field Project papers only Committee members (other than your adviser who is listed in the section above) 1. CMTE MEMBER’S NAME: DATE: 2. CMTE MEMBER’S NAME: DATE: 3. CMTE MEMBER’S NAME: DATE: --------------------------------------------------------------------------------------------------------------------------------- This section to be completed by the Graduate School This final research report has been approved by the Graduate School. Director, Office of Graduate Studies: DATE: 2 Ruggles, Olivia M. Standardized Work Instruction Abstract Mercury Marine is a world-wide manufacturing company in the marine industry.
    [Show full text]
  • Download Complete Curriculum
    L E A N S I X S I G M A G R E E N B E LT C O U R S E T O P I C S Copyright ©2019 by Pyzdek Institute, LLC. LEAN SIX SIGMA GREEN BELT COURSE TOPICS LESSON TOPIC Overview A top-level overview of the topics covered in this course What is Six Sigma? A complete overview of Six Sigma Lean Overview 1 Waste and Value Lean Overview 2 Value Streams, Flow and Pull Lean Overview 3 Perfection Recognizing an Linking your Green Belt activities to the organization’s Opportunity vision and goals Choosing the Project- How to pick a winning project using Pareto Analysis Pareto Analysis Assessing Lean Six Sigma How to carefully assess Lean Six Sigma project candidates Project Candidates to assure success Develop the Project Plan 1 Team selection and dynamics; brainstorming; consensus decision making; nominal group technique Develop the Project Plan 2 Stakeholder analysis, communication and planning, cross functional collaboration, and Force Field Analysis Develop the Project Plan 3 Obtain a charter for your project Develop the Project Plan 4 Work breakdown structures, DMAIC tasks, network diagrams Develop the Project Plan 5 Project schedule management; project budget management Develop the Project Plan 6 Obstacle avoidance tactics and management support strategies High Level Maps 1 L-Maps, linking project charter Ys to L-Map processes High Level Maps 2 Mapping the process from supplier to customer (SIPOC) High Level Maps 3 Product family matrix 2 Voice of the Customer (VOC) 1 Kano Model, getting the voice of the customer using the critical incident technique VOC 2-CTQ Specification Link the voice of the customer to the CTQs that drive it Principles of Variation 1 How will I measure success? Are my measurements trustworthy? Scales of measurement, data types, measurement error principles.
    [Show full text]
  • The Mapping Tree Hierarchical Tool Selection and Use
    The Mapping Tree Hierarchical Tool Selection and Use 1 Session Objectives . Discuss the hierarchical linkage and transparency of mapping using this methodology. Understand how and when to apply each mapping tool and its application in the Lean tool set. Understand how mapping helps to reveal Value and Non-Value Added actions as well as Constraints in the process. 2 Why Do We Care? “Hierarchical Mapping“is necessary because: • Hierarchical mapping is critical in maintaining the organization’s strategic plan during a Lean deployment. • Hierarchical mapping is critical in achieving greater “Value to the Customer”, in revealing of wastes and improving processes. • Until we know all of the “players in the process”, we cannot begin to understand the process, its “Value to the Customer” and the impact on the strategic plan. 3 Keys To Success . Always use your team of experts for mapping exercises. Mapping in “silos” is a “design for failure”. Always follow a hierarchical procedure for mapping to root cause. Always begin at the high level first, then capture detailed maps as needed. 4 Why use the Mapping Tree methodology ? • Before any improvement exercise is undertaken, a clear definition of “what to work on” must be developed. • Without utilizing a mapping hierarchy, any attempt to attack a process for improvement effort would be just a “shot in the dark”. • We need a methodology that will link the lowest level effort to the high level organizational objectives, and do it transparently. • The hierarchical approach of the Mapping Tree helps to ensure that the lowest task efforts remain focused on the Customer requirements and support the Strategic Objectives.
    [Show full text]
  • Chapter 5: Quality Tools for Six Sigma 2
    Six Sigma Quality: Concepts & Cases‐ Volume I STATISTICAL TOOLS IN SIX SIGMA DMAIC PROCESS WITH MINITAB® APPLICATIONS Chapter 5 Quality Tools for Six Sigma Basic Quality Tools and Seven New Tools ©Amar Sahay, Ph.D. 1 Chapter 5: Quality Tools for Six Sigma 2 Chapter Highlights This chapter deals with the quality tools widely used in Six Sigma and quality improvement programs. The chapter includes the seven basic tools of quality, the seven new tools of quality, and another set of useful tools in Lean Six Sigma that we refer to –“beyond the basic and new tools of quality.” The objective of this chapter is to enable you to master these tools of quality and use these tools in detecting and solving quality problems in Six Sigma projects. You will find these tools to be extremely useful in different phases of Six Sigma. They are easy to learn and very useful in drawing meaningful conclusions from data. In this chapter, you will learn the concepts, various applications, and computer instructions for these quality tools of Six Sigma. This chapter will enable you to: 1. Learn the seven graphical tools ‐ considered the basic tools of quality. These are: (i) Process Maps (ii) Check sheets (iii) Histograms (iv) Scatter Diagrams (v) Run Charts/Control Charts (vi) Cause‐and‐Effect (Ishikawa)/Fishbone Diagrams (vii) Pareto Charts/Pareto Analysis 2. Construct the above charts using MINITAB 3. Apply these quality tools in Six Sigma projects 4. Learn the seven new tools of quality and their applications: (i) Affinity Diagram (ii) Interrelationship Digraph (iii) Tree Diagram (iv) Prioritizing Matrices (v) Matrix Diagram (vi) Process Decision Program Chart (vii) Activity Network Diagram 5.
    [Show full text]
  • Implementation of Dmaic and Axiomatic Design to the Creation of a Basic Smartphone Application
    TREBALL FI DE GRAU Grau en Enginyeria Mecànica IMPLEMENTATION OF DMAIC AND AXIOMATIC DESIGN TO THE CREATION OF A BASIC SMARTPHONE APPLICATION Memòria i Annexos Autor: Antoni Amat Serra Director: Joan Martínez Sánchez Convocatòria: Octubre 2017 Implementation of DMAIC And Axiomatic Design to the Creation of A Basic Smartphone Application ACKNOWLEDGEMENT I would like to thank the Politecnico di Bari to give me the opportunity to study for one semester in Bari, also to Yasamin Eslami for helping me during all the process to finish this project. I would like to specially thank Joan Martinez to accept directing my work in such a short notice giving me the opportunity to finish my bachelor. I would like to thank my Parents to give the opportunity to study and to carry out this project abroad and also for giving me the spirit to finish the Bachelor. I Implementation of DMAIC And Axiomatic Design to the Creation of A Basic Smartphone Application ABSTRACT This project implements two theories to the creation of a basic smartphone application: DMAIC and Axiomatic Design Theory. DMAIC is very often used methodology that very successful enterprises had already implemented; it is used in Six Sigma, a procedure that ensures a large reduction on the errors of the enterprise processes. This method has been used by a lot of companies all over the world providing them a large increase of quality producing. Axiomatic Design Theory takes its name from the fact that it is composed of two Axioms that have to be accomplished when implementing this theory. It is a method meant to design with a very specific order.
    [Show full text]
  • Define Measure Analyze Contr Ol
    Lean Six Sigma BENEFITS STRATEGIC VALUE METHOD ORGANIZATION • Process improvement and • Superior cost structure • Professional and scientific • Improvement projects are led by Green redesign (manufacturing, • Competitive advantages based problem solving and Black Belts, who are familiar with the construction, financial services, on customer satisfaction • Working with precise and process and Lean Six Sigma healthcare, public sector, quantitative problem descriptions • Improvement projects follow the DMAIC high-tech industry) • Competence development in operations management, project • Starting with a data-based approach • Resulting in superior quality management and continuous diagnosis • Lean Six Sigma program management and efficiency levels improvement • Designing evidence-based coordinates projects by strategically • Structural financial impact improvement actions choosing projects and making sure that benefits are realized 0. DEFINE THE PROJECT Stakeholder analysis Lets initiative happen Legend: M oderately agains Strongly against 0: Current situation Makes initiative S I P O C X: Preferred situation Helps initiative happe Influence n Stakeholder Stake t Person 1 Person 2 Person 3 SIPOC Person 4 - Project charter - SIPOC and process flow chart - Benefit analysis - Organization (time and review board) DEFINE - Stakeholder analysis Project charter Stakeholder analysis 1. DEFINE THE CTQS 2. VALIDATE THE MEASUREMENT Operational PROCEDURES Revenue cost Pareto Chart of Problems Throughput time Processing time (min) 200 Customer 100 Personnel
    [Show full text]
  • Six Sigma in Urban Logistics Management—A Case Study
    sustainability Article Six Sigma in Urban Logistics Management—A Case Study Justyna Lemke , Kinga Kijewska , Stanisław Iwan * and Tomasz Dudek Faculty of Economics and Transport Engineering, Maritime University of Szczecin, ul. H. Poboznego˙ 11, 70-507 Szczecin, Poland; [email protected] (J.L.); [email protected] (K.K.); [email protected] (T.D.) * Correspondence: [email protected]; Tel.: +48-91-48-09-690 Abstract: A city as a system that constitutes one of the most important areas of human activities. The significant role to fulfill their expectations pay the goods transport and deliveries. These issues are the subject of urban logistics. In broad terms, urban logistics may be construed as a number of processes focused on freight flows, which are completed in cities, including deliveries, supply, goods transfer, services, etc. Due to the different urban logistics stakeholders’ expectations, these systems generate many challenges for managers, especially in the context of city users’ needs and their quality of life. Today, there is a lack of broadened approach and methodology to support them from the processes’ efficiency perspective. To fulfill this gap, the purpose of this paper is to apply the Six Sigma method as a support in last mile delivery management. Six Sigma method plays important role in production systems processes management. However, it could be useful in much wider perspective, including transport and logistics processes. The Authors emphasize that the Six Sigma method could be efficient approach in the last mile delivery processes’ analysis in the context of their efficiency. It helps positioning the customer satisfaction level and quantify the delivery processes defects, related to the undelivered goods.
    [Show full text]
  • Finding and Eliminating the Root Cause of Defects Identified in Customer Complaints a Case Study Using the Six Sigma Methodology to Facilitate Root Cause Analyses
    Finding and Eliminating the Root Cause of Defects Identified in Customer Complaints A case study using the Six Sigma methodology to facilitate root cause analyses Master’s Thesis Project in the Master’s Degree Program Quality and Operations Management MARIA ARAB ELIN DYMLING DEPARTMENT OF INDUSTRIAL AND MATERIAL SCIENCES DEPAR CHALMERS UNIVERSITY OF TECHNOLOGY Gothenburg, Sweden 2020 www.chalmers.se FIRST NAME LAST NAME Finding and Eliminating the Root Cause of Defects Identified in Customer Complaints A case study using the Six Sigma methodology to facilitate root cause analyses MARIA ARAB ELIN DYMLING Department of Industrial and Material Sciences CHALMERS UNIVERSITY OF TECHNOLOGY Gothenburg, Sweden 2020 Finding and eliminating the root cause of defects identified in customer complaints A case study using the Six Sigma methodology to facilitate root cause analyses MARIA ARAB ELIN DYMLING © MARIA ARAB, 2020 © ELIN DYMLING, 2020. Department of Industrial and Material Sciences Chalmers University of Technology SE-412 96 Gothenburg, Sweden Telephone: + 46 (0)31-772 1000 Abstract Volvo Cars is a global car manufacturer that produces premium brand cars that demand high quality. The quality of a product is often defined by the degree of customer satisfaction. Therefore, Volvo Cars Corporation has internal departments working with customer complaints. This thesis was performed in collaboration with the department Variability Reduction Team who perform root cause analyses initiated by customer complaints on newly produced cars. A case study was performed regarding a customer-initiated problem with loose support bearings at the production plant in Torslanda. People from several different departments possess different knowledge and experience regarding the problem with loose support bearings.
    [Show full text]
  • Problem Solver MauIE O’BIe
    Problem Solver Mauie O’Bie About LBSPartners LBSPartners was founded in Limerick in 2002 to educate and assist companies in the development of operational excellence through Lean, Lean-Sigma & 6-Sigma. We are a hands-on business improvement consulting firm with extensive Lean and management experience. Our customer base includes SMEs, Multinationals and Public sector clients in food, engineering, life sciences, services and software. LBSPartners has a proven track record of delivering measurable and sustainable results to our clients through significant Lean transformations to hundreds of clients. Projects are typically delivering improvements in cost, cycle time, quality and customer service. Published by: LBSPartners, Nexus Innovation Centre, Tierney Building, University of Limerick, Limerick, Ireland Copyright © LBSPartners, 2012 All rights reserved. Publication date: June, 2012 Telephone: +353 (0) 61 518408 e-mail: [email protected] Website: www.lbspartners.ie ISBN: 978-0-9570203-2-0 All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by information storage and retrieval systems, without the written permission of the publisher, except by a reviewer who may quote brief passages in a review. Problem Solver Contents Page Introduction 1 Lean Thinking 3 Problem Solving 7 Problem Solving Tools 15 SIPOC 16 Process Maps 20 Check sheets 28 Pareto Diagrams 31 Run and Trend charts 34 Brainstorming 37 Cause and Effect Diagram 40 5 Whys/Root Cause Analysis 47 Scatter Diagrams 50 Histograms 53 Control Charts 56 Improvement Projects 59 Team Skills 69 Templates 73 Problem Solver Introduction Problem Solving involves finding the root cause of an issue and implementing a corrective action or actions to effect a permanent fix for the issue.
    [Show full text]
  • Lean Six Sigma (Σ) in (Packaging) Industry
    ASD Ambalaj Kongresi 2019 Uluslararası Ambalaj Sanayi Kongresi Lean Six Sigma (σ) in (Packaging) Industry Gültekin «Gill» Savaşkan General Manager Super Film Packaging Gültekin Savaşkan 1 ASD Ambalaj Kongresi 2019 Uluslararası Ambalaj Sanayi Kongresi The Flow • Introduction to quality • What is Lean Six Sigma? • Is your company ready for Lean (Six Sigma) Implementation? • Lean • Six Sigma – a sample application • Advanced Tool – Design of Experiments Gültekin Savaşkan 2 ASD Ambalaj Kongresi 2019 Uluslararası Ambalaj Sanayi Kongresi Quotes to remember «The bitterness of poor quality remains «A bad system will long after the sweetness of low price is beat a good person forgotten.» Benjamin Franklin every time.» W. Edwards W. Edwards Deming «It is not enough to do your best; you Deming must know what to «In God we trust, all «It is not necessary do, and then do others must bring to change. Survival your best.» data.» is NOT mandatory.» W. Edwards Deming W. Edwards Deming W. Edwards Deming Gültekin Savaşkan 3 ASD Ambalaj Kongresi 2019 Uluslararası Ambalaj Sanayi Kongresi What is Lean Six Sigma? • Lean - Focusing in waste reduction in all its forms – strong process engineering background. • Six Sigma – Focusing to reduce process variability to achieve more predictable and reliable process which leads to increased quality, improved yield and less waste. They are both essentially a mindset and collection of techniques deployed to investigate and resolve a MINDSET given problem or business issue. Waste - Defects Both effectively look at the cause and effect around a NVA (non-value-added) problem, establishing its magnitude and means of Variability managing or eliminating it altogether.
    [Show full text]
  • Development of the Laboratory Based Course in Lean Six Sigma
    AC 2010-471: DEVELOPMENT OF THE LABORATORY-BASED COURSE IN LEAN SIX SIGMA NANOMANUFACTURING Vladimir Genis, Drexel University Dr. Vladimir Genis—Associate Professor and Applied Engineering Technology Program Director in the School of Technology and Professional Studies, Drexel University, has developed and taught graduate and undergraduate courses in physics, electronics, nanotechnology, biomedical engineering, nondestructive testing, and acoustics. His research interests include ultrasound wave propagation and scattering, ultrasound imaging, nondestructive testing, electronic instrumentation, piezoelectric transducers, and engineering education. Results of his research work were published in scientific journals and presented at the national and international conferences. Dr. Genis has three U.S. patents. From July 2003 to July 2005, as a team facilitator, he worked on the development of the curriculum for the “Partnership for Innovation in Nanobiotechnology Education” program in collaboration with the University of Pennsylvania and several Community Colleges. Michael Mauk, Drexel University Dr. Michael G. Mauk is an Assistant Professor in the Applied Engineering Technology Program at Drexel University. Dr. Mauk’s research and teaching interests are in nanotechnology, Quality methods, rapid prototyping, microfluidics, and solar energy. Dr. Mauk has a Ph.D. in Electrical Engineering from the University of Delaware, Masters degrees in Biotechnology (Johns Hopkins) and Chemistry (University of the Sciences), and Bachelors degrees in Chemical and Electrical Engineering. Dr. Mauk is a licensed Professional Engineer. From 1989 to 2003, he was a Senior Research Engineer at AstroPower, Inc. (Newark, Delaware), serving as Principal Investigator for numerous research programs sponsored by NSF, DOD, NASA, DOE, and NIST. From 2003 to 2008, Dr. Mauk was a Research Associate at the University of Pennsylvania working on lab-on-a-chip clinical diagnostics devices.
    [Show full text]
  • Lean Six Sigma and Minitab' Page Number Changes for Edition 3 to Edition 4
    Lean Six Sigma and Minitab' Page Number changes for Edition 3 to Edition 4 Introduction Edition 3 Edition 4 Notes What is Six Sigma? 1 1 DMAIC – A Logical Approach to Problem Solving 2 2 What is Lean? 3 3 Lean and the Six Sigma DMAIC Structure 4 4 Building a Lean Six Sigma Programme 5 5 Different Types of Lean Six Sigma Projects 7 7 Where do Lean Six Sigma Projects come from? 9 9 Managing Lean Six Sigma Projects 10 10 Minitab – Overview 11 11 Quality Companion – Overview 12 12 How to use this guide – Free data files! 13 13 DEFINE 14 14 Problem Statements 15 15 Goal Statements 17 17 Costs of Poor Quality (COPQ) 18 18 Voice of the Customer (VOC), Kano Analysis 19 19 House of Quality 21 21 Critical to Quality (CTQ) Trees 23 23 Extra page on CTQ Trees. SIPOC – High Level Process Mapping 24 25 Gemba - 26 New tool/page. Project Structure and Project Plans 25 27 Stakeholder Analysis 26 28 Project Working Files 27 29 Facilitation Skills 28 30 Effective Teams and Meetings 29 31 Project Charter 30 32 Define Checklist and Review Questions 31 33 MEASURE 32 34 Key Performance Indicators (KPIs) 33 35 KPI Trees 34 36 Lean Measures (PCE, OEE, Takt Time etc.) 35 37 Statistics for process ‘Position’ / ‘Spread’ 38 40 Operational Definitions 40 42 Data Worlds (Continuous/Count/Attribute Data) 43 45 Data Collection Methods 49 51 Data Collection Plans & Sampling 50 52 Minimum Sample Sizes 51 53 Sampling Frequency 54 56 Contextual Data – the 4th Data World 55 57 Measurement System Analysis – Intro & Routemap 56 58 - Bias and Precision 58 60 - Meausurement System
    [Show full text]