This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.

In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.

Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.

Displaying 1 - 10 of 131
Filtering by

Clear all filters

151681-Thumbnail Image.png
Description
Using experience, observations, data, current research, and writings in the field of volunteer management, it was determined there was a need to study the effects of leadership/management practices on the productivity outcomes of a volunteer construction workforce. A simple wood bench that would be tiled and painted was designed to

Using experience, observations, data, current research, and writings in the field of volunteer management, it was determined there was a need to study the effects of leadership/management practices on the productivity outcomes of a volunteer construction workforce. A simple wood bench that would be tiled and painted was designed to test the areas of Time, Waste, Quality, Safety, and Satisfaction of different volunteer groups. The challenge was bolstered by giving the teams no power tools and limited available resources. A simple design of experiment model was used to test highs and lows in the three management techniques of Instruction, Help, and Encouragement. Each scenario was tested multiple times. Data was collected, normalized and analyzed using statistical analysis software. A few significant findings were discovered. The first; the research showed that there was no significant correlation between the management practices of the leader and the satisfaction of the volunteers. The second; the research also showed when further analyzed into specific realistic scenarios that the organizations would be better to focus on high amounts of Help and Encouragement in order to maximize the productivity of their volunteer construction workforce. This is significant as it allows NPO's and governments to focus their attention where best suited to produce results. The results were shared and the study was further validated as "significant" by conducting interviews with experts in the construction nonprofit sector.
ContributorsPrigge, Diedrich (Author) / Sullivan, Kenneth (Thesis advisor) / Wiezel, Avi (Committee member) / Badger, William (Committee member) / Arizona State University (Publisher)
Created2013
152178-Thumbnail Image.png
Description
The construction industry in India suffers from major time and cost overruns. Data from government and industry reports suggest that projects suffer from 20 to 25 percent time and cost overruns. Waste of resources has been identified as a major source of inefficiency. Despite a substantial increase in the past

The construction industry in India suffers from major time and cost overruns. Data from government and industry reports suggest that projects suffer from 20 to 25 percent time and cost overruns. Waste of resources has been identified as a major source of inefficiency. Despite a substantial increase in the past few years, demand for professionals and contractors still exceeds supply by a large margin. The traditional methods adopted in the Indian construction industry may not suffice the needs of this dynamic environment, as they have produced large inefficiencies. Innovative ways of procurement and project management can satisfy the needs aspired to as well as bring added value. The problems faced by the Indian construction industry are very similar to those faced by other developing countries. The objective of this paper is to discuss and analyze the economic concerns, inefficiencies and investigate a model that both explains the Indian construction industry structure and provides a framework to improve efficiencies. The Best Value (BV) model is examined as an approach to be adopted in lieu of the traditional approach. This could result in efficient construction projects by minimizing cost overruns and delays, which until now have been a rarity.
ContributorsNihas, Syed (Author) / Kashiwagi, Dean (Thesis advisor) / Sullivan, Kenneth (Committee member) / Kashiwagi, Jacob (Committee member) / Arizona State University (Publisher)
Created2013
152185-Thumbnail Image.png
Description
Over the past couple of decades, quality has been an area of increased focus. Multiple models and approaches have been proposed to measure the quality in the construction industry. This paper focuses on determining the quality of one of the types of roofing systems used in the construction industry, i.e.

Over the past couple of decades, quality has been an area of increased focus. Multiple models and approaches have been proposed to measure the quality in the construction industry. This paper focuses on determining the quality of one of the types of roofing systems used in the construction industry, i.e. Sprayed Polyurethane Foam Roofs (SPF roofs). Thirty seven urethane coated SPF roofs that were installed in 2005 / 2006 were visually inspected to measure the percentage of blisters and repairs three times over a period of 4 year, 6 year and 7 year marks. A repairing criteria was established after a 6 year mark based on the data that were reported to contractors as vulnerable roofs. Furthermore, the relation between four possible contributing time of installation factors i.e. contractor, demographics, season, and difficulty (number of penetrations and size of the roof in square feet) that could affect the quality of the roof was determined. Demographics and difficulty did not affect the quality of the roofs whereas the contractor and the season when the roof was installed did affect the quality of the roofs.
ContributorsGajjar, Dhaval (Author) / Kashiwagi, Dean (Thesis advisor) / Sullivan, Kenneth (Committee member) / Badger, William (Committee member) / Arizona State University (Publisher)
Created2013
151282-Thumbnail Image.png
Description
The goal of this research study was to identify the competencies the Project Manager (PM) will need to respond to the challenges the construction industry faces in 2022 and beyond. The study revealed twenty-one emerging challenges for construction PMs grouped into four primary disruptive forces: workforce demographics, globalization, rapidly evolving

The goal of this research study was to identify the competencies the Project Manager (PM) will need to respond to the challenges the construction industry faces in 2022 and beyond. The study revealed twenty-one emerging challenges for construction PMs grouped into four primary disruptive forces: workforce demographics, globalization, rapidly evolving technology, and changing organizational structures. The future PM will respond to these emerging challenges using a combination of fourteen competencies. The competencies are grouped into four categories: technical (multi-disciplined, practical understanding of technology), management (keen business insight, understanding of project management, knowledge network building, continuous risk monitoring), cognitive (complex decisions making, emotional maturity, effective communication), and leadership (leveraging diverse thinking, building relationships, engaging others, mentoring, building trust). Popular data collection methods used in project management research, such as surveys and interviews, have received criticism about the differences between stated responses to questions, what respondents say they will do, and revealed preferences, what they actually practice in the workplace. Rather than relying on surveys, this research study utilized information generated from games and exercises bundled into one-day training seminars conducted by Construction Industry Institute (CII) companies for current and upcoming generations of PMs. Educational games and exercises provide participants with the opportunity to apply classroom learning and workplace experience to resolve issues presented in real-world scenarios, providing responses that are more closely aligned with the actual decisions and activities occurring on projects. The future competencies were identified by combining results of the literature review with information from the games and exercises through an iterative cycle of data mining, analysis, and consolidation review sessions with CII members. This competency forecast will be used as a basis for company recruiting and to create tools for professional development programs and project management education at the university level. In addition to the competency forecast, the research identified simulation games and exercises as components of a project management development program in a classroom setting. An instrument that links the emerging challenges with the fourteen competencies and learning tools that facilitate the mastering of these competencies has also been developed.
ContributorsKing, Cynthia Joyce (Author) / Wiezel, Avi (Thesis advisor) / Badger, William (Committee member) / Sullivan, Kenneth (Committee member) / Arizona State University (Publisher)
Created2012
152888-Thumbnail Image.png
Description
Owner organizations in the architecture, engineering, and construction (AEC) industry are presented with a wide variety of project delivery approaches. Implementation of these approaches, while enticing due to their potential to save money, reduce schedule delays, or improve quality, is extremely difficult to accomplish and requires a concerted change management

Owner organizations in the architecture, engineering, and construction (AEC) industry are presented with a wide variety of project delivery approaches. Implementation of these approaches, while enticing due to their potential to save money, reduce schedule delays, or improve quality, is extremely difficult to accomplish and requires a concerted change management effort. Research in the field of organizational behavior cautions that perhaps more than half of all organizational change efforts fail to accomplish their intended objectives. This study utilizes an action research approach to analyze change message delivery within owner organizations, model owner project team readiness and adoption of change, and identify the most frequently encountered types of resistance from lead project members. The analysis methodology included Spearman's rank order correlation, variable selection testing via three methods of hierarchical linear regression, relative weight analysis, and one-way ANOVA. Key findings from this study include recommendations for communicating the change message within owner organizations, empirical validation of critical predictors for change readiness and change adoption among project teams, and identification of the most frequently encountered resistive behaviors within change implementation in the AEC industry. A key contribution of this research is the recommendation of change management strategies for use by change practitioners.
ContributorsLines, Brian (Author) / Sullivan, Kenneth (Thesis advisor) / Wiezel, Avi (Committee member) / Badger, William (Committee member) / Arizona State University (Publisher)
Created2014
153335-Thumbnail Image.png
Description
With the increasing user demand for low latency, elastic provisioning of computing resources coupled with ubiquitous and on-demand access to real-time data, cloud computing has emerged as a popular computing paradigm to meet growing user demands.

With the increasing user demand for low latency, elastic provisioning of computing resources coupled with ubiquitous and on-demand access to real-time data, cloud computing has emerged as a popular computing paradigm to meet growing user demands. However, with the introduction and rising use of wear- able technology and evolving uses of smart-phones, the concept of Internet of Things (IoT) has become a prevailing notion in the currently growing technology industry. Cisco Inc. has projected a data creation of approximately 403 Zetabytes (ZB) by 2018. The combination of bringing benign devices and connecting them to the web has resulted in exploding service and data aggregation requirements, thus requiring a new and innovative computing platform. This platform should have the capability to provide robust real-time data analytics and resource provisioning to clients, such as IoT users, on-demand. Such a computation model would need to function at the edge-of-the-network, forming a bridge between the large cloud data centers and the distributed connected devices.

This research expands on the notion of bringing computational power to the edge- of-the-network, and then integrating it with the cloud computing paradigm whilst providing services to diverse IoT-based applications. This expansion is achieved through the establishment of a new computing model that serves as a platform for IoT-based devices to communicate with services in real-time. We name this paradigm as Gateway-Oriented Reconfigurable Ecosystem (GORE) computing. Finally, this thesis proposes and discusses the development of a policy management framework for accommodating our proposed computational paradigm. The policy framework is designed to serve both the hosted applications and the GORE paradigm by enabling them to function more efficiently. The goal of the framework is to ensure uninterrupted communication and service delivery between users and their applications.
ContributorsDsouza, Clinton (Author) / Ahn, Gail-Joon (Thesis advisor) / Doupe, Adam (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2015
153094-Thumbnail Image.png
Description
Android is currently the most widely used mobile operating system. The permission model in Android governs the resource access privileges of applications. The permission model however is amenable to various attacks, including re-delegation attacks, background snooping attacks and disclosure of private information. This thesis is aimed at understanding, analyzing and

Android is currently the most widely used mobile operating system. The permission model in Android governs the resource access privileges of applications. The permission model however is amenable to various attacks, including re-delegation attacks, background snooping attacks and disclosure of private information. This thesis is aimed at understanding, analyzing and performing forensics on application behavior. This research sheds light on several security aspects, including the use of inter-process communications (IPC) to perform permission re-delegation attacks.

Android permission system is more of app-driven rather than user controlled, which means it is the applications that specify their permission requirement and the only thing which the user can do is choose not to install a particular application based on the requirements. Given the all or nothing choice, users succumb to pressures and needs to accept permissions requested. This thesis proposes a couple of ways for providing the users finer grained control of application privileges. The same methods can be used to evade the Permission Re-delegation attack.

This thesis also proposes and implements a novel methodology in Android that can be used to control the access privileges of an Android application, taking into consideration the context of the running application. This application-context based permission usage is further used to analyze a set of sample applications. We found the evidence of applications spoofing or divulging user sensitive information such as location information, contact information, phone id and numbers, in the background. Such activities can be used to track users for a variety of privacy-intrusive purposes. We have developed implementations that minimize several forms of privacy leaks that are routinely done by stock applications.
ContributorsGollapudi, Narasimha Aditya (Author) / Dasgupta, Partha (Thesis advisor) / Xue, Guoliang (Committee member) / Doupe, Adam (Committee member) / Arizona State University (Publisher)
Created2014
153126-Thumbnail Image.png
Description
The increasing number of continually connected mobile persons has created an environment conducive to real time user data gathering for many uses both public and private in nature. Publicly, one can envision no longer requiring a census to determine the demographic composition of the country and its sub regions. The

The increasing number of continually connected mobile persons has created an environment conducive to real time user data gathering for many uses both public and private in nature. Publicly, one can envision no longer requiring a census to determine the demographic composition of the country and its sub regions. The information provided is vastly more up to date than that of a census and allows civil authorities to be more agile and preemptive with planning. Privately, advertisers take advantage of a persons stated opinions, demographics, and contextual (where and when) information in order to formulate and present pertinent offers.

Regardless of its use this information can be sensitive in nature and should therefore be under the control of the user. Currently, a user has little say in the manner that their information is processed once it has been released. An ad-hoc approach is currently in use, where the location based service providers each maintain their own policy over personal information usage.

In order to allow more user control over their personal information while still providing for targeted advertising, a systematic approach to the release of the information is needed. It is for that reason we propose a User-Centric Context Aware Spatiotemporal Anonymization framework. At its core the framework will unify the current spatiotemporal anonymization with that of traditional anonymization so that user specified anonymization requirement is met or exceeded while allowing for more demographic information to be released.
ContributorsSanchez, Michael Andrew (Author) / Ahn, Gail-Joon (Thesis advisor) / Doupe, Adam (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2014
153147-Thumbnail Image.png
Description
The rate at which new malicious software (Malware) is created is consistently increasing each year. These new malwares are designed to bypass the current anti-virus countermeasures employed to protect computer systems. Security Analysts must understand the nature and intent of the malware sample in order to protect computer systems from

The rate at which new malicious software (Malware) is created is consistently increasing each year. These new malwares are designed to bypass the current anti-virus countermeasures employed to protect computer systems. Security Analysts must understand the nature and intent of the malware sample in order to protect computer systems from these attacks. The large number of new malware samples received daily by computer security companies require Security Analysts to quickly determine the type, threat, and countermeasure for newly identied samples. Our approach provides for a visualization tool to assist the Security Analyst in these tasks that allows the Analyst to visually identify relationships between malware samples.

This approach consists of three steps. First, the received samples are processed by a sandbox environment to perform a dynamic behavior analysis. Second, the reports of the dynamic behavior analysis are parsed to extract identifying features which are matched against other known and analyzed samples. Lastly, those matches that are determined to express a relationship are visualized as an edge connected pair of nodes in an undirected graph.
ContributorsHolmes, James Edward (Author) / Ahn, Gail-Joon (Thesis advisor) / Dasgupta, Partha (Committee member) / Doupe, Adam (Committee member) / Arizona State University (Publisher)
Created2014
153252-Thumbnail Image.png
Description
Effective collection and dissemination of project information, including best practices, help increase the likelihood of project performance and are vital to organizations in the architecture-engineering-construction (AEC) industry. Best practices can help improve project performance, yet these practices are not universally implemented and used in the industry, due to the following:

Effective collection and dissemination of project information, including best practices, help increase the likelihood of project performance and are vital to organizations in the architecture-engineering-construction (AEC) industry. Best practices can help improve project performance, yet these practices are not universally implemented and used in the industry, due to the following: 1) not all practices are applicable to every project or organization, 2) knowledge lost in organizational turnover which leads to inconsistent collection and implementation of best practices and 3) the lack of standardized processes for best practice management in an organization.

This research, sponsored by National Academy of Construction, the Construction Industry Institute and Arizona State University, used structured interviews, a Delphi study and focus groups to explore: 1) potential benefit and industry interest in an open repository of best practices and 2) important elements of a framework/model that guides the creation, management and sustainment of an open repository of best practices.

This dissertation presents findings specifically exploring the term "Practices for Excellence", its definition, elements that hinder implementation, the potential value of an open online repository for such practices and a model to develop an open repository.
ContributorsBosfield, Roberta Patrice (Author) / Gibson, Edd (Thesis advisor) / Chester, Mikhail (Committee member) / Parrish, Kristen (Committee member) / Sullivan, Kenneth (Committee member) / Arizona State University (Publisher)
Created2014