Matching Items (1,306)
Filtering by

Clear all filters

157369-Thumbnail Image.png
Description
A Chief Audit Executive (CAE) is the leader of a company’s internal audit function. Because there is no mandated disclosure requirement for the internal audit structure, little is understood about the influence of a CAE on a company. Following the logic that a CAE disclosed in SEC filings is more

A Chief Audit Executive (CAE) is the leader of a company’s internal audit function. Because there is no mandated disclosure requirement for the internal audit structure, little is understood about the influence of a CAE on a company. Following the logic that a CAE disclosed in SEC filings is more influential in a company’s oversight function, I identify an influential CAE using the disclosure of the role. I then examine the association between an influential CAE and monitoring outcomes. Using data hand collected from SEC filings for S&P 1500 companies from 2004 to 2015, I find companies that have an influential CAE are generally larger, older, and have a larger corporate board. More importantly, I find that an influential CAE in NYSE-listed companies is associated with higher internal control quality. This association is stronger for companies that reference a CAE’s direct interaction with the audit committee. This study provides an initial investigation into a common, but little understood position in corporate oversight.
ContributorsZhang, Wei (Author) / Lamoreaux, Phillip (Thesis advisor) / Kaplan, Steve (Committee member) / Li, Yinghua (Committee member) / Arizona State University (Publisher)
Created2019
156458-Thumbnail Image.png
Description
This study examines how a populist religious leader, Alexander Campbell, altered the economic value system of religious material production in the early United States and, subsequently, the long-term value structure of religious economic systems generally. As religious publishing societies in the early nineteenth century were pioneering the not-for-profit corporation and

This study examines how a populist religious leader, Alexander Campbell, altered the economic value system of religious material production in the early United States and, subsequently, the long-term value structure of religious economic systems generally. As religious publishing societies in the early nineteenth century were pioneering the not-for-profit corporation and as many popular itinerants manufactured religious spectacles around the country, Campbell combined the promotional methods of revivalism and the business practices of religious printers, with a conspicuously pugilistic tone to simultaneously build religious and business empires. He was a religious entrepreneur who capitalized on the opportunities of American revivalism for personal and religious gain. His opponents attacked his theology and his wealth as signs of his obvious error but few were prepared for the vigor of his answer. He invited conflict and challenged prominent opponents to grow his celebrity and extend his brand into new markets. He argued that his labor as a printer was deserving of compensation and that, unlike his “venal” clerical opponents, he offered his services as a preacher for free. As Americans in the early national period increasingly felt obligated to find the “right kind of Christianity,” Campbell packaged and sold a compelling product. In the decades that followed his first debate in 1820, he built a religious following that by 1850 numbered well over 100,000 followers. This dissertation considers the importance of marketing, promotion, investment capital, distribution networks, property law, print culture, and ideology, to the success of a given religious prescription in the nineteenth century American marketplace of religion. Campbell’s success reveals important social, political, and economic structures in the nineteenth century trans-Appalachian west. It also illuminates a form of religious entrepreneurialism that continues to be important to American Christianity.
ContributorsDupey, James (Author) / O'Donnell, Catherine (Thesis advisor) / Critchlow, Donald (Committee member) / Fessenden, Tracy (Committee member) / Schermerhorn, Calvin J (Committee member) / Arizona State University (Publisher)
Created2018
156551-Thumbnail Image.png
Description
This study investigates the relation between credit supply competition among banks and their clients’ conditional accounting conservatism (i.e., asymmetric timely loss recognition). The Interstate Banking and Branching Efficiency Act (IBBEA) of 1994 permits banks and bank holding companies to expand their business across state lines, introducing a positive shock to

This study investigates the relation between credit supply competition among banks and their clients’ conditional accounting conservatism (i.e., asymmetric timely loss recognition). The Interstate Banking and Branching Efficiency Act (IBBEA) of 1994 permits banks and bank holding companies to expand their business across state lines, introducing a positive shock to credit supply competition in the banking industry. The increase in credit supply competition weakens banks’ bargaining power in the negotiation process, which in turn may weaken their ability to demand conservative financial reporting from borrowers. Consistent with this prediction, results show that firms report less conservatively after the IBBEA is passed in their headquartered states. The effect of the IBBEA on conditional conservatism is particularly stronger for firms in states with a greater increase in competition among banks, firms whose operations are more concentrated in their headquarter states, firms with greater financial constraints, and firms subject to less external monitoring. Robustness tests confirm that the observed decline in conditional conservatism is causally related to the passage of IBBEA. Overall, this study highlights the impact of credit supply competition on financial reporting practices.
ContributorsHuang, Wei (Author) / Li, Yinghua (Thesis advisor) / Huang, Xiaochuan (Committee member) / Kaplan, Steve (Committee member) / Arizona State University (Publisher)
Created2018
157094-Thumbnail Image.png
Description当前,上市公司的盈余管理问题已是我国资本市场中普遍存在的突出问题。一般来说,一些企业为了满足资本市场对于上市、增发等条件的要求,以及为有效推动企业的并购、重组等行为的顺利实现,甚至为了谋求公司管理层的个别利益,往往运用盈余管理等举措实施公司财报及关键指标的粉饰修正,让不知情的股民蒙受一定的损失。普遍分析显示,我国股市中民营企业比其他企业遭遇的问题和压力更多、更大、更突出,因此民营企业从客观上来说拥有更强的盈余管理动机。而从当前我国资本市场的实际情况来看,我国相关专家学者对盈余管理的系统性深入研究,一般都瞄准了上市企业群体或持续亏损企业,对盈余管理的研究不系统、不全面、不深入,这将对我国进一步提升盈余管理监管水平构成一定不利影响。当前,由于我国民企在自身管理及发展动力方面的特殊性,我国民企的管理、盈余管理特点和国外上市公司还存在着很大的不同,进一步深入研究我国民企上市公司自身管理方面的突出特点,以及其对企业盈余管理等方面的深层次影响,有助于监管层对症下药,更有针对性地研究出台全新的监管措施,进一步提升管理水平。这还可以为公司发展的决策层及相关会计信息使用人员提供一定的决策参考, 因此其拥有十分重要的意义。

本文首先认真总结分析了有关上市企业治理结构和盈余管理等方面的历史文献资料,依托当前资本市场上普遍运用的委托代理、内部人控制和契约等理论,系统研究了我国民企上市公司在自身治理结构方面的突出特征以及其对盈余管理方面所构成影响的深层次原理。在此基础上,本文通过2015-2017年我国上市企业数据,基于截面Jones模型对民营企业和非民营企业盈余管理程度进行测算和比较分析,发现民营企业盈余管理程度更高;从四个层面系统研究民企公司自身的治理结构突出特点,设立回归模型论证了民营企业独特的公司治理结构特征对盈余管理程度确实会产生影响;最后,本文进一步利用修正的费尔萨姆一奥尔森估价模型对民营上市公司盈余管理有公司价值的关系进行了验证,发现两者具有显著相关性。
ContributorsChen, Hui (Author) / Shen, Wei (Thesis advisor) / Chang, Chun (Thesis advisor) / Huang, Xiaochuan (Committee member) / Arizona State University (Publisher)
Created2019
133359-Thumbnail Image.png
Description
The current trend of interconnected devices, or the internet of things (IOT) has led to the popularization of single board computers (SBC). This is primarily due to their form-factor and low price. This has led to unique networks of devices that can have unstable network connections and minimal processing power.

The current trend of interconnected devices, or the internet of things (IOT) has led to the popularization of single board computers (SBC). This is primarily due to their form-factor and low price. This has led to unique networks of devices that can have unstable network connections and minimal processing power. Many parallel program- ming libraries are intended for use in high performance computing (HPC) clusters. Unlike the IOT environment described, HPC clusters will in general look to obtain very consistent network speeds and topologies. There are a significant number of software choices that make up what is referred to as the HPC stack or parallel processing stack. My thesis focused on building an HPC stack that would run on the SCB computer name the Raspberry Pi. The intention in making this Raspberry Pi cluster is to research performance of MPI implementations in an IOT environment, which had an impact on the design choices of the cluster. This thesis is a compilation of my research efforts in creating this cluster as well as an evaluation of the software that was chosen to create the parallel processing stack.
ContributorsO'Meara, Braedon Richard (Author) / Meuth, Ryan (Thesis director) / Dasgupta, Partha (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133381-Thumbnail Image.png
Description
This thesis discusses three recent optimization problems that seek to reduce disease spread on arbitrary graphs by deleting edges, and it discusses three approximation algorithms developed for these problems. Important definitions are presented including the Linear Threshold and Triggering Set models and the set function properties of submodularity and monotonicity.

This thesis discusses three recent optimization problems that seek to reduce disease spread on arbitrary graphs by deleting edges, and it discusses three approximation algorithms developed for these problems. Important definitions are presented including the Linear Threshold and Triggering Set models and the set function properties of submodularity and monotonicity. Also, important results regarding the Linear Threshold model and computation of the influence function are presented along with proof sketches. The three main problems are formally presented, and NP-hardness results along with proof sketches are presented where applicable. The first problem seeks to reduce spread of infection over the Linear Threshold process by making use of an efficient tree data structure. The second problem seeks to reduce the spread of infection over the Linear Threshold process while preserving the PageRank distribution of the input graph. The third problem seeks to minimize the spectral radius of the input graph. The algorithms designed for these problems are described in writing and with pseudocode, and their approximation bounds are stated along with time complexities. Discussion of these algorithms considers how these algorithms could see real-world use. Challenges and the ways in which these algorithms do or do not overcome them are noted. Two related works, one which presents an edge-deletion disease spread reduction problem over a deterministic threshold process and the other which considers a graph modification problem aimed at minimizing worst-case disease spread, are compared with the three main works to provide interesting perspectives. Furthermore, a new problem is proposed that could avoid some issues faced by the three main problems described, and directions for future work are suggested.
ContributorsStanton, Andrew Warren (Author) / Richa, Andrea (Thesis director) / Czygrinow, Andrzej (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
131498-Thumbnail Image.png
Description
This project uses Kenneth Burke’s theory of dramatism and the pentad to analyze popular narrative films about human sex trafficking. It seeks to understand the relationship between a film’s dominant philosophy (as highlighted by utilizing Burke’s pentad), its inherently suggested solutions to trafficking, and the effect that the film has

This project uses Kenneth Burke’s theory of dramatism and the pentad to analyze popular narrative films about human sex trafficking. It seeks to understand the relationship between a film’s dominant philosophy (as highlighted by utilizing Burke’s pentad), its inherently suggested solutions to trafficking, and the effect that the film has on viewers’ perception of trafficking. 20 narrative feature films about sex trafficking such as the 2008 film Taken were analyzed for this study. Three out of five of Burke’s philosophies were uncovered after analysis: idealism, mysticism, and materialism. Films that aligned with idealism were found to implicitly blame women for their own trafficking. Films that aligned with mysticism were found to rally audiences around violence and racism as opposed to women’s freedom. Films that aligned with materialism were found to be the most empathetic towards trafficked women. The conclusion of this paper is that films about sex trafficking have a high potential to be harmful to women who have exited trafficking. This paper asserts that the most valuable films about trafficking are those that are not simply based on a true story but are created by trafficking survivors themselves, such as the 2016 film Apartment 407.
ContributorsHamby, Hannah Mary (Co-author) / Raum, Brionna (Co-author) / Edson, Belle (Thesis director) / Zanin, Alaina (Committee member) / Dean, W.P. Carey School of Business (Contributor) / Hugh Downs School of Human Communication (Contributor) / School of Film, Dance and Theatre (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131504-Thumbnail Image.png
Description
In the last few years, billion-dollar companies like Yahoo and Equifax have had data breaches causing millions of people’s personal information to be leaked online. Other billion-dollar companies like Google and Facebook have gotten in trouble for abusing people’s personal information for financial gain as well. In this new age

In the last few years, billion-dollar companies like Yahoo and Equifax have had data breaches causing millions of people’s personal information to be leaked online. Other billion-dollar companies like Google and Facebook have gotten in trouble for abusing people’s personal information for financial gain as well. In this new age of technology where everything is being digitalized and stored online, people all over the world are concerned about what is happening to their personal information and how they can trust it is being kept safe. This paper describes, first, the importance of protecting user data, second, one easy tool that companies and developers can use to help ensure that their user’s information (credit card information specifically) is kept safe, how to implement that tool, and finally, future work and research that needs to be done. The solution I propose is a software tool that will keep credit card data secured. It is only a small step towards achieving a completely secure data anonymized system, but when implemented correctly, it can reduce the risk of credit card data from being exposed to the public. The software tool is a script that can scan every viable file in any given system, server, or other file-structured Linux system and detect if there any visible credit card numbers that should be hidden.
ContributorsPappas, Alexander (Author) / Zhao, Ming (Thesis director) / Kuznetsov, Eugene (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131511-Thumbnail Image.png
Description
This document is a proposal for a research project, submitted as an Honors Thesis to Barrett, The Honors College at Arizona State University. The proposal summarizes previous findings and literature about women survivors of domestic violence who are suffering from post-traumatic stress disorder as well as outlining the design and

This document is a proposal for a research project, submitted as an Honors Thesis to Barrett, The Honors College at Arizona State University. The proposal summarizes previous findings and literature about women survivors of domestic violence who are suffering from post-traumatic stress disorder as well as outlining the design and measures of the study. At this time, the study has not been completed. However, it may be completed at a future time.
ContributorsKunst, Jessica (Author) / Hernandez Ruiz, Eugenia (Thesis director) / Belgrave, Melita (Committee member) / School of Music (Contributor) / Dean, W.P. Carey School of Business (Contributor) / School of International Letters and Cultures (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131514-Thumbnail Image.png
Description
Political polarization is the coalescence of political parties -- and the individuals of which parties are composed -- around opposing ends of the ideological spectrum. Political parties in the United States have always been divided, however, in recent years this division has only intensified. Recently, polarization has also wound its

Political polarization is the coalescence of political parties -- and the individuals of which parties are composed -- around opposing ends of the ideological spectrum. Political parties in the United States have always been divided, however, in recent years this division has only intensified. Recently, polarization has also wound its way to the Supreme Court and the nomination processes of justices to the Court. This paper examines how prevalent polarization in the Supreme Court nomination process has become by looking specifically at the failed nomination of Judge Merrick Garland and the confirmations of now-Justices Neil Gorsuch and Brett Kavanaugh. This is accomplished by comparing the ideologies and qualifications of the three most recent nominees to those of previous nominees, as well as analysing the ideological composition of the Senate at the times of the individual nominations.
ContributorsJoss, Jacob (Author) / Hoekstra, Valerie (Thesis director) / Critchlow, Donald (Committee member) / Computer Science and Engineering Program (Contributor) / School of Politics and Global Studies (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05