Matching Items (3)
Filtering by

Clear all filters

157023-Thumbnail Image.png
Description
Design is a fundamental human activity through which we attempt to navigate and manipulate the world around us for our survival, pleasure, and benefit. As human society has evolved, so too has the complexity and impact of our design activities on the environment. Now clearly intertwined as a complex social-ecological

Design is a fundamental human activity through which we attempt to navigate and manipulate the world around us for our survival, pleasure, and benefit. As human society has evolved, so too has the complexity and impact of our design activities on the environment. Now clearly intertwined as a complex social-ecological system at the global scale, we struggle in our ability to understand, design, implement, and manage solutions to complex global issues such as climate change, water scarcity, food security, and natural disasters. Some have asserted that this is because complex adaptive systems, like these, are moving targets that are only partially designed and partially emergent and self-organizing. Furthermore, these types of systems are difficult to understand and control due to the inherent dynamics of "wicked problems", such as: uncertainty, social dilemmas, inequities, and trade-offs involving multiple feedback loops that sometimes cause both the problems and their potential solutions to shift and evolve together. These problems do not, however, negate our collective need to effectively design, produce, and implement strategies that allow us to appropriate, distribute, manage and sustain the resources on which we depend. Design, however, is not well understood in the context of complex adaptive systems involving common-pool resources. In addition, the relationship between our attempts at control and performance at the system-level over time is not well understood either. This research contributes to our understanding of design in common-pool resource systems by using a multi-methods approach to investigate longitudinal data on an innovative participatory design intervention implemented in nineteen small-scale, farmer-managed irrigation systems in the Indrawati River Basin of Nepal over the last three decades. The intervention was intended as an experiment in using participatory planning, design and construction processes to increase food security and strengthen the self-sufficiency and self-governing capacity of resource user groups within the poorest district in Nepal. This work is the first time that theories of participatory design-processes have been empirically tested against longitudinal data on a number of small-scale, locally managed common-pool resource systems. It clarifies and helps to develop a theory of design in this setting for both scientific and practical purposes.
ContributorsRatajczyk, Elicia Beth (Author) / Anderies, John M (Thesis advisor) / York, Abigail (Committee member) / Shivakoti, Ganesh P (Committee member) / Arizona State University (Publisher)
Created2018
171531-Thumbnail Image.png
Description
The reality of smart cities is here and now. The issues of data privacy in tech applications are apparent in smart cities. Privacy as an issue raised by many and addressed by few remains critical for smart cities’ success. It is the common responsibility of smart cities, tech application makers,

The reality of smart cities is here and now. The issues of data privacy in tech applications are apparent in smart cities. Privacy as an issue raised by many and addressed by few remains critical for smart cities’ success. It is the common responsibility of smart cities, tech application makers, and users to embark on the journey to solutions. Privacy is an individual problem that smart cities need to provide a collective solution for. The research focuses on understanding users’ data privacy preferences, what information they consider private, and what they need to protect. The research identifies the data security loopholes, data privacy roadblocks, and common opportunities for change to implement a proactive privacy-driven tech solution necessary to address and resolve tech-induced data privacy concerns among citizens. This dissertation aims at addressing the issue of data privacy in tech applications based on known methodologies to address the concerns they allow. Through this research, a data privacy survey on tech applications was conducted, and the results reveal users’ desires to become a part of the solution by becoming aware and taking control of their data privacy while using tech applications. So, this dissertation gives an overview of the data privacy issues in tech, discusses available data privacy basis, elaborates on the different steps needed to create a robust remedy to data privacy concerns in enabling users’ awareness and control, and proposes two privacy applications one as a data privacy awareness solution and the other as a representation of the privacy control framework to address data privacy concerns in smart cities.
ContributorsMusafiri Mimo, Edgard (Author) / McDaniel, Troy (Thesis advisor) / Michael, Katina (Committee member) / Sullivan, Kenneth (Committee member) / Arizona State University (Publisher)
Created2022
190706-Thumbnail Image.png
Description
Despite increased attention and funding from companies and governments worldwide over the past several years, cybersecurity incidents (such as data breaches or exploited vulnerabilities) remain frequent, widespread, and severe. Policymakers in the United States have generally addressed these problems discretely, treating them as individual events rather than identifying commonalities between

Despite increased attention and funding from companies and governments worldwide over the past several years, cybersecurity incidents (such as data breaches or exploited vulnerabilities) remain frequent, widespread, and severe. Policymakers in the United States have generally addressed these problems discretely, treating them as individual events rather than identifying commonalities between them and forming a more effective broad-scale solution. In other words: the standard approaches to cybersecurity issues at the U.S. federal level do not provide sufficient insight into fundamental system behavior to meaningfully solve these problems. To that end, this dissertation develops a sociotechnical analogy of a classical mechanics technique, a framework named the Socio-Technical Lagrangian (STL). First, existing socio/technical/political cybersecurity systems in the United States are analyzed, and a new taxonomy is created which can be used to identify impacts of cybersecurity events at different scales. This taxonomy was created by analyzing a vetted corpus of key cybersecurity incidents, each of which was noted for its importance by multiple respected sources, with federal-level policy implications in the U.S.. The new taxonomy is leveraged to create STL, an abstraction-level framework. The original Lagrangian process, from the physical sciences, generates a new coordinate system that is customized for a specific complex mechanical system. This method replaces a conventional reference frame –one that is ill-suited for the desired analysis –with one that provides clearer insights into fundamental system behaviors. Similarly, STL replaces conventional cybersecurity analysis with a more salient lens, providing insight into the incentive structures within cybersecurity systems, revealing often hidden conflicts and their effects. The result is not a single solution, but a new framework that allows several questions to be asked and answered more effectively. Synthesizing the findings from the taxonomy and STL framework, the third contribution involves formulating reasonable and effective recommendations for enhancing the cybersecurity system's state for multiple stakeholder groups. Leveraging the contextually appropriate taxonomy and unique STL framework, these suggestions address the reform of U.S. federal cybersecurity policy, drawing insights from various governmental sources, case law, and discussions with policy experts, culminating in analysis and recommendations around the 2023 White House Cybersecurity Strategy.
ContributorsWinterton, Jamie (Author) / Maynard, Andrew (Thesis advisor) / Bowman, Diana (Committee member) / Michael, Katina (Committee member) / Arizona State University (Publisher)
Created2023