Matching Items (8)
Filtering by

Clear all filters

133162-Thumbnail Image.png
Description
Executive compensation is broken into two parts: one fixed and one variable. The fixed component of executive compensation is the annual salary and the variable components are performance-based incentives. Clawback provisions of executive compensation are designed to require executives to return performance-based, variable compensation that was erroneously awarded in the

Executive compensation is broken into two parts: one fixed and one variable. The fixed component of executive compensation is the annual salary and the variable components are performance-based incentives. Clawback provisions of executive compensation are designed to require executives to return performance-based, variable compensation that was erroneously awarded in the year of a misstatement. This research shows the need for the use of a new clawback provision that combines aspects of the two currently in regulation. In our current federal regulation, there are two clawback provisions in play: Section 304 of Sarbanes-Oxley and section 954 of The Dodd\u2014Frank Wall Street Reform and Consumer Protection Act. This paper argues for the use of an optimal clawback provision that combines aspects of both the current SOX provision and the Dodd-Frank provision, by integrating the principles of loss aversion and narcissism. These two factors are important to consider when designing a clawback provision, as it is generally accepted that average individuals are loss averse and executives are becoming increasingly narcissistic. Therefore, when attempting to mitigate the risk of a leader keeping erroneously awarded executive compensation, the decision making factors of narcissism and loss aversion must be taken into account. Additionally, this paper predicts how compensation structures will shift post-implementation. Through a survey analyzing the level of both loss- aversion and narcissism in respondents, the research question justifies the principle that people are loss averse and that a subset of the population show narcissistic tendencies. Both loss aversion and narcissism drove the results to suggest there are benefits to both clawback provisions and that a new provision that combines elements of both is most beneficial in mitigating the risk of executives receiving erroneously awarded compensation. I concluded the most optimal clawback provision is mandatory for all public companies (Dodd-Frank), targets all executives (Dodd-Frank), and requires the recuperation of the entire bonus, not just that which was in excess of what should have been received (SOX).
ContributorsLarscheid, Elizabeth (Author) / Samuelson, Melissa (Thesis director) / Casas-Arce, Pablo (Committee member) / WPC Graduate Programs (Contributor) / School of Accountancy (Contributor) / Barrett, The Honors College (Contributor)
Created2018-12
133077-Thumbnail Image.png
Description
Blockchain is a sophisticated and complex technology that will have a massive impact on the public accounting industry. Currently there is concern surrounding how blockchain may impact the industry as a whole. Auditors and accountants are worried that this technology has the potential to replace the responsibilities they fulfill. However,

Blockchain is a sophisticated and complex technology that will have a massive impact on the public accounting industry. Currently there is concern surrounding how blockchain may impact the industry as a whole. Auditors and accountants are worried that this technology has the potential to replace the responsibilities they fulfill. However, blockchain technology will not replace accountants and will enhance their daily activities by eliminating menial tasks, providing increased transparency, and allowing time to be spent in areas that require more consideration. This will change the role of accountants and professionals, requiring them to be more technologically proficient and analytically minded. This paper is organized as follows. There will be an initial explanation of the technology to inform the reader of what blockchain is and how it works. Then there will be a discussion regarding how blockchain technology relates to, and can be utilized by, public accounting firms as well as the implications of blockchain on the public accounting industry. These implications will be discussed followed by why they are extraneous, and how to combat them in both the assurance and advisory practices. In conclusion, recommendations will be provided for public accounting firms on how to effectively utilize the technology to their benefit.
ContributorsLomsdalen, Stephen A (Co-author) / Charen, Stephanie (Co-author) / Samuelson, Melissa (Thesis director) / Garverick, Michael (Committee member) / School of Accountancy (Contributor) / WPC Graduate Programs (Contributor) / Barrett, The Honors College (Contributor)
Created2018-12
134933-Thumbnail Image.png
Description
Given its impact on the accounting profession and public corporations, Sarbanes-Oxley Act of 2002(SOX) is a widely researched regulation among accounting scholars. Research typically focuses on the impact it has had on corporations, executives and auditors, however, there is limited research that illustrates the impact SOX may have on average

Given its impact on the accounting profession and public corporations, Sarbanes-Oxley Act of 2002(SOX) is a widely researched regulation among accounting scholars. Research typically focuses on the impact it has had on corporations, executives and auditors, however, there is limited research that illustrates the impact SOX may have on average Americans. There were several US criminal code sections that resulted from the passing of SOX. Statute 1519, which is often referred to as the "anti-shredding provision", penalizes anyone who "knowingly alters, destroys, mutilates, conceals, covers up, falsifies, or makes a false entry in any record, document, or tangible object with the intent to" obstruct a current or foreseeable federal investigation. This statute, although intended to punish behavior similar to that which occurred in the early 2000s by corporations and auditors, has been used to charge people beyond its original intent. Several issues with the crafting of the statute cause its broad application and some litigation even reached the Supreme Court due to its vague wording. Not only is the statute being applied beyond the intent, there are other issues that legal scholars have critiqued it for. This statute is far from being the only law facing these issues as the same issues and critiques are found in the 14th amendment. Rewriting the statute seems to be the most effective way to address the concerns of judges, lawyers and defendants regarding the statute. In addition, Congress could have passed this statute outside of SOX to avoid being seen as overreaching if obstruction of justice related to documents was actually an issue outside of corporate fraud.
ContributorsGonzalez, Joana (Author) / Samuelson, Melissa (Thesis director) / Lowe, Jordan (Committee member) / School of Accountancy (Contributor) / Barrett, The Honors College (Contributor)
Created2016-12
Description

Through my work with the Arizona State University Blockchain Research Lab (BRL) and JennyCo, one of the first Healthcare Information (HCI) HIPAA - compliant decentralized exchanges, I have had the opportunity to explore a unique cross-section of some of the most up and coming DLTs including both DAGs and blockchains.

Through my work with the Arizona State University Blockchain Research Lab (BRL) and JennyCo, one of the first Healthcare Information (HCI) HIPAA - compliant decentralized exchanges, I have had the opportunity to explore a unique cross-section of some of the most up and coming DLTs including both DAGs and blockchains. During this research, four major technologies (including JennyCo’s own systems) presented themselves as prime candidates for the comparative analysis of two models for implementing JennyCo’s system architecture for the monetization of healthcare information exchanges (HIEs). These four identified technologies and their underlying mechanisms will be explored thoroughly throughout the course of this paper and are listed with brief definitions as follows: Polygon - “Polygon is a “layer two” or “sidechain” scaling solution that runs alongside the Ethereum blockchain. MATIC is the network’s native cryptocurrency, which is used for fees, staking, and more” [8]. Polygon is the scalable layer involved in the L2SP architecture. Ethereum - “Ethereum is a decentralized blockchain platform that establishes a peer-to-peer network that securely executes and verifies application code, called smart contracts.” [9] This foundational Layer-1 runs thousands of nodes and creates a unique decentralized ecosystem governed by turing complete automated programs. Ethereum is the foundational Layer involved in the L2SP. Constellation - A novel Layer-0 data-centric peer-to-peer network that utilizes the “Hypergraph Transfer Protocol or HGTP, a DLT known as a [DAG] protocol with a novel reputation-based consensus model called Proof of Reputable Observation (PRO). Hypergraph is a feeless decentralized network that supports the transfer of $DAG cryptocurrency.” [10] JennyCo Protocol - Acts as a HIPAA compliant decentralized HIE by allowing consumers, big businesses, and brands to access and exchange user health data on a secure, interoperable, and accessible platform via DLT. The JennyCo Protocol implements utility tokens to reward buyers and sellers for exchanging data. Its protocol nature comes from its DLT implementation which governs the functioning of on-chain actions (e.g. smart contracts). In this case, these actions consist of secure and transparent health data exchange and monetization to reconstitute data ownership to those who generate that data [11]. With the direct experience of working closely with multiple companies behind the technologies listed, I have been exposed to the benefits and deficits of each of these technologies and their corresponding approaches. In this paper, I will use my experience with these technologies and their frameworks to explore two distributed ledger architecture protocols in order to determine the more effective model for implementing JennycCo’s health data exchange. I will begin this paper with an exploration of blockchain and directed acyclic graph (DAG) technologies to better understand their innate architectures and features. I will then move to an in-depth look at layered protocols, and healthcare data in the form of EHRs. Additionally, I will address the main challenges EHRs and HIEs face to present a deeper understanding of the challenges JennyCo is attempting to address. Finally, I will demonstrate my hypothesis: the Hypergraph Transfer Protocol (HGTP) model by Constellation presents significant advantages in scalability, interoperability, and external data security over the Layer-2 Scalability Protocol (L2SP) used by Polygon and Ethereum in implementing the JennyCo protocol. This will be done through a thorough breakdown of each protocol along with an analysis of relevant criteria including but not limited to: security, interoperability, and scalability. In doing so, I hope to determine the best framework for running JennyCo’s HIE Protocol.

ContributorsVan Bussum, Alexander (Author) / Boscovic, Dragan (Thesis director) / Grando, Adela (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2023-05
131600-Thumbnail Image.png
Description
This study aims to examine how the use of consensus-based transactions, smart contracts,and interoperability, provided by blockchain, may benefit the blood plasma industry. Plasmafractionation is the process of separating blood into multiple components to garner benefitsof increased lifespan, specialized allocation, and decreased waste, thereby creating a morecomplex and flexible supply

This study aims to examine how the use of consensus-based transactions, smart contracts,and interoperability, provided by blockchain, may benefit the blood plasma industry. Plasmafractionation is the process of separating blood into multiple components to garner benefitsof increased lifespan, specialized allocation, and decreased waste, thereby creating a morecomplex and flexible supply chain. Traditional applications of blockchain are developed onthe basis of decentralization—an infeasible policy for this sector due to stringent governmentregulations, such as HIPAA. However, the trusted nature of the relations in the plasmaindustry’s taxonomy proves private and centralized blockchains as the viable alternative.Implementations of blockchain are widely seen across pharmaceutical supply chains to combatthe falsification of possibly afflictive drugs. This system is more difficult to manage withblood, due to the quick perishable time, tracking/tracing of recycled components, and thenecessity of real-time metrics. Key attributes of private blockchains, such as digital identity,smart contracts, and authorized ledgers, may have the possibility of providing a significantpositive impact on the allocation and management functions of blood banks. Herein, we willidentify the economy and risks of the plasma ecosystem to extrapolate specific applications forthe use of blockchain technology. To understand tangible effects of blockchain, we developeda proof of concept application, aiming to emulate the business logic of modern plasma supplychain ecosystems adopting a blockchain data structure. The application testing simulates thesupply chain via agent-based modeling to analyze the scalability, benefits, and limitations ofblockchain for the plasma fractionation industry.
ContributorsVallabhaneni, Saipavan K (Author) / Boscovic, Dragan (Thesis director) / Kellso, James (Committee member) / Department of Information Systems (Contributor) / Department of Supply Chain Management (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131060-Thumbnail Image.png
Description
All modern multiplayer games are administered by having players connect to a remote server which is used to provide the ground truth for game state and player actions. This use of a central server provides a simple and intuitive way to administer game servers but also provides a single point

All modern multiplayer games are administered by having players connect to a remote server which is used to provide the ground truth for game state and player actions. This use of a central server provides a simple and intuitive way to administer game servers but also provides a single point of failure, as each server must be able to process all actions coming in and make a decision on whether the action is allowed or not, and how to update the game state accordingly. In cases where the server is under significant load, either from a very popular game release or from a deliberate attack, the game slows down or completely crashes. When there is a server action backlog, this can allow malicious actors to perform previously impossible actions. By instead using a decentralized platform, we can build a robust system that allows playing games through a P2P manner, filling in the need for central servers with consensus algorithms that provide the security on the part of a central authority. This project aims to show that a decentralized solution can be used to create a transparent, fully playable game of Monopoly with complex features that would be more scalable, reliable, and cost-effective compared to a centralized solution; meaning that games could be produced that costs pennies to publish and modify, taking seconds to propagate changes globally, and most importantly, cost nothing for upkeep. The codebase is available here: https://github.com/SirNeural/monopoly
ContributorsXu, Yun Hui (Author) / Boscovic, Dragan (Thesis director) / Foy, Joseph (Committee member) / Computer Science and Engineering Program (Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2020-12
Description
Proxy digital signatures are a subset of proxy cryptography that enable a peer, as a proxy delegator, to delegate signing privileges to another trusted peer, who becomes a proxy signer. The proxy signer then signs authorized transactions routed to it from the proxy delegator, to then send to the intended

Proxy digital signatures are a subset of proxy cryptography that enable a peer, as a proxy delegator, to delegate signing privileges to another trusted peer, who becomes a proxy signer. The proxy signer then signs authorized transactions routed to it from the proxy delegator, to then send to the intended third party on their behalf. This has great applications for computer networks where certain devices lack sufficient computational power to secure themselves and may rely on trusted and computationally more powerful peers, particularly within edge and fog networks. Although there are multiple proxy digital signature schemas that are circulated within cryptography-centric research papers, a practical software implementation has yet to be created. In this paper we describe Mengde Signatures: the first practical software implementation of proxy digital signatures. We expound upon the current architecture and process for how proxy signatures are implemented and function in a software engineering context. Although applicable to many different types of networks, we showcase the application of Mengde Signatures on an open source Proof-Of-Work Blockchain.
ContributorsMendoza, Francis (Author) / Boscovic, Dragan (Thesis director) / Zhao, Ming (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-12
164866-Thumbnail Image.png
Description

This project aims to mint NFT's on the Ethereum blockchain with upgraded functionality. This functionality helps user verifiability and increases a user's control over their NFT.

ContributorsHoppe, Aidan (Author) / Boscovic, Dragan (Thesis director) / Pesic, Sasa (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2022-05