Matching Items (48)
Filtering by

Clear all filters

133884-Thumbnail Image.png
Description
This paper looks at the growth of influencer marketing in application and how it has shifted the relationship between brands and consumers. Barriers to enter the space and methods of practice are discussed and analyzed to project the accessibility of obtaining influencer status. Best practices for brands and influencers are

This paper looks at the growth of influencer marketing in application and how it has shifted the relationship between brands and consumers. Barriers to enter the space and methods of practice are discussed and analyzed to project the accessibility of obtaining influencer status. Best practices for brands and influencers are outlined based on research, and key findings are analyzed from interviewed participants that play an active role in the field. Another component of the paper includes the discussion of the significance of platform dependence regarding influencers and brands using social media channels to reach consumers. The dynamic of the relationship that exists between consumers, brands and platforms is demonstrated through a model to demonstrate the interdependence of the relationship. The final component of the paper involves the exploration of the field as an active participant through an experiment that was conducted by the researcher on behalf of the question: can anyone be an influencer? The answer to this question is explored through personal accounts on the journey during an eight month process of testing content creation and promotion to build awareness and increase engagement. The barriers to enter the space as an influencer and to collaborate with brands is addressed through the process of testing tactics and strategies on social channels, along with travel expeditions across Arizona to contribute to content creation purposed into blog articles. The findings throughout the paper are conclusive that the value of influencer marketing is increasing as more brands validate and utilize this method in their marketing efforts.
ContributorsDavis, Natalie Marie (Author) / Giles, Bret (Thesis director) / Schlacter, John (Committee member) / Department of Information Systems (Contributor) / Department of Marketing (Contributor) / Walter Cronkite School of Journalism and Mass Communication (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133894-Thumbnail Image.png
Description
Pandora is a play exploring our relationship with gendered technology through the lens of artificial intelligence. Can women be subjective under patriarchy? Do robots who look like women have subjectivity? Hoping to create a better version of ourselves, The Engineer must navigate the loss of her creation, and Pandora must

Pandora is a play exploring our relationship with gendered technology through the lens of artificial intelligence. Can women be subjective under patriarchy? Do robots who look like women have subjectivity? Hoping to create a better version of ourselves, The Engineer must navigate the loss of her creation, and Pandora must navigate their new world. The original premiere run was March 27-28, 2018, original cast: Caitlin Andelora, Rikki Tremblay, and Michael Tristano Jr.
ContributorsToye, Abigail Elizabeth (Author) / Linde, Jennifer (Thesis director) / Abele, Kelsey (Committee member) / Department of Information Systems (Contributor) / Economics Program in CLAS (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
135574-Thumbnail Image.png
Description
The purpose of our research was to develop recommendations and/or strategies for Company A's data center group in the context of the server CPU chip industry. We used data collected from the International Data Corporation (IDC) that was provided by our team coaches, and data that is accessible on the

The purpose of our research was to develop recommendations and/or strategies for Company A's data center group in the context of the server CPU chip industry. We used data collected from the International Data Corporation (IDC) that was provided by our team coaches, and data that is accessible on the internet. As the server CPU industry expands and transitions to cloud computing, Company A's Data Center Group will need to expand their server CPU chip product mix to meet new demands of the cloud industry and to maintain high market share. Company A boasts leading performance with their x86 server chips and 95% market segment share. The cloud industry is dominated by seven companies Company A calls "The Super 7." These seven companies include: Amazon, Google, Microsoft, Facebook, Alibaba, Tencent, and Baidu. In the long run, the growing market share of the Super 7 could give them substantial buying power over Company A, which could lead to discounts and margin compression for Company A's main growth engine. Additionally, in the long-run, the substantial growth of the Super 7 could fuel the development of their own design teams and work towards making their own server chips internally, which would be detrimental to Company A's data center revenue. We first researched the server industry and key terminology relevant to our project. We narrowed our scope by focusing most on the cloud computing aspect of the server industry. We then researched what Company A has already been doing in the context of cloud computing and what they are currently doing to address the problem. Next, using our market analysis, we identified key areas we think Company A's data center group should focus on. Using the information available to us, we developed our strategies and recommendations that we think will help Company A's Data Center Group position themselves well in an extremely fast growing cloud computing industry.
ContributorsJurgenson, Alex (Co-author) / Nguyen, Duy (Co-author) / Kolder, Sean (Co-author) / Wang, Chenxi (Co-author) / Simonson, Mark (Thesis director) / Hertzel, Michael (Committee member) / Department of Finance (Contributor) / Department of Management (Contributor) / Department of Information Systems (Contributor) / School of Mathematical and Statistical Sciences (Contributor) / School of Accountancy (Contributor) / WPC Graduate Programs (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
136239-Thumbnail Image.png
Description
In an effort to gauge on-campus resident's satisfaction with services provided by Century Link and the University Technology Office as well as understand the resident's technology usage habits, the Performance Based Research Studies Group at ASU conducted a survey to collect the data needed to initiate improvements. Unlike previous years,

In an effort to gauge on-campus resident's satisfaction with services provided by Century Link and the University Technology Office as well as understand the resident's technology usage habits, the Performance Based Research Studies Group at ASU conducted a survey to collect the data needed to initiate improvements. Unlike previous years, the 2015 edition of the survey was distributed more efficiently by engaging University Housing staff members (those who work closest with the residents). The result was a 288% increase in responses from the previous year, totaling 2352 respondents and a 167% increase in the number of Residential Halls surveyed, totaling 24. As a primary concern, on a scale of zero to five, the average Internet satisfaction rating was 2.42. In the comments section residents reported issues with the reliability and speed of the ASU networks. It was further determined that residents were dissatisfied with the television services with an average satisfaction rating of 2.91; and the vast majority of comments regarding television services demanding that the ESPN channels be provided. In addition to the metrics on resident satisfaction, it was found that the majority of on-campus residents do not utilize hard-wired ports. Based on the information gathered from this survey, it is recommended that the University Technology Office: 1) focus efforts on upgrading, expanding, and improving the existing ASU networks in particular the reliability and speed of those networks, 2) invest in a broader channel line-up to at minimum provide the ESPN channels, and 3) start an awareness campaign to educate residents on the usage of hard wired ports with the goal of increasing hard wired port usage. As a corollary to information gathered from the survey, it is possible to begin building technology usage profiles on each building and even building such profiles on each residential college and academic unit to better understand the clientele and adapt the services a necessary.
ContributorsMcculloch, John Patrick (Author) / Kashiwagi, Dean (Thesis director) / Kashiwagi, Jacob (Committee member) / Barrett, The Honors College (Contributor) / School of Earth and Space Exploration (Contributor) / Department of Information Systems (Contributor) / School of Mathematical and Statistical Sciences (Contributor)
Created2015-05
133388-Thumbnail Image.png
Description
For students on a college campus, many courses can present challenges to them academically. Some universities have taken an initiative to respond to this by offering tutoring opportunities at a central location. Generally this provides help for some struggling students, but others are left with many questions unanswered. Two primary

For students on a college campus, many courses can present challenges to them academically. Some universities have taken an initiative to respond to this by offering tutoring opportunities at a central location. Generally this provides help for some struggling students, but others are left with many questions unanswered. Two primary reasons for this are that some tutoring services are broad in scope and that there may not be sufficient one-on-one time with a tutor. With the development of a mobile application, a solution is possible to improve upon the tutoring experience for all students. The concept revolves around the formation of a labor market of freelancers, known as a gig economy, to create a large supply of tutors who can provide their services to a student looking for help in a specific course. A strategic process was followed to develop this mobile application, called Tuzee. To begin, an early concept and design was drafted to shape a clear vision statement and effective user experience. Planning and research followed, where technical requirements including an efficient database and integrated development environment were selected. After these prerequisites, the development stage of the application started and a working app produced. Subsequently, a business model was devised along with possible features to be added upon a successful launch. With a peer-to-peer approach powering the app, monitoring user engagement lies as a core principle for consistent growth. The vision statement will frequently be referred to: enhance university academics by enabling the interaction of students with each other.
ContributorsArcaro, Daniel James (Author) / Ahmad, Altaf (Thesis director) / Sopha, Matthew (Committee member) / Department of Information Systems (Contributor) / WPC Graduate Programs (Contributor) / Department of Management and Entrepreneurship (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
132840-Thumbnail Image.png
Description
The United States is in a period of political turmoil and polarization. New technologies have matured over the last ten years, which have transformed an individual’s relationship with society and government. The emergence of these technologies has revolutionized access to both information and misinformation. Skills such as bias recognition and

The United States is in a period of political turmoil and polarization. New technologies have matured over the last ten years, which have transformed an individual’s relationship with society and government. The emergence of these technologies has revolutionized access to both information and misinformation. Skills such as bias recognition and critical thinking are more imperative than in any other time to separate truth from false or misleading information. Meanwhile, education has not evolved with these changes. The average individual is more likely to come to uninformed conclusions and less likely to listen to differing perspectives. Moreover, technology is further complicating and compounding other issues in the political process. All of this is manifesting in division among the American people who elect more polarized politicians who increasingly fail to find avenues for compromise.

In an effort to address these trends, we founded a student organization, The Political Literates, to fight political apathy by delivering political news in an easy to understand and unbiased manner. Inspired by our experience with this organization, we combine our insights with research to paint a new perspective on the state of the American political system.

This thesis analyzes various issues identified through our observations and research, with a heavy emphasis on using examples from the 2016 election. Our focus is how new technologies like data analytics, the Internet, smartphones, and social media are changing politics by driving political and social transformation. We identify and analyze five core issues that have been amplified by new technology, hindering the effectiveness of elections and further increasing political polarization:

● Gerrymandering which skews partisan debate by forcing politicians to pander to ideologically skewed districts.
● Consolidation of media companies which affects the diversity of how news is shared.
● Repeal of the Fairness Doctrine which allowed media to become more partisan.
● The Citizens United Ruling which skews power away from average voters in elections.
● A Failing Education System which does not prepare Americans to be civically engaged and to avoid being swayed by biased or untrue media.

Based on our experiment with the Political Literates and our research, we call for improving how critical thinking and civics is taught in the American education system. Critical thought and civics must be developed pervasively. With this, more people would be able to form more sophisticated views by listening to others to learn rather than win, listening less to irrelevant information, and forming a culture with more engagement in politics. Through this re-enlightenment, many of America’s other problems may evaporate or become more actionable.
ContributorsStenseth, Kyle (Co-author) / Tumas, Trevor (Co-author) / Mokwa, Michael (Thesis director) / Eaton, John (Committee member) / Department of Information Systems (Contributor) / Department of Supply Chain Management (Contributor) / Sandra Day O'Connor College of Law (Contributor) / Watts College of Public Service & Community Solut (Contributor) / Barrett, The Honors College (Contributor)
Created2019-05
Description
The object of the present study is to examine methods in which the company can optimize their costs on third-party suppliers whom oversee other third-party trade labor. The third parties in scope of this study are suspected to overstaff their workforce, thus overcharging the company. We will introduce a complex

The object of the present study is to examine methods in which the company can optimize their costs on third-party suppliers whom oversee other third-party trade labor. The third parties in scope of this study are suspected to overstaff their workforce, thus overcharging the company. We will introduce a complex spreadsheet model that will propose a proper project staffing level based on key qualitative variables and statistics. Using the model outputs, the Thesis team proposes a headcount solution for the company and problem areas to focus on, going forward. All sources of information come from company proprietary and confidential documents.
ContributorsLoo, Andrew (Co-author) / Brennan, Michael (Co-author) / Sheiner, Alexander (Co-author) / Hertzel, Michael (Thesis director) / Simonson, Mark (Committee member) / Barrett, The Honors College (Contributor) / Department of Information Systems (Contributor) / Department of Finance (Contributor) / Department of Supply Chain Management (Contributor) / WPC Graduate Programs (Contributor) / School of Accountancy (Contributor)
Created2014-05
137207-Thumbnail Image.png
Description
The main goal of this study was to understand the awareness of small business owners regarding occupational fraud, meaning fraud committed from within an organization. A survey/questionnaire was used to gather insight into the knowledge and perceptions of small business owners, while also obtaining information about the history of fraud

The main goal of this study was to understand the awareness of small business owners regarding occupational fraud, meaning fraud committed from within an organization. A survey/questionnaire was used to gather insight into the knowledge and perceptions of small business owners, while also obtaining information about the history of fraud and the internal controls within their business. Twenty-four owners of businesses with less than 100 employees participated in the study. The results suggest that small business owners overestimate their knowledge regarding internal controls and occupational fraud, while also underestimating the risk of fraud within their own business. In fact, 92% of participants were not at all familiar with the popular Internal Control \u2014 Integrated Framework published by the Committee of Sponsoring Organizations of the Treadway Commission. The results also show that small business owners tend to overestimate the protection provided by their currently implemented controls in regard to their risk of fraud. Overall, through continued knowledge of internal controls and occupational fraud, business owners can better protect their businesses from the risk of occupational fraud by increasing their awareness of fraud.
ContributorsDennis, Lauren Nicole (Author) / Orpurt, Steven (Thesis director) / Munshi, Perseus (Committee member) / Barrett, The Honors College (Contributor) / Department of Information Systems (Contributor) / School of Accountancy (Contributor)
Created2014-05
134639-Thumbnail Image.png
Description
This research study concerns the issue of gender diversity that still persists in STEM education, especially in computing-related fields. Females are so severely underrepresented in computing education that the diversity in the fields is even less than that in physics in K-12. This research study seeks to address the problem

This research study concerns the issue of gender diversity that still persists in STEM education, especially in computing-related fields. Females are so severely underrepresented in computing education that the diversity in the fields is even less than that in physics in K-12. This research study seeks to address the problem of low female participation in computing-related fields. For the purpose of the study, two versions of surveys were distributed. One was filled out by 94 local elementary school students that mostly in 3rd-4th grade; the other went to 399 college freshmen in W. P. Carey School of Business. It asks questions, including if students are interested in learning STEM, and what reasons explain them having interest or no interest in STEM learning. Meanwhile, the study aims to unveil if there are any gender discrepancies in regards to STEM learning. Besides those dynamics, three factors—attitudes toward learning computer skills, logic, and coding—are examined for indications on students’ interest in STEM learning.
The results suggest no indication that female students are necessarily less interested than male students in studying computing-related majors, despite that female students find working with computers and coding more difficult. Female students have diverse and varied interests that are non-computing-related, which could be an underlying factor that contributes to their “lower” participation in those majors. While self-interest is the key factor that influences students’ decisions in pursuing STEM majors or non-STEM majors, they also consider job market outlook an important factor. Compared to female students, male students tend to cite family influence in deciding whether to study STEM majors. Furthermore, showing positive attitudes toward working with computers, learning new computer skills, and even coding indicates both male and female students’ potential desires to pursue computing-related majors or careers.
ContributorsZhou, Xingyan (Author) / Lin, Elva (Suh-Yun) (Thesis director) / Hsiao, Sharon I-Han (Committee member) / WPC Graduate Programs (Contributor) / Department of Information Systems (Contributor) / Barrett, The Honors College (Contributor)
Created2017-05
133143-Thumbnail Image.png
Description
The prevalence of bots, or automated accounts, on social media is a well-known problem. Some of the ways bots harm social media users include, but are not limited to, spreading misinformation, influencing topic discussions, and dispersing harmful links. Bots have affected the field of disaster relief on social media as

The prevalence of bots, or automated accounts, on social media is a well-known problem. Some of the ways bots harm social media users include, but are not limited to, spreading misinformation, influencing topic discussions, and dispersing harmful links. Bots have affected the field of disaster relief on social media as well. These bots cause problems such as preventing rescuers from determining credible calls for help, spreading fake news and other malicious content, and generating large amounts of content which burdens rescuers attempting to provide aid in the aftermath of disasters. To address these problems, this research seeks to detect bots participating in disaster event related discussions and increase the recall, or number of bots removed from the network, of Twitter bot detection methods. The removal of these bots will also prevent human users from accidentally interacting with these bot accounts and being manipulated by them. To accomplish this goal, an existing bot detection classification algorithm known as BoostOR was employed. BoostOR is an ensemble learning algorithm originally modeled to increase bot detection recall in a dataset and it has the possibility to solve the social media bot dilemma where there may be several different types of bots in the data. BoostOR was first introduced as an adjustment to existing ensemble classifiers to increase recall. However, after testing the BoostOR algorithm on unobserved datasets, results showed that BoostOR does not perform as expected. This study attempts to improve the BoostOR algorithm by comparing it with a baseline classification algorithm, AdaBoost, and then discussing the intentional differences between the two. Additionally, this study presents the main factors which contribute to the shortcomings of the BoostOR algorithm and proposes a solution to improve it. These recommendations should ensure that the BoostOR algorithm can be applied to new and unobserved datasets in the future.
ContributorsDavis, Matthew William (Author) / Liu, Huan (Thesis director) / Nazer, Tahora H. (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / Department of Information Systems (Contributor) / Barrett, The Honors College (Contributor)
Created2018-12