Matching Items (5)
Filtering by

Clear all filters

150987-Thumbnail Image.png
Description
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned

In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned and operated by third-party service providers, there are risks of unauthorized use of the users' sensitive data by service providers. Although there are many techniques for protecting users' data from outside attackers, currently there is no effective way to protect users' sensitive data from service providers. In this dissertation, an approach is presented to protecting the confidentiality of users' data from service providers, and ensuring that service providers cannot collect users' confidential data while the data is processed or stored in cloud computing systems. The approach has four major features: (1) separation of software service providers and infrastructure service providers, (2) hiding the information of the owners of data, (3) data obfuscation, and (4) software module decomposition and distributed execution. Since the approach to protecting users' data confidentiality includes software module decomposition and distributed execution, it is very important to effectively allocate the resource of servers in SBS to each of the software module to manage the overall performance of workflows in SBS. An approach is presented to resource allocation for SBS to adaptively allocating the system resources of servers to their software modules in runtime in order to satisfy the performance requirements of multiple workflows in SBS. Experimental results show that the dynamic resource allocation approach can substantially increase the throughput of a SBS and the optimal resource allocation can be found in polynomial time
ContributorsAn, Ho Geun (Author) / Yau, Sik-Sang (Thesis advisor) / Huang, Dijiang (Committee member) / Ahn, Gail-Joon (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2012
156469-Thumbnail Image.png
Description
The 21st-century professional or knowledge worker spends much of the working day engaging others through electronic communication. The modes of communication available to knowledge workers have rapidly increased due to computerized technology advances: conference and video calls, instant messaging, e-mail, social media, podcasts, audio books, webinars, and much more. Professionals

The 21st-century professional or knowledge worker spends much of the working day engaging others through electronic communication. The modes of communication available to knowledge workers have rapidly increased due to computerized technology advances: conference and video calls, instant messaging, e-mail, social media, podcasts, audio books, webinars, and much more. Professionals who think for a living express feelings of stress about their ability to respond and fear missing critical tasks or information as they attempt to wade through all the electronic communication that floods their inboxes. Although many electronic communication tools compete for the attention of the contemporary knowledge worker, most professionals use an electronic personal information management (PIM) system, more commonly known as an e-mail application and often the ubiquitous Microsoft Outlook program. The aim of this research was to provide knowledge workers with solutions to manage the influx of electronic communication that arrives daily by studying the workers in their working environment. This dissertation represents a quest to understand the current strategies knowledge workers use to manage their e-mail, and if modification of e-mail management strategies can have an impact on productivity and stress levels for these professionals. Today’s knowledge workers rarely work entirely alone, justifying the importance of also exploring methods to improve electronic communications within teams.
ContributorsCounts, Virginia (Author) / Parrish, Kristen (Thesis advisor) / Allenby, Braden (Thesis advisor) / Landis, Amy (Committee member) / Cooke, Nancy J. (Committee member) / Arizona State University (Publisher)
Created2018
151811-Thumbnail Image.png
Description
This document builds a model, the Resilience Engine, of how a given sociotechnical innovation contributes to the resilience of its society, where the failure points of that process might be, and what outcomes, resilient or entropic, can be generated by the uptake of a particular innovation. Closed systems, which tend

This document builds a model, the Resilience Engine, of how a given sociotechnical innovation contributes to the resilience of its society, where the failure points of that process might be, and what outcomes, resilient or entropic, can be generated by the uptake of a particular innovation. Closed systems, which tend towards stagnation and collapse, are distinguished from open systems, which through ongoing encounters with external novelty, tend towards enduring resilience. Heterotopia, a space bounded from the dominant order in which novelty is generated and defended, is put forth as the locus of innovation for systemic resilience, defined as the capacity to adapt to environmental changes. The generative aspect of the Resilience Engine lies in a dialectic between a heterotopia and the dominant system across a membrane which permits interaction while maintaining the autonomy of the new space. With a model of how innovation, taken up by agents seeking power outside the dominant order, leads to resilience, and of what generates failures of the Resilience Engine as well as successes, the model is tested against cases drawn from two key virtual worlds of the mid-2000s. The cases presented largely validate the model, but generate a crucial surprise. Within those worlds, 2008-2010 saw an abrupt cultural transformation as the dialectic stage of the Resilience Engine's operation generated victories for the dominant order over promising emergent attributes of virtual heterotopia. At least one emergent practice has been assimilated, generating systemic resilience, that of the conference backchannel. A surprise, however, comes from extensive evidence that one element never problematized in thinking about innovation, the discontent agent, was largely absent from virtual worlds. Rather, what users sought was not greater agency but the comfort of submission over the burdens of self-governance. Thus, aside from minor cases, the outcome of the operation of the Resilience Engine within the virtual worlds studied was the colonization of the heterotopic space for the metropolis along with attempts by agents both external and internal to generate maximum order. Pursuant to the Resilience Engine model, this outcome is a recipe for entropic collapse and for preventing new heterotopias from arising under the current dominant means of production.
ContributorsMcKnight, John Carter (Author) / Miller, Clark (Thesis advisor) / Hayes, Elisabeth (Committee member) / Allenby, Braden (Committee member) / Daer, Alice (Committee member) / Arizona State University (Publisher)
Created2013
161814-Thumbnail Image.png
Description
Army Futures Command (AFC) has the implicit mission of ensuring that the Army does not get locked into a technology that might be ineffective in a future of competition and conflict. In this dissertation I develop insights and tools that can help assess and inform AFC’s efforts to understand and

Army Futures Command (AFC) has the implicit mission of ensuring that the Army does not get locked into a technology that might be ineffective in a future of competition and conflict. In this dissertation I develop insights and tools that can help assess and inform AFC’s efforts to understand and avoid undesirable technological lock-in. I started with three historical case studies of the interactions between technology and military strategy. The first examined the German Army’s strategic commitment to using railroads before World War I, forcing them into a military answer to rapidly increased diplomatic tensions in 1914. The second explored how the US Army Air Corps became locked into a doctrine of strategic bombing before World War II, affecting their ability to support ground troops during the Cold War. The third studied why the US Army was able to avoid becoming locked into a tactical nuclear doctrine in the 1950s, despite initial efforts to change Army structure and tactics to accommodate the nuclear battlefield. I identified three factors: 1) rapid changes in the strategic environment; 2) lack of civilian analogues to nuclear weapons; 3) the novelty of tactical nuclear technology, and availability of operational alternatives. The second part of my research sought to identify applicable theories from the fields of science, technology and society studies (STS). I identified five theories (technological systems, co-production, technological lock-in, path dependence, and economic growth theory), each with a brief case study. I sent my initial analysis to eighteen professionals at AFC and used their feedback to determine the utility of these theories for military planning. Finally, I analyzed AFC's current initiatives via semi-structured interviews, gaining insight into AFC's operations to identify three classes of issues that they face: complicated, exterior, and complex. Complicated issues are manageable through organizational methods. Exterior issues require planning to accommodate irreducible uncertainties (such as budgeting processes). Complex issues involved unpredictable interactions among technology and military strategy. I focused on three AFC programs, (artificial intelligence, robotics, and autonomous systems) demonstrating how STS theories can offer additional tools to help guide technological and strategic planning for an uncertain future.
ContributorsMcCafferty, Sean (Author) / Sarewitz, Daniel (Thesis advisor) / Allenby, Braden (Committee member) / Kubiak, Jeffrey (Committee member) / Arizona State University (Publisher)
Created2021
161807-Thumbnail Image.png
Description
Existing models of military innovation assume general resistance to change within militaries that necessitates an outside influence to induce military innovation. Within these approaches, the complex relationship between technology and innovation is normally addressed by either minimizing the importance of technology or separating it from the social process of innovation.

Existing models of military innovation assume general resistance to change within militaries that necessitates an outside influence to induce military innovation. Within these approaches, the complex relationship between technology and innovation is normally addressed by either minimizing the importance of technology or separating it from the social process of innovation. Yet these approaches struggle to reflect emerging dynamics between technology and military innovation, and as a result, potentially contribute to wasted national resources and unnecessarily bloody wars. Reframing the relationship between technology and military innovation can provide novel insights into the apparent inability of militaries to align technology with strategic goals and inform more effective future alignment. This dissertation leverages the insights of constructivist science and technology studies concepts to develop a novel model of military innovation: referred to here as the technology triad. The technology triad describes military sociotechnical systems in a way that highlights change and innovation within militaries. The model describes how doctrine, materiel, and “martial knowledge,” a new concept that relates to socially constructed truths about the conduct of war, interact to produce change and innovation within militaries. After constructing the model and exploring an in-depth application to the development of armored warfare in the United States Army prior to World War II, the case from which the model was developed, the dissertation explores the logical extension of the technology triad to establish a deductive framework against which to test the generalizability of the model. Nuclear weapons innovation in the United States military through the end of the Vietnam War provides a test of the model at the strategic level, and the development and employment of armed drones in the United States, Russia, Israel, and Azerbaijan provide a test of a contemporary innovation for the technology triad. Together, these three cases demonstrate that framing the relationship between technology and military innovation in terms of the technology triad can inform concrete actions that military leaders can take related to the types of technologies that are most likely to be useful in future conflicts and ways to manage military innovations to increase opportunities to achieve strategic objectives.
ContributorsSickler, Robert (Author) / Maynard, Andrew (Thesis advisor) / Kubiak, Jeff (Committee member) / Allenby, Braden (Committee member) / Jalbert, Kirk (Committee member) / Arizona State University (Publisher)
Created2021