Matching Items (6)
Filtering by

Clear all filters

152417-Thumbnail Image.png
Description
Medical students acquire and enhance their clinical skills using various available techniques and resources. As the health care profession has move towards team-based practice, students and trainees need to practice team-based procedures that involve timely management of clinical tasks and adequate communication with other members of the team. Such team-based

Medical students acquire and enhance their clinical skills using various available techniques and resources. As the health care profession has move towards team-based practice, students and trainees need to practice team-based procedures that involve timely management of clinical tasks and adequate communication with other members of the team. Such team-based procedures include surgical and clinical procedures, some of which are protocol-driven. Cost and time required for individual team-based training sessions, along with other factors, contribute to making the training complex and challenging. A great deal of research has been done on medically-focused collaborative virtual reality (VR)-based training for protocol-driven procedures as a cost-effective as well as time-efficient solution. Most VR-based simulators focus on training of individual personnel. The ones which focus on providing team training provide an interactive simulation for only a few scenarios in a collaborative virtual environment (CVE). These simulators are suited for didactic training for cognitive skills development. The training sessions in the simulators require the physical presence of mentors. The problem with this kind of system is that the mentor must be present at the training location (either physically or virtually) to evaluate the performance of the team (or an individual). Another issue is that there is no efficient methodology that exists to provide feedback to the trainees during the training session itself (formative feedback). Furthermore, they lack the ability to provide training in acquisition or improvement of psychomotor skills for the tasks that require force or touch feedback such as cardiopulmonary resuscitation (CPR). To find a potential solution to overcome some of these concerns, a novel training system was designed and developed that utilizes the integration of sensors into a CVE for time-critical medical procedures. The system allows the participants to simultaneously access the CVE and receive training from geographically diverse locations. The system is also able to provide real-time feedback and is also able to store important data during each training/testing session. Finally, this study also presents a generalizable collaborative team-training system that can be used across various team-based procedures in medical as well as non-medical domains.
ContributorsKhanal, Prabal (Author) / Greenes, Robert (Thesis advisor) / Patel, Vimla (Thesis advisor) / Smith, Marshall (Committee member) / Gupta, Ashish (Committee member) / Kaufman, David (Committee member) / Arizona State University (Publisher)
Created2014
153094-Thumbnail Image.png
Description
Android is currently the most widely used mobile operating system. The permission model in Android governs the resource access privileges of applications. The permission model however is amenable to various attacks, including re-delegation attacks, background snooping attacks and disclosure of private information. This thesis is aimed at understanding, analyzing and

Android is currently the most widely used mobile operating system. The permission model in Android governs the resource access privileges of applications. The permission model however is amenable to various attacks, including re-delegation attacks, background snooping attacks and disclosure of private information. This thesis is aimed at understanding, analyzing and performing forensics on application behavior. This research sheds light on several security aspects, including the use of inter-process communications (IPC) to perform permission re-delegation attacks.

Android permission system is more of app-driven rather than user controlled, which means it is the applications that specify their permission requirement and the only thing which the user can do is choose not to install a particular application based on the requirements. Given the all or nothing choice, users succumb to pressures and needs to accept permissions requested. This thesis proposes a couple of ways for providing the users finer grained control of application privileges. The same methods can be used to evade the Permission Re-delegation attack.

This thesis also proposes and implements a novel methodology in Android that can be used to control the access privileges of an Android application, taking into consideration the context of the running application. This application-context based permission usage is further used to analyze a set of sample applications. We found the evidence of applications spoofing or divulging user sensitive information such as location information, contact information, phone id and numbers, in the background. Such activities can be used to track users for a variety of privacy-intrusive purposes. We have developed implementations that minimize several forms of privacy leaks that are routinely done by stock applications.
ContributorsGollapudi, Narasimha Aditya (Author) / Dasgupta, Partha (Thesis advisor) / Xue, Guoliang (Committee member) / Doupe, Adam (Committee member) / Arizona State University (Publisher)
Created2014
153387-Thumbnail Image.png
Description
A core principle in multiple national quality improvement strategies is the engagement of chronically ill patients in the creation and execution of their treatment plans. Numerous initiatives are underway to use health information technology (HIT) to support patient engagement however the use of HIT and other factors such as health

A core principle in multiple national quality improvement strategies is the engagement of chronically ill patients in the creation and execution of their treatment plans. Numerous initiatives are underway to use health information technology (HIT) to support patient engagement however the use of HIT and other factors such as health literacy may be significant barriers to engagement for older adults. This qualitative descriptive study sought to explore the ways that older adults with multi-morbidities engaged with their plan of care. Forty participants were recruited through multiple case sampling from two ambulatory cardiology practices. Participants were English-speaking, without a dementia-related diagnosis, and between the ages of 65 and 86. The older adults in this study performed many behaviors to engage in the plan of care, including acting in ways to support health, managing health-related information, attending routine visits with their doctors, and participating in treatment planning. A subset of patients engaged in active decision-making because of the point they were at in their chronic disease. At that cross roads, they expressed uncertainly over which road to travel. Two factors influenced the engagement of older adults: a relationship with the provider that met the patient's needs, and the distribution of a Meaningful Use clinical summary at the conclusion of the provider visit. Participants described the ways in which the clinical summary helped and hindered their understanding of the care plan.

Insights gained as a result of this study include an understanding of the discrepancies between what the healthcare system expects of patients and their actual behavior when it comes to the creation of a care plan and the ways in which they take care of their health. Further research should examine the ability of various factors to enhance patient engagement. For example, it may be useful to focus on ways to improve the clinical summary to enhance engagement with the care plan and meet standards for a health literate document. Recommendations for the improvement of the clinical summary are provided. Finally, this study explored potential reasons for the infrequent use of online health information by older adults including the trusting relationship they enjoyed with their cardiologist.
ContributorsJiggins Colorafi, Karen (Author) / Lamb, Gerri (Thesis advisor) / Marek, Karen (Committee member) / Greenes, Robert (Committee member) / Evans, Bronwynne (Committee member) / Arizona State University (Publisher)
Created2015
150987-Thumbnail Image.png
Description
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned

In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned and operated by third-party service providers, there are risks of unauthorized use of the users' sensitive data by service providers. Although there are many techniques for protecting users' data from outside attackers, currently there is no effective way to protect users' sensitive data from service providers. In this dissertation, an approach is presented to protecting the confidentiality of users' data from service providers, and ensuring that service providers cannot collect users' confidential data while the data is processed or stored in cloud computing systems. The approach has four major features: (1) separation of software service providers and infrastructure service providers, (2) hiding the information of the owners of data, (3) data obfuscation, and (4) software module decomposition and distributed execution. Since the approach to protecting users' data confidentiality includes software module decomposition and distributed execution, it is very important to effectively allocate the resource of servers in SBS to each of the software module to manage the overall performance of workflows in SBS. An approach is presented to resource allocation for SBS to adaptively allocating the system resources of servers to their software modules in runtime in order to satisfy the performance requirements of multiple workflows in SBS. Experimental results show that the dynamic resource allocation approach can substantially increase the throughput of a SBS and the optimal resource allocation can be found in polynomial time
ContributorsAn, Ho Geun (Author) / Yau, Sik-Sang (Thesis advisor) / Huang, Dijiang (Committee member) / Ahn, Gail-Joon (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2012
155954-Thumbnail Image.png
Description
The telephone network is used by almost every person in the modern world. With the rise of Internet access to the PSTN, the telephone network today is rife with telephone spam and scams. Spam calls are significant annoyances for telephone users, unlike email spam, spam calls demand immediate attention. They

The telephone network is used by almost every person in the modern world. With the rise of Internet access to the PSTN, the telephone network today is rife with telephone spam and scams. Spam calls are significant annoyances for telephone users, unlike email spam, spam calls demand immediate attention. They are not only significant annoyances but also result in significant financial losses in the economy. According to complaint data from the FTC, complaints on illegal calls have made record numbers in recent years. Americans lose billions to fraud due to malicious telephone communication, despite various efforts to subdue telephone spam, scam, and robocalls.

In this dissertation, a study of what causes the users to fall victim to telephone scams is presented, and it demonstrates that impersonation is at the heart of the problem. Most solutions today primarily rely on gathering offending caller IDs, however, they do not work effectively when the caller ID has been spoofed. Due to a lack of authentication in the PSTN caller ID transmission scheme, fraudsters can manipulate the caller ID to impersonate a trusted entity and further a variety of scams. To provide a solution to this fundamental problem, a novel architecture and method to authenticate the transmission of the caller ID is proposed. The solution enables the possibility of a security indicator which can provide an early warning to help users stay vigilant against telephone impersonation scams, as well as provide a foundation for existing and future defenses to stop unwanted telephone communication based on the caller ID information.
ContributorsTu, Huahong (Author) / Doupe, Adam (Thesis advisor) / Ahn, Gail-Joon (Thesis advisor) / Huang, Dijiang (Committee member) / Zhang, Yanchao (Committee member) / Zhao, Ziming (Committee member) / Arizona State University (Publisher)
Created2017
151499-Thumbnail Image.png
Description
Parkinson's disease, the most prevalent movement disorder of the central nervous system, is a chronic condition that affects more than 1000,000 U.S. residents and about 3% of the population over the age of 65. The characteristic symptoms include tremors, bradykinesia, rigidity and impaired postural stability. Current therapy based on augmentation

Parkinson's disease, the most prevalent movement disorder of the central nervous system, is a chronic condition that affects more than 1000,000 U.S. residents and about 3% of the population over the age of 65. The characteristic symptoms include tremors, bradykinesia, rigidity and impaired postural stability. Current therapy based on augmentation or replacement of dopamine is designed to improve patients' motor performance but often leads to levodopa-induced complications, such as dyskinesia and motor fluctuation. With the disease progress, clinicians must closely monitor patients' progress in order to identify any complications or decline in motor function as soon as possible in PD management. Unfortunately, current clinical assessment for Parkinson's is subjective and mostly influenced by brief observations during patient visits. Thus improvement or decline in patients' motor function in between visits is extremely difficult to assess. This may hamper clinicians while making informed decisions about the course of therapy for Parkinson's patients and could negatively impact clinical care. In this study we explored new approaches for PD assessment that aim to provide home-based PD assessment and monitoring. By extending the disease assessment to home, the healthcare burden on patients and their family can be reduced, and the disease progress can be more closely monitored by physicians. To achieve these aims, two novel approaches have been designed, developed and validated. The first approach is a questionnaire based self-evaluation metric, which estimate the PD severity through using self-evaluation score on pre-designed questions. Based on the results of the first approach, a smart phone based approach was invented. The approach takes advantage of the mobile computing technology and clinical decision support approach to evaluate the motor performance of patient daily activity and provide the longitudinal disease assessment and monitoring. Both approaches have been validated on recruited PD patients at the movement disorder program of Barrow Neurological Clinic (BNC) at St Joseph's Hospital and Medical Center. The results of validation tests showed favorable accuracy on detecting and assessing critical symptoms of PD, and shed light on promising future of implementing mobile platform based PD evaluation and monitoring tools to facilitate PD management.
ContributorsPan, Di (Author) / Petitti, Diana (Thesis advisor) / Greenes, Robert (Committee member) / Johnson, William (Committee member) / Dhall, Rohit (Committee member) / Arizona State University (Publisher)
Created2013