Matching Items (4)
Filtering by

Clear all filters

150968-Thumbnail Image.png
Description
The history of Koreans in the former Soviet Union dates back to more than a century ago. Yet little was known about them during the existence of the USSR, and even less as the first decade of the Newly Independent States unfolded. This current study is one of the first

The history of Koreans in the former Soviet Union dates back to more than a century ago. Yet little was known about them during the existence of the USSR, and even less as the first decade of the Newly Independent States unfolded. This current study is one of the first attempts to quantitatively measure the national and ethnic identity of this group. The research was conducted via an online survey in two languages, English and Russian. Three main variables -- ethnic identity, national identity and information technology -- were used to test the hypothesis. The data collection and survey process revealed some interesting facts about this group. Namely, there are some strong indicators that post-Soviet Koreans belong to a category of their own within the larger group known as the "Korean diaspora." Secondly, a very strong sense of ethnic group belonging, when paired with higher education and high to medium levels of proficiency with Internet technology, indicates the potential for further development and sustainability of these ethnic and national identities, particularly when nurtured by the continued progress of information technology.
ContributorsLi, Veronika (Author) / Grossman, Gary (Thesis advisor) / Parmentier, Mary Jane (Committee member) / Thor, Eric (Committee member) / Arizona State University (Publisher)
Created2012
150987-Thumbnail Image.png
Description
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned

In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned and operated by third-party service providers, there are risks of unauthorized use of the users' sensitive data by service providers. Although there are many techniques for protecting users' data from outside attackers, currently there is no effective way to protect users' sensitive data from service providers. In this dissertation, an approach is presented to protecting the confidentiality of users' data from service providers, and ensuring that service providers cannot collect users' confidential data while the data is processed or stored in cloud computing systems. The approach has four major features: (1) separation of software service providers and infrastructure service providers, (2) hiding the information of the owners of data, (3) data obfuscation, and (4) software module decomposition and distributed execution. Since the approach to protecting users' data confidentiality includes software module decomposition and distributed execution, it is very important to effectively allocate the resource of servers in SBS to each of the software module to manage the overall performance of workflows in SBS. An approach is presented to resource allocation for SBS to adaptively allocating the system resources of servers to their software modules in runtime in order to satisfy the performance requirements of multiple workflows in SBS. Experimental results show that the dynamic resource allocation approach can substantially increase the throughput of a SBS and the optimal resource allocation can be found in polynomial time
ContributorsAn, Ho Geun (Author) / Yau, Sik-Sang (Thesis advisor) / Huang, Dijiang (Committee member) / Ahn, Gail-Joon (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2012
153741-Thumbnail Image.png
Description
By offering increased access to medical care, telemedicine offers significant opportunity for the process of development under Amartya Sen’s definition, that development is freedom, including freedom from illness, early death, and preventable disease. It advances development by freeing people from these burdens. However, like many emerging technologies, organizing information and

By offering increased access to medical care, telemedicine offers significant opportunity for the process of development under Amartya Sen’s definition, that development is freedom, including freedom from illness, early death, and preventable disease. It advances development by freeing people from these burdens. However, like many emerging technologies, organizing information and understanding the field faces significant challenges. This paper applies Bashshur's three-dimensional model of telemedicine to the classification of telemedicine literature found in databases to assess the value of the model as a tool for classification. By standardizing language and creating a repository of research done to date in a centralized location, the field can better understand how it is progressing and where work still needs to be done. This paper aims to see if Bashshur's model serves well for this task.
ContributorsBlum, Alexander (Author) / Parmentier, Mary Jane (Thesis advisor) / Zachary, Gregg (Committee member) / Grossman, Gary (Committee member) / Arizona State University (Publisher)
Created2015
155149-Thumbnail Image.png
Description
Cyber systems, including IoT (Internet of Things), are increasingly being used ubiquitously to vastly improve the efficiency and reduce the cost of critical application areas, such as finance, transportation, defense, and healthcare. Over the past two decades, computing efficiency and hardware cost have dramatically been improved. These improvements have made

Cyber systems, including IoT (Internet of Things), are increasingly being used ubiquitously to vastly improve the efficiency and reduce the cost of critical application areas, such as finance, transportation, defense, and healthcare. Over the past two decades, computing efficiency and hardware cost have dramatically been improved. These improvements have made cyber systems omnipotent, and control many aspects of human lives. Emerging trends in successful cyber system breaches have shown increasing sophistication in attacks and that attackers are no longer limited by resources, including human and computing power. Most existing cyber defense systems for IoT systems have two major issues: (1) they do not incorporate human user behavior(s) and preferences in their approaches, and (2) they do not continuously learn from dynamic environment and effectively adapt to thwart sophisticated cyber-attacks. Consequently, the security solutions generated may not be usable or implementable by the user(s) thereby drastically reducing the effectiveness of these security solutions.

In order to address these major issues, a comprehensive approach to securing ubiquitous smart devices in IoT environment by incorporating probabilistic human user behavioral inputs is presented. The approach will include techniques to (1) protect the controller device(s) [smart phone or tablet] by continuously learning and authenticating the legitimate user based on the touch screen finger gestures in the background, without requiring users’ to provide their finger gesture inputs intentionally for training purposes, and (2) efficiently configure IoT devices through controller device(s), in conformance with the probabilistic human user behavior(s) and preferences, to effectively adapt IoT devices to the changing environment. The effectiveness of the approach will be demonstrated with experiments that are based on collected user behavioral data and simulations.
ContributorsBuduru, Arun Balaji (Author) / Yau, Sik-Sang (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Davulcu, Hasan (Committee member) / Zhang, Yanchao (Committee member) / Arizona State University (Publisher)
Created2016