Matching Items (78)
150987-Thumbnail Image.png
Description
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned

In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned and operated by third-party service providers, there are risks of unauthorized use of the users' sensitive data by service providers. Although there are many techniques for protecting users' data from outside attackers, currently there is no effective way to protect users' sensitive data from service providers. In this dissertation, an approach is presented to protecting the confidentiality of users' data from service providers, and ensuring that service providers cannot collect users' confidential data while the data is processed or stored in cloud computing systems. The approach has four major features: (1) separation of software service providers and infrastructure service providers, (2) hiding the information of the owners of data, (3) data obfuscation, and (4) software module decomposition and distributed execution. Since the approach to protecting users' data confidentiality includes software module decomposition and distributed execution, it is very important to effectively allocate the resource of servers in SBS to each of the software module to manage the overall performance of workflows in SBS. An approach is presented to resource allocation for SBS to adaptively allocating the system resources of servers to their software modules in runtime in order to satisfy the performance requirements of multiple workflows in SBS. Experimental results show that the dynamic resource allocation approach can substantially increase the throughput of a SBS and the optimal resource allocation can be found in polynomial time
ContributorsAn, Ho Geun (Author) / Yau, Sik-Sang (Thesis advisor) / Huang, Dijiang (Committee member) / Ahn, Gail-Joon (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2012
150653-Thumbnail Image.png
Description
The microfinance industry provides financial services to the world's poor in hopes of moving individuals and families out of poverty. This dissertation document suggests that information and communication technologies (ICTs) are changing the microfinance industry, especially given recent advancements in mobile banking, Internet usage and connectivity, and a decreasing digital

The microfinance industry provides financial services to the world's poor in hopes of moving individuals and families out of poverty. This dissertation document suggests that information and communication technologies (ICTs) are changing the microfinance industry, especially given recent advancements in mobile banking, Internet usage and connectivity, and a decreasing digital divide. These impacts are discussed in three essays. First, ICTs impact intermediation among various players in the microfinance industry. Second, ICTs impact the extent to which microfinance institutions (MFIs) extend their outreach to poorer or more geographically remote borrowers. Finally, ICTs impact the location of decision rights given newly forming peer-to-peer (P2P) social microlending organizations. As the microfinance industry increases its adoption and reliance on ICTs, new and interesting opportunities abound for researchers in the information systems discipline.
ContributorsWeber, David Michael (Author) / Riggins, Frederick J. (Thesis advisor) / Kulkarni, Uday R. (Thesis advisor) / Carey, Jane M. (Committee member) / Arizona State University (Publisher)
Created2012
151159-Thumbnail Image.png
Description
Ample evidence exists to support the conclusion that enterprise search is failing its users. This failure is costing corporate America billions of dollars every year. Most enterprise search engines are built using web search engines as their foundations. These search engines are optimized for web use and are inadequate when

Ample evidence exists to support the conclusion that enterprise search is failing its users. This failure is costing corporate America billions of dollars every year. Most enterprise search engines are built using web search engines as their foundations. These search engines are optimized for web use and are inadequate when used inside the firewall. Without the ability to use popularity-based measures for ranking documents returned to the searcher, these search engines must rely on full-text search technologies. The Information Science literature explains why full-text search, by itself, fails to adequately discriminate relevant from irrelevant documents. This failure in discrimination results in far too many documents being returned to the searcher, which causes enterprise searchers to abandon their searches in favor of re-creating the documents or information they seek. This dissertation describes and evaluates a potential solution to the problem of failed enterprise search derived from the Information Science literature: subject-aided search. In subject-aided search, full-text search is augmented with a search of subject metadata coded into each document based upon a hierarchically structured subject index. Using the Design Science methodology, this dissertation develops and evaluates three IT artifacts in the search for a solution to the wicked problem of enterprise search failure.
ContributorsSchymik, Gregory (Author) / St. Louis, Robert (Thesis advisor) / Goul, Kenneth M (Committee member) / Santanum, Raghu (Committee member) / Arizona State University (Publisher)
Created2012
154120-Thumbnail Image.png
Description
Online programming communities are widely used by programmers for troubleshooting or various problem solving tasks. Large and ever increasing volume of posts on these communities demands more efforts to read and comprehend thus making it harder to find relevant information. In my thesis; I designed and studied an alternate approach

Online programming communities are widely used by programmers for troubleshooting or various problem solving tasks. Large and ever increasing volume of posts on these communities demands more efforts to read and comprehend thus making it harder to find relevant information. In my thesis; I designed and studied an alternate approach by using interactive network visualization to represent relevant search results for online programming discussion forums.

I conducted user study to evaluate the effectiveness of this approach. Results show that users were able to identify relevant information more precisely via visual interface as compared to traditional list based approach. Network visualization demonstrated effective search-result navigation support to facilitate user’s tasks and improved query quality for successive queries. Subjective evaluation also showed that visualizing search results conveys more semantic information in efficient manner and makes searching more effective.
ContributorsMehta, Vishal Vimal (Author) / Hsiao, Ihan (Thesis advisor) / Walker, Erin (Committee member) / Sarwat, Mohamed (Committee member) / Arizona State University (Publisher)
Created2015
156469-Thumbnail Image.png
Description
The 21st-century professional or knowledge worker spends much of the working day engaging others through electronic communication. The modes of communication available to knowledge workers have rapidly increased due to computerized technology advances: conference and video calls, instant messaging, e-mail, social media, podcasts, audio books, webinars, and much more. Professionals

The 21st-century professional or knowledge worker spends much of the working day engaging others through electronic communication. The modes of communication available to knowledge workers have rapidly increased due to computerized technology advances: conference and video calls, instant messaging, e-mail, social media, podcasts, audio books, webinars, and much more. Professionals who think for a living express feelings of stress about their ability to respond and fear missing critical tasks or information as they attempt to wade through all the electronic communication that floods their inboxes. Although many electronic communication tools compete for the attention of the contemporary knowledge worker, most professionals use an electronic personal information management (PIM) system, more commonly known as an e-mail application and often the ubiquitous Microsoft Outlook program. The aim of this research was to provide knowledge workers with solutions to manage the influx of electronic communication that arrives daily by studying the workers in their working environment. This dissertation represents a quest to understand the current strategies knowledge workers use to manage their e-mail, and if modification of e-mail management strategies can have an impact on productivity and stress levels for these professionals. Today’s knowledge workers rarely work entirely alone, justifying the importance of also exploring methods to improve electronic communications within teams.
ContributorsCounts, Virginia (Author) / Parrish, Kristen (Thesis advisor) / Allenby, Braden (Thesis advisor) / Landis, Amy (Committee member) / Cooke, Nancy J. (Committee member) / Arizona State University (Publisher)
Created2018
155954-Thumbnail Image.png
Description
The telephone network is used by almost every person in the modern world. With the rise of Internet access to the PSTN, the telephone network today is rife with telephone spam and scams. Spam calls are significant annoyances for telephone users, unlike email spam, spam calls demand immediate attention. They

The telephone network is used by almost every person in the modern world. With the rise of Internet access to the PSTN, the telephone network today is rife with telephone spam and scams. Spam calls are significant annoyances for telephone users, unlike email spam, spam calls demand immediate attention. They are not only significant annoyances but also result in significant financial losses in the economy. According to complaint data from the FTC, complaints on illegal calls have made record numbers in recent years. Americans lose billions to fraud due to malicious telephone communication, despite various efforts to subdue telephone spam, scam, and robocalls.

In this dissertation, a study of what causes the users to fall victim to telephone scams is presented, and it demonstrates that impersonation is at the heart of the problem. Most solutions today primarily rely on gathering offending caller IDs, however, they do not work effectively when the caller ID has been spoofed. Due to a lack of authentication in the PSTN caller ID transmission scheme, fraudsters can manipulate the caller ID to impersonate a trusted entity and further a variety of scams. To provide a solution to this fundamental problem, a novel architecture and method to authenticate the transmission of the caller ID is proposed. The solution enables the possibility of a security indicator which can provide an early warning to help users stay vigilant against telephone impersonation scams, as well as provide a foundation for existing and future defenses to stop unwanted telephone communication based on the caller ID information.
ContributorsTu, Huahong (Author) / Doupe, Adam (Thesis advisor) / Ahn, Gail-Joon (Thesis advisor) / Huang, Dijiang (Committee member) / Zhang, Yanchao (Committee member) / Zhao, Ziming (Committee member) / Arizona State University (Publisher)
Created2017
157308-Thumbnail Image.png
Description
Image-based process monitoring has recently attracted increasing attention due to the advancement of the sensing technologies. However, existing process monitoring methods fail to fully utilize the spatial information of images due to their complex characteristics including the high dimensionality and complex spatial structures. Recent advancement of the unsupervised deep models

Image-based process monitoring has recently attracted increasing attention due to the advancement of the sensing technologies. However, existing process monitoring methods fail to fully utilize the spatial information of images due to their complex characteristics including the high dimensionality and complex spatial structures. Recent advancement of the unsupervised deep models such as a generative adversarial network (GAN) and generative adversarial autoencoder (AAE) has enabled to learn the complex spatial structures automatically. Inspired by this advancement, we propose an anomaly detection framework based on the AAE for unsupervised anomaly detection for images. AAE combines the power of GAN with the variational autoencoder, which serves as a nonlinear dimension reduction technique with regularization from the discriminator. Based on this, we propose a monitoring statistic efficiently capturing the change of the image data. The performance of the proposed AAE-based anomaly detection algorithm is validated through a simulation study and real case study for rolling defect detection.
ContributorsYeh, Huai-Ming (Author) / Yan, Hao (Thesis advisor) / Pan, Rong (Committee member) / Li, Jing (Committee member) / Arizona State University (Publisher)
Created2019
136547-Thumbnail Image.png
Description
The introduction of novel information technology within contemporary healthcare settings presents a critical juncture for the industry and thus lends itself to the importance of better understanding the impact of this emerging "health 2.0" landscape. Simply, how such technology may affect the healthcare system is still not fully realized, despite

The introduction of novel information technology within contemporary healthcare settings presents a critical juncture for the industry and thus lends itself to the importance of better understanding the impact of this emerging "health 2.0" landscape. Simply, how such technology may affect the healthcare system is still not fully realized, despite the ever-growing need to adopt it in order to serve a growing patient population. Thus, two pertinent questions are posed: is HIT useful and practical and, if so, what is the best way to implement it? This study examined the clinical implementation of specific instances of health information technology (HIT) so as to weigh its benefits and risks to ultimately construct a proposal for successful widespread adoption. Due to the poignancy of information analysis within HIT, Information Measurement Theory (IMT) was used to measure the effectiveness of current HIT systems as well as to elucidate improvements for future implementation. The results indicate that increased transparency, attention to patient-focused approaches and proper IT training will not only allow HIT to better serve the community, but will also decrease inefficient healthcare expenditure.
ContributorsMaietta, Myles Anthony (Author) / Kashiwagi, Dean (Thesis director) / Kashiwagi, Jacob (Committee member) / Barrett, The Honors College (Contributor) / Department of Psychology (Contributor) / School of Life Sciences (Contributor)
Created2015-05
153741-Thumbnail Image.png
Description
By offering increased access to medical care, telemedicine offers significant opportunity for the process of development under Amartya Sen’s definition, that development is freedom, including freedom from illness, early death, and preventable disease. It advances development by freeing people from these burdens. However, like many emerging technologies, organizing information and

By offering increased access to medical care, telemedicine offers significant opportunity for the process of development under Amartya Sen’s definition, that development is freedom, including freedom from illness, early death, and preventable disease. It advances development by freeing people from these burdens. However, like many emerging technologies, organizing information and understanding the field faces significant challenges. This paper applies Bashshur's three-dimensional model of telemedicine to the classification of telemedicine literature found in databases to assess the value of the model as a tool for classification. By standardizing language and creating a repository of research done to date in a centralized location, the field can better understand how it is progressing and where work still needs to be done. This paper aims to see if Bashshur's model serves well for this task.
ContributorsBlum, Alexander (Author) / Parmentier, Mary Jane (Thesis advisor) / Zachary, Gregg (Committee member) / Grossman, Gary (Committee member) / Arizona State University (Publisher)
Created2015
154452-Thumbnail Image.png
Description
By collecting and analyzing more than two million tweets, U.S. House Representatives’ voting records in 111th and 113th Congress, and data from other resources I study several aspects of adoption and use of Twitter by Representatives. In the first chapter, I study the overall impact of Twitter use by Representatives

By collecting and analyzing more than two million tweets, U.S. House Representatives’ voting records in 111th and 113th Congress, and data from other resources I study several aspects of adoption and use of Twitter by Representatives. In the first chapter, I study the overall impact of Twitter use by Representatives on their political orientation and their political alignment with their constituents. The findings show that Representatives who adopted Twitter moved closer to their constituents in terms of political orientation.

By using supervised machine learning and text mining techniques, I shift the focus to synthesizing the actual content shared by Representatives on Twitter to evaluate their effects on Representatives’ political polarization in the second chapter. I found support for the effects of repeated expressions and peer influence in Representatives’ political polarization.

Last but not least, by employing a recently developed dynamic network model (separable temporal exponential-family random graph model), I study the effects of homophily on formation and dissolution of Representatives’ Twitter communications in the third chapter. The results signal the presence of demographic homophily and value homophily in Representatives’ Twitter communications networks.

These three studies altogether provide a comprehensive picture about the overall consequences and dynamics of use of online social networking platforms by Representatives.
ContributorsMosuavi, Seyedreza (Author) / Gu, Bin (Thesis advisor) / Vinzé, Ajay S. (Committee member) / Shi, Zhan (Michael) (Committee member) / Arizona State University (Publisher)
Created2016