Matching Items (23)
Filtering by

Clear all filters

135654-Thumbnail Image.png
Description
Company X has developed RealSenseTM technology, a depth sensing camera that provides machines the ability to capture three-dimensional spaces along with motion within these spaces. The goal of RealSense was to give machines human-like senses, such as knowing how far away objects are and perceiving the surrounding environment. The key

Company X has developed RealSenseTM technology, a depth sensing camera that provides machines the ability to capture three-dimensional spaces along with motion within these spaces. The goal of RealSense was to give machines human-like senses, such as knowing how far away objects are and perceiving the surrounding environment. The key issue for Company X is how to commercialize RealSense's depth recognition capabilities. This thesis addresses the problem by examining which markets to address and how to monetize this technology. The first part of the analysis identified potential markets for RealSense. This was achieved by evaluating current markets that could benefit from the camera's gesture recognition, 3D scanning, and depth sensing abilities. After identifying seven industries where RealSense could add value, a model of the available, addressable, and obtainable market sizes was developed for each segment. Key competitors and market dynamics were used to estimate the portion of the market that Company X could capture. These models provided a forecast of the discounted gross profits that could be earned over the next five years. These forecasted gross profits, combined with an examination of the competitive landscape and synergistic opportunities, resulted in the selection of the three segments thought to be most profitable to Company X. These segments are smart home, consumer drones, and automotive. The final part of the analysis investigated entrance strategies. Company X's competitive advantages in each space were found by examining the competition, both for the RealSense camera in general and other technologies specific to each industry. Finally, ideas about ways to monetize RealSense were developed by exploring various revenue models and channels.
ContributorsDunn, Nicole (Co-author) / Boudreau, Thomas (Co-author) / Kinzy, Chris (Co-author) / Radigan, Thomas (Co-author) / Simonson, Mark (Thesis director) / Hertzel, Michael (Committee member) / WPC Graduate Programs (Contributor) / Department of Psychology (Contributor) / Department of Finance (Contributor) / School of Accountancy (Contributor) / Department of Economics (Contributor) / School of Mathematical and Statistical Science (Contributor) / W. P. Carey School of Business (Contributor) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
135678-Thumbnail Image.png
Description
The constant evolution of technology has greatly shifted the way in which we gain knowledge information. This, in turn, has an affect on how we learn. Long gone are the days where students sit in libraries for hours flipping through numerous books to find one specific piece of information. With

The constant evolution of technology has greatly shifted the way in which we gain knowledge information. This, in turn, has an affect on how we learn. Long gone are the days where students sit in libraries for hours flipping through numerous books to find one specific piece of information. With the advent of Google, modern day students are able to arrive at the same information within 15 seconds. This technology, the internet, is reshaping the way we learn. As a result, the academic integrity policies that are set forth at the college level seem to be outdated, often prohibiting the use of technology as a resource for learning. The purpose of this paper is to explore why exactly these resources are prohibited. By contrasting a subject such as Computer Science with the Humanities, the paper explores the need for the internet as a resource in some fields as opposed to others. Taking a look at the knowledge presented in Computer Science, the course structure, and the role that professors play in teaching this knowledge, this thesis evaluates the epistemology of Engineering subjects. By juxtaposing Computer Science with the less technology reliant humanities subjects, it is clear that one common policy outlining academic integrity does not suffice for an entire university. Instead, there should be amendments made to the policy specific to each subject, in order to best foster an environment of learning at the university level. In conclusion of this thesis, Arizona State University's Academic Integrity Policy is analyzed and suggestions are made to remove ambiguity in the language of the document, in order to promote learning at the university.
ContributorsMohan, Sishir Basavapatna (Author) / Brake, Elizabeth (Thesis director) / Martin, William (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
136585-Thumbnail Image.png
Description
Although the number of women earning college degrees and entering the workforce is increasing, a gender gap persists at top leadership positions. Women are faced with numerous challenges throughout the talent pipeline, challenges that often drive women out of the workforce. This paper looks at the power of mentoring and

Although the number of women earning college degrees and entering the workforce is increasing, a gender gap persists at top leadership positions. Women are faced with numerous challenges throughout the talent pipeline, challenges that often drive women out of the workforce. This paper looks at the power of mentoring and how women, particularly young women, have the potential to overcome these challenges through a successful mentoring relationship. We use examples of successful mentoring programs at the corporate and university level to support the development of a mentoring program at the high school level. Our paper presents the research and development process behind the Young Women in Leadership (YWiL) Workshop, a half-day event that focused on bringing awareness to the importance of mentoring and leadership at the high school level while providing young women with the confidence and knowledge to begin to establish their own mentoring relationships.
ContributorsRust, Brenna (Co-author) / Myers, Sheridan (Co-author) / Desch, Tim (Thesis director) / Kalika, Dale (Committee member) / Barrett, The Honors College (Contributor) / School of Life Sciences (Contributor) / School of Accountancy (Contributor) / T. Denny Sanford School of Social and Family Dynamics (Contributor) / WPC Graduate Programs (Contributor) / W. P. Carey School of Business (Contributor)
Created2015-05
136224-Thumbnail Image.png
Description
Revenge porn is the accepted term used to describe the distribution of explicit photos online with the intent to incite embarrassment or shame. Perpetrators are typically ex-lovers seeking revenge on a former partner. This harassment has become widespread alongside increased access to online networks and "sexting" culture. Early studies indicate

Revenge porn is the accepted term used to describe the distribution of explicit photos online with the intent to incite embarrassment or shame. Perpetrators are typically ex-lovers seeking revenge on a former partner. This harassment has become widespread alongside increased access to online networks and "sexting" culture. Early studies indicate revenge porn reflects a larger cultural attitude of "slut shaming", the tendency to shame women for behaving in a sexual manner outside the boundaries of traditional female sexuality. Focus groups were organized to discuss views regarding revenge porn, Internet privacy, and legislature.
Created2015-05
133636-Thumbnail Image.png
Description
All of the modern technology tools that are being used today, have a purpose to support a variety of human tasks. Ambient Intelligence is the next step to transform modern technology. Ambient Intelligence is an electronic environment that is sensitive and responsive to human interaction/activity. We understand that Ambient Intelligence(AmI)

All of the modern technology tools that are being used today, have a purpose to support a variety of human tasks. Ambient Intelligence is the next step to transform modern technology. Ambient Intelligence is an electronic environment that is sensitive and responsive to human interaction/activity. We understand that Ambient Intelligence(AmI) concentrates on connectivity within a person's environment and the purpose of having a new connection is to make life simpler. Today, technology is in the transition of a new lifestyle where technology is discretely living with us. Ambient Intelligence is still in progress, but we can analyze the technology we have today, ties a relationship with Ambient Intelligence. In order to examine this concern, I investigated how much awareness/knowledge users that range from Generation X to Xennials, that had experience from replacing habitual items and technologies they use on a daily basis. A few questions I mainly wanted answered: - What kind of technologies, software, or tech services replace items you use daily? - What kind of benefits did the technology give you, did it change the way you think/act on any kind of activities? - What kind of expectations/concerns do you have for future technologies? To accomplish this, I gathered information from interviewing multiples groups: millennials and other older generations (33+ years old). I retrieved data from students at Arizona State University, Intel Corporation, and a local clinic. From this study, I've discovered from both groups, that both sides agree that modern technology is rapidly growing to a point that computers think as humans. Through multiple interviews and research, I have found that the technology today makes an impact through all aspects of our lives and through artificial intelligence. Furthermore, I will discuss and predict what will society will encounter later on as the new technology discretely arises.
ContributorsPascua, Roman Paolo Bustos (Author) / Yang, Yezhou (Thesis director) / Caviedes, Jorge (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
137524-Thumbnail Image.png
Description
The intent of this thesis was to explore current literature to further understand the work environments of medical fields and the obstacles that are unique to women pursuing medical careers. It is acknowledged that a significant glass ceiling exists for women in medical fields, specifically areas such as academia and

The intent of this thesis was to explore current literature to further understand the work environments of medical fields and the obstacles that are unique to women pursuing medical careers. It is acknowledged that a significant glass ceiling exists for women in medical fields, specifically areas such as academia and surgery. Thus, the research is focused on determining explanations for a lack of women in said medical specialties, as well as understanding the source of the obstacles women face in medicine. This study was designed to obtain a general background from a literature review and then, to compare and supplement the findings with in-depth interviews of females in a variety of medical careers. From the literature review and the interviews, it was confirmed that the largest area of inequality women in medical fields faced was struggling to balance work and personal life, specifically motherhood. Furthermore, the knowledge gained from the literature review and interviews provided a framework for suggesting possible solutions to help women successfully balance a professional medical career and a personal life.
ContributorsHaugen, Kelsey Blair (Author) / Fonow, Mary Margaret (Thesis director) / Scheiner, Georganne (Committee member) / McGibbney, Michelle (Committee member) / Barrett, The Honors College (Contributor) / T. Denny Sanford School of Social and Family Dynamics (Contributor)
Created2013-05
136855-Thumbnail Image.png
Description
The aim of this thesis is to explain the dichotomy between public perception of leadership and quantifiable measurement of leadership based on Information Measurement Theory, a method of utilizing deductive logic, and to identify and interpret the causes of such discrepancies as seen in the case of Steve Jobs. The

The aim of this thesis is to explain the dichotomy between public perception of leadership and quantifiable measurement of leadership based on Information Measurement Theory, a method of utilizing deductive logic, and to identify and interpret the causes of such discrepancies as seen in the case of Steve Jobs. The general public perceives Steve Jobs to be an effective leader because he was visionary, entrepreneurial, charismatic and highly successful. However, these perceptions are not true indicators of leadership but rather qualitative interpretations of leadership without tangible evidence in support of this idea. An analysis of words found in multiple appearances of online articles relating to Steve Jobs and leadership revealed a variety of common factors associated with Steve Jobs' leadership, supporting a primarily positive viewpoint by the public. The thesis then identified how a new methodology of measuring leadership effectiveness based on quantitative data, known as the New Leadership Model, concludes Steve Jobs does not meet the criteria necessary to be considered a Best Value Leader, one who uses alignment rather than management, direction and control to achieve maximum efficiency within an organization. The discrepancies between public perception of Steve Jobs as a leader and the results of the New Leadership Model evaluation show significant variance. Potential rationale for these variances is offered in the thesis. In conclusion, the thesis argues that public perception will often differ from quantifiable measurement of leadership based on the interpretation of leadership by various groups and by the methods each group uses to identify characteristics of effective leadership.
Created2014-05
136884-Thumbnail Image.png
Description
Gender discrimination and inequality in this day and age points to the existence of ambivalent sexist beliefs. That is, men and women hold outwardly negative or superficially positive sexist beliefs about the innate inferiority of women (Glick & Fiske, 1996; Glick & Fiske, 1997). In the past twenty years, outcomes

Gender discrimination and inequality in this day and age points to the existence of ambivalent sexist beliefs. That is, men and women hold outwardly negative or superficially positive sexist beliefs about the innate inferiority of women (Glick & Fiske, 1996; Glick & Fiske, 1997). In the past twenty years, outcomes and effects of women due to these beliefs have been researched extensively. Less common are suggestions or conclusions regarding the underlying existence of these beliefs, though many researchers have related their results to aspects within the Social Identity Theory (1979) and other alike theories involving the self and threats to self. The present study looks at smaller constructs, reporting a relationship between a model of women's identity, including predictors: 1) closeness to women, 2) public regard 3) gender identity centrality, to hostile, benevolent and ambivalent sexist beliefs. A group of N=115 women with ages ranging from 18 to 22 at Arizona State University were administered a survey asking questions about their sexist beliefs and their personal gender values. Results show a significant relationship between predictor variables to hostile sexist beliefs, but not benevolent sexist beliefs. These findings suggest that women's association with their gender-derived identity may parallel with endorsement of sexist beliefs when conceptions of the traditional woman is more salient.
ContributorsChavez, Adrienne Raschelle (Author) / Bradley, Robert (Thesis director) / McKenney, Sarah (Committee member) / Barrett, The Honors College (Contributor) / T. Denny Sanford School of Social and Family Dynamics (Contributor) / Department of Psychology (Contributor)
Created2014-05
134711-Thumbnail Image.png
Description
The purpose of this research project is to develop a recommendation for Company X on the strategies it should use to enter a new market. This was done through the compilation and interpretation of data from the company and the construction of a financial model capable of analyzing our different

The purpose of this research project is to develop a recommendation for Company X on the strategies it should use to enter a new market. This was done through the compilation and interpretation of data from the company and the construction of a financial model capable of analyzing our different proposed strategies. Company X is a leading producer of silicon chips which seeks to remain one of the leading forces in new technologies. Currently Company X wants to assess the value and risks associated with introducing a new packaging technology (FO-WLP) into their products either by developing the technology in-house or outsourcing production. The first portion of the research consisted mostly of gathering the necessary business acumen to be able to to fully understand our research findings. Market research was conducted to discover what competitors exist and what inputs should be included for the model with help from employees at Company X. The research then proceeded with the identification of three possible strategies and construction of financial models to analyze these options. Using the results from our analysis we were able to develop our recommendation for Company X and lay out the next steps which the Company needs to take before investing in the new technology.
ContributorsRubenzer, Jack (Co-author) / Galaviz, Roberto (Co-author) / Mariani, Stephanie (Co-author) / Mecinas, Freddy (Co-author) / Simonson, Mark (Thesis director) / Hertzel, Mike (Committee member) / Department of Finance (Contributor) / Department of Economics (Contributor) / Department of Supply Chain Management (Contributor) / T. Denny Sanford School of Social and Family Dynamics (Contributor) / Barrett, The Honors College (Contributor)
Created2016-12
134133-Thumbnail Image.png
Description
Hackathons are 24-36 hour events where participants are encouraged to learn, collaborate, and build technological inventions with leaders, companies, and peers in the tech community. Hackathons have been sweeping the nation in the recent years especially at the collegiate level; however, there is no substantial research or documentation of the

Hackathons are 24-36 hour events where participants are encouraged to learn, collaborate, and build technological inventions with leaders, companies, and peers in the tech community. Hackathons have been sweeping the nation in the recent years especially at the collegiate level; however, there is no substantial research or documentation of the actual effects of hackathons especially at the collegiate level. This makes justifying the usage of valuable time and resources to host hackathons difficult for tech companies and academic institutions. This thesis specifically examines the effects of collegiate hackathons through running a collegiate hackathon known as Desert Hacks at Arizona State University (ASU). The participants of Desert Hacks were surveyed at the start and at the end of the event to analyze the effects. The results of the survey implicate that participants have grown in base computer programming skills, inclusion in the tech community, overall confidence, and motivation for the technological field. Through these results, this study can be used to help justify the necessity of collegiate hackathons and events similar.
ContributorsLe, Peter Thuan (Author) / Atkinson, Robert (Thesis director) / Chavez-Echeagaray, Maria Elena (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2017-12