Filtering by
- All Subjects: engineering
- All Subjects: artificial intelligence
- Creators: Arizona State University
- Creators: Computer Science and Engineering Program
- Resource Type: Text
![149709-Thumbnail Image.png](https://d1rbsgppyrdqq4.cloudfront.net/s3fs-public/styles/width_400/public/2021-08/149709-Thumbnail%20Image.png?versionId=kLUHiLE169SB7ODQVZ4Rh1m8of03Unzj&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIASBVQ3ZQ42ZLA5CUJ/20240530/us-west-2/s3/aws4_request&X-Amz-Date=20240530T153758Z&X-Amz-SignedHeaders=host&X-Amz-Expires=120&X-Amz-Signature=1f16db0545bd82ba171b6733a3406f6edcb4f31d29c8cc9da840a5748b216673&itok=8MVraSBp)
on-accountable to an accountable position, from a relationship based
on-measuring to a measuring entity, and to a contractor who manages and minimizes the risk that they do not control. Years of price based practices have caused poor quality and low performance in the construction industry. This research identifies what is a best value contractor or vendor, what factors make up a best value vendor, and the methodology to transform a vendor to a best value vendor. It will use deductive logic, a case study to confirm the logic and the proposed methodology.
![149660-Thumbnail Image.png](https://d1rbsgppyrdqq4.cloudfront.net/s3fs-public/styles/width_400/public/2021-08/149660-Thumbnail%20Image.png?versionId=Z2CLaPub8hVwXY.2tEmYvqORDnv.n6qf&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIASBVQ3ZQ42ZLA5CUJ/20240608/us-west-2/s3/aws4_request&X-Amz-Date=20240608T173807Z&X-Amz-SignedHeaders=host&X-Amz-Expires=120&X-Amz-Signature=85789e6d3d30aa1be88d274c805dcb04770d54c6c688ad1416a0af22e796ac7e&itok=n4yzkWhu)
![150409-Thumbnail Image.png](https://d1rbsgppyrdqq4.cloudfront.net/s3fs-public/styles/width_400/public/2021-08/150409-Thumbnail%20Image.png?versionId=4Nz2knmtqLt_CmrbL3aNePA_tR.n_SR4&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIASBVQ3ZQ42ZLA5CUJ/20240604/us-west-2/s3/aws4_request&X-Amz-Date=20240604T090552Z&X-Amz-SignedHeaders=host&X-Amz-Expires=120&X-Amz-Signature=2d45ef0a71ba76db9ee098cb6ee2fe97bd41ac3ad6019908e346992229c27951&itok=8m3fSISz)
![150372-Thumbnail Image.png](https://d1rbsgppyrdqq4.cloudfront.net/s3fs-public/styles/width_400/public/2021-08/150372-Thumbnail%20Image.png?versionId=o0MpGejLeazJ_5i0DMqPFsGxZDUsP8o4&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIASBVQ3ZQ42ZLA5CUJ/20240530/us-west-2/s3/aws4_request&X-Amz-Date=20240530T153759Z&X-Amz-SignedHeaders=host&X-Amz-Expires=120&X-Amz-Signature=8d2c45db9eef498be82fb064273e2f2b9bceecaad6eb39010132cc4897b14265&itok=914Fknn6)
![150346-Thumbnail Image.png](https://d1rbsgppyrdqq4.cloudfront.net/s3fs-public/styles/width_400/public/2021-08/150346-Thumbnail%20Image.png?versionId=yBskKooxDx.yHXMNVLur0FEXW9VcZr8o&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIASBVQ3ZQ42ZLA5CUJ/20240605/us-west-2/s3/aws4_request&X-Amz-Date=20240605T035106Z&X-Amz-SignedHeaders=host&X-Amz-Expires=120&X-Amz-Signature=45aac37f0eacf774cc797d13e7ded71ce747c32d6811451a28cfbd8c60698794&itok=oKv8LwJM)
![150348-Thumbnail Image.png](https://d1rbsgppyrdqq4.cloudfront.net/s3fs-public/styles/width_400/public/2021-08/150348-Thumbnail%20Image.png?versionId=SMd3ag5TNhxAE0DcVvkOI0zbr98AP7P8&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIASBVQ3ZQ42ZLA5CUJ/20240608/us-west-2/s3/aws4_request&X-Amz-Date=20240608T195820Z&X-Amz-SignedHeaders=host&X-Amz-Expires=120&X-Amz-Signature=4f9a925c9d7b7b9e735506e29d51b76fe68eb4bd9e54127fda799545eddbfe0b&itok=GYStKi-u)
![150392-Thumbnail Image.png](https://d1rbsgppyrdqq4.cloudfront.net/s3fs-public/styles/width_400/public/2021-08/150392-Thumbnail%20Image.png?versionId=YDzVl04nRivZfTAfLXwsd6Sw6JpS_KTA&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIASBVQ3ZQ42ZLA5CUJ/20240530/us-west-2/s3/aws4_request&X-Amz-Date=20240530T164649Z&X-Amz-SignedHeaders=host&X-Amz-Expires=120&X-Amz-Signature=ec691bc3945037c2bda95158cd3bf44cd6241f8799bc03f6251af855afab5b54&itok=FnZSUMpz)
![150393-Thumbnail Image.png](https://d1rbsgppyrdqq4.cloudfront.net/s3fs-public/styles/width_400/public/2021-08/150393-Thumbnail%20Image.png?versionId=DQBs4XbkdFz3aLtWuhoAVP8XZv0xT5gS&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIASBVQ3ZQ42ZLA5CUJ/20240530/us-west-2/s3/aws4_request&X-Amz-Date=20240530T165831Z&X-Amz-SignedHeaders=host&X-Amz-Expires=120&X-Amz-Signature=5d5b7319650be8c145d390a38f75acfe5c85807c85516005cbd4e1476b01b08f&itok=BK3GXJl4)
![150341-Thumbnail Image.png](https://d1rbsgppyrdqq4.cloudfront.net/s3fs-public/styles/width_400/public/2021-08/150341-Thumbnail%20Image.png?versionId=b47i.BsvCsk4UZHJyvFVsW_F2yEeJBwm&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIASBVQ3ZQ42ZLA5CUJ/20240610/us-west-2/s3/aws4_request&X-Amz-Date=20240610T132950Z&X-Amz-SignedHeaders=host&X-Amz-Expires=120&X-Amz-Signature=fba65b4745cf97817ec17c0c5d2bffc3f9bf0b2e868101fd7237ac178d934a59&itok=io4Oba3h)
![147884-Thumbnail Image.png](https://d1rbsgppyrdqq4.cloudfront.net/s3fs-public/styles/width_400/public/2021-07/147884-Thumbnail%20Image.png?versionId=SnEzdQ_9.6rn9QDwwUtaSf2RlouXs9W3&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIASBVQ3ZQ42ZLA5CUJ/20240614/us-west-2/s3/aws4_request&X-Amz-Date=20240614T093848Z&X-Amz-SignedHeaders=host&X-Amz-Expires=120&X-Amz-Signature=a6a4b1e92173e88ebeef17b7c0f0a96b9000ec90b04cc01cb5c467c34014ff3d&itok=991SpDTw)
Affective computing allows computers to monitor and influence people’s affects, in other words emotions. Currently, there is a lot of research exploring what can be done with this technology. There are many fields, such as education, healthcare, and marketing, that this technology can transform. However, it is important to question what should be done. There are unique ethical considerations in regards to affective computing that haven't been explored. The purpose of this study is to understand the user’s perspective of affective computing in regards to the Association of Computing Machinery (ACM) Code of Ethics, to ultimately start developing a better understanding of these ethical concerns. For this study, participants were required to watch three different videos and answer a questionnaire, all while wearing an Emotiv EPOC+ EEG headset that measures their emotions. Using the information gathered, the study explores the ethics of affective computing through the user’s perspective.