Matching Items (6)
Filtering by

Clear all filters

137481-Thumbnail Image.png
Description
We discuss processes involved in user-centric security design, including the synthesis of goals based on security and usability tasks. We suggest the usage of implicit security and the facilitation of secureuser actions. We propose a process for evaluating usability flaws by treating them as security threats and adapting traditional HCI

We discuss processes involved in user-centric security design, including the synthesis of goals based on security and usability tasks. We suggest the usage of implicit security and the facilitation of secureuser actions. We propose a process for evaluating usability flaws by treating them as security threats and adapting traditional HCI methods. We discuss how to correct these flaws once they are discovered. Finally, we discuss the Usable Security Development Model for developing usable secure systems.
ContributorsJorgensen, Jan Drake (Author) / Ahn, Gail-Joon (Thesis director) / VanLehn, Kurt (Committee member) / Wilkerson, Kelly (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2013-05
137623-Thumbnail Image.png
Description
Due to its difficult nature, organic chemistry is receiving much research attention across the nation to develop more efficient and effective means to teach it. As part of that, Dr. Ian Gould at ASU is developing an online organic chemistry educational website that provides help to students, adapts to their

Due to its difficult nature, organic chemistry is receiving much research attention across the nation to develop more efficient and effective means to teach it. As part of that, Dr. Ian Gould at ASU is developing an online organic chemistry educational website that provides help to students, adapts to their responses, and collects data about their performance. This thesis creative project addresses the design and implementation of an input parser for organic chemistry reagent questions, to appear on his website. After students used the form to submit questions throughout the Spring 2013 semester in Dr. Gould's organic chemistry class, the data gathered from their usage was analyzed, and feedback was collected. The feedback obtained from students was positive, and suggested that the input parser accomplished the educational goals that it sought to meet.
ContributorsBeerman, Eric Christopher (Author) / Gould, Ian (Thesis director) / Wilkerson, Kelly (Committee member) / Mosca, Vince (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2013-05
148121-Thumbnail Image.png
Description

This thesis proposes hardware and software security enhancements to the robotic explorer of a capstone team, in collaboration with the NASA Psyche Mission Student Collaborations program. The NASA Psyche Mission, launching in 2022 and reaching the metallic asteroid of the same name in 2026, will explore from orbit what is

This thesis proposes hardware and software security enhancements to the robotic explorer of a capstone team, in collaboration with the NASA Psyche Mission Student Collaborations program. The NASA Psyche Mission, launching in 2022 and reaching the metallic asteroid of the same name in 2026, will explore from orbit what is hypothesized to be remnant core material of an early planet, potentially providing key insights to planet formation. Following this initial mission, it is possible there would be scientists and engineers interested in proposing a mission to land an explorer on the surface of Psyche to further document various properties of the asteroid. As a proposal for a second mission, an interdisciplinary engineering and science capstone team at Arizona State University designed and constructed a robotic explorer for the hypothesized surfaces of Psyche, capable of semi-autonomously navigating simulated surfaces to collect scientific data from onboard sensors. A critical component of this explorer is the command and data handling subsystem, and as such, the security of this system, though outside the scope of the capstone project, remains a crucial consideration. This thesis proposes the pairing of Trusted Platform Module (TPM) technology for increased hardware security and the implementation of SELinux (Security Enhanced Linux) for increased software security for Earth-based testing as well as space-ready missions.

ContributorsAnderson, Kelly Joanne (Author) / Bowman, Catherine (Thesis director) / Kozicki, Michael (Committee member) / Electrical Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
148195-Thumbnail Image.png
Description

The colossal global counterfeit market and advances in cryptography including quantum computing supremacy have led the drive for a class of anti-counterfeit tags that are physically unclonable. Dendrites, previously considered an undesirable side effect of battery operation, have promise as an extremely versatile version of such tags, with their fundamental

The colossal global counterfeit market and advances in cryptography including quantum computing supremacy have led the drive for a class of anti-counterfeit tags that are physically unclonable. Dendrites, previously considered an undesirable side effect of battery operation, have promise as an extremely versatile version of such tags, with their fundamental nature ensuring that no two dendrites are alike and that they can be read at multiple magnification scales. In this work, we first pursue a simulation for electrochemical dendrites that elucidates fundamental information about their growth mechanism. We then translate these results into physical dendrites and demonstrate methods of producing a hash from these dendrites that is damage-tolerant for real-world verification. Finally, we explore theoretical curiosities that arise from the fractal nature of dendrites. We find that uniquely ramified dendrites, which rely on lower ion mobility and conductive deposition, are particularly amenable to wavelet hashing, and demonstrate that these dendrites have strong commercial potential for securing supply chains at the highest level while maintaining a low price point.

ContributorsSneh, Tal (Author) / Kozicki, Michael (Thesis director) / Gonzalez-Velo, Yago (Committee member) / School of Molecular Sciences (Contributor) / Department of Physics (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
147833-Thumbnail Image.png
Description

In light of the 2020 Presidential election, accusations regarding early voting methods have risen as a topic of debate among active voters. In order to ensure the voter’s trust in voting methods, it is important to analyze whether such accusations are truthful or just dramatized speculation. Do early voting methods

In light of the 2020 Presidential election, accusations regarding early voting methods have risen as a topic of debate among active voters. In order to ensure the voter’s trust in voting methods, it is important to analyze whether such accusations are truthful or just dramatized speculation. Do early voting methods negatively infringe on the integrity the U.S. election process? Using gathered voter statistics and conducted partisan research within recent elections, this defense examines the impact early voting has had through the analysis of two of its most controversial claims. The author finds that there exists little to no reasonable support to conclude existence of infringement to the integrity of the election process, and the reasons that explain this topic’s rise in popularity lies in the failure to accept defeat and the notion of fear.

Created2021-05
132273-Thumbnail Image.png
Description
Women, Peace, and Security (WPS) practitioners (including policymakers, scholars, and nonprofit leaders) in the U.S. and Canada have often focused their attention on the United Nations’ WPS initiative as a strategy for responding to conflicts abroad, particularly in the Global South. As a result of these limitations, black, Latino, and

Women, Peace, and Security (WPS) practitioners (including policymakers, scholars, and nonprofit leaders) in the U.S. and Canada have often focused their attention on the United Nations’ WPS initiative as a strategy for responding to conflicts abroad, particularly in the Global South. As a result of these limitations, black, Latino, and Indigenous advocates and peacebuilders in the U.S. and Canada remain largely unable to take advantage of WPS frameworks and resources. The subjectivity of the term “conflict” and the range of circumstances where it is used inspire this research. The selective application of the word “conflict” is itself a challenge to security, for conflicts can only be addressed once they are acknowledged and so named. Where does WPS intersect with contemporary Indigenous advocacy? A case study of the #noDAPL movement and the ways that nonviolence and women’s leadership emerged at Standing Rock, ND in 2016 provide a partial answer. Four challenges and recommendations are offered to WPS practitioners who seek to expand the availability of WPS resources to Indigenous peoples in the U.S. and Canada. These challenges and recommendations draw upon existing National Action Plans, legal and policy documents, and data from four interviews conducted with Indigenous women advocates in the U.S. and Canada in 2019. Above all, this paper seeks to encourage WPS practitioners to move beyond “gender mainstreaming” to consider not only how policies and practices impact women and men differently, but also how they may impact Indigenous people and settlers differently.
Created2019-05