Matching Items (4)
Filtering by

Clear all filters

135099-Thumbnail Image.png
Description
Smartphone privacy is a growing concern around the world; smartphone applications routinely take personal information from our phones and monetize it for their own profit. Worse, they're doing it legally. The Terms of Service allow companies to use this information to market, promote, and sell personal data. Most users seem

Smartphone privacy is a growing concern around the world; smartphone applications routinely take personal information from our phones and monetize it for their own profit. Worse, they're doing it legally. The Terms of Service allow companies to use this information to market, promote, and sell personal data. Most users seem to be either unaware of it, or unconcerned by it. This has negative implications for the future of privacy, particularly as the idea of smart home technology becomes a reality. If this is what privacy looks like now, with only one major type of smart device on the market, what will the future hold, when the smart home systems come into play. In order to examine this question, I investigated how much awareness/knowledge smartphone users of a specific demographic (millennials aged 18-25) knew about their smartphone's data and where it goes. I wanted three questions answered: - For what purposes do millennials use their smartphones? - What do they know about smartphone privacy and security? - How will this affect the future of privacy? To accomplish this, I gathered information using a distributed survey to millennials attending Arizona State University. Using statistical analysis, I exposed trends for this demographic, discovering that there isn't a lack of knowledge among millennials; most are aware that smartphone apps can collect and share data and many of the participants are not comfortable with the current state of smartphone privacy. However, more than half of the study participants indicated that they never read an app's Terms of Service. Due to the nature of the privacy vs. convenience argument, users will willingly agree to let apps take their personal in- formation, since they don't want to give up the convenience.
ContributorsJones, Scott Spenser (Author) / Atkinson, Robert (Thesis director) / Chavez-Echeagaray, Maria Elena (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2016-12
148121-Thumbnail Image.png
Description

This thesis proposes hardware and software security enhancements to the robotic explorer of a capstone team, in collaboration with the NASA Psyche Mission Student Collaborations program. The NASA Psyche Mission, launching in 2022 and reaching the metallic asteroid of the same name in 2026, will explore from orbit what is

This thesis proposes hardware and software security enhancements to the robotic explorer of a capstone team, in collaboration with the NASA Psyche Mission Student Collaborations program. The NASA Psyche Mission, launching in 2022 and reaching the metallic asteroid of the same name in 2026, will explore from orbit what is hypothesized to be remnant core material of an early planet, potentially providing key insights to planet formation. Following this initial mission, it is possible there would be scientists and engineers interested in proposing a mission to land an explorer on the surface of Psyche to further document various properties of the asteroid. As a proposal for a second mission, an interdisciplinary engineering and science capstone team at Arizona State University designed and constructed a robotic explorer for the hypothesized surfaces of Psyche, capable of semi-autonomously navigating simulated surfaces to collect scientific data from onboard sensors. A critical component of this explorer is the command and data handling subsystem, and as such, the security of this system, though outside the scope of the capstone project, remains a crucial consideration. This thesis proposes the pairing of Trusted Platform Module (TPM) technology for increased hardware security and the implementation of SELinux (Security Enhanced Linux) for increased software security for Earth-based testing as well as space-ready missions.

ContributorsAnderson, Kelly Joanne (Author) / Bowman, Catherine (Thesis director) / Kozicki, Michael (Committee member) / Electrical Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
147833-Thumbnail Image.png
Description

In light of the 2020 Presidential election, accusations regarding early voting methods have risen as a topic of debate among active voters. In order to ensure the voter’s trust in voting methods, it is important to analyze whether such accusations are truthful or just dramatized speculation. Do early voting methods

In light of the 2020 Presidential election, accusations regarding early voting methods have risen as a topic of debate among active voters. In order to ensure the voter’s trust in voting methods, it is important to analyze whether such accusations are truthful or just dramatized speculation. Do early voting methods negatively infringe on the integrity the U.S. election process? Using gathered voter statistics and conducted partisan research within recent elections, this defense examines the impact early voting has had through the analysis of two of its most controversial claims. The author finds that there exists little to no reasonable support to conclude existence of infringement to the integrity of the election process, and the reasons that explain this topic’s rise in popularity lies in the failure to accept defeat and the notion of fear.

Created2021-05
132273-Thumbnail Image.png
Description
Women, Peace, and Security (WPS) practitioners (including policymakers, scholars, and nonprofit leaders) in the U.S. and Canada have often focused their attention on the United Nations’ WPS initiative as a strategy for responding to conflicts abroad, particularly in the Global South. As a result of these limitations, black, Latino, and

Women, Peace, and Security (WPS) practitioners (including policymakers, scholars, and nonprofit leaders) in the U.S. and Canada have often focused their attention on the United Nations’ WPS initiative as a strategy for responding to conflicts abroad, particularly in the Global South. As a result of these limitations, black, Latino, and Indigenous advocates and peacebuilders in the U.S. and Canada remain largely unable to take advantage of WPS frameworks and resources. The subjectivity of the term “conflict” and the range of circumstances where it is used inspire this research. The selective application of the word “conflict” is itself a challenge to security, for conflicts can only be addressed once they are acknowledged and so named. Where does WPS intersect with contemporary Indigenous advocacy? A case study of the #noDAPL movement and the ways that nonviolence and women’s leadership emerged at Standing Rock, ND in 2016 provide a partial answer. Four challenges and recommendations are offered to WPS practitioners who seek to expand the availability of WPS resources to Indigenous peoples in the U.S. and Canada. These challenges and recommendations draw upon existing National Action Plans, legal and policy documents, and data from four interviews conducted with Indigenous women advocates in the U.S. and Canada in 2019. Above all, this paper seeks to encourage WPS practitioners to move beyond “gender mainstreaming” to consider not only how policies and practices impact women and men differently, but also how they may impact Indigenous people and settlers differently.
Created2019-05