Matching Items (7)
Filtering by

Clear all filters

151890-Thumbnail Image.png
Description
Gender and sex are often conflated. Our laws, policies, and even science establish sex and gender as intrinsically linked and dimorphic in nature. This dissertation examines the relationship between sex and gender and the repercussions of this linked dimorphism in the realms of law, politics, and science. Chapter One identifies

Gender and sex are often conflated. Our laws, policies, and even science establish sex and gender as intrinsically linked and dimorphic in nature. This dissertation examines the relationship between sex and gender and the repercussions of this linked dimorphism in the realms of law, politics, and science. Chapter One identifies the legal climate for changing one's sexual identity post-surgical reassignment. It pays particular attention to the ability of postsurgical transsexuals to marry in their acquired sex. Chapter Two considers the process for identifying the sex of athletes for the purposes of participation in sex-segregated athletic events, specifically the role of testing and standards for categorization. Chapter Three explores the process of identifying and assigning the sex of intersex children. Chapter Four examines the process of prenatal sex selection and its ethical implications. Chapter Four also offers an anticipatory governance framework to address these implications.
ContributorsParsi, John (Author) / Crittenden, Jack (Thesis advisor) / Guston, David H. (Committee member) / Marchant, Gary (Committee member) / Arizona State University (Publisher)
Created2013
151152-Thumbnail Image.png
Description
Access control is one of the most fundamental security mechanisms used in the design and management of modern information systems. However, there still exists an open question on how formal access control models can be automatically analyzed and fully realized in secure system development. Furthermore, specifying and managing access control

Access control is one of the most fundamental security mechanisms used in the design and management of modern information systems. However, there still exists an open question on how formal access control models can be automatically analyzed and fully realized in secure system development. Furthermore, specifying and managing access control policies are often error-prone due to the lack of effective analysis mechanisms and tools. In this dissertation, I present an Assurance Management Framework (AMF) that is designed to cope with various assurance management requirements from both access control system development and policy-based computing. On one hand, the AMF framework facilitates comprehensive analysis and thorough realization of formal access control models in secure system development. I demonstrate how this method can be applied to build role-based access control systems by adopting the NIST/ANSI RBAC standard as an underlying security model. On the other hand, the AMF framework ensures the correctness of access control policies in policy-based computing through automated reasoning techniques and anomaly management mechanisms. A systematic method is presented to formulate XACML in Answer Set Programming (ASP) that allows users to leverage off-the-shelf ASP solvers for a variety of analysis services. In addition, I introduce a novel anomaly management mechanism, along with a grid-based visualization approach, which enables systematic and effective detection and resolution of policy anomalies. I further evaluate the AMF framework through modeling and analyzing multiparty access control in Online Social Networks (OSNs). A MultiParty Access Control (MPAC) model is formulated to capture the essence of multiparty authorization requirements in OSNs. In particular, I show how AMF can be applied to OSNs for identifying and resolving privacy conflicts, and representing and reasoning about MPAC model and policy. To demonstrate the feasibility of the proposed methodology, a suite of proof-of-concept prototype systems is implemented as well.
ContributorsHu, Hongxin (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Dasgupta, Partha (Committee member) / Ye, Nong (Committee member) / Arizona State University (Publisher)
Created2012
147777-Thumbnail Image.png
Description

This study analyzed currently existing statute at the state, federal, and international level to ultimately build a criteria of recommendations for policymakers to consider when building regulations for facial recognition technology usage by law enforcement agencies within the United States.

ContributorsHong, Susan Suggi (Author) / Royal, K (Thesis director) / Marchant, Gary (Committee member) / Historical, Philosophical & Religious Studies (Contributor) / School of Politics and Global Studies (Contributor, Contributor) / Historical, Philosophical & Religious Studies, Sch (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
164188-Thumbnail Image.png
Description

My honors thesis focuses on the technological aspects and the legal impacts of prosthetics and advanced prosthetics. There is a lot of case law dealing with early prosthetics when it comes to worker’s compensation, airport security, prisons and sports. However, there has been little case law that has dealt with

My honors thesis focuses on the technological aspects and the legal impacts of prosthetics and advanced prosthetics. There is a lot of case law dealing with early prosthetics when it comes to worker’s compensation, airport security, prisons and sports. However, there has been little case law that has dealt with advanced prosthetics. As prosthetic limbs become more technologically advanced and intertwined with one’s identity, it is crucial that laws are made to draw a new line between person and property. The innovation of prosthetic limbs has just begun and will surely face setbacks along the way, but the benefits will be worth it once the law catches up with the rapidly advancing technology.

ContributorsRogers, Madison (Author) / Marchant, Gary (Thesis director) / Schaefer, Sydney (Committee member) / Barrett, The Honors College (Contributor) / Harrington Bioengineering Program (Contributor)
Created2022-05
Description

To mitigate climate change, carbon needs to be removed from the atmosphere and stored for thousands of years. Currently, carbon removal and storage are voluntarily procured, and longevity of storage is inconsistently defined and regulated. Clauses can be added to procurement contracts to require long-term management and increase the durability

To mitigate climate change, carbon needs to be removed from the atmosphere and stored for thousands of years. Currently, carbon removal and storage are voluntarily procured, and longevity of storage is inconsistently defined and regulated. Clauses can be added to procurement contracts to require long-term management and increase the durability of storage. Well-designed and properly enforced contracts can pave the way to future regulation for long-term carbon management.

ContributorsHagood, Emily (Author) / Lackner, Klaus (Thesis director) / Marchant, Gary (Committee member) / Barrett, The Honors College (Contributor) / Materials Science and Engineering Program (Contributor) / School of Mathematical and Statistical Sciences (Contributor) / School of Sustainability (Contributor)
Created2023-05
153032-Thumbnail Image.png
Description
Most existing security decisions for both defending and attacking are made based on some deterministic approaches that only give binary answers. Even though these approaches can achieve low false positive rate for decision making, they have high false negative rates due to the lack of accommodations to new attack methods

Most existing security decisions for both defending and attacking are made based on some deterministic approaches that only give binary answers. Even though these approaches can achieve low false positive rate for decision making, they have high false negative rates due to the lack of accommodations to new attack methods and defense techniques. In this dissertation, I study how to discover and use patterns with uncertainty and randomness to counter security challenges. By extracting and modeling patterns in security events, I am able to handle previously unknown security events with quantified confidence, rather than simply making binary decisions. In particular, I cope with the following four real-world security challenges by modeling and analyzing with pattern-based approaches: 1) How to detect and attribute previously unknown shellcode? I propose instruction sequence abstraction that extracts coarse-grained patterns from an instruction sequence and use Markov chain-based model and support vector machines to detect and attribute shellcode; 2) How to safely mitigate routing attacks in mobile ad hoc networks? I identify routing table change patterns caused by attacks, propose an extended Dempster-Shafer theory to measure the risk of such changes, and use a risk-aware response mechanism to mitigate routing attacks; 3) How to model, understand, and guess human-chosen picture passwords? I analyze collected human-chosen picture passwords, propose selection function that models patterns in password selection, and design two algorithms to optimize password guessing paths; and 4) How to identify influential figures and events in underground social networks? I analyze collected underground social network data, identify user interaction patterns, and propose a suite of measures for systematically discovering and mining adversarial evidence. By solving these four problems, I demonstrate that discovering and using patterns could help deal with challenges in computer security, network security, human-computer interaction security, and social network security.
ContributorsZhao, Ziming (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2014
158243-Thumbnail Image.png
Description
The 1973 Supreme Court case Roe v. Wade was a significant event in the story of fetal personhood—the story of whether embryos and fetuses are legal persons. Roe legalized abortion care in the United States (US). However, the story of fetal personhood began long before the 1970s. People have been

The 1973 Supreme Court case Roe v. Wade was a significant event in the story of fetal personhood—the story of whether embryos and fetuses are legal persons. Roe legalized abortion care in the United States (US). However, the story of fetal personhood began long before the 1970s. People have been talking about embryos, fetuses, and their status in science, the law, and society for centuries. I studied the history of fetal personhood in the United States, tracing its origins from Ancient Rome and Medieval England to its first appearance in a US courtroom in 1884 and then to the Supreme Court’s decision in 1973.

But this isn’t a history of events—of names and dates and typical details. This is a history of words. In the twenty-first century, words used to discuss embryos and fetuses are split. Some people use humanizing language like “unborn children” and “human life.” Others use technical words like “embryos” and “fetuses.” I studied what words people used historically. I charted how words moved from science to the public to the law, and how they impacted court rulings on fetal personhood.

The use of certain words nudged courts to grant additional rights to embryos and fetuses. In the 1960s, writers began describing the science of development, using words like “unborn child” and humanizing descriptions to make embryos and fetuses seem like people already born. That helped build an idea of embryos and fetuses as having “life” before birth. When people began asking courts to legalize abortion care in the 1970s, attorneys on the opposite side argued that embryos and fetuses were “human life,” and that that “life” began at conception.

In those cases, “life” was biologically defined as when sperm fertilized egg, but it was on that biological definition “life” that judges improperly rested their legal rulings that embryos and fetuses were “potential human life” states had a duty to protect. It wasn’t legal personhood, but it was a legal status that let states pass laws restricting abortion care and punishing pregnant people for their behavior, trends that threaten people’s lives and autonomy in the twenty-first century.
ContributorsAbboud, Carolina (Author) / Maienschein, Jane (Thesis advisor) / Justice, George (Committee member) / Marchant, Gary (Committee member) / Pyne, Stephen (Committee member) / Arizona State University (Publisher)
Created2020